Usage control based security access scheme for wireless sensor networks

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    8 Citations (Scopus)

    Abstract

    Security access is one of the key concerns for wireless sensor networks (WSNs). The secure authentication protocols of the most current security access schemes are complex. Moreover, the access control models of existing schemes have no concept of attribute mutability and can not perform continuous access decisions. In this paper, we propose a new security access scheme that deal with the requirements of low-complexity authentication and continuous access decision. The authentication protocol and access control mechanism is designed based on security token and usage control (UCON) respectively. An instance of UCON is implemented. The implementation results support the feasibility of using UCON in WSNs. The authentication protocol in our scheme presents several advantages including the low expenses in calculation, storage and communication. Moreover, our scheme also can perform access control with attribute mutability and decision continuity.

    Original languageEnglish
    Title of host publicationIEEE International Conference on Communications
    DOIs
    Publication statusPublished - 2010
    Event2010 IEEE International Conference on Communications, ICC 2010 - Cape Town
    Duration: 2010 May 232010 May 27

    Other

    Other2010 IEEE International Conference on Communications, ICC 2010
    CityCape Town
    Period10/5/2310/5/27

    Fingerprint

    Authentication
    Wireless sensor networks
    Access control
    Network protocols
    Communication

    ASJC Scopus subject areas

    • Electrical and Electronic Engineering
    • Computer Networks and Communications

    Cite this

    Usage control based security access scheme for wireless sensor networks. / Wu, Jun; Shimamoto, Shigeru.

    IEEE International Conference on Communications. 2010. 5502583.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Wu, J & Shimamoto, S 2010, Usage control based security access scheme for wireless sensor networks. in IEEE International Conference on Communications., 5502583, 2010 IEEE International Conference on Communications, ICC 2010, Cape Town, 10/5/23. https://doi.org/10.1109/ICC.2010.5502583
    Wu, Jun ; Shimamoto, Shigeru. / Usage control based security access scheme for wireless sensor networks. IEEE International Conference on Communications. 2010.
    @inproceedings{0c6bfb05b12041399f9fd346695a2aed,
    title = "Usage control based security access scheme for wireless sensor networks",
    abstract = "Security access is one of the key concerns for wireless sensor networks (WSNs). The secure authentication protocols of the most current security access schemes are complex. Moreover, the access control models of existing schemes have no concept of attribute mutability and can not perform continuous access decisions. In this paper, we propose a new security access scheme that deal with the requirements of low-complexity authentication and continuous access decision. The authentication protocol and access control mechanism is designed based on security token and usage control (UCON) respectively. An instance of UCON is implemented. The implementation results support the feasibility of using UCON in WSNs. The authentication protocol in our scheme presents several advantages including the low expenses in calculation, storage and communication. Moreover, our scheme also can perform access control with attribute mutability and decision continuity.",
    author = "Jun Wu and Shigeru Shimamoto",
    year = "2010",
    doi = "10.1109/ICC.2010.5502583",
    language = "English",
    isbn = "9781424464043",
    booktitle = "IEEE International Conference on Communications",

    }

    TY - GEN

    T1 - Usage control based security access scheme for wireless sensor networks

    AU - Wu, Jun

    AU - Shimamoto, Shigeru

    PY - 2010

    Y1 - 2010

    N2 - Security access is one of the key concerns for wireless sensor networks (WSNs). The secure authentication protocols of the most current security access schemes are complex. Moreover, the access control models of existing schemes have no concept of attribute mutability and can not perform continuous access decisions. In this paper, we propose a new security access scheme that deal with the requirements of low-complexity authentication and continuous access decision. The authentication protocol and access control mechanism is designed based on security token and usage control (UCON) respectively. An instance of UCON is implemented. The implementation results support the feasibility of using UCON in WSNs. The authentication protocol in our scheme presents several advantages including the low expenses in calculation, storage and communication. Moreover, our scheme also can perform access control with attribute mutability and decision continuity.

    AB - Security access is one of the key concerns for wireless sensor networks (WSNs). The secure authentication protocols of the most current security access schemes are complex. Moreover, the access control models of existing schemes have no concept of attribute mutability and can not perform continuous access decisions. In this paper, we propose a new security access scheme that deal with the requirements of low-complexity authentication and continuous access decision. The authentication protocol and access control mechanism is designed based on security token and usage control (UCON) respectively. An instance of UCON is implemented. The implementation results support the feasibility of using UCON in WSNs. The authentication protocol in our scheme presents several advantages including the low expenses in calculation, storage and communication. Moreover, our scheme also can perform access control with attribute mutability and decision continuity.

    UR - http://www.scopus.com/inward/record.url?scp=77955399678&partnerID=8YFLogxK

    UR - http://www.scopus.com/inward/citedby.url?scp=77955399678&partnerID=8YFLogxK

    U2 - 10.1109/ICC.2010.5502583

    DO - 10.1109/ICC.2010.5502583

    M3 - Conference contribution

    AN - SCOPUS:77955399678

    SN - 9781424464043

    BT - IEEE International Conference on Communications

    ER -