Abstract

The implementation of IP technology in wireless sensor networks has promoted the development of many smart scenarios. To enhance secure access in IP-enabled wireless sensor networks, access control to sensor nodes is a necessary process. However, access control currently faces two challenges, feasibility and preservation of user access privacy. In this paper, we propose eHAPAC, a novel privacy-preserving access control model for IP-enabled wireless sensor networks. The contributions of our paper include three parts. First, this paper integrates the Hidra access control protocol and APAC privacy-preserving model, addressing the issue of privacy-preserving access control in resource-constrained devices. Second, this paper proposes an enhanced Hidra protocol to implement the unlinkability of protocol message exchanges. Third, to solve the problem of third party credibility, this paper improves the group signature-based APAC model and utilizes blockchain technology to manage the storage and publication of public group signature keys. Security analysis and performance evaluation prove that our protocol is secure and effective.

Highlights

  • Wireless sensor networks (WSNs), as an important part of the Internet of Things (IoT), enable us to create smart environments

  • The key challenges for secure remote access to IP-enabled resource-constrained devices (RCDs) are the availability of APAC model is much more than that in our privacy-preserving model

  • This paper establishes a groups in the system is large, our model can greatly improve the efficiency of the system setup phase

Read more

Summary

Introduction

Wireless sensor networks (WSNs), as an important part of the Internet of Things (IoT), enable us to create smart environments. Sensors 2019, 19, 1513 authorization imply transmitting user identity-related information to the targeted service, which will cause another problem, namely privacy security of data access. Those mechanisms are of two main types: one aims to hide the user identity by introducing cryptographic mechanisms, such as the group signature-based APAC privacy-preserving model [19] In these schemes, privacy preservation relies on the difficulty of resolving some problems, so such schemes have strong privacy security, but most of them lack any consideration of feasibility in a resource-constrained scenario. The other type implements access control by introducing an absolutely trusted third party, which stores the mapping table of the user real identities and a pseudonym set, such as the enhanced Ladon protocol [20] This way users can be authenticated and authorized by sending a pseudonym to the third party.

Related Work
Access Control System Architecture
Trust and Threat Model
Replay attack
Collusion between the arbitration organization and internal users
Security Goals
Resist replay attack
General
The Privacy-Preserving Model of EHAPAC
System Setup
New User Join
Sign and Verify
User Revokation
Accountability and Disputes
Access Control Protocol
The Authentication Phase
The Authorization Phase
The Service Access Phase and The Auditing Phase
Smart Contract Design
Resisting Privacy Attacks
Resisting to Replay Attacks
Resisting to Resource Consumption Attacks
Guarantee the Openness
Performance Evaluation
Performance Evaluation of the Enhanced Hidra Protocol
10. Energy consumption results:results:
Performance Evaluation of the Privacy-Preserving Model
Conclusions

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.