Practical access control for sensor networks in the context of the Internet of Things
Wireless sensor network (WSN) plays an important role in military sensing and tracking, target tracking, and environment monitoring. To query of the network to get useful information from anywhere and anytime, we need to integrate the WSN into the Internet as part of the Internet of Things (IoT). In...
Gespeichert in:
Veröffentlicht in: | Computer communications 2016-09, Vol.89-90, p.154-164 |
---|---|
Hauptverfasser: | , , |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 164 |
---|---|
container_issue | |
container_start_page | 154 |
container_title | Computer communications |
container_volume | 89-90 |
creator | Li, Fagen Han, Yanan Jin, Chunhua |
description | Wireless sensor network (WSN) plays an important role in military sensing and tracking, target tracking, and environment monitoring. To query of the network to get useful information from anywhere and anytime, we need to integrate the WSN into the Internet as part of the Internet of Things (IoT). In this case, it is an important task to design an access control scheme that can authorize, authenticate and revoke a user to access the WSN. In this paper, we propose a heterogeneous signcryption scheme to control the access behavior of the users. We give the formal security proof of our scheme in the random oracle model. An important characteristic of our scheme is to allow a user in a certificateless cryptography (CLC) environment to send a message to a sensor node in an identity-based cryptography (IBC) environment. We give an access control scheme for the WSN in the context of the IoT using the proposed signcryption scheme. As compared with existing two access control schemes using signcryption, the computational cost of sensors in our scheme is reduced by about 22% and 53%, respectively and the energy consumption of sensors in our scheme is reduced by about 33% and 54%, respectively. |
doi_str_mv | 10.1016/j.comcom.2016.03.007 |
format | Article |
fullrecord | <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_miscellaneous_1825522097</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><els_id>S0140366416300652</els_id><sourcerecordid>1825522097</sourcerecordid><originalsourceid>FETCH-LOGICAL-c385t-cdd29e6e8c340eb4732df12158550b9d168335b4ec2d4d66ce75d2ef438dac263</originalsourceid><addsrcrecordid>eNp9kEtLw0AUhQdRsFb_gYss3STOO-lGkOKjUNBFC-6G9M6NnZpm6kx8_XunjWvhwuHAdw7cQ8glowWjTF9vCvDbdAVPrqCioLQ8IiNWlSIvqXg5JiPKJM2F1vKUnMW4oZTKshQjsnwONfQO6jarATDGDHzXB99mjQ9ZxC4m6bD_8uEtZq7L-jUeEPzuM98c7Cy5kJi9X6xd9xrPyUlTtxEv_nRMlvd3i-ljPn96mE1v5zmISvU5WMsnqLECISmuZCm4bRhnqlKKriaW6UoItZII3EqrNWCpLMdGisrWwLUYk6uhdxf8-wfG3mxdBGzbukP_EQ2ruFKc00mZUDmgEHyMARuzC25bhx_DqNmvaDZmWNHsVzRUmLRiit0MMUxvfDoMJoLDDtC6gNAb693_Bb_cgX3N</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>1825522097</pqid></control><display><type>article</type><title>Practical access control for sensor networks in the context of the Internet of Things</title><source>ScienceDirect Journals (5 years ago - present)</source><creator>Li, Fagen ; Han, Yanan ; Jin, Chunhua</creator><creatorcontrib>Li, Fagen ; Han, Yanan ; Jin, Chunhua</creatorcontrib><description>Wireless sensor network (WSN) plays an important role in military sensing and tracking, target tracking, and environment monitoring. To query of the network to get useful information from anywhere and anytime, we need to integrate the WSN into the Internet as part of the Internet of Things (IoT). In this case, it is an important task to design an access control scheme that can authorize, authenticate and revoke a user to access the WSN. In this paper, we propose a heterogeneous signcryption scheme to control the access behavior of the users. We give the formal security proof of our scheme in the random oracle model. An important characteristic of our scheme is to allow a user in a certificateless cryptography (CLC) environment to send a message to a sensor node in an identity-based cryptography (IBC) environment. We give an access control scheme for the WSN in the context of the IoT using the proposed signcryption scheme. As compared with existing two access control schemes using signcryption, the computational cost of sensors in our scheme is reduced by about 22% and 53%, respectively and the energy consumption of sensors in our scheme is reduced by about 33% and 54%, respectively.</description><identifier>ISSN: 0140-3664</identifier><identifier>EISSN: 1873-703X</identifier><identifier>DOI: 10.1016/j.comcom.2016.03.007</identifier><language>eng</language><publisher>Elsevier B.V</publisher><subject>Access control ; Certificateless cryptography ; Computer simulation ; Cryptography ; Digital signatures ; Encryption ; Identity-based cryptography ; Internet ; Internet of Things ; Networks ; Security ; Sensors ; Signcryption</subject><ispartof>Computer communications, 2016-09, Vol.89-90, p.154-164</ispartof><rights>2016 The Authors</rights><lds50>peer_reviewed</lds50><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c385t-cdd29e6e8c340eb4732df12158550b9d168335b4ec2d4d66ce75d2ef438dac263</citedby><cites>FETCH-LOGICAL-c385t-cdd29e6e8c340eb4732df12158550b9d168335b4ec2d4d66ce75d2ef438dac263</cites><orcidid>0000-0001-6289-1265</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://dx.doi.org/10.1016/j.comcom.2016.03.007$$EHTML$$P50$$Gelsevier$$Hfree_for_read</linktohtml><link.rule.ids>315,781,785,3551,27929,27930,46000</link.rule.ids></links><search><creatorcontrib>Li, Fagen</creatorcontrib><creatorcontrib>Han, Yanan</creatorcontrib><creatorcontrib>Jin, Chunhua</creatorcontrib><title>Practical access control for sensor networks in the context of the Internet of Things</title><title>Computer communications</title><description>Wireless sensor network (WSN) plays an important role in military sensing and tracking, target tracking, and environment monitoring. To query of the network to get useful information from anywhere and anytime, we need to integrate the WSN into the Internet as part of the Internet of Things (IoT). In this case, it is an important task to design an access control scheme that can authorize, authenticate and revoke a user to access the WSN. In this paper, we propose a heterogeneous signcryption scheme to control the access behavior of the users. We give the formal security proof of our scheme in the random oracle model. An important characteristic of our scheme is to allow a user in a certificateless cryptography (CLC) environment to send a message to a sensor node in an identity-based cryptography (IBC) environment. We give an access control scheme for the WSN in the context of the IoT using the proposed signcryption scheme. As compared with existing two access control schemes using signcryption, the computational cost of sensors in our scheme is reduced by about 22% and 53%, respectively and the energy consumption of sensors in our scheme is reduced by about 33% and 54%, respectively.</description><subject>Access control</subject><subject>Certificateless cryptography</subject><subject>Computer simulation</subject><subject>Cryptography</subject><subject>Digital signatures</subject><subject>Encryption</subject><subject>Identity-based cryptography</subject><subject>Internet</subject><subject>Internet of Things</subject><subject>Networks</subject><subject>Security</subject><subject>Sensors</subject><subject>Signcryption</subject><issn>0140-3664</issn><issn>1873-703X</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2016</creationdate><recordtype>article</recordtype><recordid>eNp9kEtLw0AUhQdRsFb_gYss3STOO-lGkOKjUNBFC-6G9M6NnZpm6kx8_XunjWvhwuHAdw7cQ8glowWjTF9vCvDbdAVPrqCioLQ8IiNWlSIvqXg5JiPKJM2F1vKUnMW4oZTKshQjsnwONfQO6jarATDGDHzXB99mjQ9ZxC4m6bD_8uEtZq7L-jUeEPzuM98c7Cy5kJi9X6xd9xrPyUlTtxEv_nRMlvd3i-ljPn96mE1v5zmISvU5WMsnqLECISmuZCm4bRhnqlKKriaW6UoItZII3EqrNWCpLMdGisrWwLUYk6uhdxf8-wfG3mxdBGzbukP_EQ2ruFKc00mZUDmgEHyMARuzC25bhx_DqNmvaDZmWNHsVzRUmLRiit0MMUxvfDoMJoLDDtC6gNAb693_Bb_cgX3N</recordid><startdate>20160901</startdate><enddate>20160901</enddate><creator>Li, Fagen</creator><creator>Han, Yanan</creator><creator>Jin, Chunhua</creator><general>Elsevier B.V</general><scope>6I.</scope><scope>AAFTH</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>7SC</scope><scope>8FD</scope><scope>JQ2</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope><orcidid>https://orcid.org/0000-0001-6289-1265</orcidid></search><sort><creationdate>20160901</creationdate><title>Practical access control for sensor networks in the context of the Internet of Things</title><author>Li, Fagen ; Han, Yanan ; Jin, Chunhua</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c385t-cdd29e6e8c340eb4732df12158550b9d168335b4ec2d4d66ce75d2ef438dac263</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2016</creationdate><topic>Access control</topic><topic>Certificateless cryptography</topic><topic>Computer simulation</topic><topic>Cryptography</topic><topic>Digital signatures</topic><topic>Encryption</topic><topic>Identity-based cryptography</topic><topic>Internet</topic><topic>Internet of Things</topic><topic>Networks</topic><topic>Security</topic><topic>Sensors</topic><topic>Signcryption</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Li, Fagen</creatorcontrib><creatorcontrib>Han, Yanan</creatorcontrib><creatorcontrib>Jin, Chunhua</creatorcontrib><collection>ScienceDirect Open Access Titles</collection><collection>Elsevier:ScienceDirect:Open Access</collection><collection>CrossRef</collection><collection>Computer and Information Systems Abstracts</collection><collection>Technology Research Database</collection><collection>ProQuest Computer Science Collection</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><jtitle>Computer communications</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Li, Fagen</au><au>Han, Yanan</au><au>Jin, Chunhua</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Practical access control for sensor networks in the context of the Internet of Things</atitle><jtitle>Computer communications</jtitle><date>2016-09-01</date><risdate>2016</risdate><volume>89-90</volume><spage>154</spage><epage>164</epage><pages>154-164</pages><issn>0140-3664</issn><eissn>1873-703X</eissn><abstract>Wireless sensor network (WSN) plays an important role in military sensing and tracking, target tracking, and environment monitoring. To query of the network to get useful information from anywhere and anytime, we need to integrate the WSN into the Internet as part of the Internet of Things (IoT). In this case, it is an important task to design an access control scheme that can authorize, authenticate and revoke a user to access the WSN. In this paper, we propose a heterogeneous signcryption scheme to control the access behavior of the users. We give the formal security proof of our scheme in the random oracle model. An important characteristic of our scheme is to allow a user in a certificateless cryptography (CLC) environment to send a message to a sensor node in an identity-based cryptography (IBC) environment. We give an access control scheme for the WSN in the context of the IoT using the proposed signcryption scheme. As compared with existing two access control schemes using signcryption, the computational cost of sensors in our scheme is reduced by about 22% and 53%, respectively and the energy consumption of sensors in our scheme is reduced by about 33% and 54%, respectively.</abstract><pub>Elsevier B.V</pub><doi>10.1016/j.comcom.2016.03.007</doi><tpages>11</tpages><orcidid>https://orcid.org/0000-0001-6289-1265</orcidid><oa>free_for_read</oa></addata></record> |
fulltext | fulltext |
identifier | ISSN: 0140-3664 |
ispartof | Computer communications, 2016-09, Vol.89-90, p.154-164 |
issn | 0140-3664 1873-703X |
language | eng |
recordid | cdi_proquest_miscellaneous_1825522097 |
source | ScienceDirect Journals (5 years ago - present) |
subjects | Access control Certificateless cryptography Computer simulation Cryptography Digital signatures Encryption Identity-based cryptography Internet Internet of Things Networks Security Sensors Signcryption |
title | Practical access control for sensor networks in the context of the Internet of Things |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-15T07%3A54%3A34IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Practical%20access%20control%20for%20sensor%20networks%20in%20the%20context%20of%20the%20Internet%20of%20Things&rft.jtitle=Computer%20communications&rft.au=Li,%20Fagen&rft.date=2016-09-01&rft.volume=89-90&rft.spage=154&rft.epage=164&rft.pages=154-164&rft.issn=0140-3664&rft.eissn=1873-703X&rft_id=info:doi/10.1016/j.comcom.2016.03.007&rft_dat=%3Cproquest_cross%3E1825522097%3C/proquest_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=1825522097&rft_id=info:pmid/&rft_els_id=S0140366416300652&rfr_iscdi=true |