A Novel Digital Certificate Based Remote Data Access Control Scheme in WSN

A digital certificate based remote data access control scheme is proposed for safe authentication of accessor in wireless sensor network (WSN). The scheme is founded on the access control scheme on the basis of characteristic expression (named CEB scheme). Data is divided by characteristics and the key for encryption is related to characteristic expression. Only the key matching with characteristic expression can decrypt the data. Meanwhile, three distributed certificate detection methods are designed to prevent the certificate from being misappropriated by hostile anonymous users. When a user starts query, the key access control method can judge whether the query is valid. In this case, the scheme can achieve public certificate of users and effectively protect query privacy as well. The security analysis and experiments show that the proposed scheme is superior in communication overhead, storage overhead, and detection probability.

[1]  C. Karlof,et al.  Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Proceedings of the First IEEE International Workshop on Sensor Network Protocols and Applications, 2003..

[2]  Yang Yu,et al.  Query privacy in wireless sensor networks , 2007, 2007 4th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks.

[3]  Wei Liang,et al.  Securing sensor data storage and query based on k‐out‐of‐ n coding , 2013, Int. J. Commun. Syst..

[4]  Eddie Kohler,et al.  SOS: A Dynamic Operating System for Sensor Networks , 2005 .

[5]  Ling Cheung,et al.  Provably secure ciphertext policy ABE , 2007, CCS '07.

[6]  Chun Chen,et al.  Distributed Access Control with Privacy Support in Wireless Sensor Networks , 2011, IEEE Transactions on Wireless Communications.

[7]  Qun Li,et al.  Distributed User Access Control in Sensor Networks , 2006, DCOSS.

[8]  Jeff Rose,et al.  MANTIS OS: An Embedded Multithreaded Operating System for Wireless Micro Sensor Platforms , 2005, Mob. Networks Appl..

[9]  Jie Gao,et al.  Double Rulings for Information Brokerage in Sensor Networks , 2006, IEEE/ACM Transactions on Networking.

[10]  Ian F. Akyildiz,et al.  Wireless sensor networks: a survey , 2002, Comput. Networks.

[11]  Wei Liang,et al.  An Efficient and Lightweight Source Privacy Protecting Scheme for Sensor Networks Using Group Knowledge , 2013, Int. J. Distributed Sens. Networks.

[12]  Congwei Xu,et al.  A proxy blind signature scheme based on DLP , 2006, Wuhan University Journal of Natural Sciences.

[13]  Brent Waters,et al.  Ciphertext-Policy Attribute-Based Encryption , 2007, 2007 IEEE Symposium on Security and Privacy (SP '07).

[14]  David E. Culler,et al.  TinyOS: An Operating System for Sensor Networks , 2005, Ambient Intelligence.

[15]  Brad Karp,et al.  GPSR: greedy perimeter stateless routing for wireless networks , 2000, MobiCom '00.