Title: The design of dynamic access control for hierarchical sensor networks with key-lock-pair mechanism

Authors: Xi Chen; Yun Liu; Chin-Chen Chang; Changlu Lin

Addresses: Key Laboratory of Communication and Information Systems, Beijing Municipal Commission of Education, Beijing Jiaotong University, Beijing 100044, China ' Key Laboratory of Communication and Information Systems, Beijing Municipal Commission of Education, Beijing Jiaotong University, Beijing 100044, China ' Department of Information Engineering and Computer Science, Feng Chia University, Taichung 40724, Taiwan; Department of Computer Science and Information Engineering, Asia University, Taichung 41354, Taiwan ' School of Mathematics and Computer Science, Fujian Normal University, Fuzhou, Fujian, 350108, China

Abstract: In recent years, Wireless Sensor Networks (WSNs) have been applied extensively. Since low-power and mobile sensor networks with flat topology demand high efficiency, good scalability and security, a new structural dynamic access control scheme is needed. In this paper, we explore the task of providing access privileges in hierarchical sensor networks with directed graph and partially ordered set tools. In some traditional schemes, there will be a huge overhead of calculations on the large-scale network when the new class of sensors joins or an old one leaves. We present a novel, efficient and dynamic access control scheme that makes it unnecessary to change all the keys for the Central Authority (CA) and requires only a small amount of computation for each sensor. Specifically, we make use of a key-lock-pair mechanism based on Newton's interpolating polynomial for key management. Extensive analysis showed that our proposed scheme is secure under security models and efficient for both the CA and users.

Keywords: key-lock-pair mechanism; dynamic access control; hierarchical sensor networks; wireless sensor networks; WSNs; directed graph; partially ordered set; key management; network security.

DOI: 10.1504/IJAHUC.2014.065763

International Journal of Ad Hoc and Ubiquitous Computing, 2014 Vol.17 No.2/3, pp.162 - 173

Received: 27 Feb 2013
Accepted: 17 Jul 2013

Published online: 19 Nov 2014 *

Full-text access for editors Full-text access for subscribers Purchase this article Comment on this article