Secure and practical access control mechanism for WSN with node privacy

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Privacy Preserving Dynamic Access Control Model with Access Delegation for eHealth

eHealth is the concept of using the stored digital data to achieve clinical, educational, and administrative goals and meet the needs of patients, experts, and medical care providers. Expansion of the utilization of information technology and in particular, the Internet of Things (IoT) in eHealth, raises various challenges, where the most important one is security and access control. In this re...

متن کامل

Practical server privacy with secure coprocessors

What does it take to implement a server that provides access to records in a large database, in a way that ensures that this access is completely private—even to the operator of this server? In this paper, we abstract this problem to a real world computer security application, and examine the question: using current commercially available technology, is it practical to build such a server, for ...

متن کامل

Maximizing Lifetime through Phantom Node for Privacy Preservation in WSN

One of the major challenges in real-time event-monitoring applications such as military surveillance or monitoring of endangered species of Wireless Sensor Network (WSN), is that of context privacy in terms of location of source node. When a source node senses and forwards a packet to the target, adversaries can eavesdrop on network and trace source node from base station. The concept of introd...

متن کامل

A Location-based Secure Access Control Mechanism for Geospatial Data

Nowadays due to the advancements in spatial data acquisition technologies, data acquisition technologies are producing mass high precision spatial data. To store such high precision data onto the database is a big challenge today. Spatial database is different from relational database as it contains data along with its location, so security concerns of spatial database are also different from r...

متن کامل

Cryptography for Secure and Private Databases: Enabling Practical Data Access without Compromising Privacy

IN 2006 America Online’s research division leaked the web search histories of more than 600,000 of their customers. While this data had been stripped of customer names and identifying information, it nevertheless revealed deeply private information about these individuals’ identities and interests. Access to information is becoming fundamental to our society, whether it is a web search or a loo...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Journal of King Saud University - Computer and Information Sciences

سال: 2020

ISSN: 1319-1578

DOI: 10.1016/j.jksuci.2020.05.010