Skip to main content

Advertisement

Log in

Achieving secure data access control and efficient key updating in mobile multimedia sensor networks

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

MMSN is a new type of wireless sensor networks, which can satisfy the demands of capturing various structures of multimedia data. Due to its better performance in monitoring the target environment, MMSN has already been applied to many fields and scenarios. However, MMSN also faces with various security threatens and data privacy is one issue urgently to be solved. In this paper, we propose an attribute based encryption scheme to guarantee the secure data sharing in MMSN. In our scheme, a user can only get access to the encrypted multimedia data if his private key satisfies with the access structure. We divide the system lifetime of MMSN into discrete time periods and embed the current time period information into user’s private key. When time evolves, only part of the private key has to be updated and the system public parameters remain unchanged. This can reduce the key-updating computation cost and minimize the energy consumption for system parameter transmission when attribute revocation or private key exposure happens. By security proof and efficiency analysis, we prove our scheme is confidential and of higher efficiency, which makes it more appropriate for secure data protection in MMSN.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5

Similar content being viewed by others

References

  1. Akyildiz I, Melodia T, Chowdhury K (2007) A survey on wireless multimedia sensor networks. Comput Netw 51(4):921–960

    Article  Google Scholar 

  2. Attrapadung N, Libert B, De Panafieu E (2011) Expressive key-policy attribute-based encryption with constant-size ciphertexts, Public Key Cryptography—PKC 2011, of LNCS. Springer 6571:90–108

    MATH  Google Scholar 

  3. Baek J, Tan HC, Zhou J (2008) Realizing Stateful public key encryption in wireless sensor network. The International Federation for Information Processing Volume 278:95–107

    Google Scholar 

  4. Bertoni G, Chen L, Fragneto P, Harrison K, Pelosi G (2005) Computing Tate pairing on smartcards. Proceedings of Ches’05, Workshop on Cryptographic Hardware and Embedded Systems

  5. Chen L, Cheng Z, Smart NP (2007) Identity-based key agreement protocols from pairings. Int J Inf Secur 6(4):213–241

    Article  Google Scholar 

  6. Chen M et al (2011) Mobile multimedia sensor networks: architecture and routing. EURASIP J Wirel Commun Netw 2011:159

    Article  Google Scholar 

  7. Fu X, Zhang G, Ma C (2010) An Identity and Attribute-Based Key Agreement Scheme for Wireless Sensor and Actor Networks. Wireless Communications Networking and Mobile Computing (WiCOM), 2010 6th International Conference, pp 1–4

  8. Ghadi M, Laouamer L, Moulahi T (2015) Securing data exchange in wireless multimedia sensor networks: perspectives and challenges. Multimedia Tools and Applications. doi:10.1007/s11042-014-2443-y

  9. Guerrero-Zapata M, Zilan R (2010) The future of security in wireless multimedia sensor networks. Telecommun Syst 45(1):77–91

    Article  Google Scholar 

  10. Hu C, Zhang N (2013) Body area network security: a fuzzy attribute-based Signcryption scheme. IEEE J Sel Areas Commun/SUPPLEMENT 31(9):37–46

    Article  Google Scholar 

  11. Lewko A, Okamoto T, Sahai A, Takashima K, Waters B (2010) Fully secure functional encryption: attribute-based encryption and (hierarchical) inner product encryption. In: Advances in Cryptology—EUROCRYPT 2010, Springer, Berlin, Germany, pp 62–91

  12. Lopez J, Roman R, Alcaraz C (2009) Analysis of security threats, requirements, technologies and standards in wireless sensor networks. Foundations of Security Analysis and Design, Lecture Notes in Computer Science 5705:289–338

    Article  Google Scholar 

  13. Melodia T, Akyildiz IF (2011) Research challenges for wireless multimedia sensor networks. Distributed Video Sensor Networks:233–246

  14. Rani TP, Jaya Kumar C (2012) “Survey on key pre distribution for security in wireless sensor networks”, advances in computer science and information technology. Networks and Communications, Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 84:248–252

    Article  Google Scholar 

  15. Ruj S, Nayak A, Stojmenovic I (2011) Distributed Fine-grained access control in wireless sensor networks. Parallel & Distributed Processing Symposium (IPDPS), 2011 I.E. International, pp 352–362

  16. Sahai A, Waters B (2005) Fuzzy identity-based encryption. Proc. Int. Conf. EUROCRYPT, Aarhus, Denmark, 2005: 457–473

  17. Sharif A, Potdar V, Chang E (2009) Wireless multimedia sensor network technology: A survey. Industrial Informatics. INDIN 2009. 7th IEEE International Conference, 2009: 606–613

  18. Sun Q, Guo S, Xu Q (2008) Research on the Encrypted Data Access Control of Multi-purpose Asynchronous WSN. Embedded and Ubiquitous Computing 2:651–654

  19. Tan CC, Wang H, Zhong S, Li Q (2009) IBE-lite: “a lightweight identity-based cryptography for body sensor networks”. IEEE Trans Inf Technol Biomed 13(6):926–932

    Article  Google Scholar 

  20. Tan Y-L, Goi B-M, Komiya R (2011) A study of attribute-based encryption for body sensor networks. Informatics Engineering and Information Science, Communications in Computer and Information Science 251:238–247

    Article  Google Scholar 

  21. Tian Y, Peng Y (2014) An attribute-based encryption scheme with revocation for fine-grained access control in wireless body area networks. Int J Distrib Sensor Netw 2014:1

    Google Scholar 

  22. Varalakshmi LM, Florence Sudha G, Jaikishan G (2014) A selective encryption and energy efficient clustering scheme for video streaming in wireless sensor networks. Telecommun Syst 56(2014):357–365

    Article  Google Scholar 

  23. Wander A, Gura N, Eberle H, Gupta V, Shantz S (2005) Energy analysis of public-key cryptography for wireless sensor networks. In: Proceedings of the Third IEEE International Conference on Pervasive Computing and Communications, Kauai Island, p 324–328

  24. Waters B (2011) Ciphertext policy attribute based encryption: an expressive, efficient, and provably secure realization. Proc. Int. Conf. PKC 2011, Taormina, Italy, pp 53–70

  25. Yu S, Ren K, Lou W (2011) FDAC: toward fine-grained distributed data access control in wireless sensor networks. IEEE Trans Parallel Distrib Syst 22(4):673–686

    Article  Google Scholar 

Download references

Acknowledgements

This research is supported by the National Natural Science Foundation of China (61373135, 61672299). The authors thank the sponsors for their support and the reviewers for helpful comments.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Hanshu Hong.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Hong, H., Sun, Z. Achieving secure data access control and efficient key updating in mobile multimedia sensor networks. Multimed Tools Appl 77, 4477–4490 (2018). https://doi.org/10.1007/s11042-017-4804-9

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-017-4804-9

Keywords

Navigation