[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1145/2387218.2387236acmconferencesArticle/Chapter ViewAbstractPublication PagesmswimConference Proceedingsconference-collections
poster

An adaptive access control model with privileges overriding and behaviour monitoring in wireless sensor networks

Published: 24 October 2012 Publication History

Abstract

Wireless Sensor Networks (WSNs) have attracted a lot of interest in the research community because of their wide range of applications. Due to the distributed nature of WSNs and their deployment in remote areas, these networks are vulnerable to numerous security threats that can adversely affect their proper functioning. Access control is a critical security service in WSNs to prevent unauthorised access from users. Current access control models in WSNs cannot make access control decisions efficiently and effectively when the system faces unexpected and unanticipated events because access control decisions are based on predefined access policies and roles. Sometimes, users may need to access stored data for emergency and immediate data access but the system cannot grant access to this kind of users' request. Based on the needs of real world requirements, we propose an adaptive access control model that builds on the concepts of overriding access privileges and user behaviour monitoring to provide a flexible approach in the access control model. The proposed access control model will adapt to unanticipated events by using privilege overriding and adjust its decision based on users' behaviour. The proposed approach can make an access control model much flexible and also detect abnormal users' request from authorised users. To the best of our knowledge, the proposed access control model is the first to realize the flexibility of access control model by using the concept of possibility-with-override with users' behaviour monitoring in WSNs

References

[1]
Z. li and G. Gong. A Survey on security in wireless sensor networks. Technical Report, University of Waterloo, 2008.
[2]
G. Zhao and D. W. Chadwick. On the modeling of bell- lapadula security policies using RBAC. In Proceedings of the 2008 IEEE 17th Workshop on Enabling Technologies: Infrastructure for Collaborative Enterprises, WETICE '08,pages 257--262, Washington, DC, USA, 2008. IEEE Computer Society.
[3]
J. Alqatawna, E. Rissanen, and B. Sadighi. Overriding of access control in xacml. In Proceedings of the Eighth IEEE International Workshop on Policies for Distributed Systems and Networks, POLICY '07, pages 87--95, Washington, DC, USA, 2007. IEEE Computer Society.
[4]
E. Rissanen, B. S. Firozabadi, and M. Sergot. Towards a mechanism for discretionary overriding of access control. In Proceedings of the 12th international conference on Security Protocols, SP'04, pages 312--319, Berlin, Heidelberg, 2006. Springer-Verlag.
[5]
T. Li-qin, L. Chuang, and N. Yang. Evaluation of user behaviour trust in cloud computing. 2010 International Conference on Computer Application and System Modeling (ICCASM 2010), 2010.
[6]
R. Sandhu and P. Samarati. Authentication, access control, and audit. ACM Comput. Surv., 28(1): 241--243, Mar. 1996.

Cited By

View all
  • (2018)TRAC: A Therapeutic Regimen-Oriented Access Control Model in Healthcare2018 IEEE 42nd Annual Computer Software and Applications Conference (COMPSAC)10.1109/COMPSAC.2018.10263(388-393)Online publication date: Jul-2018
  • (2017)wirelessOrBACProceedings of the 2017 7th International Conference on Communication and Network Security10.1145/3163058.3163077(96-103)Online publication date: 24-Nov-2017
  • (2016)A fined-grained privacy-preserving access control protocol in wireless sensor networksProceedings of the 9th International Conference on Utility and Cloud Computing10.1145/2996890.3007850(382-387)Online publication date: 6-Dec-2016
  • Show More Cited By

Index Terms

  1. An adaptive access control model with privileges overriding and behaviour monitoring in wireless sensor networks

        Recommendations

        Comments

        Please enable JavaScript to view thecomments powered by Disqus.

        Information & Contributors

        Information

        Published In

        cover image ACM Conferences
        Q2SWinet '12: Proceedings of the 8h ACM symposium on QoS and security for wireless and mobile networks
        October 2012
        98 pages
        ISBN:9781450316194
        DOI:10.1145/2387218

        Sponsors

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        Published: 24 October 2012

        Permissions

        Request permissions for this article.

        Check for updates

        Author Tags

        1. access control
        2. user behaviour

        Qualifiers

        • Poster

        Conference

        MSWiM '12
        Sponsor:

        Acceptance Rates

        Overall Acceptance Rate 46 of 131 submissions, 35%

        Contributors

        Other Metrics

        Bibliometrics & Citations

        Bibliometrics

        Article Metrics

        • Downloads (Last 12 months)0
        • Downloads (Last 6 weeks)0
        Reflects downloads up to 17 Jan 2025

        Other Metrics

        Citations

        Cited By

        View all
        • (2018)TRAC: A Therapeutic Regimen-Oriented Access Control Model in Healthcare2018 IEEE 42nd Annual Computer Software and Applications Conference (COMPSAC)10.1109/COMPSAC.2018.10263(388-393)Online publication date: Jul-2018
        • (2017)wirelessOrBACProceedings of the 2017 7th International Conference on Communication and Network Security10.1145/3163058.3163077(96-103)Online publication date: 24-Nov-2017
        • (2016)A fined-grained privacy-preserving access control protocol in wireless sensor networksProceedings of the 9th International Conference on Utility and Cloud Computing10.1145/2996890.3007850(382-387)Online publication date: 6-Dec-2016
        • (2016)BTG-AC: Break-the-Glass Access Control Model for Medical Data in Wireless Sensor NetworksIEEE Journal of Biomedical and Health Informatics10.1109/JBHI.2015.251040320:3(763-774)Online publication date: May-2016
        • (2014)A Survey of Access Control Models in Wireless Sensor NetworksJournal of Sensor and Actuator Networks10.3390/jsan30201503:2(150-180)Online publication date: 20-Jun-2014
        • (2014)An evaluation of break-the-glass access control model for medical data in wireless sensor networks2014 IEEE 16th International Conference on e-Health Networking, Applications and Services (Healthcom)10.1109/HealthCom.2014.7001829(130-135)Online publication date: Oct-2014
        • (2013)An adaptive access control model for medical data in Wireless Sensor Networks2013 IEEE 15th International Conference on e-Health Networking, Applications and Services (Healthcom 2013)10.1109/HealthCom.2013.6720690(303-309)Online publication date: Oct-2013

        View Options

        Login options

        View options

        PDF

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader

        Media

        Figures

        Other

        Tables

        Share

        Share

        Share this Publication link

        Share on social media