University of Hertfordshire

From the same journal

By the same authors

A Survey of Access Control Models in Wireless Sensor Networks

Research output: Contribution to journalArticlepeer-review

Standard

A Survey of Access Control Models in Wireless Sensor Networks. / Maw, Htoo Aung; Xiao, Hannan; Christianson, B.; Malcolm, James.

In: Journal of Sensors and Actuator Networks, Vol. 3, No. 2, 20.06.2014, p. 150-180.

Research output: Contribution to journalArticlepeer-review

Harvard

APA

Vancouver

Author

Maw, Htoo Aung ; Xiao, Hannan ; Christianson, B. ; Malcolm, James. / A Survey of Access Control Models in Wireless Sensor Networks. In: Journal of Sensors and Actuator Networks. 2014 ; Vol. 3, No. 2. pp. 150-180.

Bibtex

@article{034eb98a0b52468fb81358912da44eee,
title = "A Survey of Access Control Models in Wireless Sensor Networks",
abstract = "Wireless sensor networks (WSNs) have attracted considerable interest in the research community, because of their wide range of applications. However, due to the distributed nature of WSNs and their deployment in remote areas, these networks are vulnerable to numerous security threats that can adversely affect their proper functioning. Resource constraints in sensor nodes mean that security mechanisms with a large overhead of computation and communication are impractical to use in WSNs; security in sensor networks is, therefore, a challenge. Access control is a critical security service that offers the appropriate access privileges to legitimate users and prevents illegitimate users from unauthorized access. However, access control has not received much attention in the context of WSNs. This paper provides an overview of security threats and attacks, outlines the security requirements and presents a state-of-the-art survey on access control models, including a comparison and evaluation based on their characteristics in WSNs. Potential challenging issues for access control schemes in WSNs are also discussed.",
keywords = "wireless sensor networks, access control schemes, security mechanisms; , security vulnerabilities",
author = "Maw, {Htoo Aung} and Hannan Xiao and B. Christianson and James Malcolm",
note = "Copyright 2014 by the authors; licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution license (http://creativecommons.org/licenses/by/3.0/)",
year = "2014",
month = jun,
day = "20",
doi = "10.3390/jsan3020150",
language = "English",
volume = "3",
pages = "150--180",
journal = "Journal of Sensors and Actuator Networks",
issn = "2224-2708",
publisher = "MDPI AG",
number = "2",

}

RIS

TY - JOUR

T1 - A Survey of Access Control Models in Wireless Sensor Networks

AU - Maw, Htoo Aung

AU - Xiao, Hannan

AU - Christianson, B.

AU - Malcolm, James

N1 - Copyright 2014 by the authors; licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution license (http://creativecommons.org/licenses/by/3.0/)

PY - 2014/6/20

Y1 - 2014/6/20

N2 - Wireless sensor networks (WSNs) have attracted considerable interest in the research community, because of their wide range of applications. However, due to the distributed nature of WSNs and their deployment in remote areas, these networks are vulnerable to numerous security threats that can adversely affect their proper functioning. Resource constraints in sensor nodes mean that security mechanisms with a large overhead of computation and communication are impractical to use in WSNs; security in sensor networks is, therefore, a challenge. Access control is a critical security service that offers the appropriate access privileges to legitimate users and prevents illegitimate users from unauthorized access. However, access control has not received much attention in the context of WSNs. This paper provides an overview of security threats and attacks, outlines the security requirements and presents a state-of-the-art survey on access control models, including a comparison and evaluation based on their characteristics in WSNs. Potential challenging issues for access control schemes in WSNs are also discussed.

AB - Wireless sensor networks (WSNs) have attracted considerable interest in the research community, because of their wide range of applications. However, due to the distributed nature of WSNs and their deployment in remote areas, these networks are vulnerable to numerous security threats that can adversely affect their proper functioning. Resource constraints in sensor nodes mean that security mechanisms with a large overhead of computation and communication are impractical to use in WSNs; security in sensor networks is, therefore, a challenge. Access control is a critical security service that offers the appropriate access privileges to legitimate users and prevents illegitimate users from unauthorized access. However, access control has not received much attention in the context of WSNs. This paper provides an overview of security threats and attacks, outlines the security requirements and presents a state-of-the-art survey on access control models, including a comparison and evaluation based on their characteristics in WSNs. Potential challenging issues for access control schemes in WSNs are also discussed.

KW - wireless sensor networks

KW - access control schemes

KW - security mechanisms;

KW - security vulnerabilities

U2 - 10.3390/jsan3020150

DO - 10.3390/jsan3020150

M3 - Article

VL - 3

SP - 150

EP - 180

JO - Journal of Sensors and Actuator Networks

JF - Journal of Sensors and Actuator Networks

SN - 2224-2708

IS - 2

ER -