SPINS: security protocols for sensor networks
Wireless Networks
Keying Hash Functions for Message Authentication
CRYPTO '96 Proceedings of the 16th Annual International Cryptology Conference on Advances in Cryptology
LEAP+: Efficient security mechanisms for large-scale distributed sensor networks
ACM Transactions on Sensor Networks (TOSN)
Review: Wireless sensor network key management survey and taxonomy
Journal of Network and Computer Applications
Cryptographic extraction and key derivation: the HKDF scheme
CRYPTO'10 Proceedings of the 30th annual conference on Advances in cryptology
EURASIP Journal on Wireless Communications and Networking - Special issue on security and resilience for smart devices and applications
SP 800-108. Recommendation for Key Derivation Using Pseudorandom Functions (Revised)
SP 800-108. Recommendation for Key Derivation Using Pseudorandom Functions (Revised)
Otsopack: Lightweight semantic framework for interoperable ambient intelligence applications
Computers in Human Behavior
Hi-index | 0.00 |
This work introduces a novel access control solution for infrastructures composed of highly constrained devices which provide users with services. Low energy consumption is a key point in this kind of scenarios given that devices usually run on batteries and are unattended for long periods of time. Our proposal achieves privacy, authentication, semantic security, low energy and computational demand and device compromise impact limitation on a simple manner. The access control provided is based on user identity and time intervals. We discuss these properties and compare our proposal to previous related work.