An effective ECC-based user access control scheme with attribute-based encryption for wireless sensor networks

被引:61
作者
Chatterjee, Santanu [1 ]
Das, Ashok Kumar [2 ]
机构
[1] Def Res & Dev Org, Res Ctr Imarat, Hyderabad 500069, Andhra Pradesh, India
[2] Int Inst Informat Technol, Ctr Secur Theory & Algorithm Res, Hyderabad 500032, Andhra Pradesh, India
关键词
wireless sensor networks; user access control; authentication; security; ECC; AVISPA; KEY; SECURITY; AUTHENTICATION;
D O I
10.1002/sec.1140
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
For critical applications, real-time data access is essential from the nodes inside a wireless sensor network (WSN). Only the authorized users with unique access privilege should access the specific, but not all, sensing information gathered by the cluster heads in a hierarchical WSNs. Access rights for the correct information and resources for different services from the cluster heads to the genuine users can be provided with the help of efficient user access control mechanisms. In this paper, we propose a new user access control scheme with attribute-based encryption using elliptic curve cryptography in hierarchical WSNs. In attribute-based encryption, the ciphertexts are labeled with sets of attributes and secret keys of the users that are associated with their own access structures. The authorized users with the relevant set of attributes can able to decrypt the encrypted message coming from the cluster heads. Our scheme provides high security. Moreover, our scheme is efficient as compared with those for other existing user access control schemes. Through both the formal and informal security analysis, we show that our scheme has the ability to tolerate different known attacks required for a user access control designed for WSNs. Furthermore, we simulate our scheme for the formal security verification using the widely-accepted automated validation of Internet security protocols and applications tool. The simulation results demonstrate that our scheme is secure. Copyright (c) 2014 John Wiley & Sons, Ltd.
引用
收藏
页码:1752 / 1771
页数:20
相关论文
共 45 条
  • [1] Advanced Encryption Standard (AES), 2001, 197 AES FISP PUB NIS
  • [2] [Anonymous], ACM T INFORM SYSTEM
  • [3] [Anonymous], 00010 NAI LAB
  • [4] [Anonymous], WIRELESS SENSOR NETW
  • [5] [Anonymous], 2009, PROC 1 INT C COMMUNI
  • [6] Armando A, 2005, LECT NOTES COMPUT SC, V3576, P281
  • [7] Basin D., 2004, Int. J. Inf. Secur, V4, P181, DOI [10.1007/s10207-004-0055-7, DOI 10.1007/S10207-004-0055-7]
  • [8] Chatterjee S, 2014, AD HOC SENS WIREL NE, V21, P121
  • [9] An improved key distribution mechanism for large-scale hierarchical wireless sensor networks
    Cheng, Yi
    Agrawal, Dharma P.
    [J]. AD HOC NETWORKS, 2007, 5 (01) : 35 - 48
  • [10] Das A. K., 2013, Netw. Sci., V2, P12