TC-BAC: A trust and centrality degree based access control model in wireless sensor networks |
| |
Authors: | Junqi Duan Deyun Gao Chuan Heng Foh Hongke Zhang |
| |
Affiliation: | 1. School of Electronic and Information Engineering, Beijing Jiaotong University, Beijing 100044, PR China;2. Center for Communication Systems Research, University of Surrey, Guildford , Surrey, GU2 7XH, United Kingdom;1. Univ. Politècnica de Catalunya, Dept. d''Arquitectura de Computadors, c/Jordi Girona, 1-3, Barcelona, Spain;2. Univ. Politècnica de València, Communications Dep., València, Spain;1. Orange Labs, 92130 Issy les Moulineaux, France;2. Swinburne University of Technology, John Street, Hawthorn, 3122 Victoria, Australia;3. Telecom SudParis, 9 rue C. Fourier, 91011 Evry Cedex, France;4. INRIA, 2004 Route des Lucioles, 06902 Sophia-Antipolis, France;1. Applied Communication Science (ACS), Inc., Basking Ridge, NJ, USA;2. U.S. Army CERDEC, Aberdeen, MD, USA |
| |
Abstract: | Access control is one of the major security concerns for wireless sensor networks. However, applying conventional access control models that rely on the central Certificate Authority and sophisticated cryptographic algorithms to wireless sensor networks poses new challenges as wireless sensor networks are highly distributed and resource-constrained. In this paper, a distributed and fine-grained access control model based on the trust and centrality degree is proposed (TC-BAC). Our design uses the combination of trust and risk to grant access control. To meet the security requirements of an access control system with the absence of Certificate Authority, a distributed trust mechanism is developed to allow access of a trusted node to a network. Then, centrality degree is used to assess the risk factor of a node and award the access, which can reduce the risk ratio of the access control scheme and provide a certain protection level. Finally, our design also takes multi-domain access control into account and solves this problem by utilizing a mapping mechanism and group access policies. We show with simulation that TC-BAC can achieve both the intended level of security and high efficiency suitable for wireless sensor networks. |
| |
Keywords: | Access control Trust computation Centrality degree Wireless sensor networks |
本文献已被 ScienceDirect 等数据库收录! |
|