Secure Mobile Subscription of Sensor-encrypted Data

In an end-to-end encryption model for a wireless sensor network (WSN), the network control center preloads encryption and decryption keys to the sensor nodes and the subscribers respectively, such that a subscriber can use a mobile device in the deployment field to decrypt the sensed data encrypted...

Full description

Saved in:
Bibliographic Details
Main Authors: CHU, Cheng-Kang, ZHU, Wen-Tao, CHOW, Sherman S. M., ZHOU, Jianying, DENG, Robert H.
Format: text
Language:English
Published: Institutional Knowledge at Singapore Management University 2011
Subjects:
Online Access:https://ink.library.smu.edu.sg/sis_research/1423
https://ink.library.smu.edu.sg/context/sis_research/article/2422/viewcontent/Secure_Mobile_Sub_2011_afv.pdf
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Singapore Management University
Language: English
id sg-smu-ink.sis_research-2422
record_format dspace
spelling sg-smu-ink.sis_research-24222019-01-03T08:20:13Z Secure Mobile Subscription of Sensor-encrypted Data CHU, Cheng-Kang ZHU, Wen-Tao CHOW, Sherman S. M. ZHOU, Jianying DENG, Robert H. In an end-to-end encryption model for a wireless sensor network (WSN), the network control center preloads encryption and decryption keys to the sensor nodes and the subscribers respectively, such that a subscriber can use a mobile device in the deployment field to decrypt the sensed data encrypted by the more resource-constrained sensor nodes. This paper proposes SMS-SED, a provably secure yet practically efficient key assignment system featuring a discrete time-based access control, to better support a business model where the sensors deployer rents the WSN to customers who desires a higher flexibility beyond subscribing to strictly consecutive periods. In SMS-SED, a node or a mobile device stores a secret key of size independent of the total number of sensor nodes and time periods. We evaluated the feasibility of deploying 2000 nodes for 4096 time periods at 1024-bit of security as a case study, studied the trade off of increasing the storage requirement of a node to significantly reduce its computation time, and provided formal security argument in the random oracle model. 2011-03-01T08:00:00Z text application/pdf https://ink.library.smu.edu.sg/sis_research/1423 info:doi/10.1145/1966913.1966943 https://ink.library.smu.edu.sg/context/sis_research/article/2422/viewcontent/Secure_Mobile_Sub_2011_afv.pdf http://creativecommons.org/licenses/by-nc-nd/4.0/ Research Collection School Of Computing and Information Systems eng Institutional Knowledge at Singapore Management University compact key size data confidentiality sensor network security subscription-based key management access control weak computational device Information Security
institution Singapore Management University
building SMU Libraries
continent Asia
country Singapore
Singapore
content_provider SMU Libraries
collection InK@SMU
language English
topic compact key size
data confidentiality
sensor network security
subscription-based key management
access control
weak computational device
Information Security
spellingShingle compact key size
data confidentiality
sensor network security
subscription-based key management
access control
weak computational device
Information Security
CHU, Cheng-Kang
ZHU, Wen-Tao
CHOW, Sherman S. M.
ZHOU, Jianying
DENG, Robert H.
Secure Mobile Subscription of Sensor-encrypted Data
description In an end-to-end encryption model for a wireless sensor network (WSN), the network control center preloads encryption and decryption keys to the sensor nodes and the subscribers respectively, such that a subscriber can use a mobile device in the deployment field to decrypt the sensed data encrypted by the more resource-constrained sensor nodes. This paper proposes SMS-SED, a provably secure yet practically efficient key assignment system featuring a discrete time-based access control, to better support a business model where the sensors deployer rents the WSN to customers who desires a higher flexibility beyond subscribing to strictly consecutive periods. In SMS-SED, a node or a mobile device stores a secret key of size independent of the total number of sensor nodes and time periods. We evaluated the feasibility of deploying 2000 nodes for 4096 time periods at 1024-bit of security as a case study, studied the trade off of increasing the storage requirement of a node to significantly reduce its computation time, and provided formal security argument in the random oracle model.
format text
author CHU, Cheng-Kang
ZHU, Wen-Tao
CHOW, Sherman S. M.
ZHOU, Jianying
DENG, Robert H.
author_facet CHU, Cheng-Kang
ZHU, Wen-Tao
CHOW, Sherman S. M.
ZHOU, Jianying
DENG, Robert H.
author_sort CHU, Cheng-Kang
title Secure Mobile Subscription of Sensor-encrypted Data
title_short Secure Mobile Subscription of Sensor-encrypted Data
title_full Secure Mobile Subscription of Sensor-encrypted Data
title_fullStr Secure Mobile Subscription of Sensor-encrypted Data
title_full_unstemmed Secure Mobile Subscription of Sensor-encrypted Data
title_sort secure mobile subscription of sensor-encrypted data
publisher Institutional Knowledge at Singapore Management University
publishDate 2011
url https://ink.library.smu.edu.sg/sis_research/1423
https://ink.library.smu.edu.sg/context/sis_research/article/2422/viewcontent/Secure_Mobile_Sub_2011_afv.pdf
_version_ 1770571117083230208