An efficient access control model for wireless sensor network

behzad molavi, Hamed Bashipour, morteza nikooghadam

Abstract


The sensor nodes after a time lose their energy. In this case, to maintain network performance, new nodes can be added to the network. In the critical applications, the adversary can take advantage of this opportunity, and enter hostile node to the network. To prevent hostile node entry, an access control mechanism is needed. In this paper, a model for access control based on elliptic curve cryptography is proposed. The scheme makes sure the node authentication. Moreover, it has secure and fast method for key distribution. Evaluation shows that our efficient scheme compared to other models have less Computational overhead. Another feature of this model is robustness against denial of service attack.

Full Text:

PDF

References


A. Perrig, R. Szewczyk, J.D. Tygar, V. Wen, D.E. Culler, SPINS: Security protocols for sensor networks, Wireless. Networks 8 (September) (2002) 521–534.

Y. Zhang, W. Liu, W. Lou, Y. Fang, Location-based compromise-tolerant security mechanisms for wireless sensor networks, IEEE JSAC, Special Issue on Security in Wireless Ad Hoc Networks 24 (2) (2006) 247–260.

Y. Zhou, Y. Zhang, Y. Fang, 2007. Access control in wireless sensor networks. Ad Hoc Networks 5 (1), 3–13.

H.F. Huang, 2009. A novel access control protocol for secure sensor networks. Computer Standards and Interfaces 31 (2), 272–276

Wu. Fan, Pai. Hao-Ting, An adaptable and scalable group access control scheme, Telematics and Informatics 2012

M. Nikooghadam, A. Zakerolhosseini, Efficient Utilization of Elliptic Curve Cryptosystem for Hierarchical Access Control, system and software jurnal 2010

X. Zou, Y.S. Dai, E. Bertino, 2008. A practical and flexible key management mechanism for trusted collaborative computing. In: Proceedings of the IEEE Conference on Computer Communications (INFOCO, 2008), April, Phoenix)

B. Antoine, B. Bagula, Modelling and Implementation of QoS inWireless Sensor Networks, Intelligent Systems and Advanced Telecommunication, 12 June 2010

M. Nikooghadam, A. Zakerolhosseini, a protocol for digital sinnature based ECDLP, 2008 asian network jurnal

M. Nikooghadam, F. Safaei & A. Zakerolhosseini. (2010). An efficient key management scheme for mobile agents in distributed networks, In IEEE, 1st international conference on parallel, distributed and grid computing.

M. Nikooghadam, & A. Zakerolhosseini. (2009). An efficient blind signature scheme based on the elliptic curve discrete logarithm problem. The ISC International Journal of Information Security, 1(2), 125–131.

I.F. Akyildiz, W. Su, Y. Sankarasubramaniam, E. Cayirci, 2002. Wireless sensor networks: a survey. Computer Networks 38 (4), 393–422.

Abbasi, A.A., Younis, M., 2007. A survey on clustering algorithms for wireless sensor networks. Computer Communications 30 (14–15), 2826–2841.

Y. Kim, A. Perrig, G. Tsudik, 2004. Group key agreement efficient in communication. IEEE Transactions on Computers 53 (7), 905–921.


Refbacks

  • There are currently no refbacks.


ISSN: 1694-2507 (Print)

ISSN: 1694-2108 (Online)