TY - GEN
T1 - Usage control based security access scheme for wireless sensor networks
AU - Wu, Jun
AU - Shimamoto, Shigeru
PY - 2010/8/13
Y1 - 2010/8/13
N2 - Security access is one of the key concerns for wireless sensor networks (WSNs). The secure authentication protocols of the most current security access schemes are complex. Moreover, the access control models of existing schemes have no concept of attribute mutability and can not perform continuous access decisions. In this paper, we propose a new security access scheme that deal with the requirements of low-complexity authentication and continuous access decision. The authentication protocol and access control mechanism is designed based on security token and usage control (UCON) respectively. An instance of UCON is implemented. The implementation results support the feasibility of using UCON in WSNs. The authentication protocol in our scheme presents several advantages including the low expenses in calculation, storage and communication. Moreover, our scheme also can perform access control with attribute mutability and decision continuity.
AB - Security access is one of the key concerns for wireless sensor networks (WSNs). The secure authentication protocols of the most current security access schemes are complex. Moreover, the access control models of existing schemes have no concept of attribute mutability and can not perform continuous access decisions. In this paper, we propose a new security access scheme that deal with the requirements of low-complexity authentication and continuous access decision. The authentication protocol and access control mechanism is designed based on security token and usage control (UCON) respectively. An instance of UCON is implemented. The implementation results support the feasibility of using UCON in WSNs. The authentication protocol in our scheme presents several advantages including the low expenses in calculation, storage and communication. Moreover, our scheme also can perform access control with attribute mutability and decision continuity.
UR - http://www.scopus.com/inward/record.url?scp=77955399678&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=77955399678&partnerID=8YFLogxK
U2 - 10.1109/ICC.2010.5502583
DO - 10.1109/ICC.2010.5502583
M3 - Conference contribution
AN - SCOPUS:77955399678
SN - 9781424464043
T3 - IEEE International Conference on Communications
BT - 2010 IEEE International Conference on Communications, ICC 2010
T2 - 2010 IEEE International Conference on Communications, ICC 2010
Y2 - 23 May 2010 through 27 May 2010
ER -