Secure Mobile Subscription of Sensor-encrypted Data
In an end-to-end encryption model for a wireless sensor network (WSN), the network control center preloads encryption and decryption keys to the sensor nodes and the subscribers respectively, such that a subscriber can use a mobile device in the deployment field to decrypt the sensed data encrypted...
Saved in:
Main Authors: | , , , , |
---|---|
Format: | text |
Language: | English |
Published: |
Institutional Knowledge at Singapore Management University
2011
|
Subjects: | |
Online Access: | https://ink.library.smu.edu.sg/sis_research/1423 https://ink.library.smu.edu.sg/context/sis_research/article/2422/viewcontent/Secure_Mobile_Sub_2011_afv.pdf |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Singapore Management University |
Language: | English |
id |
sg-smu-ink.sis_research-2422 |
---|---|
record_format |
dspace |
spelling |
sg-smu-ink.sis_research-24222019-01-03T08:20:13Z Secure Mobile Subscription of Sensor-encrypted Data CHU, Cheng-Kang ZHU, Wen-Tao CHOW, Sherman S. M. ZHOU, Jianying DENG, Robert H. In an end-to-end encryption model for a wireless sensor network (WSN), the network control center preloads encryption and decryption keys to the sensor nodes and the subscribers respectively, such that a subscriber can use a mobile device in the deployment field to decrypt the sensed data encrypted by the more resource-constrained sensor nodes. This paper proposes SMS-SED, a provably secure yet practically efficient key assignment system featuring a discrete time-based access control, to better support a business model where the sensors deployer rents the WSN to customers who desires a higher flexibility beyond subscribing to strictly consecutive periods. In SMS-SED, a node or a mobile device stores a secret key of size independent of the total number of sensor nodes and time periods. We evaluated the feasibility of deploying 2000 nodes for 4096 time periods at 1024-bit of security as a case study, studied the trade off of increasing the storage requirement of a node to significantly reduce its computation time, and provided formal security argument in the random oracle model. 2011-03-01T08:00:00Z text application/pdf https://ink.library.smu.edu.sg/sis_research/1423 info:doi/10.1145/1966913.1966943 https://ink.library.smu.edu.sg/context/sis_research/article/2422/viewcontent/Secure_Mobile_Sub_2011_afv.pdf http://creativecommons.org/licenses/by-nc-nd/4.0/ Research Collection School Of Computing and Information Systems eng Institutional Knowledge at Singapore Management University compact key size data confidentiality sensor network security subscription-based key management access control weak computational device Information Security |
institution |
Singapore Management University |
building |
SMU Libraries |
continent |
Asia |
country |
Singapore Singapore |
content_provider |
SMU Libraries |
collection |
InK@SMU |
language |
English |
topic |
compact key size data confidentiality sensor network security subscription-based key management access control weak computational device Information Security |
spellingShingle |
compact key size data confidentiality sensor network security subscription-based key management access control weak computational device Information Security CHU, Cheng-Kang ZHU, Wen-Tao CHOW, Sherman S. M. ZHOU, Jianying DENG, Robert H. Secure Mobile Subscription of Sensor-encrypted Data |
description |
In an end-to-end encryption model for a wireless sensor network (WSN), the network control center preloads encryption and decryption keys to the sensor nodes and the subscribers respectively, such that a subscriber can use a mobile device in the deployment field to decrypt the sensed data encrypted by the more resource-constrained sensor nodes. This paper proposes SMS-SED, a provably secure yet practically efficient key assignment system featuring a discrete time-based access control, to better support a business model where the sensors deployer rents the WSN to customers who desires a higher flexibility beyond subscribing to strictly consecutive periods. In SMS-SED, a node or a mobile device stores a secret key of size independent of the total number of sensor nodes and time periods. We evaluated the feasibility of deploying 2000 nodes for 4096 time periods at 1024-bit of security as a case study, studied the trade off of increasing the storage requirement of a node to significantly reduce its computation time, and provided formal security argument in the random oracle model. |
format |
text |
author |
CHU, Cheng-Kang ZHU, Wen-Tao CHOW, Sherman S. M. ZHOU, Jianying DENG, Robert H. |
author_facet |
CHU, Cheng-Kang ZHU, Wen-Tao CHOW, Sherman S. M. ZHOU, Jianying DENG, Robert H. |
author_sort |
CHU, Cheng-Kang |
title |
Secure Mobile Subscription of Sensor-encrypted Data |
title_short |
Secure Mobile Subscription of Sensor-encrypted Data |
title_full |
Secure Mobile Subscription of Sensor-encrypted Data |
title_fullStr |
Secure Mobile Subscription of Sensor-encrypted Data |
title_full_unstemmed |
Secure Mobile Subscription of Sensor-encrypted Data |
title_sort |
secure mobile subscription of sensor-encrypted data |
publisher |
Institutional Knowledge at Singapore Management University |
publishDate |
2011 |
url |
https://ink.library.smu.edu.sg/sis_research/1423 https://ink.library.smu.edu.sg/context/sis_research/article/2422/viewcontent/Secure_Mobile_Sub_2011_afv.pdf |
_version_ |
1770571117083230208 |