Skip to main content
Log in

Time-Based Access Control for Multi-attribute Data in Internet of Things

  • Published:
Mobile Networks and Applications Aims and scope Submit manuscript

Abstract

Internet of Things (IoT) has become a vital part of our infrastructure to enrich lives and make processes easier. In these people-centric IoT applications, massive personal data are collected in real-time and stored by the resource constrained sensor network. Because any misusage of these personal data might result in the leakage of privacy and economic losses, it is expected that the data requesters can only access to the data what they have purchased, or are entitled to use. How to accurately control data access permissions is one of the prerequisites for IoT data protection. Based on a revised one-way hash chain technique, we proposed a novel Time-based Access Control (TAC) scheme for multi-attribute data in Internet of Things. All the data are partitioned into 2-D subspaces representing generation time and data attribute. Data in each subspace is encrypted with the corresponding sub-key before its transmission to the base station to achieve data privacy and access control. Anyone who wants to read or use data with specified attribute at a particular time must get the corresponding sub-key from the data source node or the owner. TAC can generate a sub-key for data in each subspace in an efficient manner in terms of less sub-key generation time and low memory space usage. We proposed three improved schemes to further reduce sub-key computation time according to different application scenarios. The experimental results show that TAC can be applied to the resource limited WSNs efficiently.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10

Similar content being viewed by others

References

  1. Brown M, Cheung D, Hankerson D, Lopez J, Kirkup M, Menezes A (2000) Pgp in constrained wireless devices. In: Proceedings of the 9th USENIX security symposium, pp 19–19

  2. Capkun S, Hubaux J (2005) Secure positioning of wireless devices with application to sensor networks. In: International conference on computer communications, vol 3, pp 1917–1928

  3. Cui J (2018) Securing display path for security-sensitive applications on mobile devices. Comput Mater Continua 55(1):017–017

    Google Scholar 

  4. Deng J, Han R, Mishra S (2005) Countermeasures against traffic analysis attacks in wireless sensor networks. In: International workshop on security, pp 113–126

  5. Ganeriwal S, Capkun S, Han C, Srivastava MB (2005) Secure time synchronization service for sensor networks. In: Workshop on wireless security, pp 97–106

  6. Kamat P, Xu W, Trappe W, Zhang Y (2009) Temporal privacy in wireless sensor networks: theory and practice. ACM Trans Sensor Netw 5(4):28–52

    Article  Google Scholar 

  7. Kamat P, Zhang Y, Trappe W, Ozturk C (2005) Enhancing source-location privacy in sensor network routing. In: International conference on distributed computing systems, pp 599–608

  8. Karlof C, Sastry N, Wagner DA (2004) Tinysec: a link layer security architecture for wireless sensor networks. In: International conference on embedded networked sensor systems, pp 162–175

  9. Li D, Zhang G, Xu Z, Lan Y, Shi Y, Liang Z, Chen H (2018) Modelling the roles of cewebrity trust and platform trust in consumers propensity of live-streaming an extended tam method. Comput Mater Continua 55 (1):137–137

    Google Scholar 

  10. Liu W, Luo X, Liu Y, Liu J, Liu M, Shi YQ (2018) Localization algorithm of indoor wi-fi access points based on signal strength relative relationship and region division. Comput Mater Continua 55(1):071–071

    Google Scholar 

  11. Mao X, Miao X, He Y, Li X, Liu Y (2012) Citysee: urban co2 monitoring with sensors. In: International conference on computer communications, Orlando, pp 1611–1619

  12. Ouaddah A, Mousannif H, Elkalam AA, Ouahman AA (2017) Access control in the internet of things: big challenges and new opportunities. Comput Netw 112:237–262

    Article  Google Scholar 

  13. Perrig A, Szewczyk R, Wen V, Culler DE, Tygar JD (2001) Spins: security protocols for sensor networks. In: ACM/IEEE international conference on mobile computing and networking, pp 189–199

  14. Sicari S, Rizzardi A, Grieco LA, Coenporisini A (2015) Security, privacy and trust in internet of things. Comput Netw 76:146–164

    Article  Google Scholar 

  15. Szewczyk R, Mainwaring AM, Polastre J, Anderson J, Culler DE (2004) An analysis of a large scale habitat monitoring application. In: International conference on embedded networked sensor systems, pp 214–226

  16. Wang B, Gu X, Ma L, Yan S (2017) E2s2: a code dissemination approach to energy efficiency and status surveillance for wireless sensor networks. J Intnernet Technol 18(4):877–885

    Google Scholar 

  17. Wang B, Gu X, Ma L, Yan S (2017) Temperature error correction based on bp neural network in meteorological wireless sensor network. Int J Sensor Netw 23(4):265

    Article  Google Scholar 

  18. Xue Q, Ganz A (2003) Runtime security composition for sensor networks (securesense). In: Proceedings of IEEE vehicular technology conference, Orlando, pp 2976–2980

  19. Yao L, Wu G, Wang J, Xia F, Lin C, Wang G (2012) A clustering k-anonymity scheme for location privacy preservation. In: IEICE Transactions on information and systems, vol 95-D, pp 134–142

  20. Zhang R, Zhang Y, Ren K (2009) Dppac: distributed privacy-preserving access control in sensor networks. IEEE Trans Parallel Distrib Syst 23:1251–1259

    Google Scholar 

  21. Zhu S, Setia S, Jajodia S (2006) Leap+: efficient security mechanisms for large-scale distributed sensor networks. ACM Trans Sensor Netw 2(4):500–528

    Article  Google Scholar 

Download references

Acknowledgments

This work is supported by the National Nature Science Foundation of China under Grant No. 61972207, U1836208, U1836110, U1536206, 61772283, 61602253, 61672294, the Major Program of the National Social Science Fund of China under Grant No. 17ZDA092, the 2011 Collaborative Innovation Center for Development and Utilization of Finance and Economics Big Data Property, Universities of Hunan Province, Open Project, under Grant No. 20181901CRP04, the Electronic Information and Control of Fujian University Engineering Research Center Fund under Grant No. EIC1704, the National Key R and D Program of China under Grant No. 2018YFB1003205, the CICAEET (Jiangsu Collaborative Innovation Center on Atmospheric Environment and Equipment Technology) fund and PAPD (Priority Academic Program Development of Jiangsu Higher Education Institutions) fund.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Baowei Wang.

Additional information

Publisher’s Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Wang, B., Li, W. & Xiong, N.N. Time-Based Access Control for Multi-attribute Data in Internet of Things. Mobile Netw Appl 26, 797–807 (2021). https://doi.org/10.1007/s11036-019-01327-2

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11036-019-01327-2

Keywords

Navigation