Security analysis and resource requirements of Group-Oriented user access control for Hardware-Constrained wireless network services

  • D. Ventura
  • , Aitor Gómez-Goiri
  • , V. Catania
  • , Diego López-De-Ipinã
  • , J. A.M. Naranjo
  • , L. G. Casado

Research output: Contribution to journalArticlepeer-review

2 Citations (Scopus)

Abstract

We extend and analyse a previous access control solution for wireless network services with Group-Based authorization. Authentication and encryption are provided, and access control relies on user identity, group membership and time intervals. Both the basic solution and the extension focus on minimizing computation, energy, storage and communications on the sensor side: computations involved rely on symmetric cryptography and key derivation functions, and no additional messages between user and sensor are needed. The performance of our solution is proven by experiments on a highly constrained platform such as Arduino. Finally, its security is validated against the AVISPA tool.

Original languageEnglish
Pages (from-to)80-91
Number of pages12
JournalLogic Journal of the IGPL
Volume24
Issue number1
DOIs
Publication statusPublished - 10 Jul 2014
Externally publishedYes

Keywords

  • Access control
  • Group-Based authorization
  • Internet of things
  • Ubiquitous computing
  • Wireless network services

Fingerprint

Dive into the research topics of 'Security analysis and resource requirements of Group-Oriented user access control for Hardware-Constrained wireless network services'. Together they form a unique fingerprint.

Cite this