Lightweight User Access Control in Energy-Constrained Wireless Network Services
This work introduces a novel access control solution for infrastructures composed of highly constrained devices which provide users with services. Low energy consumption is a key point in this kind of scenarios given that devices usually run on batteries and are unattended for long periods of time. Our proposal achieves privacy, authentication, semantic security, low energy and computational demand and device compromise impact limitation on a simple manner. The access control provided is based on user identity and time intervals. We discuss these properties and compare our proposal to previous related work.
Keywordsaccess control wireless network services internet of things sustainability
Unable to display preview. Download preview PDF.
- 1.Bellare, M., Canetti, R., Krawczyk, H.: Keying Hash Functions for Message Authentication. In: Koblitz, N. (ed.) CRYPTO 1996. LNCS, vol. 1109, pp. 1–15. Springer, Heidelberg (1996)Google Scholar
- 2.Chen, L.: Recommendation for key derivation using pseudorandom functions. NIST Special Publication 800-108 (2008)Google Scholar
- 7.Information technology - Open Systems Interconnection - The Directory: Public-key and attribute certificate frameworks. ITU-T recommendation X.509 (2005)Google Scholar
- 8.Chowdhury, A.R., Baras, J.S.: Energy-efficient source authentication for secure group communication with low-powered smart devices in hybrid wireless/satellite networks. EURASIP J. Wireless Comm. and Networking (2011)Google Scholar
- 10.Le, X.H., Khalid, M., Sankar, R., Lee, S.: An efficient mutual authentication and access control scheme for wireless sensor networks in healthcare. Journal of Networks 6(3) (2011)Google Scholar