首页> 外文会议>International conference on advances in computing, communications and informatics >Cryptanalysis and enhancement of a distributed fine-grained access control in wireless sensor networks
【24h】

Cryptanalysis and enhancement of a distributed fine-grained access control in wireless sensor networks

机译:密码分析和无线传感器网络中分布式细粒度访问控制的增强

获取原文

摘要

Fine-grained access control is used to assign unique access privilege to a particular user for accessing the relevant information. Recently, Yu et al. and Ruj et al. proposed a couple of fine grained access control schemes using public key cryptography. These schemes exploit and maneuver the concept of KP-ABE and a cryptographic technique based on bilinear pairing on elliptive curve groups. In this paper, we first show that though these schemes are efficient, but both schemes suffer from some fatal weakness such as vulnerability against an insider attack, specifically key abuse attacks by the genuine users. Therefore, a user with lower access privilege can access the secret data sent for a user of higher access privilege. This contradicts the basic objective of fine grained access control. Also, information sent for a particular user can be revealed to an adversary. In order to remedy that weakness, we propose some simple countermeasures to prevent key-abuse insider attack while the merits of existing fine grained access control scheme are left unchanged. Further, our scheme is unconditionally secure against various attacks such as man-in-the-middle attack, replay attack and denial of service attack. While providing these extra security features, our scheme incurs no such extra communication, computation or storage overhead as compared to the existing schemes.
机译:细粒度的访问控制用于为特定用户分配唯一的访问特权,以访问相关信息。最近,Yu等。和Ruj等。提出了一些使用公钥密码学的细粒度访问控制方案。这些方案利用并操纵了KP-ABE的概念以及基于椭圆曲线组上的双线性配对的密码技术。在本文中,我们首先表明尽管这些方案是有效的,但是这两种方案都存在一些致命的弱点,例如针对内部人员攻击的脆弱性,特别是真正用户的密钥滥用攻击。因此,具有较低访问权限的用户可以访问为较高访问权限的用户发送的机密数据。这与细粒度访问控制的基本目标相矛盾。而且,可以将向特定用户发送的信息透露给对手。为了弥补这一弱点,我们提出了一些简单的对策,以防止密钥滥用内部人攻击,而现有细粒度访问控制方案的优点保持不变。此外,我们的方案可无条件地防御各种攻击,例如中间人攻击,重播攻击和拒绝服务攻击。在提供这些额外的安全功能的同时,与现有方案相比,我们的方案不会招致此类额外的通信,计算或存储开销。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号