{"title":"Efficient Access Control in Wireless Network","authors":"Kun Wang, Zhenguo Ding, Lihua Zhou","doi":"10.1109/WI-IATW.2006.63","DOIUrl":null,"url":null,"abstract":"To use role-based access control (RBAC) in wireless network is difficult than that in wired network. RBAC needs to search relative tables to get the user's permissions. We present an access control judgment algorithm which bases on artificial neural network (ANN). The algorithm reduces the data transmission using bit string to express roles and permissions. The algorithm employs set theory to represent roles and their inheritance hierarchy, as well as conflicted permissions. It uses selected roles as input vectors and the matching permissions which contain no conflict as the output vectors to train the ANN. Then it uses the trained ANN to compute directly users' permissions when the system is under running condition, instead of searching tables. That improves the efficiency of access control. The algorithm is simple and efficient, which makes it easy to be realized in wireless networks","PeriodicalId":358971,"journal":{"name":"2006 IEEE/WIC/ACM International Conference on Web Intelligence and Intelligent Agent Technology Workshops","volume":"25 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2006-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"4","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2006 IEEE/WIC/ACM International Conference on Web Intelligence and Intelligent Agent Technology Workshops","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/WI-IATW.2006.63","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 4
Abstract
To use role-based access control (RBAC) in wireless network is difficult than that in wired network. RBAC needs to search relative tables to get the user's permissions. We present an access control judgment algorithm which bases on artificial neural network (ANN). The algorithm reduces the data transmission using bit string to express roles and permissions. The algorithm employs set theory to represent roles and their inheritance hierarchy, as well as conflicted permissions. It uses selected roles as input vectors and the matching permissions which contain no conflict as the output vectors to train the ANN. Then it uses the trained ANN to compute directly users' permissions when the system is under running condition, instead of searching tables. That improves the efficiency of access control. The algorithm is simple and efficient, which makes it easy to be realized in wireless networks