Lightweight User Access Control in Energy-Constrained Wireless Network Services

  • J. A. M. Naranjo
  • Pablo Orduña
  • Aitor Gómez-Goiri
  • Diego López-de-Ipiña
  • L. G. Casado
Part of the Lecture Notes in Computer Science book series (LNCS, volume 7656)

Abstract

This work introduces a novel access control solution for infrastructures composed of highly constrained devices which provide users with services. Low energy consumption is a key point in this kind of scenarios given that devices usually run on batteries and are unattended for long periods of time. Our proposal achieves privacy, authentication, semantic security, low energy and computational demand and device compromise impact limitation on a simple manner. The access control provided is based on user identity and time intervals. We discuss these properties and compare our proposal to previous related work.

Keywords

access control wireless network services internet of things sustainability 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Bellare, M., Canetti, R., Krawczyk, H.: Keying Hash Functions for Message Authentication. In: Koblitz, N. (ed.) CRYPTO 1996. LNCS, vol. 1109, pp. 1–15. Springer, Heidelberg (1996)Google Scholar
  2. 2.
    Chen, L.: Recommendation for key derivation using pseudorandom functions. NIST Special Publication 800-108 (2008)Google Scholar
  3. 3.
    Krawczyk, H.: Cryptographic Extraction and Key Derivation: The HKDF Scheme. In: Rabin, T. (ed.) CRYPTO 2010. LNCS, vol. 6223, pp. 631–648. Springer, Heidelberg (2010)CrossRefGoogle Scholar
  4. 4.
    Perrig, A., Szewczyk, R., Tygar, J.D., Wen, V., Culler, D.E.: SPINS: security protocols for sensor networks. Wirel. Netw. 8, 521–534 (2002)MATHCrossRefGoogle Scholar
  5. 5.
    Zhu, S., Setia, S., Jajodia, S.: LEAP+: Efficient security mechanisms for large-scale distributed sensor networks. ACM Trans. Sen. Netw. 2(4), 500–528 (2006)CrossRefGoogle Scholar
  6. 6.
    Zhang, J., Varadharajan, V.: Wireless sensor network key management survey and taxonomy. Journal of Network and Computer Applications 33(2), 63–75 (2010)CrossRefGoogle Scholar
  7. 7.
    Information technology - Open Systems Interconnection - The Directory: Public-key and attribute certificate frameworks. ITU-T recommendation X.509 (2005)Google Scholar
  8. 8.
    Chowdhury, A.R., Baras, J.S.: Energy-efficient source authentication for secure group communication with low-powered smart devices in hybrid wireless/satellite networks. EURASIP J. Wireless Comm. and Networking (2011)Google Scholar
  9. 9.
    Ngo, H.H., Wu, X., Le, P.D., Srinivasan, B.: An individual and group authentication model for wireless network services. JCIT 5(1), 82–94 (2010)CrossRefGoogle Scholar
  10. 10.
    Le, X.H., Khalid, M., Sankar, R., Lee, S.: An efficient mutual authentication and access control scheme for wireless sensor networks in healthcare. Journal of Networks 6(3) (2011)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2012

Authors and Affiliations

  • J. A. M. Naranjo
    • 1
  • Pablo Orduña
    • 2
  • Aitor Gómez-Goiri
    • 2
  • Diego López-de-Ipiña
    • 2
  • L. G. Casado
    • 1
  1. 1.Department of Computer Architecture and ElectronicsUniversity of AlmeríaSpain
  2. 2.Deusto Institute of Technology - DeustoTechUniversity of DeustoBilbaoSpain

Personalised recommendations