{"title":"无线节点的生物识别访问控制","authors":"O. Althobaiti, Mznah Al-Rodhaan, A. Al-Dhelaan","doi":"10.1109/CASoN.2012.6412397","DOIUrl":null,"url":null,"abstract":"The most important requirements of Wireless Sensor Network (WSN) security are confidentiality, authentication and integrity. User authentication is necessary for legitimate access control in WSNs. These sensors have limited processing power, bandwidth, memory and limited communication abilities. Assume that WSN is deployed in a hospital, a university campus, or a smart home, to permit legal users to query and receive the particular response from any of this sensor node of WSN. Significantly, the system must produce authentication method for confirming if the user is legal or not. We present a solution based on biometric for this problem and also adapt it for WSN environment. The proposed protocol involves simple operations and light computations.","PeriodicalId":431370,"journal":{"name":"2012 Fourth International Conference on Computational Aspects of Social Networks (CASoN)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2012-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"Biometric access control for wireless nodes\",\"authors\":\"O. Althobaiti, Mznah Al-Rodhaan, A. Al-Dhelaan\",\"doi\":\"10.1109/CASoN.2012.6412397\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The most important requirements of Wireless Sensor Network (WSN) security are confidentiality, authentication and integrity. User authentication is necessary for legitimate access control in WSNs. These sensors have limited processing power, bandwidth, memory and limited communication abilities. Assume that WSN is deployed in a hospital, a university campus, or a smart home, to permit legal users to query and receive the particular response from any of this sensor node of WSN. Significantly, the system must produce authentication method for confirming if the user is legal or not. We present a solution based on biometric for this problem and also adapt it for WSN environment. The proposed protocol involves simple operations and light computations.\",\"PeriodicalId\":431370,\"journal\":{\"name\":\"2012 Fourth International Conference on Computational Aspects of Social Networks (CASoN)\",\"volume\":\"29 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2012-11-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2012 Fourth International Conference on Computational Aspects of Social Networks (CASoN)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/CASoN.2012.6412397\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2012 Fourth International Conference on Computational Aspects of Social Networks (CASoN)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CASoN.2012.6412397","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
The most important requirements of Wireless Sensor Network (WSN) security are confidentiality, authentication and integrity. User authentication is necessary for legitimate access control in WSNs. These sensors have limited processing power, bandwidth, memory and limited communication abilities. Assume that WSN is deployed in a hospital, a university campus, or a smart home, to permit legal users to query and receive the particular response from any of this sensor node of WSN. Significantly, the system must produce authentication method for confirming if the user is legal or not. We present a solution based on biometric for this problem and also adapt it for WSN environment. The proposed protocol involves simple operations and light computations.