The Community for Technology Leaders
Green Image
Issue No. 08 - Aug. (2012 vol. 23)
ISSN: 1045-9219
pp: 1427-1438
Rui Zhang , Arizona State University, Tempe
Yanchao Zhang , Arizona State University, Tempe
Kui Ren , Illinois Institute of Technology, Chicago
The owner and users of a sensor network may be different, which necessitates privacy-preserving access control. On the one hand, the network owner need enforce strict access control so that the sensed data are only accessible to users willing to pay. On the other hand, users wish to protect their respective data access patterns whose disclosure may be used against their interests. This paper presents {\rm DP}^2{\rm{AC}}, a Distributed Privacy-Preserving Access Control scheme for sensor networks, which is the first work of its kind. Users in {\rm DP}^2{\rm{AC}} purchase tokens from the network owner whereby to query data from sensor nodes which will reply only after validating the tokens. The use of blind signatures in token generation ensures that tokens are publicly verifiable yet unlinkable to user identities, so privacy-preserving access control is achieved. A central component in {\rm DP}^2{\rm{AC}} is to prevent malicious users from reusing tokens, for which we propose a suite of distributed token reuse detection (DTRD) schemes without involving the base station. These schemes share the essential idea that a sensor node checks with some other nodes (called witnesses) whether a token has been used, but they differ in how the witnesses are chosen. We thoroughly compare their performance with regard to TRD capability, communication overhead, storage overhead, and attack resilience. The efficacy and efficiency of {\rm DP}^2{\rm{AC}} are confirmed by detailed performance evaluations.
Wireless sensor networks, access control, privacy, security.

Y. Zhang, K. Ren and R. Zhang, "Distributed Privacy-Preserving Access Control in Sensor Networks," in IEEE Transactions on Parallel & Distributed Systems, vol. 23, no. , pp. 1427-1438, 2011.
95 ms
(Ver 3.3 (11022016))