Extending a User Access Control Proposal for Wireless Network Services with Hierarchical User Credentials

  • Juan Álvaro Muñoz Naranjo
  • Aitor Gómez-Goiri
  • Pablo Orduña
  • Diego López-de-Ipiña
  • Leocadio González Casado
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 239)

Abstract

We extend a previous access control solution for wireless network services with group-based authorization and encryption capabilities. Both the basic solution and this novel extension focus on minimizing computation, energy, storage and communications required at sensors so they can be run in very constrained hardware, since the computations involved rely on symmetric cryptography and key derivation functions. Furthermore, no additional messages between users and sensors are needed. Access control is based on user identity, group membership and time intervals.

Keywords

access control group-based authorization wireless network services Internet of Things ubiquitous computing 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Gómez-Goiri, A., Orduña, P., Diego, J., López-de-Ipiña, D.: Otsopack: Lightweight Semantic Framework for Interoperable Ambient Intelligence Applications. To appear in Journal of Computers in Human BehaviorGoogle Scholar
  2. 2.
    Le, X.H., Khalid, M., Sankar, R., Lee, S.: An Efficient Mutual Authentication and Access Control Scheme for Wireless Sensor Networks in Healthcare. Journal of Networks 6(3), 355–364 (2011)CrossRefGoogle Scholar
  3. 3.
    Naranjo, J.A.M., Orduña, P., Gómez-Goiri, A., López-de-Ipiña, D., Casado, L.G.: Lightweight User Access Control in Energy-Constrained Wireless Network Services. In: Bravo, J., López-de-Ipiña, D., Moya, F. (eds.) UCAmI 2012. LNCS, vol. 7656, pp. 33–41. Springer, Heidelberg (2012)CrossRefGoogle Scholar
  4. 4.
    Naranjo, J.A.M., Orduña, P., Gómez-Goiri, A., López-de-Ipiña, D., Casado, L.G.: Enabling user access control in energy-constrained wireless smart environments. To appear in Journal of Universal Computer ScienceGoogle Scholar
  5. 5.
    Ngo, H.H., Xianping, W., Phu, D.L., Srinivasan, B.: An Individual and Group Authentication Model for Wireless Network Services. JCIT 5(1), 82–94 (2010)CrossRefGoogle Scholar
  6. 6.
    Perrig, A., Szewczyk, R., Tygar, J.D., Wen, V., Culler, D.E.: SPINS: security protocols for sensor networks. Wireless Networks 8(5), 521–534 (2002)MATHCrossRefGoogle Scholar
  7. 7.
    The AVISPA Project, http://www.avispa-project.org/
  8. 8.
    Zhu, S., Setia, S., Jajodia, S.: LEAP+: Efficient security mechanisms for large-scale distributed sensor networks. ACM Transactions on Sensor Networks 2(4), 500–528 (2006)CrossRefGoogle Scholar

Copyright information

© Springer International Publishing Switzerland 2014

Authors and Affiliations

  • Juan Álvaro Muñoz Naranjo
    • 1
  • Aitor Gómez-Goiri
    • 2
  • Pablo Orduña
    • 2
  • Diego López-de-Ipiña
    • 2
  • Leocadio González Casado
    • 1
  1. 1.Dpt. of Computer ScienceUniversity of Almería, Agrifood Campus of International Excellence (ceiA3)AlmeríaSpain
  2. 2.Deusto Institute of Technology - DeustoTechUniversity of DeustoDonostia-San Sebasti’anSpain

Personalised recommendations