| Literature DB >> 30925780 |
Fagui Liu1, Yangyu Tang2, Liangming Wang3.
Abstract
The implementation of IP technology in wireless sensor networks has promoted the development of many smart scenarios. To enhance secure access in IP-enabled wireless sensor networks, access control to sensor nodes is a necessary process. However, access control currently faces two challenges, feasibility and preservation of user access privacy. In this paper, we propose eHAPAC, a novel privacy-preserving access control model for IP-enabled wireless sensor networks. The contributions of our paper include three parts. First, this paper integrates the Hidra access control protocol and APAC privacy-preserving model, addressing the issue of privacy-preserving access control in resource-constrained devices. Second, this paper proposes an enhanced Hidra protocol to implement the unlinkability of protocol message exchanges. Third, to solve the problem of third party credibility, this paper improves the group signature-based APAC model and utilizes blockchain technology to manage the storage and publication of public group signature keys. Security analysis and performance evaluation prove that our protocol is secure and effective.Entities:
Keywords: access control; blockchain; privacy-preserving; resource-constrained device; wireless sensor network
Year: 2019 PMID: 30925780 PMCID: PMC6480219 DOI: 10.3390/s19071513
Source DB: PubMed Journal: Sensors (Basel) ISSN: 1424-8220 Impact factor: 3.576
Comparison among Hidra, Ladon and Kerberos.
| Kerberos | Ladon | Hidra | |
|---|---|---|---|
| Targeted protected devices | Powerful workstations | Severely resource deprived devices | Severely resource deprived devices |
| Authentication and key establishment | √ | √ | √ |
| Authorization | √ | √ | |
| Independence of clock synchronization | √ | √ | |
| Dynamic fine-grained policy enforcement | √ | ||
| Accurate accounting | √ |
Figure 1Access control system architecture.
Figure 2The proposed eHAPAC model.
Terminology and notation agreement of the privacy-preserving model of eHAPAC.
| Expression | Description |
|---|---|
|
| a registered user who requests the sensor services |
|
| issue-key, used to issue group member certificates |
|
| open-key, consisting of two parts which generated by ACS and LA respectively |
|
| ECDH private key of entity X |
|
| ECDH public key of entity X |
|
| group private key |
|
| group private key |
|
| user-key, used to generate group signature |
|
| group member certificate |
|
| personal certificate |
|
| public key of |
|
| private key of |
Figure 3New user joining procedure.
Figure 4User revocation procedure.
Figure 5Accountability procedure in the proposed model.
Figure 6The enhanced Hidra architecture and message exchanges.
Terminology and Notation agreement.
| Expression | Description |
|---|---|
|
| Registered user |
|
| Blockchain |
|
| Authentication server |
|
| Ticket granting server |
|
| Sensor node |
|
| Group signature |
|
| Group identity |
|
| Blockchain address of entity X |
|
| ECDH public key of entity X, used to establish session key with the communication partner |
|
| Temporary session key based on ECDH between X and Y |
|
| Secret key shared between entities X and Y |
|
| Secret key of entity X shared with the ACS |
|
| i-th value of a one-way key chain used to provide freshness in the communication between entities X and Y |
|
| Session key shared between the user and the target sensor node |
Details of the content of enhanced Hidra messages.
| Message | Direction | Content |
|---|---|---|
| BC_AS_REQ |
| |
| BC_AS_REP |
|
|
| HID_TGS_REQ |
|
|
| HID_TGS_IND |
|
|
| HID_S_IND_REQ |
|
|
| HID_S_IND_REP |
|
|
| HID_TGS_REP |
| |
| HID_U_S_REQ |
|
|
| HID_U_S_REP |
|
|
| HID_S_IND |
|
|
| HID_S_ACK |
|
|
Figure 7Traditional accountability procedure.
Figure 8Accountability procedure in APAC model.
Lengths of THE enhanced Hidra protocol messages and number of bytes over which each entity must perform cryptographic operations.
| Message Type | Length (Bytes) | Bytes Subject to Cryptographic Operations | ||||
|---|---|---|---|---|---|---|
| User (Bytes) | AS (Bytes) | TGS (Bytes) | ACM (Bytea) | Sensor (Bytes) | ||
| 1)BC_AS_REQ | 308 | 71 | 71 | - | - | - |
| 2)BC_AS_REP | 56 | 54 | 82 | - | - | - |
| 3)HID_TGS_REQ | 47 | 10 | - | 36 | - | - |
| 4)HID_TGS_IND | 45 | - | - | 41 | - | 41 |
| 5)HID_TGS_IND_REQ | 14 | - | - | 10 | - | 10 |
| 6)HID_S_IND_REP | 22 | - | - | 26 | - | 26 |
| 7)HID_TGS_REP | 133 | 96 | - | 156 | - | - |
| 8)HID_U_S_REQ | 68 | 26 | - | - | - | 60 |
| 9)HID_U_S_REP | 32 | 32 | - | - | - | 32 |
| 10)HID_S_IND | 25 | - | - | - | 23 | 23 |
| 11)HID_S_ACK | 14 | - | - | - | 10 | 10 |
Figure 9Comparison among enhanced PrivaKERB protocol, Hidra protocol, and enhanced Hidra protocol in the total length of messages and the number of bytes over which each entity must perform cryptographic operations.
Figure 10Energy consumption results: (a) impact of the MAC computation rate and the encryption rate on the energy consumption of sensor nodes; (b) energy consumption comparison of sensor nodes among enhanced Hidra, enhanced PrivaKERB and Hidra.
Execution time of AES and SHA-1 on Raspberry Pi 3B.
| Item | Value | |||
|---|---|---|---|---|
| Length of the plaintext (byte) | 10 | 50 | 90 | 130 |
| AES encryption Time (ms) | 0.5213 | 0.5220 | 0.5249 | 0.5261 |
| AES decryption Time (ms) | 0.5471 | 0.5492 | 0.5508 | 0.5529 |
| SHA-1 encryption Time (ms) | 0.1360 | 0.1452 | 0.1611 | 0.1713 |
Running time for some phases of our privacy-preserving framework.
| System Setup (ACS) | System Setup (LA) | New User Joining | New User Joining | |
|---|---|---|---|---|
| Time (CPU = 1.6 GHz) (ms) | 74.536 | 1.325 | 33.525/0.258 | 7.192/27.375/21.022 |
| Time (CPU = 1.8 GHz) (ms) | 73.456 | 1.105 | 29.693/0.231 | 6.372/24.579/18.694 |
| Time (CPU = 2.0 GHz) (ms) | 66.214 | 1.000 | 27.358/0.206 | 5.798/22.028/16.921 |
| Time (CPU = 2.2 GHz) (ms) | 63.311 | 0.939 | 24.988/0.195 | 5.516/20.853/15.989 |
| Time (CPU = 2.4 GHz) (ms) | 50.464 | 0.808 | 23.983/0.189 | 5.062/19.397/14.688 |
| Time (CPU = 2.6 GHz) (ms) | 44.418 | 0.756 | 21.654/0.170 | 4.650/17.818/13.696 |
| Time (CPU = 2.8 GHz) (ms) | 43.204 | 0.728 | 20.300/0.166 | 3.978/15.272/11.773 |
| Time (CPU = 3.1 GHz) (ms) | 41.501 | 0.616 | 18.390/0.147 | 3.804/14.496/11.111 |
Running time for the remaining phases of our privacy-preserving framework.
| Sign (User) | Signature Verify (ACS) | User Revocation (User) | User Revocation (ACS: Two Phase) | Open (ACS: Two Phase) | Open (LA) | |
|---|---|---|---|---|---|---|
| Time (CPU = 1.6 GHz) (ms) | 4.516 | 18.321 | 27.538 | 22.876/2.854 | 1.246/0.010 | 1.207 |
| Time (CPU = 1.8 GHz) (ms) | 4.015 | 15.819 | 23.852 | 19.397/2.657 | 1.097/0.010 | 1.116 |
| Time (CPU = 2.0 GHz) (ms) | 3.694 | 14.421 | 19.568 | 18.001/2.312 | 1.033/0.008 | 0.990 |
| Time (CPU = 2.2 GHz) (ms) | 3.230 | 13.148 | 17.512 | 15.939/2.078 | 0.930/0.010 | 0.875 |
| Time (CPU = 2.4 GHz) (ms) | 3.052 | 12.120 | 16.248 | 14.502/1.883 | 0.768/0.007 | 0.766 |
| Time (CPU = 2.6 GHz) (ms) | 2.949 | 11.978 | 14.994 | 13.523/1.777 | 0.701/0.006 | 0.689 |
| Time (CPU = 2.8 GHz) (ms) | 2.652 | 10.711 | 13.879 | 12.376/1.637 | 0.653/0.005 | 0.647 |
| Time (CPU = 3.1 GHz) (ms) | 2.435 | 9.503 | 13.404 | 11.413/1.492 | 0.598/0.005 | 0.604 |
Figure 11Comparison between the APAC model and our privacy-preserving framework in the time cost.