A role-based access in a hierarchical sensor network architecture to provide multilevel security
نویسندگان
چکیده
Most of the proposed security protocols for Wireless Sensor Networks (WSN) are designed to provide the uniform level of security across the network. There are various multi-sensing applications like sensors monitoring airport runway control system which may also be used to monitor environmental conditions such as wind speed and direction. When these nodes communicate, they may require different levels of security. For example, in case of a highjack event, the secure communication among nodes in a target region in the airport runway control system should be provided as they exchange highly critical data. In this paper, we propose a scheme called RBASH (Role Based Access in Sensor Networks) which provides role-based multilevel security in sensor networks. Each group is organized in such a way that they can have different roles based on the context and thus, can provide or have different levels of accesses. RBASH provides the desired security level based on the application need. The multilevel security is based on assigned keys to different nodes at different levels. To achieve this goal, we organize the network using Hasse diagram then compute the key for each individual node and extend it further to construct the key for a group. Based on experimental observations, we conclude that RBASH is energy and communication efficient in providing security compared to some other protocols which provides uniform security for all the nodes.
منابع مشابه
Access and Mobility Policy Control at the Network Edge
The fifth generation (5G) system architecture is defined as service-based and the core network functions are described as sets of services accessible through application programming interfaces (API). One of the components of 5G is Multi-access Edge Computing (MEC) which provides the open access to radio network functions through API. Using the mobile edge API third party analytics applications ...
متن کاملEnforcing RBAC Policies over Data Stored on Untrusted Server (Extended Version)
One of the security issues in data outsourcing is the enforcement of the data owner’s access control policies. This includes some challenges. The first challenge is preserving confidentiality of data and policies. One of the existing solutions is encrypting data before outsourcing which brings new challenges; namely, the number of keys required to access authorized resources, efficient policy u...
متن کاملSecurity in Web Based Work ow Management Systems
Web based work ows are increasingly becoming a viable choice for work ows that span multiple organizations Until recently Web technology has not been terribly secure However by utiliz ing appropriate encryption algorithms digital signatures and access control role based multilevel security Web based Work ow Management Systems can be made secure Since these systems include many subsystems Operat...
متن کاملCAMAC: a context-aware mandatory access control model
Mandatory access control models have traditionally been employed as a robust security mechanism in multilevel security environments such as military domains. In traditional mandatory models, the security classes associated with entities are context-insensitive. However, context-sensitivity of security classes and flexibility of access control mechanisms may be required especially in pervasive c...
متن کاملAn Optimal Approach for Secure and Energy Efficient Data Transfer in WSN using Hierarchical and Dynamic Elliptic Curve Cryptosystem
In Wireless Sensor Networks (WSN), the wireless connections are prone to different type of attacks. Therefore, security of the data that transfer over the wireless network is a measure concern in WSN. Due to the limitation of nodes’ energy, efficient energy utilization is also an important factor. Hence to provide security along with efficient energy utilization of sensor nodes, Secure and Ener...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- Computer Communications
دوره 31 شماره
صفحات -
تاریخ انتشار 2008