SPINS: security protocols for sensor networks
Wireless Networks
TinySec: a link layer security architecture for wireless sensor networks
SenSys '04 Proceedings of the 2nd international conference on Embedded networked sensor systems
Contiki - A Lightweight and Flexible Operating System for Tiny Networked Sensors
LCN '04 Proceedings of the 29th Annual IEEE International Conference on Local Computer Networks
Transforming Agriculture through Pervasive Wireless Sensor Networks
IEEE Pervasive Computing
Tiny web services: design and implementation of interoperable and evolvable sensor networks
Proceedings of the 6th ACM conference on Embedded network sensor systems
Federated and Shared Use of Sensor Networks through Security Middleware
ITNG '09 Proceedings of the 2009 Sixth International Conference on Information Technology: New Generations
Secure-TWS: Authenticating node to multi-user communication in shared sensor networks
IPSN '09 Proceedings of the 2009 International Conference on Information Processing in Sensor Networks
Formally verified authenticated query dissemination in sensor networks
SPECTS'09 Proceedings of the 12th international conference on Symposium on Performance Evaluation of Computer & Telecommunication Systems
Wireless sensor networks for logistics and retail
INSS'09 Proceedings of the 6th international conference on Networked sensing systems
FDAC: Toward Fine-Grained Distributed Data Access Control in Wireless Sensor Networks
IEEE Transactions on Parallel and Distributed Systems
SenShare: transforming sensor networks into multi-application sensing infrastructures
EWSN'12 Proceedings of the 9th European conference on Wireless Sensor Networks
On the security of public key protocols
IEEE Transactions on Information Theory
Building Wireless Sensor Network Applications with LooCI
International Journal of Mobile Computing and Multimedia Communications
Hi-index | 0.00 |
Emerging real world WSNs seldom exist as single owner, single application, isolated networks, but instead comprise of sensor nodes owned by multiple parties. These sensors offer multiple services to users locally or across the Internet, and travel between multiple WSNs. However, users should only have access to a limited subset of services. Due to a need for direct interactions of users with nodes, authentication and authorisation at the node level is critical. This paper presents an access control infrastructure consisting of three parts: 1) an authentication protocol to ensure authenticity of messages, 2) a role based authorisation framework to perform access control, and 3) a user management service to enable user and permission management. A prototype implementation on the ContikiOS demonstrates the validity and feasibility of node local role based access control on low power micro-controllers.