eHAPAC: A Privacy-Supported Access Control Model for IP-Enabled Wireless Sensor Networks

The implementation of IP technology in wireless sensor networks has promoted the development of many smart scenarios. To enhance secure access in IP-enabled wireless sensor networks, access control to sensor nodes is a necessary process. However, access control currently faces two challenges, feasibility and preservation of user access privacy. In this paper, we propose eHAPAC, a novel privacy-preserving access control model for IP-enabled wireless sensor networks. The contributions of our paper include three parts. First, this paper integrates the Hidra access control protocol and APAC privacy-preserving model, addressing the issue of privacy-preserving access control in resource-constrained devices. Second, this paper proposes an enhanced Hidra protocol to implement the unlinkability of protocol message exchanges. Third, to solve the problem of third party credibility, this paper improves the group signature-based APAC model and utilizes blockchain technology to manage the storage and publication of public group signature keys. Security analysis and performance evaluation prove that our protocol is secure and effective.

[1]  Mohsen Guizani,et al.  Accountable and Privacy-Enhanced Access Control in Wireless Sensor Networks , 2015, IEEE Transactions on Wireless Communications.

[2]  Yael Tauman Kalai,et al.  How to Leak a Secret: Theory and Applications of Ring Signatures , 2001, Essays in Memory of Shimon Even.

[3]  Kui Ren,et al.  DP²AC: Distributed Privacy-Preserving Access Control in Sensor Networks , 2009, IEEE INFOCOM 2009.

[4]  Andrei Gurtov,et al.  Lightweight and Secure Session-Key Establishment Scheme in Smart Home Environments , 2016, IEEE Sensors Journal.

[5]  Mauro Conti,et al.  A Survey on Security and Privacy Issues of Bitcoin , 2017, IEEE Communications Surveys & Tutorials.

[6]  Antonio F. Gómez-Skarmeta,et al.  PrivaKERB: A user privacy framework for Kerberos , 2011, Comput. Secur..

[7]  Jing Li,et al.  Cryptographic primitives in blockchains , 2019, J. Netw. Comput. Appl..

[8]  Maode Ma,et al.  Secure Group Mobility Support for 6LoWPAN Networks , 2018, IEEE Internet of Things Journal.

[9]  Chun Chen,et al.  Distributed Access Control with Privacy Support in Wireless Sensor Networks , 2011, IEEE Transactions on Wireless Communications.

[10]  Sang Hyuk Son,et al.  The price of security in wireless sensor networks , 2010, Comput. Networks.

[11]  Yuguang Fang,et al.  Latency Aware IPv6 Packet Delivery Scheme over IEEE 802.15.4 Based Battery-Free Wireless Sensor Networks , 2017, IEEE Transactions on Mobile Computing.

[12]  Nerea Toledo,et al.  Enhancing secure access to sensor data with user privacy support , 2014, Comput. Networks.

[13]  Qi Zhang,et al.  Improved Dual-Protected Ring Signature for Security and Privacy of Vehicular Communications in Vehicular Ad-Hoc Networks , 2018, IEEE Access.

[14]  Kunwar Singh,et al.  Efficient weighted threshold ECDSA for securing bitcoin wallet , 2017, 2017 ISEA Asia Security and Privacy (ISEASP).

[15]  Yu Zhou,et al.  Privacy-aware cloud service selection approach based on P-Spec policy models and privacy sensitivities , 2018, Future Gener. Comput. Syst..

[16]  Salil S. Kanhere,et al.  BlockChain: A Distributed Solution to Automotive Security and Privacy , 2017, IEEE Communications Magazine.

[17]  Chunhua Jin,et al.  Cost-Effective and Anonymous Access Control for Wireless Body Area Networks , 2018, IEEE Systems Journal.

[18]  Feng Bao,et al.  Evolving privacy: From sensors to the Internet of Things , 2017, Future Gener. Comput. Syst..

[19]  Pablo Rodriguez,et al.  If you are not paying for it, you are the product: how much do advertisers pay to reach you? , 2017, Internet Measurement Conference.

[20]  Claudio Bettini,et al.  The Privacy Implications of Cyber Security Systems , 2018, ACM Comput. Surv..

[21]  Mohsen Guizani,et al.  Secure Data Discovery and Dissemination based on Hash Tree for Wireless Sensor Networks , 2013, IEEE Transactions on Wireless Communications.

[22]  Monali Mavani,et al.  Privacy enabled disjoint and dynamic address auto-configuration protocol for 6Lowpan , 2018, Ad Hoc Networks.

[23]  Marcelo S. Alencar,et al.  Survey and systematic mapping of industrial Wireless Sensor Networks , 2017, J. Netw. Comput. Appl..

[24]  Hervé Rivano,et al.  Optimal WSN Deployment Models for Air Pollution Monitoring , 2017, IEEE Transactions on Wireless Communications.

[25]  Vladimiro Sassone,et al.  Decentralised Runtime Monitoring for Access Control Systems in Cloud Federations , 2017, 2017 IEEE 37th International Conference on Distributed Computing Systems (ICDCS).

[26]  Sugata Sanyal,et al.  Survey of Security and Privacy Issues of Internet of Things , 2015, ArXiv.

[27]  Ramjee Prasad,et al.  Identity Authentication and Capability Based Access Control (IACAC) for the Internet of Things , 2012, J. Cyber Secur. Mobil..

[28]  Carsten Bormann,et al.  Terminology for Constrained-Node Networks , 2014, RFC.

[29]  David Palma,et al.  Enabling the Maritime Internet of Things: CoAP and 6LoWPAN Performance Over VHF Links , 2018, IEEE Internet of Things Journal.

[30]  Mihir Bellare,et al.  Foundations of Group Signatures: The Case of Dynamic Groups , 2005, CT-RSA.

[31]  Abderrezak Rachedi,et al.  A survey on mobility management protocols in Wireless Sensor Networks based on 6LoWPAN technology , 2016, Comput. Commun..

[32]  François-Xavier Standaert,et al.  On the Energy Cost of Communication and Cryptography in Wireless Sensor Networks , 2008, 2008 IEEE International Conference on Wireless and Mobile Computing, Networking and Communications.

[33]  Robert H. Deng,et al.  Secure smart health with privacy-aware aggregate authentication and access control in Internet of Things , 2018, J. Netw. Comput. Appl..

[34]  Yi Mu,et al.  Communication security and privacy support in 6LoWPAN , 2017, J. Inf. Secur. Appl..

[35]  Elisa Bertino,et al.  Botnets and Internet of Things Security , 2017, Computer.

[36]  Mianxiong Dong,et al.  ActiveTrust: Secure and Trustable Routing in Wireless Sensor Networks , 2016, IEEE Transactions on Information Forensics and Security.

[37]  Evangelos P. Markatos,et al.  Where's Wally?: How to Privately Discover your Friends on the Internet , 2018, AsiaCCS.

[38]  Roberto Saia,et al.  Internet of Entities (IoE): a Blockchain-based Distributed Paradigm to Security , 2018, ArXiv.

[39]  David Pointcheval,et al.  Dynamic Fully Anonymous Short Group Signatures , 2006, VIETCRYPT.

[40]  Diego Reforgiato Recupero,et al.  Internet of Entities (IoE): A Blockchain-based Distributed Paradigm for Data Exchange between Wireless-based Devices , 2019, SENSORNETS.

[41]  Sherali Zeadally,et al.  Taxonomy and analysis of security protocols for Internet of Things , 2018, Future Gener. Comput. Syst..

[42]  Saurabh Bagchi,et al.  Optimizing AES for embedded devices and wireless sensor networks , 2008, TRIDENTCOM.

[43]  Maider Huarte,et al.  Expressive Policy-Based Access Control for Resource-Constrained Devices , 2018, IEEE Access.

[44]  Nir Kshetri,et al.  Can Blockchain Strengthen the Internet of Things? , 2017, IT Professional.

[45]  Eduardo Adílio Pelinson Alchieri,et al.  Device-Based Security to Improve User Privacy in the Internet of Things † , 2018, Sensors.