J4 ›› 2010, Vol. 37 ›› Issue (3): 507-512+528.doi: 10.3969/j.issn.1001-2400.2010.03.022

• Original Articles • Previous Articles     Next Articles

Access control scheme in a wireless sensor network

LIU Yun1,2;PEI Qing-qi2   

  1. (1. School of Mechano-electronic Engineering, Xidian Univ., Xi'an  710071, China;
    2. Ministry of Education Key Lab. of Computer Network and Information Security, Xidian Univ., Xi'an  710071, China)
  • Received:2009-05-15 Online:2010-06-20 Published:2010-07-23
  • Contact: LIU Yun E-mail:cloud_ly@163.com

Abstract:

Access control is one of the most challenging security problems in sensor networks. Sensor networks provide the query service of the environmental monitoring data as the service provider to the users. The current access control scheme based on public key cryptography is high in expense, and resists node capture, query replay and DoS attacks with difficulty. This paper proposes one-way hash chain based access control schemes. To increase the scalability of users and access capability, and to resist users being compromised, several effective access control schemes based on the Merkle hash tree and revoking user access control capability are proposed. Analysis, evaluation and comparison show that these schemes have several advantages over the current access control methods of low expense in calculation, storage and communication, and resistance to node capture, query replay and DoS attacks.

Key words: sensor networks, access control, one-way key chain, Merkle hash tree