J. A. M. Naranjo, Aitor Gómez-Goiri, Pablo Orduña, Diego López-de-Ipiña, L. G. Casado

In Proceedings of the Sixth International Conference on Computational Intelligence in Security for Information Systems, CISIS 2013, Salamanca, Spain, September 11-13, 2013. ISBN: 978-3-319-01853-9. DOI: 10.1007/978-3-319-01854-6_61

Bibtex citation Semantics of the publication Read the full publication

We extend a previous access control solution for wireless network services with group-based authorization and encryption capabilities. Both the basic solution and this novel extension focus on minimizing computation, energy, storage and communications required at sensors so they can be run in very constrained hardware, since the computations involved rely on symmetric cryptography and key derivation functions. Furthermore, no additional messages between users and sensors are needed. Access control is based on user identity, group membership and time intervals.