首页> 外文期刊>Security and Communication Networks (Online) >An effective ECC‐based user access control scheme with attribute‐based encryption for wireless sensor networks
【24h】

An effective ECC‐based user access control scheme with attribute‐based encryption for wireless sensor networks

机译:针对无线传感器网络的基于ECC的有效用户访问控制方案和基于属性的加密

获取原文
           

摘要

For critical applications, real‐time data access is essential from the nodes inside a wireless sensor network (WSN). Only the authorized users with unique access privilege should access the specific, but not all, sensing information gathered by the cluster heads in a hierarchical WSNs. Access rights for the correct information and resources for different services from the cluster heads to the genuine users can be provided with the help of efficient user access control mechanisms. In this paper, we propose a new user access control scheme with attribute‐based encryption using elliptic curve cryptography in hierarchical WSNs. In attribute‐based encryption, the ciphertexts are labeled with sets of attributes and secret keys of the users that are associated with their own access structures. The authorized users with the relevant set of attributes can able to decrypt the encrypted message coming from the cluster heads. Our scheme provides high security. Moreover, our scheme is efficient as compared with those for other existing user access control schemes. Through both the formal and informal security analysis, we show that our scheme has the ability to tolerate different known attacks required for a user access control designed for WSNs. Furthermore, we simulate our scheme for the formal security verification using the widely‐accepted automated validation of Internet security protocols and applications tool. The simulation results demonstrate that our scheme is secure. Copyright ? 2014 John Wiley & Sons, Ltd. In this paper, we have proposed a new user access control scheme with attribute‐based encryption using elliptic curve cryptography in hierarchical wireless sensor networks. Through both the formal and informal security analysis and verification using the widely accepted and used Automated Validation of Internet Security Protocol and Applications tool, we have shown that our scheme has the ability to tolerate different known attacks required for a user access control designed for wireless sensor networks. Furthermore, our scheme is efficient as compared with other existing user access control schemes.
机译:对于关键应用,从无线传感器网络(WSN)内部的节点进行实时数据访问至关重要。只有具有唯一访问权限的授权用户才可以访问特定的(但不是全部)感知信息,这些信息由层次化WSN中的群集头收集。可以借助有效的用户访问控制机制,为从群集头到真正用户的不同服务提供正确信息和资源的访问权限。在本文中,我们提出了一种新的用户访问控制方案,该方案使用分层WSN中的椭圆曲线密码学基于属性的加密。在基于属性的加密中,密文用与用户自己的访问结构相关联的用户属性集和秘密密钥标记。具有相关属性集的授权用户可以解密来自簇头的加密消息。我们的方案提供了很高的安全性。而且,与其他现有的用户访问控制方案相比,我们的方案是高效的。通过正式和非正式的安全分析,我们证明了我们的方案能够容忍为WSN设计的用户访问控制所需的各种已知攻击。此外,我们使用广泛接受的Internet安全协议和应用程序工具的自动验证来模拟用于正式安全验证的方案。仿真结果表明我们的方案是安全的。版权? 2014年John Wiley&Sons,Ltd.在本文中,我们提出了一种新的用户访问控制方案,该方案采用分层无线传感器网络中的基于椭圆曲线密码学的基于属性的加密。通过使用广泛接受和使用的Internet安全协议和应用程序自动验证工具进行的正式和非正式安全性分析和验证,我们已经表明,我们的方案能够容忍为无线传感器设计的用户访问控制所需的各种已知攻击网络。此外,与其他现有的用户访问控制方案相比,我们的方案是有效的。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号