Public-key based access control in sensornet

نویسندگان

  • Haodong Wang
  • Bo Sheng
  • Chiu Chiang Tan
  • Qun Li
چکیده

Symmetric cryptography has been mostly used in security schemes in sensor networks due to the concern that public key cryptography (PKC) is too expensive for sensor devices. While these schemes are efficient in processing time, they generally require complicated key management, which may introduce high memory and communication overhead. On the contrary, PKC-based schemes have simple and clean key management, but cost more computational time. The recent progress in PKC implementation, specially elliptic curve cryptography (ECC), on sensors motivates us to design a PKC-based security scheme and compare its performance with the symmetric-key counterparts. This paper proposes a practical PKC-based access control for sensor networks, which consists of pairwise key establishment, local access control, and remote access control. We have implemented both cryptographic primitives on commercial off-the-shelf sensor devices. Building the user access control as a case study, we show that PKC-based protocol is more advantageous than those built on symmetric cryptography in terms of the memory usage, message complexity, and security resilience. Meanwhile, our work also provides insights in integrating and designing PKC-based security protocols for sensor networks.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Hash Chains Sensornet: A Key Predistribution Scheme for Distributed Sensor Networks Using Nets and Hash Chains1

Key management is an essential functionality for a security protocol; particularly for implementations to low cost devices of a distributed sensor networks (DSN)–a prototype of Internet of Things (IoT). Constraints in resources of constituent devices of a low cost IoT (example: sensors of DSN) restricts implementations of computationally heavy public key cryptosystems. This leads to adaptation ...

متن کامل

Sensornet - A Key Predistribution Scheme for Distributed Sensors using Nets

Key management is an essential functionality for developing secure cryptosystems; particularly for implementations to low cost devices of a distributed sensor networks (DSN)–a prototype of Internet of Things (IoT). Low cost leads to constraints in various resources of constituent devices of a IoT (sensors of a DSN); thereby restricting implementations of computationally heavy public key cryptos...

متن کامل

A Key Management Method for Cryptographically Enforced Access Control

This paper describes a key management method for cryptographically enforced access control. In particular, we propose an algorithm that based on the containment relation transforms an arbitrary access control matrix into a hierarchy, to which public private key pairs are assigned based on the DiffieHellman key generation scheme. Therefore, the users have to store only one key and are capable of...

متن کامل

Cross-Domain Access Control via PKI

In this note we consider how role-based access control can be managed on a large scale over the Internet and across organizational boundaries. We take a PKI approach, in which users are identified using public key certificates, as are the servers. The main features of our approach are: access control by (client, role) pair; implied revocation based on the role hierarchy; automatic generation of...

متن کامل

A Know ledge -Based Approach to Inte rne t Auth orization Using PKI

In this paper, a knowledge-based approach to Internet authorizations is proposed by using Public-Key Infrastructure (PKI) based digital certificates, trust models, Role-Based Access Control (RBAC), and intelligent backtracking. Security policies are expressed as the rules in a knowledge base. An inference engine is utilised to evaluate policies, dynamically assign roles to Internet users, and r...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • Wireless Networks

دوره 17  شماره 

صفحات  -

تاریخ انتشار 2011