Research on the access control protocol Priccess design of network privacy protection

To provide a more reliable security for the network privacy, the access control protocol Priccess design of network privacy protection was studied. First of all, this paper presented the problems in wireless network security, and points out the key technologies, including privacy protection, user authentication, trust management, network security communication architecture and other technologies. Then, it made a brief analysis of the composition of the Priccess protocol, a wireless communication network in the roaming authentication scheme and wireless sensor network privacy data protection scheme. Furthermore, the roaming authentication scheme and wireless sensor networks data privacy protection in a wireless communication network was established. Finally, the results of the evaluation of the message load of Priccess protocol proved it was efficient for most of the user access devices, which could provide more efficient protection for the privacy of the network communication.

[1]  Keqiu Li,et al.  Energy-efficient and high-accuracy secure data aggregation in wireless sensor networks , 2011, Comput. Commun..

[2]  Srinivasa Rao,et al.  Cooperative Caching in Wireless P2P Networks: Design, Implementation and Evaluation , 2013 .

[3]  U. N. Okorafor,et al.  Security and Privacy for Distributed Multimedia Sensor Networks , 2008, Proceedings of the IEEE.

[4]  Sajal K. Das,et al.  Privacy preservation in wireless sensor networks: A state-of-the-art survey , 2009, Ad Hoc Networks.

[5]  Dario Pompili,et al.  Underwater acoustic sensor networks: research challenges , 2005, Ad Hoc Networks.

[6]  Kyung Sup Kwak,et al.  Security and Privacy Issues in Wireless Sensor Networks for Healthcare Applications , 2010, Journal of Medical Systems.

[7]  William A. Arbaugh,et al.  Wireless Network Security and Interworking , 2006, Proceedings of the IEEE.

[8]  Muhammad Khurram Khan,et al.  Cryptanalysis and Security Improvements of ‘Two-Factor User Authentication in Wireless Sensor Networks’ , 2010, Sensors.

[9]  Weisong Shi,et al.  Wireless Sensor Network Security: A Survey , 2006 .

[10]  Latanya Sweeney,et al.  Achieving k-Anonymity Privacy Protection Using Generalization and Suppression , 2002, Int. J. Uncertain. Fuzziness Knowl. Based Syst..

[11]  Ian F. Akyildiz,et al.  Wireless mesh networks: a survey , 2005, Comput. Networks.

[12]  John A. Stankovic,et al.  ALARM-NET: Wireless Sensor Networks for Assisted-Living and Residential Monitoring , 2006 .

[13]  Andy Hopper,et al.  The active badge location system , 1992, TOIS.

[14]  Ming Li,et al.  Data security and privacy in wireless body area networks , 2010, IEEE Wireless Communications.

[15]  V. Kavitha,et al.  A survey on security issues in service delivery models of cloud computing , 2011, J. Netw. Comput. Appl..

[16]  A. Felt Privacy Protection for Social Networking APIs , 2008 .

[17]  S.D. Baker,et al.  Medical-Grade, Mission-Critical Wireless Networks [Designing an Enterprise Mobility Solution in the Healthcare Environment] , 2008, IEEE Engineering in Medicine and Biology Magazine.

[18]  John A. Stankovic,et al.  Security in wireless sensor networks , 2004, SASN '04.

[19]  Panagiotis Papadimitratos,et al.  Secure vehicular communication systems: implementation, performance, and research challenges , 2008, IEEE Communications Magazine.

[20]  J.A. Stankovic,et al.  Denial of Service in Sensor Networks , 2002, Computer.

[21]  Peter Langendörfer,et al.  Application of wireless sensor networks in critical infrastructure protection: challenges and design options [Security and Privacy in Emerging Wireless Networks] , 2010, IEEE Wireless Communications.

[22]  Elaine Shi,et al.  Designing secure sensor networks , 2004, IEEE Wireless Communications.

[23]  Chun Chen,et al.  Distributed Access Control with Privacy Support in Wireless Sensor Networks , 2011, IEEE Transactions on Wireless Communications.

[24]  Avi Ostfeld,et al.  The Battle of the Water Sensor Networks (BWSN): A Design Challenge for Engineers and Algorithms , 2008 .

[25]  Yang Xiao,et al.  Wireless Network Security , 2006, EURASIP J. Wirel. Commun. Netw..