Accountable and Privacy-Enhanced Access Control in Wireless Sensor Networks

In general, owners and users of wireless sensor networks (WSNs) are different entities. A user may want to hide his/her data access privacy from anyone else including the network owner and, at the same time, users who misbehave need to be identified. Such requirements necessitate privacy-preserving and accountable access control. In this paper, we develop a novel protocol, named APAC, to satisfy this need. First, APAC can enforce strict access control so that the sensed data is only accessible by the authorized users. Second, APAC offers sophisticated user privacy protection. Third, misbehaving users or owners can be audited and pinpointed. Last but not least, it does not rely on the existence of a trusted third party, and thus is more feasible in practice. The feasibility of the APAC is demonstrated by experiments on resource-limited mobile devices and sensor platforms.

[1]  Tarik Taleb,et al.  Secure timing synchronization for heterogeneous sensor network using pairing over elliptic curve , 2010, CMC 2010.

[2]  Mohsen Guizani,et al.  Secure Data Discovery and Dissemination based on Hash Tree for Wireless Sensor Networks , 2013, IEEE Transactions on Wireless Communications.

[3]  Kui Ren,et al.  Distributed Privacy-Preserving Access Control in Sensor Networks , 2012, IEEE Transactions on Parallel and Distributed Systems.

[4]  Hovav Shacham,et al.  Short Group Signatures , 2004, CRYPTO.

[5]  Prakhar Gupta,et al.  Privacy preservation for WSN: A Survey , 2012 .

[6]  Jacques Stern,et al.  Efficient Revocation in Group Signatures , 2001, Public Key Cryptography.

[7]  Wenjing Lou,et al.  FDAC: Toward Fine-Grained Distributed Data Access Control in Wireless Sensor Networks , 2011 .

[8]  John Abraham,et al.  Taking the pulse of the planet , 2017 .

[9]  Bo Sheng,et al.  WM-ECC: an Elliptic Curve Cryptography Suite on Sensor Motes , 2007 .

[10]  Junbeom Hur,et al.  Fine-grained data access control for distributed sensor networks , 2011, Wirel. Networks.

[11]  J. Deng,et al.  Secure code distribution in dynamically programmable wireless sensor networks , 2006, 2006 5th International Conference on Information Processing in Sensor Networks.

[12]  Jingsha He,et al.  Secure Localization in Wireless Sensor Networks with Mobile Beacons , 2012, Int. J. Distributed Sens. Networks.

[13]  Ivan Stojmenovic,et al.  Distributed Fine-Grained Access Control in Wireless Sensor Networks , 2011, 2011 IEEE International Parallel & Distributed Processing Symposium.

[14]  Syed Masud Mahmud,et al.  A broadcast protocol with drivers' anonymity for vehicle-to-vehicle communication networks , 2009 .

[15]  Chun Chen,et al.  Distributed Access Control with Privacy Support in Wireless Sensor Networks , 2011, IEEE Transactions on Wireless Communications.

[16]  Bo Li,et al.  The intrusion detection in mobile sensor network , 2012, TNET.

[17]  Ubbarao,et al.  Channel and Energy Modeling for Self-Contained Wireless Sensor Networks in Oil Reservoirs , 2015 .

[18]  Chiara Petrioli,et al.  AGREE: exploiting energy harvesting to support data-centric access control in WSNs , 2013, Ad Hoc Networks.

[19]  Jan Camenisch,et al.  Group Signatures: Better Efficiency and New Theoretical Aspects , 2004, SCN.

[20]  Sushil Jajodia,et al.  LEAP+: Efficient security mechanisms for large-scale distributed sensor networks , 2006, TOSN.

[21]  Jie Li,et al.  A Secure Routing Protocol for Cluster-Based Wireless Sensor Networks Using ID-Based Digital Signature , 2010, 2010 IEEE Global Telecommunications Conference GLOBECOM 2010.

[22]  Peng Ning,et al.  2008 International Conference on Information Processing in Sensor Networks TinyECC: A Configurable Library for Elliptic Curve Cryptography in Wireless Sensor Networks ∗ , 2022 .