Skip to main content

Efficient and Distributed Access Control for Sensor Networks

  • Conference paper
Distributed Computing in Sensor Systems (DCOSS 2007)

Part of the book series: Lecture Notes in Computer Science ((LNCCN,volume 4549))

Included in the following conference series:

Abstract

Sensor networks are often used to sense the physical world and provide observations for various uses. In hostile environments, it is critical to control the network access to ensure the integrity, availability, and at times confidentiality of the sensor data. This paper develops efficient methods for distributed access control in sensor networks. The paper starts with a baseline approach, which provides a more flexible and efficient way to enforce access control when compared with previous solutions. This paper then extends the baseline approach to enable privilege delegation, which allows a user to delegate its privilege to other users without using a trusted server, and broadcast query, which allows a user to access the network at a large scale efficiently. The privilege delegation and broadcast query are very useful in practice; none of the current solutions can achieve these two properties.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Crossbow Technology Inc.: Wireless sensor networks Accessed in (February 2006), http://www.xbow.com/Products/Wireless_Sensor_Networks.htm

  2. Hartung, C., Balasalle, J., Han, R.: Node compromise in sensor networks: The need for secure systems. Technical Report CU-CS-990-05, U. Colorado at Boulder (January 2005)

    Google Scholar 

  3. Zhang, W., Song, H., Zhu, S., Cao, G.: Least privilege and privilege deprivation: Towards tolerating mobile sink compromises in wireless sensor networks. In: Proceedings of ACM Mobihoc’05 (2005)

    Google Scholar 

  4. Wang, H., Li, Q.: Distributed user access control in sensor networks. In: Gibbons, P.B., Abdelzaher, T., Aspnes, J., Rao, R. (eds.) DCOSS 2006. LNCS, vol. 4026, Springer, Heidelberg (2006)

    Google Scholar 

  5. Gura, N., Patel, A., Wander, A.: Comparing elliptic curve cryptography and rsa on 8-bit CPUs. In: Joye, M., Quisquater, J.-J. (eds.) CHES 2004. LNCS, vol. 3156, Springer, Heidelberg (2004)

    Google Scholar 

  6. Perrig, A., Szewczyk, R., Wen, V., Culler, D., Tygar, D.: SPINS: Security protocols for sensor networks. In: Proceedings of Seventh Annual International Conference on Mobile Computing and Networks (July 2001)

    Google Scholar 

  7. Lim, H., Kim, C.: Multicast tree construction and flooding in wireless ad hoc networks. In: Proceedings of ACM Modeling, Analysis, and Simulation of Wireless and Mobile Systems (2000)

    Google Scholar 

  8. Peng, W., Lu, X.: On the reduction of broadcast redundancy in mobile ad hoc networks. In: Proceedings of ACM International Symposium on Mobile and Ad Hoc Networking and Computing, ACM Press, New York (2000)

    Google Scholar 

  9. Wu, J., Dai, F.: Broadcasting in ad hoc networks based on self-pruning. In: Proceedings of INFOCOM (2003)

    Google Scholar 

  10. Eschenauer, L., Gligor, V.D.: A key-management scheme for distributed sensor networks. In: Proceedings of the 9th ACM Conference on Computer and Communications Security, pp. 41–47. ACM Press, New York (2002)

    Chapter  Google Scholar 

  11. Chan, H., Perrig, A., Song, D.: Random key predistribution schemes for sensor networks. In: IEEE Symposium on Research in Security and Privacy, pp. 197–213. IEEE Computer Society Press, Los Alamitos (2003)

    Google Scholar 

  12. Liu, D., Ning, P.: Establishing pairwise keys in distributed sensor networks. In: Proceedings of 10th ACM Conference on Computer and Communications Security (CCS’03), pp. 52–61. ACM Press, New York (2003)

    Chapter  Google Scholar 

  13. Du, W., Deng, J., Han, Y.S., Varshney, P.: A pairwise key pre-distribution scheme for wireless sensor networks. In: Proceedings of 10th ACM Conference on Computer and Communications Security (CCS’03) pp. 42–51(October 2003)

    Google Scholar 

  14. Wood, A.D., Stankovic, J.A.: Denial of service in sensor networks. IEEE Computer 35(10), 54–62 (2002)

    Google Scholar 

  15. Karlof, C., Wagner, D.: Secure routing in wireless sensor networks: Attacks and countermeasures. In: Proceedings of 1st IEEE International Workshop on Sensor Network Protocols and Applications, IEEE Computer Society Press, Los Alamitos (2003)

    Google Scholar 

  16. Hu, Y., Perrig, A., Johnson, D.: Packet leashes: A defense against wormhole attacks in wireless ad hoc networks. In: Proceedings of INFOCOM 2003 (April 2003)

    Google Scholar 

  17. Du, W., Deng, J., Han, Y.S., Varshney, P.K.: A witness-based approach for data fusion assurance in wireless sensor networks. In: Proceedings of IEEE Global Communications Conference (GLOBECOM 03) (December 2003)

    Google Scholar 

  18. Przydatek, B., Song, D., Perrig, A.: SIA: Secure information aggregation in sensor networks. In: Proceedings of the First ACM Conference on Embedded Networked Sensor Systems (SenSys ’03), ACM Press, New York (2003)

    Google Scholar 

  19. Liu, D., Ning, P., Du, W.: Attack-resistant location estimation in wireless sensor networks. In: Proceedings of the Fourth International Conference on Information Processing in Sensor Networks (IPSN ’05) (April 2005)

    Google Scholar 

  20. Sun, K., Ning, P., Wang, C.: Fault-tolerant cluster-wise clock synchronization for wireless sensor networks. IEEE Transactions on Dependable and Secure (TDSC) 2(1), 177–189 (2005)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

James Aspnes Christian Scheideler Anish Arora Samuel Madden

Rights and permissions

Reprints and permissions

Copyright information

© 2007 Springer Berlin Heidelberg

About this paper

Cite this paper

Liu, D. (2007). Efficient and Distributed Access Control for Sensor Networks. In: Aspnes, J., Scheideler, C., Arora, A., Madden, S. (eds) Distributed Computing in Sensor Systems. DCOSS 2007. Lecture Notes in Computer Science, vol 4549. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-73090-3_2

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-73090-3_2

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-73089-7

  • Online ISBN: 978-3-540-73090-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics