Applying Time-Bound Hierarchical Key Assignment in Wireless Sensor Networks
Access privileges in distributed systems can be effectively organized as a partial-order hierarchy that consists of distinct security classes, and are often designated with certain temporal restrictions. The time-bound hierarchical key assignment problem is to assign distinct cryptographic keys to d...
Saved in:
Main Authors: | , , , |
---|---|
Format: | text |
Language: | English |
Published: |
Institutional Knowledge at Singapore Management University
2011
|
Subjects: | |
Online Access: | https://ink.library.smu.edu.sg/sis_research/1420 https://ink.library.smu.edu.sg/context/sis_research/article/2419/viewcontent/Zhu2011_Chapter_ApplyingTime_BoundHierarchical.pdf |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Singapore Management University |
Language: | English |
id |
sg-smu-ink.sis_research-2419 |
---|---|
record_format |
dspace |
spelling |
sg-smu-ink.sis_research-24192019-01-02T07:57:24Z Applying Time-Bound Hierarchical Key Assignment in Wireless Sensor Networks ZHU, Wentao DENG, Robert H. ZHOU, Jianying BAO, Feng Access privileges in distributed systems can be effectively organized as a partial-order hierarchy that consists of distinct security classes, and are often designated with certain temporal restrictions. The time-bound hierarchical key assignment problem is to assign distinct cryptographic keys to distinct security classes according to their privileges so that users from a higher class can use their class key to derive the keys of lower classes, and these keys are time-variant with respect to sequentially allocated temporal units called time slots. In this paper, we explore applications of time-bound hierarchical key assignment in a wireless sensor network environment where there are a number of resource-constrained low-cost sensor nodes. We show time-bound hierarchical key assignment is a promising technique for addressing multiple aspects of sensor network security, such as data privacy protection and impact containment under node compromise. We also present the technical challenges and indicate future research directions. 2011-11-01T07:00:00Z text application/pdf https://ink.library.smu.edu.sg/sis_research/1420 info:doi/10.1007/978-3-642-25243-3_25 https://ink.library.smu.edu.sg/context/sis_research/article/2419/viewcontent/Zhu2011_Chapter_ApplyingTime_BoundHierarchical.pdf http://creativecommons.org/licenses/by-nc-nd/4.0/ Research Collection School Of Computing and Information Systems eng Institutional Knowledge at Singapore Management University Cryptographic key Distributed systems Future research directions Hierarchical key assignment Low-cost sensors Node compromise Privacy protection Resource-constrained Technical challenges Temporal restrictions Time slots Time variant Wireless sensor Information Security |
institution |
Singapore Management University |
building |
SMU Libraries |
continent |
Asia |
country |
Singapore Singapore |
content_provider |
SMU Libraries |
collection |
InK@SMU |
language |
English |
topic |
Cryptographic key Distributed systems Future research directions Hierarchical key assignment Low-cost sensors Node compromise Privacy protection Resource-constrained Technical challenges Temporal restrictions Time slots Time variant Wireless sensor Information Security |
spellingShingle |
Cryptographic key Distributed systems Future research directions Hierarchical key assignment Low-cost sensors Node compromise Privacy protection Resource-constrained Technical challenges Temporal restrictions Time slots Time variant Wireless sensor Information Security ZHU, Wentao DENG, Robert H. ZHOU, Jianying BAO, Feng Applying Time-Bound Hierarchical Key Assignment in Wireless Sensor Networks |
description |
Access privileges in distributed systems can be effectively organized as a partial-order hierarchy that consists of distinct security classes, and are often designated with certain temporal restrictions. The time-bound hierarchical key assignment problem is to assign distinct cryptographic keys to distinct security classes according to their privileges so that users from a higher class can use their class key to derive the keys of lower classes, and these keys are time-variant with respect to sequentially allocated temporal units called time slots. In this paper, we explore applications of time-bound hierarchical key assignment in a wireless sensor network environment where there are a number of resource-constrained low-cost sensor nodes. We show time-bound hierarchical key assignment is a promising technique for addressing multiple aspects of sensor network security, such as data privacy protection and impact containment under node compromise. We also present the technical challenges and indicate future research directions. |
format |
text |
author |
ZHU, Wentao DENG, Robert H. ZHOU, Jianying BAO, Feng |
author_facet |
ZHU, Wentao DENG, Robert H. ZHOU, Jianying BAO, Feng |
author_sort |
ZHU, Wentao |
title |
Applying Time-Bound Hierarchical Key Assignment in Wireless Sensor Networks |
title_short |
Applying Time-Bound Hierarchical Key Assignment in Wireless Sensor Networks |
title_full |
Applying Time-Bound Hierarchical Key Assignment in Wireless Sensor Networks |
title_fullStr |
Applying Time-Bound Hierarchical Key Assignment in Wireless Sensor Networks |
title_full_unstemmed |
Applying Time-Bound Hierarchical Key Assignment in Wireless Sensor Networks |
title_sort |
applying time-bound hierarchical key assignment in wireless sensor networks |
publisher |
Institutional Knowledge at Singapore Management University |
publishDate |
2011 |
url |
https://ink.library.smu.edu.sg/sis_research/1420 https://ink.library.smu.edu.sg/context/sis_research/article/2419/viewcontent/Zhu2011_Chapter_ApplyingTime_BoundHierarchical.pdf |
_version_ |
1770571115840667648 |