Usage control based security access scheme for wireless sensor networks

Jun Wu*, Shigeru Shimamoto

*Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference contribution

8 Citations (Scopus)

Abstract

Security access is one of the key concerns for wireless sensor networks (WSNs). The secure authentication protocols of the most current security access schemes are complex. Moreover, the access control models of existing schemes have no concept of attribute mutability and can not perform continuous access decisions. In this paper, we propose a new security access scheme that deal with the requirements of low-complexity authentication and continuous access decision. The authentication protocol and access control mechanism is designed based on security token and usage control (UCON) respectively. An instance of UCON is implemented. The implementation results support the feasibility of using UCON in WSNs. The authentication protocol in our scheme presents several advantages including the low expenses in calculation, storage and communication. Moreover, our scheme also can perform access control with attribute mutability and decision continuity.

Original languageEnglish
Title of host publication2010 IEEE International Conference on Communications, ICC 2010
DOIs
Publication statusPublished - 2010 Aug 13
Event2010 IEEE International Conference on Communications, ICC 2010 - Cape Town, South Africa
Duration: 2010 May 232010 May 27

Publication series

NameIEEE International Conference on Communications
ISSN (Print)0536-1486

Conference

Conference2010 IEEE International Conference on Communications, ICC 2010
Country/TerritorySouth Africa
CityCape Town
Period10/5/2310/5/27

ASJC Scopus subject areas

  • Computer Networks and Communications
  • Electrical and Electronic Engineering

Fingerprint

Dive into the research topics of 'Usage control based security access scheme for wireless sensor networks'. Together they form a unique fingerprint.

Cite this