Practical access control for sensor networks in the context of the Internet of Things

Wireless sensor network (WSN) plays an important role in military sensing and tracking, target tracking, and environment monitoring. To query of the network to get useful information from anywhere and anytime, we need to integrate the WSN into the Internet as part of the Internet of Things (IoT). In...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:Computer communications 2016-09, Vol.89-90, p.154-164
Hauptverfasser: Li, Fagen, Han, Yanan, Jin, Chunhua
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 164
container_issue
container_start_page 154
container_title Computer communications
container_volume 89-90
creator Li, Fagen
Han, Yanan
Jin, Chunhua
description Wireless sensor network (WSN) plays an important role in military sensing and tracking, target tracking, and environment monitoring. To query of the network to get useful information from anywhere and anytime, we need to integrate the WSN into the Internet as part of the Internet of Things (IoT). In this case, it is an important task to design an access control scheme that can authorize, authenticate and revoke a user to access the WSN. In this paper, we propose a heterogeneous signcryption scheme to control the access behavior of the users. We give the formal security proof of our scheme in the random oracle model. An important characteristic of our scheme is to allow a user in a certificateless cryptography (CLC) environment to send a message to a sensor node in an identity-based cryptography (IBC) environment. We give an access control scheme for the WSN in the context of the IoT using the proposed signcryption scheme. As compared with existing two access control schemes using signcryption, the computational cost of sensors in our scheme is reduced by about 22% and 53%, respectively and the energy consumption of sensors in our scheme is reduced by about 33% and 54%, respectively.
doi_str_mv 10.1016/j.comcom.2016.03.007
format Article
fullrecord <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_miscellaneous_1825522097</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><els_id>S0140366416300652</els_id><sourcerecordid>1825522097</sourcerecordid><originalsourceid>FETCH-LOGICAL-c385t-cdd29e6e8c340eb4732df12158550b9d168335b4ec2d4d66ce75d2ef438dac263</originalsourceid><addsrcrecordid>eNp9kEtLw0AUhQdRsFb_gYss3STOO-lGkOKjUNBFC-6G9M6NnZpm6kx8_XunjWvhwuHAdw7cQ8glowWjTF9vCvDbdAVPrqCioLQ8IiNWlSIvqXg5JiPKJM2F1vKUnMW4oZTKshQjsnwONfQO6jarATDGDHzXB99mjQ9ZxC4m6bD_8uEtZq7L-jUeEPzuM98c7Cy5kJi9X6xd9xrPyUlTtxEv_nRMlvd3i-ljPn96mE1v5zmISvU5WMsnqLECISmuZCm4bRhnqlKKriaW6UoItZII3EqrNWCpLMdGisrWwLUYk6uhdxf8-wfG3mxdBGzbukP_EQ2ruFKc00mZUDmgEHyMARuzC25bhx_DqNmvaDZmWNHsVzRUmLRiit0MMUxvfDoMJoLDDtC6gNAb693_Bb_cgX3N</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>1825522097</pqid></control><display><type>article</type><title>Practical access control for sensor networks in the context of the Internet of Things</title><source>ScienceDirect Journals (5 years ago - present)</source><creator>Li, Fagen ; Han, Yanan ; Jin, Chunhua</creator><creatorcontrib>Li, Fagen ; Han, Yanan ; Jin, Chunhua</creatorcontrib><description>Wireless sensor network (WSN) plays an important role in military sensing and tracking, target tracking, and environment monitoring. To query of the network to get useful information from anywhere and anytime, we need to integrate the WSN into the Internet as part of the Internet of Things (IoT). In this case, it is an important task to design an access control scheme that can authorize, authenticate and revoke a user to access the WSN. In this paper, we propose a heterogeneous signcryption scheme to control the access behavior of the users. We give the formal security proof of our scheme in the random oracle model. An important characteristic of our scheme is to allow a user in a certificateless cryptography (CLC) environment to send a message to a sensor node in an identity-based cryptography (IBC) environment. We give an access control scheme for the WSN in the context of the IoT using the proposed signcryption scheme. As compared with existing two access control schemes using signcryption, the computational cost of sensors in our scheme is reduced by about 22% and 53%, respectively and the energy consumption of sensors in our scheme is reduced by about 33% and 54%, respectively.</description><identifier>ISSN: 0140-3664</identifier><identifier>EISSN: 1873-703X</identifier><identifier>DOI: 10.1016/j.comcom.2016.03.007</identifier><language>eng</language><publisher>Elsevier B.V</publisher><subject>Access control ; Certificateless cryptography ; Computer simulation ; Cryptography ; Digital signatures ; Encryption ; Identity-based cryptography ; Internet ; Internet of Things ; Networks ; Security ; Sensors ; Signcryption</subject><ispartof>Computer communications, 2016-09, Vol.89-90, p.154-164</ispartof><rights>2016 The Authors</rights><lds50>peer_reviewed</lds50><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c385t-cdd29e6e8c340eb4732df12158550b9d168335b4ec2d4d66ce75d2ef438dac263</citedby><cites>FETCH-LOGICAL-c385t-cdd29e6e8c340eb4732df12158550b9d168335b4ec2d4d66ce75d2ef438dac263</cites><orcidid>0000-0001-6289-1265</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://dx.doi.org/10.1016/j.comcom.2016.03.007$$EHTML$$P50$$Gelsevier$$Hfree_for_read</linktohtml><link.rule.ids>315,781,785,3551,27929,27930,46000</link.rule.ids></links><search><creatorcontrib>Li, Fagen</creatorcontrib><creatorcontrib>Han, Yanan</creatorcontrib><creatorcontrib>Jin, Chunhua</creatorcontrib><title>Practical access control for sensor networks in the context of the Internet of Things</title><title>Computer communications</title><description>Wireless sensor network (WSN) plays an important role in military sensing and tracking, target tracking, and environment monitoring. To query of the network to get useful information from anywhere and anytime, we need to integrate the WSN into the Internet as part of the Internet of Things (IoT). In this case, it is an important task to design an access control scheme that can authorize, authenticate and revoke a user to access the WSN. In this paper, we propose a heterogeneous signcryption scheme to control the access behavior of the users. We give the formal security proof of our scheme in the random oracle model. An important characteristic of our scheme is to allow a user in a certificateless cryptography (CLC) environment to send a message to a sensor node in an identity-based cryptography (IBC) environment. We give an access control scheme for the WSN in the context of the IoT using the proposed signcryption scheme. As compared with existing two access control schemes using signcryption, the computational cost of sensors in our scheme is reduced by about 22% and 53%, respectively and the energy consumption of sensors in our scheme is reduced by about 33% and 54%, respectively.</description><subject>Access control</subject><subject>Certificateless cryptography</subject><subject>Computer simulation</subject><subject>Cryptography</subject><subject>Digital signatures</subject><subject>Encryption</subject><subject>Identity-based cryptography</subject><subject>Internet</subject><subject>Internet of Things</subject><subject>Networks</subject><subject>Security</subject><subject>Sensors</subject><subject>Signcryption</subject><issn>0140-3664</issn><issn>1873-703X</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2016</creationdate><recordtype>article</recordtype><recordid>eNp9kEtLw0AUhQdRsFb_gYss3STOO-lGkOKjUNBFC-6G9M6NnZpm6kx8_XunjWvhwuHAdw7cQ8glowWjTF9vCvDbdAVPrqCioLQ8IiNWlSIvqXg5JiPKJM2F1vKUnMW4oZTKshQjsnwONfQO6jarATDGDHzXB99mjQ9ZxC4m6bD_8uEtZq7L-jUeEPzuM98c7Cy5kJi9X6xd9xrPyUlTtxEv_nRMlvd3i-ljPn96mE1v5zmISvU5WMsnqLECISmuZCm4bRhnqlKKriaW6UoItZII3EqrNWCpLMdGisrWwLUYk6uhdxf8-wfG3mxdBGzbukP_EQ2ruFKc00mZUDmgEHyMARuzC25bhx_DqNmvaDZmWNHsVzRUmLRiit0MMUxvfDoMJoLDDtC6gNAb693_Bb_cgX3N</recordid><startdate>20160901</startdate><enddate>20160901</enddate><creator>Li, Fagen</creator><creator>Han, Yanan</creator><creator>Jin, Chunhua</creator><general>Elsevier B.V</general><scope>6I.</scope><scope>AAFTH</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>7SC</scope><scope>8FD</scope><scope>JQ2</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope><orcidid>https://orcid.org/0000-0001-6289-1265</orcidid></search><sort><creationdate>20160901</creationdate><title>Practical access control for sensor networks in the context of the Internet of Things</title><author>Li, Fagen ; Han, Yanan ; Jin, Chunhua</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c385t-cdd29e6e8c340eb4732df12158550b9d168335b4ec2d4d66ce75d2ef438dac263</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2016</creationdate><topic>Access control</topic><topic>Certificateless cryptography</topic><topic>Computer simulation</topic><topic>Cryptography</topic><topic>Digital signatures</topic><topic>Encryption</topic><topic>Identity-based cryptography</topic><topic>Internet</topic><topic>Internet of Things</topic><topic>Networks</topic><topic>Security</topic><topic>Sensors</topic><topic>Signcryption</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Li, Fagen</creatorcontrib><creatorcontrib>Han, Yanan</creatorcontrib><creatorcontrib>Jin, Chunhua</creatorcontrib><collection>ScienceDirect Open Access Titles</collection><collection>Elsevier:ScienceDirect:Open Access</collection><collection>CrossRef</collection><collection>Computer and Information Systems Abstracts</collection><collection>Technology Research Database</collection><collection>ProQuest Computer Science Collection</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts – Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><jtitle>Computer communications</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Li, Fagen</au><au>Han, Yanan</au><au>Jin, Chunhua</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Practical access control for sensor networks in the context of the Internet of Things</atitle><jtitle>Computer communications</jtitle><date>2016-09-01</date><risdate>2016</risdate><volume>89-90</volume><spage>154</spage><epage>164</epage><pages>154-164</pages><issn>0140-3664</issn><eissn>1873-703X</eissn><abstract>Wireless sensor network (WSN) plays an important role in military sensing and tracking, target tracking, and environment monitoring. To query of the network to get useful information from anywhere and anytime, we need to integrate the WSN into the Internet as part of the Internet of Things (IoT). In this case, it is an important task to design an access control scheme that can authorize, authenticate and revoke a user to access the WSN. In this paper, we propose a heterogeneous signcryption scheme to control the access behavior of the users. We give the formal security proof of our scheme in the random oracle model. An important characteristic of our scheme is to allow a user in a certificateless cryptography (CLC) environment to send a message to a sensor node in an identity-based cryptography (IBC) environment. We give an access control scheme for the WSN in the context of the IoT using the proposed signcryption scheme. As compared with existing two access control schemes using signcryption, the computational cost of sensors in our scheme is reduced by about 22% and 53%, respectively and the energy consumption of sensors in our scheme is reduced by about 33% and 54%, respectively.</abstract><pub>Elsevier B.V</pub><doi>10.1016/j.comcom.2016.03.007</doi><tpages>11</tpages><orcidid>https://orcid.org/0000-0001-6289-1265</orcidid><oa>free_for_read</oa></addata></record>
fulltext fulltext
identifier ISSN: 0140-3664
ispartof Computer communications, 2016-09, Vol.89-90, p.154-164
issn 0140-3664
1873-703X
language eng
recordid cdi_proquest_miscellaneous_1825522097
source ScienceDirect Journals (5 years ago - present)
subjects Access control
Certificateless cryptography
Computer simulation
Cryptography
Digital signatures
Encryption
Identity-based cryptography
Internet
Internet of Things
Networks
Security
Sensors
Signcryption
title Practical access control for sensor networks in the context of the Internet of Things
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-15T07%3A54%3A34IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Practical%20access%20control%20for%20sensor%20networks%20in%20the%20context%20of%20the%20Internet%20of%20Things&rft.jtitle=Computer%20communications&rft.au=Li,%20Fagen&rft.date=2016-09-01&rft.volume=89-90&rft.spage=154&rft.epage=164&rft.pages=154-164&rft.issn=0140-3664&rft.eissn=1873-703X&rft_id=info:doi/10.1016/j.comcom.2016.03.007&rft_dat=%3Cproquest_cross%3E1825522097%3C/proquest_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=1825522097&rft_id=info:pmid/&rft_els_id=S0140366416300652&rfr_iscdi=true