USN Middleware Access Control of Sensor Network and Selective Encryption of Information

This paper is to prepare guidelines for providing security functions that protect USN middleware system resources from malicious nodes by providing authentication, authorization and confidentiality for middleware connection nodes (applications/manager, sensor network) to make USN middleware safe.

[1]  Maode Ma,et al.  Information Computing and Applications - First International Conference, ICICA 2010, Tangshan, China, October 15-18, 2010. Proceedings , 2010, ICICA.

[2]  Sang Hyuk Son,et al.  Event Detection Services Using Data Service Middleware in Distributed Sensor Networks , 2003, Telecommun. Syst..

[3]  Namje Park,et al.  Secure RFID Application Data Management Using All-Or-Nothing Transform Encryption , 2010, WASA.

[4]  Bernhard Nebel,et al.  Spatial Cognition: Reasoning, Action, Interaction , 2010, KI - Künstliche Intelligenz.

[5]  Dongho Won,et al.  Multilateral Approaches to the Mobile RFID Security Problem Using Web Service , 2008, APWeb.

[6]  Chao-Fu Hong,et al.  Semantic Methods for Knowledge Management and Communication , 2011 .

[7]  Chien-Chung Shen,et al.  Sensor information networking architecture and applications , 2001, IEEE Wirel. Commun..

[8]  Dongho Won,et al.  WIPI Mobile Platform with Secure Service for Mobile RFID Network Environment , 2006, APWeb Workshops.

[9]  Dongho Won,et al.  Privacy Preserving Enhanced Service Mechanism in Mobile RFID Network , 2007, AWIC.

[10]  Dongho Won,et al.  Open Location-Based Service Using Secure Middleware Infrastructure in Web Services , 2005, ICCSA.

[11]  Wilfried Brauer,et al.  Spatial Cognition III , 2003, Lecture Notes in Computer Science.

[12]  David Taniar,et al.  Computational Science and Its Applications - ICCSA 2005, International Conference, Singapore, May 9-12, 2005, Proceedings, Part I , 2005, ICCSA.

[13]  Namje Park,et al.  Security Scheme for Managing a Large Quantity of Individual Information in RFID Environment , 2010, ICICA.

[14]  Namje Park,et al.  AONT Encryption Based Application Data Management in Mobile RFID Environment , 2010, ICCCI.

[15]  Namje Park,et al.  Secure Data Access Control Scheme Using Type-Based Re-encryption in Cloud Environment , 2011 .

[16]  Namje Park Secure UHF/HF Dual-Band RFID : Strategic Framework Approaches and Application Solutions , 2011, ICCCI.

[17]  Minglu Li,et al.  Advanced Web and Network Technologies, and Applications , 2006 .

[18]  Yong Yao,et al.  The cougar approach to in-network query processing in sensor networks , 2002, SGMD.