2008 IEEE International Conference on Communications 2008
DOI: 10.1109/icc.2008.279
|View full text |Cite
|
Sign up to set email alerts
|

Lightweight, Distributed Access Control for Wireless Sensor Networks Supporting Mobility

Abstract: Wireless sensor networks (WSN) are large scale networks of unattended devices, aimed at monitoring environmental parameters. Their extremely scarce hardware resources constitute a huge limitation to the use of standard security protocols to secure communications, so that custom ones must be designed. In this article we describe the development of a novel access control system for WSN based on a distributed threshold scheme. Our model gives support for mobility and limits the needed communication and consequent… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2

Citation Types

0
4
0

Year Published

2010
2010
2013
2013

Publication Types

Select...
2
2
1

Relationship

0
5

Authors

Journals

citations
Cited by 7 publications
(4 citation statements)
references
References 6 publications
0
4
0
Order By: Relevance
“…The resulting diversity therefore increases the complexity associated with the enforcement of fair and effective usage of the wireless medium by a cognitive radio network. This problem is often addressed using a trusted third party or distribution of trust [11,12]. Such system incur significant overhead or in certain scenarios, assumption of a trusted third party is not always practical.…”
Section: Related Workmentioning
confidence: 99%
“…The resulting diversity therefore increases the complexity associated with the enforcement of fair and effective usage of the wireless medium by a cognitive radio network. This problem is often addressed using a trusted third party or distribution of trust [11,12]. Such system incur significant overhead or in certain scenarios, assumption of a trusted third party is not always practical.…”
Section: Related Workmentioning
confidence: 99%
“…In previous years, a number of research works have been done and a number of others are also in progress both on access control models [1,4,5,7] and reputation-based systems [13][14][15][16]26,29] for wireless networks. Before we proceed towards describing our work, let us provide a brief review of some of the existing and popular access control and reputation based schemes that motivated our work.…”
Section: Related Workmentioning
confidence: 99%
“…Introducing security mechanisms generally involves introducing cryptographic methods, which require high memory usage and power consumption in processing and communication. Many researchers have already proposed many security measures and most of them involve cryptographic methods and techniques [1,[3][4][5][6][7][8][9][10][11][12][35][36][37][38].…”
Section: Introductionmentioning
confidence: 99%
“…Recently, schemes related to the cyber security for sensor and actuator networks have been widely investigated [20][21][22][23][24]. In particular, cyber security of Web-services-based communication for smart transducers must be implemented [25].…”
Section: Introductionmentioning
confidence: 99%