Entity

Time filter

Source Type


Yang M.,Beijing University of Technology | Yang M.,Hebei University of Science and Technology | He J.,Beijing University of Technology | Liu R.,Beijing Development Area Co.
Sensors and Transducers | Year: 2013

Wireless sensor networks (WSNs) play a very important role in the Internet of Things. But, how to save the energy of the wireless sensor nodes and prolong the lifetime of such networks is an emergent task for the wide adoption of the networks. Considering the characteristics of wireless sensor nodes where energy consumption for transmitting data is much more than that for computation, this paper presents method for precalculating a secure and efficient path before data transmission begins. The basic idea of the proposed method is that the path length based Floyd algorithm and trust degree between neighboring nodes are used as the reference for the selection of the routes. Data is then transmitted along the secure and efficient path in the WSNs. © 2013 by IFSA. Source


Huang N.,Beijing University of Technology | He J.,Beijing University of Technology | He J.,Beijing Development Area Co. | Zhao B.,Beijing University of Technology
International Journal of Security and its Applications | Year: 2015

To protect the data confidentiality of Android device users, this paper proposed a user-level secure data sanitization method which can make sensitive data stored in flash memory unrecoverable. The proposed method using reversed-scanning algorithm to reduce time and it don't need overwriting or erase the whole flash memory. After sensitive data pages are found, the program targetedly overwriting some blocks, erase them, and insert them into free block list waiting to be located again which means the blocks will be twice overwrited by new data. © 2015 SERSC. Source


Li W.,Beijing Development Area Co.
Procedia Environmental Sciences | Year: 2011

Low carbon architecture designed according to sustainable principles is becoming an important part of the journey towards achieving sustainable development of economy, society, natural environment and architecture itself simultaneously. The definition, principles and factors considered in design have been investigated in details in this paper. A Three Rings Models of sustainability proposed by author is useful for understanding mechanism of sustainable design. © 2011 Published by Elsevier Ltd. Source


Yu H.,Beijing University of Technology | He J.,Beijing University of Technology | Liu R.,Beijing Development Area Co. | Ji D.,Hebei Normal University
International Journal of Distributed Sensor Networks | Year: 2013

In the context of Internet of Things (IoT), multiple cooperative nodes in wireless sensor networks (WSNs) can be used to monitor an event, jointly generate a report and then send it to one or more Internet nodes for further processing. A primary security requirement in such applications is that every event data report be authenticated to intended Internet users and effectively filtered on its way to the Internet users to realize the security of data collection and transmission from the WSN. However, most present schemes developed for WSNs don't consider the Internet scenario while traditional mechanisms developed for the Internet are not suitable due to the resource constraint of sensor nodes. In this paper, we propose a scheme, which we refer to as Data Authentication and En-route Filtering (DAEF), for WSNs in the context of IoT. In DAEF, signature shares are generated and distributed based on verifiable secret sharing cryptography and an efficient ID-based signature algorithm. Our security analysis shows that DAEF can defend against node compromise attacks as well as denial of service (DoS) attacks in the form of report disruption and selective forwarding. We also analyze energy consumption to show the advantages of DAEF over some comparable schemes. © 2013 Hong Yu et al. Source


Zhang Y.,Beijing University of Technology | He J.,Beijing University of Technology | He J.,Beijing Development Area Co. | Zhao B.,Beijing University of Technology | And 2 more authors.
Computers and Security | Year: 2015

Access control is a core security technology which has been widely used in computer systems and networks to protect sensitive information and critical resources and to counter malicious attacks. Although many access control models have been developed in the past, such as discretionary access control (DAC), mandatory access control (MAC) and role-based access control (RBAC), these models are designed primarily as a defensive measure in that they are used for examining access requests and making authorization decisions based on established access control policies. As the result, even after a malicious access is identified, the requester can still keep issuing more malicious access requests without much fear of punitive consequences fromthe access control system in subsequent accesses. Such access control may be acceptable in closed systems and networks but is not adequate in open systems and networks where the real identities and other critical information about requesters may not be known to the systems and networks. In this paper, we propose to design pro-active access control so that access control systems can respond to malicious access pro-actively to suit the needs of open systems and networks. We will first apply some established principles in the Game Theory to analyze current access control models to identify the limitations that make them inadequate in open systems and networks. To design pro-active access control (PAC), we incorporate a constraint mechanism that includes feedback and evaluation components and show based on the Game Theory how to make such access control respond to malicious access in a pro-active manner. We also present a framework design of PAC and demonstrate through the implementation of trust-based access control the feasibility of design, implementation and application of pro-active access control. Such kind of models and mechanisms can serve as the foundation for the design of access control systems that will be made more effective in deterring malicious attacks in open systems and networks. © 2014 Elsevier Ltd. All rights reserved. S0167-4048(14)00181-3. Source

Discover hidden collaborations