Abstract

This paper puts forward an approach of access control based on unidirectional chain. For the purpose of increasing the number of users, improving the expandability of access ability, and resisting the attacks aiming at capturing users, the author proposes new methods of access control and a user access ability revocation based on the hash tree. Through analysis, evaluation and comparison, the author concludes that these approaches and methods require smaller computation, storage and communication overheads than the existing sensor network access control methods. Moreover, the proposed approaches and methods are able to resist node capture, as well as information replay requests and attacks.

Highlights

  • As an important tool in the field of environmental testing, the sensor network can be used to monitor the environment, store the acquired data and offer environmental monitoring data to users [1]

  • To safeguard the access security of the network, it is of great necessity to set up proper access control mechanism [2]

  • Vulnerable to illegal attacks, the network access control mechanism is in urgent need of improvement

Read more

Summary

Introduction

As an important tool in the field of environmental testing, the sensor network can be used to monitor the environment, store the acquired data and offer environmental monitoring data to users [1]. To safeguard the access security of the network, it is of great necessity to set up proper access control mechanism [2]. Such a mechanism can prevent illegal access, which is an existential threat to the very safety of the sensor. In the absence of a proper access control mechanism, illegal intruders may use the sensor node to destroy network services [3]. The sensor network access control operates under the principle of pre-allocating the authentication information for each node Based on such information, the sensor network can verify the users’ identities when providing the access service. If the users pass the authentication, the network would accept the access request and provide corresponding services

The service provision architecture of the sensor network
The access control based on a single key chain
The access control based on multiple key chains
Expandable Merkle hash tree access control
The access control based on Merkle hash tree
Conclusion
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.