Secure and practical access control mechanism for WSN with node privacy

Abstract An access control mechanism plays a critical role in new node deployment within a resource-constrained Wireless Sensor Networks. The deployment of a new node is inevitable either due to the outage of power or nodes getting compromised due to the adversary’s attacks. The access control scheme prevents malicious node deployment and also allows a new node to establish a shared key with its neighbors for secure communication. Besides having low communication and computational overheads, an access control mechanism must suffice to specific security and functional requirements for their practical implementations. In this paper, a provable and practical access control scheme based on Elliptical Curve Cryptography (ECC) has been presented. The proposed access control scheme supports node privacy while addressing all other major functional and security requirements. The formal validation of the proposed scheme has been carried out using automated validation of internet security protocols and applications (AVISPA) and Scyther tools. A comparative study of the proposed scheme with the existing schemes has been carried out on various security and functional requirements suggesting a better trade-off. Finally, practical experimentation on TinyOS and MICAz motes has been carried out to provide detailed energy analysis and test-bed implementation of the proposed scheme.

[1]  Sung-Woon Lee,et al.  Enhanced novel access control protocol over wireless sensor networks , 2009, IEEE Transactions on Consumer Electronics.

[2]  Sebastian Mödersheim,et al.  OFMC: A symbolic model checker for security protocols , 2005, International Journal of Information Security.

[3]  Yuguang Fang,et al.  Access control in wireless sensor networks , 2007, Ad Hoc Networks.

[4]  Elfed Lewis,et al.  Analysis of Hardware Encryption Versus Software Encryption on Wireless Sensor Network Motes , 2008 .

[5]  Michael D. Smith,et al.  Implementing public-key infrastructure for sensor networks , 2008, TOSN.

[6]  Hui-Feng Huang,et al.  A New Design of Access Control in Wireless Sensor Networks , 2011, Int. J. Distributed Sens. Networks.

[7]  Naixue Xiong,et al.  Privacy-Preserving Data Aggregation in Two-Tiered Wireless Sensor Networks with Mobile Nodes , 2014, Sensors.

[8]  Jian Shen,et al.  Comment: "Eenhanced novel access control protocol over wireless sensor networks" , 2010, IEEE Trans. Consumer Electron..

[9]  Adrian Perrig,et al.  Distributed detection of node replication attacks in sensor networks , 2005, 2005 IEEE Symposium on Security and Privacy (S&P'05).

[10]  Dawn Xiaodong Song,et al.  Random key predistribution schemes for sensor networks , 2003, 2003 Symposium on Security and Privacy, 2003..

[11]  Dong Hoon Lee,et al.  PACPs: practical access control protocols for wireless sensor networks , 2012, IEEE Transactions on Consumer Electronics.

[12]  Li Xiao,et al.  Sensor node source privacy and packet recovery under eavesdropping and node compromise attacks , 2013, TOSN.

[13]  Sandip Roy,et al.  An efficient dynamic access control scheme for distributed wireless sensor networks , 2018, Int. J. Ad Hoc Ubiquitous Comput..

[14]  Shekhar Verma,et al.  Privacy in wireless sensor networks using ring signature , 2014, J. King Saud Univ. Comput. Inf. Sci..

[15]  A. Gutub,et al.  SERIAL VS. PARALLEL ELLIPTIC CURVE CRYPTO PROCESSOR DESIGNS , 2013 .

[16]  Hui-Feng Huang,et al.  A novel access control protocol for secure sensor networks , 2009, Comput. Stand. Interfaces.

[17]  Alan Dahgwo Yein,et al.  Secure Access Control Method for Wireless Sensor Networks , 2015, Int. J. Distributed Sens. Networks.

[18]  Hans Eberle,et al.  Comparing Elliptic Curve Cryptography and RSA on 8-bit CPUs , 2004, CHES.

[19]  Da-Zhi Sun,et al.  On the security of an enhanced novel access control protocol for wireless sensor networks , 2010, IEEE Transactions on Consumer Electronics.

[20]  Prakash Ranganathan,et al.  TIME SYNCHRONIZATION IN WIRELESS SENSOR NETWORKS: A SURVEY , 2010 .

[21]  Yih-Chun Hu,et al.  Wormhole attacks in wireless networks , 2006, IEEE Journal on Selected Areas in Communications.

[22]  Kyong-jin Kim,et al.  Privacy Care Architecture in Wireless Sensor Networks , 2013, Int. J. Distributed Sens. Networks.

[23]  Adnan Abdul-Aziz Gutub,et al.  Efficient utilization of scalable multipliers in parallel to compute GF(p) elliptic curve cryptographic operations , 2007 .

[24]  Andrei Gurtov,et al.  Access Control Protocol With Node Privacy in Wireless Sensor Networks , 2016, IEEE Sensors Journal.

[25]  Gennaro Boggia,et al.  DyDAP: A dynamic data aggregation scheme for privacy aware wireless sensor networks , 2012, J. Syst. Softw..

[26]  Kefei Chen,et al.  Efficient User Access Control Mechanism for Wireless Multimedia Sensor Networks , 2011 .

[27]  Daruri Venugopal,et al.  Network Security and Cryptography , 2015 .

[28]  Spyros Tragoudas,et al.  A security protocol for sensor networks , 2005, GLOBECOM '05. IEEE Global Telecommunications Conference, 2005..

[29]  S. Arabia,et al.  Implementation of a pipelined modular multiplier architecture for GF(p) elliptic curve cryptography computation , 2011 .

[30]  Adnan Abdul-Aziz Gutub,et al.  Fast 160-Bits GF (P) Elliptic Curve Crypto Hardware of High-Radix Scalable Multipliers , 2006, Int. Arab J. Inf. Technol..

[31]  A. Gutub Merging GF(p) Elliptic Curve Point Adding and Doubling on Pipelined VLSI Cryptographic ASIC Architecture , 2006 .

[32]  Liang Liu,et al.  Energy-efficient and privacy-preserving spatial range aggregation query processing in wireless sensor networks , 2019, Int. J. Distributed Sens. Networks.

[33]  Seokjoo Shin,et al.  Achieving Source Location Privacy Protection in Monitoring Wireless Sensor Networks through Proxy Node Routing , 2019, Sensors.

[34]  Danny Dolev,et al.  On the security of public key protocols , 1981, 22nd Annual Symposium on Foundations of Computer Science (sfcs 1981).

[35]  Seokjoo Shin,et al.  Secure Routing Protocols for Source Node Privacy Protection in Multi-Hop Communication Wireless Networks , 2020 .

[36]  Adnan Abdul-Aziz Gutub,et al.  Area Flexible GF(2k) Elliptic Curve Cryptography Coprocessor , 2007, Int. Arab J. Inf. Technol..

[37]  Stefano Chessa,et al.  Wireless sensor networks: A survey on the state of the art and the 802.15.4 and ZigBee standards , 2007, Comput. Commun..

[38]  Ashok Kumar Das,et al.  A Novel Efficient Access Control Scheme for Large-Scale Distributed Wireless Sensor Networks , 2013, Int. J. Found. Comput. Sci..