Entity

Time filter

Source Type


Sun Y.,Chinese Academy of Sciences | Sun Y.,Beijing University of Posts and Telecommunications | Yin L.,Chinese Academy of Sciences | Yin L.,Beijing Key Laboratory of IOT Information Security
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | Year: 2014

Mobile social networks (MSNs) are a kind of delay tolerant network that consists of lots of mobile nodes with social characteristics. Recently, many social-aware algorithms have been proposed to address routing problems in MSNs. However, it also brings more security and privacy concerns. In this paper, we discuss a specific type of Sybil attack in MSNs, which few researches has been focused on. We proposed a security mechanism to detect Sybil nodes and eliminate them to ensure the routing security while routing forwarding. It needs to cooperate by two sides, which is, respectively measuring distance in client side and eliminating Sybil nodes in server side. We also demonstrate the solution is correct and analyze its energy costs. © Springer International Publishing Switzerland 2014. Source


Sun Y.,Chinese Academy of Sciences | Sun Y.,Beijing University of Posts and Telecommunications | Yin L.,Chinese Academy of Sciences | Yin L.,Beijing Key Laboratory of IOT Information Security | Liu W.,Harbin Institute of Technology
Proceedings - IEEE INFOCOM | Year: 2014

Mobile social networks (MSNs) are a kind of delay tolerant network that consists of lots of mobile nodes with social characteristics. Recently, many social-aware algorithms have been proposed to address routing problems in MSNs. However, it also brings more security and privacy concerns. In this paper, we discuss a specific type of Sybil attack in MSNs, which few researches has been focused on. We proposed a security mechanism to detect Sybil nodes and eliminate them to ensure the routing security while routing forwarding. It needs to cooperate by two sides, which is, respectively measuring distance in client side and eliminating Sybil nodes in server side. We also demonstrate the solution is correct and analyze its energy costs. © 2014 IEEE. Source


Guo Y.,Chinese Academy of Sciences | Guo Y.,Beijing Key Laboratory of IOT Information Security | Yin L.,Chinese Academy of Sciences | Yin L.,Beijing Key Laboratory of IOT Information Security | And 3 more authors.
Scientific World Journal | Year: 2014

Access control is a key technology in providing security in the Internet of Things (IoT). The mainstream security approach proposed for the sensing layer of the IoT concentrates only on authentication while ignoring the more general models. Unreliable communications and resource constraints make the traditional access control techniques barely meet the requirements of the sensing layer of the IoT. In this paper, we propose a model that combines space and time with reputation to control access to the information within the sensing layer of the IoT. This model is called spatiotemporal access control based on reputation (STRAC). STRAC uses a lattice-based approach to decrease the size of policy bases. To solve the problem caused by unreliable communications, we propose both nondeterministic authorizations and stochastic authorizations. To more precisely manage the reputation of nodes, we propose two new mechanisms to update the reputation of nodes. These new approaches are the authority-based update mechanism (AUM) and the election-based update mechanism (EUM). We show how the model checker UPPAAL can be used to analyze the spatiotemporal access control model of an application. Finally, we also implement a prototype system to demonstrate the efficiency of our model. © 2014 Yunchuan Guo et al. Source


Weiqing H.,Chinese Academy of Sciences | Weiqing H.,Beijing Jiaotong University | Chang D.,Chinese Academy of Sciences | Chang D.,Beijing Key Laboratory of IOT Information Security | And 3 more authors.
Computer Science and Information Systems | Year: 2015

Nowadays RFID indoor targets positioning results display methods are simplified. The positioning results visual effect is also unsatisfied. To solve this problem, we design and realize a comprehensive method to implement RFID indoor localization algorithms in a geographic information system. In our method, the RFID indoor targets positioning results can display in the real geographic environment, which can improve the application value of the results. First, we establish the geographic environment using geographic information system in order to combine RFID indoor positioning results with the real environment. Then we design a distributed system architecture to filter the useless data and implement the positioning algorithm. In this way, indoor targets real-time positioning and the results visualization display are realized. And the positioning results can also be combined with the real geographic information environment. System test results indicate that this method achieves ideal indoor positioning data display effect under well indoor-positioning precision. © 2015 ComSIS Consortium. All rights reserved. Source

Discover hidden collaborations