Title: A survey on user access control in wireless sensor networks with formal security verification

Authors: Santanu Chatterjee; Ashok Kumar Das; Jamuna Kanta Sing

Addresses: Research Center Imarat, Defence Research and Development Organization, Hyderabad 500 069, India ' Center for Security, Theory and Algorithmic Research, International Institute of Information Technology, Hyderabad 500 032, India ' Department of Computer Science and Engineering, Jadavpur University, Kolkata 700 032, India

Abstract: User access control provides the permission to impose different access privileges for different types of authenticated users for accessing the sensing information directly from the sensor nodes inside a wireless sensor network (WSN). Until now, there have been ample number of user access control schemes proposed in the literature, and each scheme has its own merits and demerits. In this paper, we identify all the functionality features and security requirements, which must be satisfied for an ideal user access control scheme. We present and discuss the recently proposed important user access control schemes available so far in the literature. We critically analyse the energy, communication, computational overheads requirement, functionality and security analysis of the existing schemes. Further, we perform the formal security analysis of existing schemes using the widely-accepted automated validation of internet security protocols and applications (AVISPA) tool. All the existing schemes have some limitations. Hence, we feel that there is a strong need to design an ideal efficient user access control scheme in future, which should meet all the security requirements and achieve all the functionality features.

Keywords: wireless sensor networks; WSNs; user access control; hash function; elliptic curve cryptography; ECC; automated validation; internet security protocols; AVISPA; formal security verification; network security; functionality.

DOI: 10.1504/IJTMCC.2014.067303

International Journal of Trust Management in Computing and Communications, 2014 Vol.2 No.3, pp.259 - 295

Received: 31 Mar 2014
Accepted: 21 Apr 2014

Published online: 21 Feb 2015 *

Full-text access for editors Full-text access for subscribers Purchase this article Comment on this article