Abstract
Internet of Things (IoT) has become a vital part of our infrastructure to enrich lives and make processes easier. In these people-centric IoT applications, massive personal data are collected in real-time and stored by the resource constrained sensor network. Because any misusage of these personal data might result in the leakage of privacy and economic losses, it is expected that the data requesters can only access to the data what they have purchased, or are entitled to use. How to accurately control data access permissions is one of the prerequisites for IoT data protection. Based on a revised one-way hash chain technique, we proposed a novel Time-based Access Control (TAC) scheme for multi-attribute data in Internet of Things. All the data are partitioned into 2-D subspaces representing generation time and data attribute. Data in each subspace is encrypted with the corresponding sub-key before its transmission to the base station to achieve data privacy and access control. Anyone who wants to read or use data with specified attribute at a particular time must get the corresponding sub-key from the data source node or the owner. TAC can generate a sub-key for data in each subspace in an efficient manner in terms of less sub-key generation time and low memory space usage. We proposed three improved schemes to further reduce sub-key computation time according to different application scenarios. The experimental results show that TAC can be applied to the resource limited WSNs efficiently.










Similar content being viewed by others
References
Brown M, Cheung D, Hankerson D, Lopez J, Kirkup M, Menezes A (2000) Pgp in constrained wireless devices. In: Proceedings of the 9th USENIX security symposium, pp 19–19
Capkun S, Hubaux J (2005) Secure positioning of wireless devices with application to sensor networks. In: International conference on computer communications, vol 3, pp 1917–1928
Cui J (2018) Securing display path for security-sensitive applications on mobile devices. Comput Mater Continua 55(1):017–017
Deng J, Han R, Mishra S (2005) Countermeasures against traffic analysis attacks in wireless sensor networks. In: International workshop on security, pp 113–126
Ganeriwal S, Capkun S, Han C, Srivastava MB (2005) Secure time synchronization service for sensor networks. In: Workshop on wireless security, pp 97–106
Kamat P, Xu W, Trappe W, Zhang Y (2009) Temporal privacy in wireless sensor networks: theory and practice. ACM Trans Sensor Netw 5(4):28–52
Kamat P, Zhang Y, Trappe W, Ozturk C (2005) Enhancing source-location privacy in sensor network routing. In: International conference on distributed computing systems, pp 599–608
Karlof C, Sastry N, Wagner DA (2004) Tinysec: a link layer security architecture for wireless sensor networks. In: International conference on embedded networked sensor systems, pp 162–175
Li D, Zhang G, Xu Z, Lan Y, Shi Y, Liang Z, Chen H (2018) Modelling the roles of cewebrity trust and platform trust in consumers propensity of live-streaming an extended tam method. Comput Mater Continua 55 (1):137–137
Liu W, Luo X, Liu Y, Liu J, Liu M, Shi YQ (2018) Localization algorithm of indoor wi-fi access points based on signal strength relative relationship and region division. Comput Mater Continua 55(1):071–071
Mao X, Miao X, He Y, Li X, Liu Y (2012) Citysee: urban co2 monitoring with sensors. In: International conference on computer communications, Orlando, pp 1611–1619
Ouaddah A, Mousannif H, Elkalam AA, Ouahman AA (2017) Access control in the internet of things: big challenges and new opportunities. Comput Netw 112:237–262
Perrig A, Szewczyk R, Wen V, Culler DE, Tygar JD (2001) Spins: security protocols for sensor networks. In: ACM/IEEE international conference on mobile computing and networking, pp 189–199
Sicari S, Rizzardi A, Grieco LA, Coenporisini A (2015) Security, privacy and trust in internet of things. Comput Netw 76:146–164
Szewczyk R, Mainwaring AM, Polastre J, Anderson J, Culler DE (2004) An analysis of a large scale habitat monitoring application. In: International conference on embedded networked sensor systems, pp 214–226
Wang B, Gu X, Ma L, Yan S (2017) E2s2: a code dissemination approach to energy efficiency and status surveillance for wireless sensor networks. J Intnernet Technol 18(4):877–885
Wang B, Gu X, Ma L, Yan S (2017) Temperature error correction based on bp neural network in meteorological wireless sensor network. Int J Sensor Netw 23(4):265
Xue Q, Ganz A (2003) Runtime security composition for sensor networks (securesense). In: Proceedings of IEEE vehicular technology conference, Orlando, pp 2976–2980
Yao L, Wu G, Wang J, Xia F, Lin C, Wang G (2012) A clustering k-anonymity scheme for location privacy preservation. In: IEICE Transactions on information and systems, vol 95-D, pp 134–142
Zhang R, Zhang Y, Ren K (2009) Dppac: distributed privacy-preserving access control in sensor networks. IEEE Trans Parallel Distrib Syst 23:1251–1259
Zhu S, Setia S, Jajodia S (2006) Leap+: efficient security mechanisms for large-scale distributed sensor networks. ACM Trans Sensor Netw 2(4):500–528
Acknowledgments
This work is supported by the National Nature Science Foundation of China under Grant No. 61972207, U1836208, U1836110, U1536206, 61772283, 61602253, 61672294, the Major Program of the National Social Science Fund of China under Grant No. 17ZDA092, the 2011 Collaborative Innovation Center for Development and Utilization of Finance and Economics Big Data Property, Universities of Hunan Province, Open Project, under Grant No. 20181901CRP04, the Electronic Information and Control of Fujian University Engineering Research Center Fund under Grant No. EIC1704, the National Key R and D Program of China under Grant No. 2018YFB1003205, the CICAEET (Jiangsu Collaborative Innovation Center on Atmospheric Environment and Equipment Technology) fund and PAPD (Priority Academic Program Development of Jiangsu Higher Education Institutions) fund.
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher’s Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Wang, B., Li, W. & Xiong, N.N. Time-Based Access Control for Multi-attribute Data in Internet of Things. Mobile Netw Appl 26, 797–807 (2021). https://doi.org/10.1007/s11036-019-01327-2
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11036-019-01327-2