DP 2AC: Distributed privacy-preserving access control in sensor networks
Document Type
Conference Proceeding
Publication Date
10-12-2009
Abstract
The owner and users of a sensor network may be different, which necessitates privacy-preserving access control. On the one hand, the network owner need enforce strict access control so that the sensed data are only accessible to users willing to pay. On the other hand, users wish to protect their respective data access patterns whose disclosure may be used against their interests. This paper presents DP 2AC, a Distributed Privacy-Preserving Access Control scheme for sensor networks, which is the first work of its kind. Users in DP 2AC purchase tokens from the network owner whereby to query data from sensor nodes which will reply only after validating the tokens. The use of blind signatures in token generation ensures that tokens are publicly verifiable yet unlinkable to user identities, so privacypreserving access control is achieved. A central component in DP 2AC is to prevent malicious users from reusing tokens. We propose a suite of distributed techniques for token-reuse detection (TRD) and thoroughly compare their performance with regard to TRD capability, communication overhead, storage overhead, and attack resilience. The efficacy and efficiency of DP 2AC are confirmed by detailed performance evaluations. © 2009 IEEE.
Identifier
70349658629 (Scopus)
ISBN
[9781424435135]
Publication Title
Proceedings IEEE INFOCOM
External Full Text Location
https://doi.org/10.1109/INFCOM.2009.5062039
ISSN
0743166X
First Page
1251
Last Page
1259
Recommended Citation
Zhang, Rui; Zhang, Yanchao; and Ren, Kui, "DP 2AC: Distributed privacy-preserving access control in sensor networks" (2009). Faculty Publications. 11917.
https://digitalcommons.njit.edu/fac_pubs/11917
