Fast Hash-Based Signatures on Constrained Devices
CARDIS '08 Proceedings of the 8th IFIP WG 8.8/11.2 international conference on Smart Card Research and Advanced Applications
Reputation-based role assignment for role-based access control in wireless sensor networks
Computer Communications
Modeling access control for cyber-physical systems using reputation
Computers and Electrical Engineering
Hi-index | 0.01 |
Access control is a critical security service in sensor networks. Sensor networks provide the query service of the environmental monitoring data as the service provider to the users. The current access control scheme based on public key cryptography is high in expenses, and difficult to resist replay and DoS attacks. This paper proposes several effective access control schemes using the one-way key chain and the Merkle hash tree. Also this paper provides a revocation tree scheme to revoke the access control capability from compromised users. These schemes have several advantages over the current access control methods of low expenses in calculation, storage and communication, and resistance to node capture, query replay and DoS attacks.