Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1145/1180345.1180347acmconferencesArticle/Chapter ViewAbstractPublication PagesccsConference Proceedingsconference-collections
Article

Inverting sensor networks and actuating the environment for spatio-temporal access control

Published: 30 October 2006 Publication History

Abstract

Wireless sensor networks are typically deployed to measure the information field, rather than create an information field. However, by utilizing the radio on sensor nodes, it is possible to invert the role of sensor networks, and allow sensor nodes to actuate the environment. Such actuation can facilitate new forms of access control that are based on whether a user is located at the right place at the right time. In this paper, we explore the challenges of supporting spatio-temporal access control, where access to an object or service is based on the user's spatio-temporal context. Specifically, we focus on supporting spatio-temporal access control through the specification of access control policies, and show how complex spatio-temporal policies can be specified using automata. We outline a challenge-response mechanism for verifying user location in a centralized spatio-temporal access control mechanism. We utilize sensor networks in an inverted fashion to support spatio-temporal access control. Sensor nodes announce keys according to a time-varying schedule, and users may access restricted files/resources only if they are in the neighborhood of the correct sensor node and witness the appropriate cryptographic key.

References

[1]
S. Gavrila D. Ferraiolo, R. Sandhu, D. Richard Kuhn, and R. Chandramouli, "Proposed NIST standard for Role-Based Access Control," ACM Transactions on Information and System Security, vol. 4, no. 3, pp. 224--274, 2001.
[2]
J. E. Hopcroft and J. D. Ullman, Introduction to Automata theory, languages and computation, Addison-Wesley Publishing Company, 1979.
[3]
P. Bahl and V.N. Padmanabhan, "RADAR: An in-building RF-based user location and tracking system," in Proceedings of IEEE Infocom 2000, 2000, pp. 775--784.
[4]
P. Bahl, V.N. Padmanabhan, and A. Balachandran, "Enhancements to the RADAR User Location and Tracking System," Tech. Rep. Technical Report MSR-TR-2000-12, Microsoft Research, February 2000.
[5]
D. Nicelescu and B. Nath, "DV based positioning in ad hoc networks," Telecommunication Systems, vol. 22, no. 1-4, pp. 267--280, 2003.
[6]
D. Nicelescu and B. Nath, "Ad hoc positioning (APS) using AOA," in Proceedings of IEEE Infocom 2003, 2003, pp. 1734--1743.
[7]
S. Capkun and J. Hubaux, "Secure Positioning of Wireless Devices with Application to Sensor Networks," in Proceedings of the IEEE INFOCOM, 2005, pp. 1917--1928.
[8]
Z. Li, W. Trappe, Y. Zhang, and B. Nath, "Robust Statistical Methods for Securing Wireless Localization in Sensor Networks," in The Fourth International Conference on Information Processing in Sensor Networks (IPSN), 2005, pp. 91--98.
[9]
L. Lazos and R. Poovendran, "SeRLoc: Secure range-independent localization for wireless sensor networks," in Proceedings of the 2004 ACM Workshop on Wireless Security, 2004, pp. 21--30.
[10]
N. Sastry, U. Shankar, and D. Wagner, "Secure verification of location claims," in Proceedings of the 2003 ACM workshop on Wireless security, 2003, pp. 1--10.
[11]
B. Schilit, J. Hong, and M. Gruteser, "Wireless Location Privacy Protection," Computer, vol. 36, no. 12, pp. 135--137, 2003.
[12]
M. Gruteser and D. Grunwald, "Anonymous Usage of Location-Based Services through Spatial and Temporal Cloaking," in Proceedings of First ACM/USENIX International Conference on Mobile Systems, Applications, and Services (MobiSys), 2003, pp. 31--42.
[13]
Y. Gertner, S. Goldwasser, and T. Malkin, "A random server model for private information retrieval or how to achieve information theoretic PIR avoiding database replication," Lecture Notes in Computer Science, vol. 1518, 1998.
[14]
G. D. Crescenzo, Y. Ishai, and R. Ostrovsky, "Universal service-providers for database private information retrieval (extended abstract)," in Symposium on Principles of Distributed Computing, 1998, pp. 91--100.
[15]
C. Cachin, S. Micali, and M. Stadler, "Computationally private information retrieval with polylogarithmic communication," Lecture Notes in Computer Science, vol. 1592, 1999.
[16]
M. Bishop, Computer Security: Art and Practice, Addison Wesley, 2003.
[17]
S. Capkun and J.P. Hubaux, "Secure positioning in sensor networks," Technical report EPFL/IC/200444, May 2004.
[18]
S. Capkun and J.P. Hubaux, "Securing localization with hidden and mobile base stations," Proceedings of IEEE Infocom 2006.
[19]
L. Lazos, R. Poovendran, and S. Capkun, "Rope: robust position estimation in wireless sensor networks," in Proceedings of the Fourth International Symposium on Information Processing in Sensor Networks (IPSN 2005), 2005, pp. 324--331.
[20]
D. Liu, P. Ning, and W. Du, "Attack-resistant location estimation in sensor networks," in Proceedings of the Fourth International Symposium on Information Processing in Sensor Networks (IPSN 2005), 2005.
[21]
D. B. Faria and D. R. Cheriton, "No Longterm Secrets: Location-based Security in Overprovisioned Wireless LANs," in Proceedings of the Third ACM Workshop on Hot Topics in Networks, 2004.
[22]
N. Michalakis, "PAC: Location Aware Access Control for Pervasive Computing Environments," 16 September 2002.
[23]
Nikolaos Michalakis, "Location-aware Access Control for Pervasive Computing Environments,".
[24]
W. Han, J. Zhang, and X. Yao, "Context-sensitive access control model and implementation," in The Fifth International Conference on Computer and Information Technology, pp. 757--763.
[25]
R. J. Hulsebosch, A. H. Salden, M. S. Bargh, P. W. G. Ebben, and J. Reitsma, "Context sensitive access control," in SACMAT '05: Proceedings of the tenth ACM symposium on Access control models and technologies, New York, NY, USA, 2005, pp. 111--119, ACM Press.
[26]
E. Bertino, B. Catania, M. L. Damiani, and P. Perlasca, "GEO-RBAC: a spatially aware RBAC," in SACMAT '05: Proceedings of the tenth ACM symposium on Access control models and technologies, New York, NY, USA, 2005, pp. 29--37, ACM Press.
[27]
J. Joshi, E. Bertino, U. Latif, and A. Ghafoor, "A generalized temporal role-based access control model," vol. 17, pp. 4--23, 2005.
[28]
M. Gruteser, G. Schelle, A. Jain, R. Han, and D. Grunwald, "Privacy-aware location sensor networks," in Workshop on Hot Topics in Operating Systems (HotOS), 2003.
[29]
M. Gruteser and D. Grunwald, "Anonymous Usage of Location-based Services through Spatial and Temporal Cloaking," in Proceedings of the International Conference on Mobile Systems, Applications, and Services (MobiSys), 2003.
[30]
S. Duri, M. Gruteser, X. Liu, P. Moskowitz, R. Perez, M. Singh, and J. Tang, "Context and Location: Framework for security and privacy in automotive telematics," in Proceedings of the 2nd international workshop on Mobile commerce, 2002.

Cited By

View all
  • (2016)Location Verification Systems Under Spatially Correlated ShadowingIEEE Transactions on Wireless Communications10.1109/TWC.2016.253530315:6(4132-4144)Online publication date: Jun-2016
  • (2014)A policy-driven approach to access control in future internet name resolution servicesProceedings of the 9th ACM workshop on Mobility in the evolving internet architecture10.1145/2645892.2645897(7-12)Online publication date: 11-Sep-2014
  • (2012)Securing Mobile Location-based Services through position verification leveraging key distribution2012 IEEE Wireless Communications and Networking Conference (WCNC)10.1109/WCNC.2012.6214257(2694-2699)Online publication date: Apr-2012
  • Show More Cited By

Index Terms

  1. Inverting sensor networks and actuating the environment for spatio-temporal access control

        Recommendations

        Comments

        Please enable JavaScript to view thecomments powered by Disqus.

        Information & Contributors

        Information

        Published In

        cover image ACM Conferences
        SASN '06: Proceedings of the fourth ACM workshop on Security of ad hoc and sensor networks
        October 2006
        186 pages
        ISBN:1595935541
        DOI:10.1145/1180345
        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Sponsors

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        Published: 30 October 2006

        Permissions

        Request permissions for this article.

        Check for updates

        Author Tags

        1. access control
        2. localization

        Qualifiers

        • Article

        Conference

        CCS06
        Sponsor:

        Upcoming Conference

        CCS '25

        Contributors

        Other Metrics

        Bibliometrics & Citations

        Bibliometrics

        Article Metrics

        • Downloads (Last 12 months)0
        • Downloads (Last 6 weeks)0
        Reflects downloads up to 21 Nov 2024

        Other Metrics

        Citations

        Cited By

        View all
        • (2016)Location Verification Systems Under Spatially Correlated ShadowingIEEE Transactions on Wireless Communications10.1109/TWC.2016.253530315:6(4132-4144)Online publication date: Jun-2016
        • (2014)A policy-driven approach to access control in future internet name resolution servicesProceedings of the 9th ACM workshop on Mobility in the evolving internet architecture10.1145/2645892.2645897(7-12)Online publication date: 11-Sep-2014
        • (2012)Securing Mobile Location-based Services through position verification leveraging key distribution2012 IEEE Wireless Communications and Networking Conference (WCNC)10.1109/WCNC.2012.6214257(2694-2699)Online publication date: Apr-2012
        • (2012)Biometric security based application development and emulation framework - IEEE 802.15.4 for Intensive Care Units2012 International Conference on Recent Advances in Computing and Software Systems10.1109/RACSS.2012.6212672(228-232)Online publication date: Apr-2012
        • (2011)Adaptive Location-Oriented Content Delivery in Delay-Sensitive Pervasive ApplicationsIEEE Transactions on Mobile Computing10.1109/TMC.2010.16710:3(362-376)Online publication date: 1-Mar-2011
        • (2010)Inverting Systems of Embedded Sensors for Position Verification in Location-Aware ApplicationsIEEE Transactions on Parallel and Distributed Systems10.1109/TPDS.2009.11021:5(722-736)Online publication date: 1-May-2010
        • (2010)Adaptive Location-Oriented Content Delivery in Delay-Sensitive Pervasive ApplicationsIEEE Transactions on Mobile Computing10.1109/TMC.2010.64Online publication date: 2010
        • (2010)Benefits of Location-Based Access ControlProceedings of the 2010 IEEE/ACM Int'l Conference on Green Computing and Communications & Int'l Conference on Cyber, Physical and Social Computing10.1109/GreenCom-CPSCom.2010.148(739-746)Online publication date: 18-Dec-2010
        • (2008)Exploiting environmental properties for wireless localizationACM SIGMOBILE Mobile Computing and Communications Review10.1145/1374512.137452812:1(49-51)Online publication date: 1-Jan-2008
        • (2008)Evaluation of Localization Attacks on Power-Modulated Challenge–Response SystemsIEEE Transactions on Information Forensics and Security10.1109/TIFS.2008.9191213:2(259-272)Online publication date: 1-Jun-2008
        • Show More Cited By

        View Options

        Login options

        View options

        PDF

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader

        Media

        Figures

        Other

        Tables

        Share

        Share

        Share this Publication link

        Share on social media