With the advent of business apps which allow users to form dynamic groups so that they can store data on cloud servers and share the data within their user groups through their mobile devices. A major concern comes here that mobile users need the security of their group data which should not be accessible to other group users. To solve the issue, ABE or Attribute Based Encryption techniques are employed as they are vastly recognized as a valid and robust mechanism to provide fine access control over the data to legitimate users. At the same time, as there are complex computations involved in key issuing and data encryption by AAs' (Attribute Authorities) and decryption by legitimate users, there exist some efficiency issues. Rekeying plays a major role in dynamic systems where nodes come-in and move-out. As revocation of user rights requires the system to secure data from moved out users, rekeying has to be done on entire data set belonging to that attribute users in the group. However, the cost of re-keying is another concern for system efficiency which should not be compensated with a compromise on data security. There are many research works carried out earlier on data security for web applications using ABE, but there are limited studies on CP-ABE in mobile computing with multiauthority data storage system. A system is implemented which allows user groups to register, CAs'(Certificate Authorities) to allow registrations of Users and AAs and assign public Keys, AAs to manage attributes and revoke user access with rekeying and a centralized server for data persistence. Experimental results show the effectiveness of proposed solution and efficiency of re-keying mechanism while evoking user access rights on system architecture.
Due to the radio range of the network, suspicious transmission, unattended nature, and easier access, Wireless Sensor Networks are vulnerable to malicious users and physical attacks. Hence security is a must in these cases. A workable solution to these problems might be to create a WSN for a secure temperature sensing system. Sensors gather temperature measurements, which are then communicated to an advanced RISC microprocessor (ARM) using Wireless Fidelity (Wi-Fi) technology, which has been proven to transfer data accurately and reliably. The data is then stored in memory, controlled by the microprocessor. An ARM 9-based Samsung S3C2440 Controller running on the Linux operating system is used to achieve the functionality. The security system is incorporated using the host MCUs, and the temperature values are converted to digital form using the ARM processor’s ADC (S3C2440). The processor is connected to the console terminal through UART, which regularly sends data to the system. Security data is monitored and transferred to other Wi-Fi-equipped devices through a USB-based Wi-Fi module. The temperature readings are continuously monitored via this wireless sensor network. We perform the validation of our study through MATLAB simulations. We measure the sensor nodes’ total energy dissipated, throughput, and lifetime through MATLAB simulations. Over all in this research, we develop improved security in WSN system with application in ARM controller-based secured temperature monitoring system. This paper paves a direction toward further research in physical security in Wireless Sensor Networks.
In the recent times the IT industry has been witnessing rapid development in wireless communication technologies such as 3 G, 4 G, etc. Wireless Mesh Network is one such promising wireless communication technology which provides high bandwidth internet connectivity in a sizable geographic area at a much lower cost than with classic WiFi networks. WMN consists of wireless entities such as Mesh Routers (MRs), Mesh Clients (MCs), Internet Gateways (IGs) are organized in an arbitrary mesh topology and form the wireless mesh back bone. Due to the mobility of the Mesh Clients, great challenges arise in securing the WMNs from various kinds of attacks. In this work a security mechanism is presented to ensure that induced network is connected and well protected from potential eaves dropping attacks, and this is accomplished by introducing an efficient key management scheme with key agreement. The simulation results show that the scheme implemented in this work, out performs previous schemes thus providing a network that is resistant against malicious eavesdropping attack.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
customersupport@researchsolutions.com
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.