Acta Informatica Pragensia 2015, 4(3), 276-287 | DOI: 10.18267/j.aip.743993
A Fine-Grained Data Access Control System in Wireless Sensor Network
- Computer Science Department, Federal University of Technology Akure, P.M.B. 704, Akure, Ondo State, Nigeria
The evolving realities of Wireless Sensor Network (WSN) deployed to various terrain of life require serving multiple applications. As large amount of sensed data are distributed and stored in individual sensors nodes, the illegal access to these sensitive data can be devastating. Consequently, data insecurity becomes a big concern. This study, therefore, proposes a fine-grained access control system which only requires the right set of users to access a particular data, based on their access privileges in the sensor networks. It is designed using Priccess Protocol with Access policy formulation adopting the principle of Bell Lapadula model as well as Attribute-Based Encryption (ABE) to control access to sensor data. The functionality of the proposed system is simulated using Netbeans. The performance analysis of the proposed system using execution time and size of the key show that the higher the key size, the harder it becomes for the attacker to hack the system. Additionally, the time taken for the proposed work is lesser which makes the work faster than the existing work. Consequently, a well secure interactive web-based application that could facilitates the field officers access to stored data in safe and secure manner is developed.
Keywords: Attribute-Based Signature (ABE), Bell Lapadula access policy model, Wireless sensor network (WSN), Fine-grained data access control, Security
Received: November 1, 2015; Revised: December 18, 2015; Accepted: December 24, 2015; Published: December 31, 2015 Show citation
References
- Alese B. K. (2000). Vulnerability Analysis of Encryption / Decryption Techniques of computer network security. Master Thesis. Akure: Federal university of technology Akure.
- Bhattacharyya, D., Kim T-h, & Pal, S. (2010). A Comparative Study of Wireless Sensor Networks and Their Routing Protocols. Sensors, 10, 10506-10523. doi: 10.3390/s101210506
Go to original source...
- Buratti, C., Conti, A., Dardari, D., & Verdone, R. (2009). An overview on wireless sensor networks technology and evolution. Sensors, 9(9), 6869-6896. doi: 10.3390/s90906869
Go to original source...
- Cook D. J. & Das S. (2004). Smart Environments: Technology, Protocols and Applications. New York: John Wiley & Sons.
Go to original source...
- He, D., Bu, J., Zhu, S., Chan, S., & Chen, C. (2011). Distributed Access Control with privacy support in wireless sensor networks. IEEE Transactions on Wireless Communications, 10(10), 3472-3481. doi: 10.1109/TWC.2011.072511.102283
Go to original source...
- Ferraiolo, D., Cugini, J., & Kuhn, R. (1995). Role Based Access Control: Features and Motivations. In Proceedings of the Annual Computer Security Applications Conference, pp. 241-248, New Orleans: IEEE Computer Society Press.
- Hac, A. (2003). Wireless sensor network designs. Etobicoke: John Wiley & Sons.
Go to original source...
- Han, K. Kim, K. & Shon, T. (2010). Untraceable Mobile Node Authentication in WSN. Sensors, 10, 4410-4429. doi: 10.3390/s100504410
Go to original source...
- Shon, H. (2012), All-in-one CISSP Exam Guide. Emeryville: McGraw Hill Osborne.
- Hill, J. L. (1998). System Architecture for Wireless Sensor Networks. Doctoral Dissertation. Berkeley: University of California.
- Lewis F. L. (2004). Wireless Sensor Networks. In D.J. Cook, S.K. Das (eds.), Smart Environments: Technology, Protocols, and Applications. New York: John Wiley.
Go to original source...
- Li, M., Lou, W., & Ren, K. (2010). Data security and privacy in Wireless body area networks. IEEE Wireless communications, 17(1), 51-58. doi: 10.1109/MWC.2010.5416350
Go to original source...
- Matthys, N., Afzal, R., Huygen, C., Michiels, S., Joosen, W., & Hughes, D. (2010). Toward Fine-grained and application-centric Access control for wireless sensor networks. In Proceedings of the 2010 ACM Symposium on Applied Computing (pp. 793-794). New York: ACM. doi: 10.1145/1774088.1774252
Go to original source...
- Nanda, A. (2003). Fine grained access control. International Oracle users group publication. Retrieved from http://www.proligence.com/nyoug_fgac.pdf
- Ogundele, O. S. (2011). Design of multilevel access control model for delegation based on attributes separation of duty and trust. Master thesis. Akure: Federal University of Technology Akure.
- Pirretti, M., Traynor, P., McDaniel, P., & Waters, B. (2006). Secure Attribute-Based Systems. In Proceedings of the 13th ACM conference on Computer and communications security (pp. 99-112). doi: 10.1145/1180405.1180419
Go to original source...
- Shon, H. (2012). Cryptography. In CISSP All-in-One Exam Guide. New York: McGraw-Hill Education.
- Sohraby, K., Minoli, D., & Znati, T. (2007). Wireless sensor networks: technology, protocols, and applications. New York: Wiley.
Go to original source...
- Ruj, S., Nayak, & A. Stojmenovic, I. (2011). Distributed fine-grained Access control in Wireless Sensor Networks. In IEEE International Parallel & Distributed Processing Symposium (pp. 352 - 362). New York: IEEE. doi: 10.1109/IPDPS.2011.42
Go to original source...
- Tubaishat, M., & Madria, S. (2003). Sensor networks: an overview. IEEE Potentials, 22, 20-30.
Go to original source...
- Wayne, W. M. (2000). Wireless Sensor Network Topologies. Retrieved from http://archives.sensorsmag.com/articles/0500/72/
- Campete, S. A., & Yener, B. (2005). Key distribution mechanisms for wiles sensor networks: a survey. Retrieved from https://www.cs.rpi.edu/research/pdf/05-07.pdf
- Yu, S., Wenjing, L., Kui, R. (2006). FDAC: Toward fine-grained distributed data access control in wireless sensor networks. IEEE Transactions on Parallel and Distributed Systems, 22(4), 673-686. doi: 10.1109/TPDS.2010.130
Go to original source...
This is an open access article distributed under the terms of the Creative Commons Attribution 4.0 International License (CC BY 4.0), which permits use, distribution, and reproduction in any medium, provided the original publication is properly cited. No use, distribution or reproduction is permitted which does not comply with these terms.