Extending a user access control proposal for wireless network services with hierarchical user credentials

  • Juan Álvaro Muñoz Naranjo
  • , Aitor Gómez-Goiri
  • , Pablo Orduña
  • , Diego López-de-Ipiña
  • , Leocadio González Casado

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

1 Citation (Scopus)

Abstract

We extend a previous access control solution for wireless network services with group-based authorization and encryption capabilities. Both the basic solution and this novel extension focus on minimizing computation, energy, storage and communications required at sensors so they can be run in very constrained hardware, since the computations involved rely on symmetric cryptography and key derivation functions. Furthermore, no additional messages between users and sensors are needed. Access control is based on user identity, group membership and time intervals.

Original languageEnglish
Title of host publicationInternational Joint Conference SOCO’13-CISIS’13-ICEUTE’13, Proceedings
EditorsAjith Abraham, Emilio Corchado, Václav Snášel, Ivan Zelinka, Pablo García Bringas, Álvaro Herrero, Bruno Baruque, Héctor Quintián, Emilio Corchado, André C.P.L.F. de Carvalho, Fanny Klett, Ivan Zelinka
PublisherSpringer Verlag
Pages601-610
Number of pages10
ISBN (Electronic)9783319018539
DOIs
Publication statusPublished - 2014
Externally publishedYes
EventInternational Joint Conference on 8th International Conference on Soft Computing Models in Industrial and Environmental Applications, SOCO 2013, 6th International Conference on Computational Intelligence in Security for Information Systems, CISIS 2013 and 4th International Conference on European Transnational Education, ICEUTE 2013 - Salamanca, Spain
Duration: 11 Sept 201313 Sept 2013

Publication series

NameAdvances in Intelligent Systems and Computing
Volume239
ISSN (Print)2194-5357

Conference

ConferenceInternational Joint Conference on 8th International Conference on Soft Computing Models in Industrial and Environmental Applications, SOCO 2013, 6th International Conference on Computational Intelligence in Security for Information Systems, CISIS 2013 and 4th International Conference on European Transnational Education, ICEUTE 2013
Country/TerritorySpain
CitySalamanca
Period11/09/1313/09/13

Keywords

  • Access control
  • Group-based authorization
  • Internet of Things
  • Ubiquitous computing
  • Wireless network services

Fingerprint

Dive into the research topics of 'Extending a user access control proposal for wireless network services with hierarchical user credentials'. Together they form a unique fingerprint.

Cite this