Next Article in Journal
An Authenticated Key Agreement Scheme for Wireless Sensor Networks
Previous Article in Journal
Adaptive Decentralized Control of Mobile Underwater Sensor Networks and Robots for Modeling Underwater Phenomena
Article Menu

Export Article

Open AccessArticle
J. Sens. Actuator Netw. 2014, 3(2), 150-180; doi:10.3390/jsan3020150

A Survey of Access Control Models in Wireless Sensor Networks

Department of Computer Science, University of Hertfordshire, Hatfield, AL10 9AB, UK
Author to whom correspondence should be addressed.
Received: 23 January 2014 / Revised: 20 May 2014 / Accepted: 11 June 2014 / Published: 20 June 2014
View Full-Text   |   Download PDF [944 KB, uploaded 20 June 2014]   |  


Wireless sensor networks (WSNs) have attracted considerable interest in the research community, because of their wide range of applications. However, due to the distributed nature of WSNs and their deployment in remote areas, these networks are vulnerable to numerous security threats that can adversely affect their proper functioning. Resource constraints in sensor nodes mean that security mechanisms with a large overhead of computation and communication are impractical to use in WSNs; security in sensor networks is, therefore, a challenge. Access control is a critical security service that offers the appropriate access privileges to legitimate users and prevents illegitimate users from unauthorized access. However, access control has not received much attention in the context of WSNs. This paper provides an overview of security threats and attacks, outlines the security requirements and presents a state-of-the-art survey on access control models, including a comparison and evaluation based on their characteristics in WSNs. Potential challenging issues for access control schemes in WSNs are also discussed. View Full-Text
Keywords: wireless sensor networks; access control schemes; security mechanisms; security vulnerabilities wireless sensor networks; access control schemes; security mechanisms; security vulnerabilities

Figure 1

This is an open access article distributed under the Creative Commons Attribution License (CC BY 3.0).

Scifeed alert for new publications

Never miss any articles matching your research from any publisher
  • Get alerts for new papers matching your research
  • Find out the new papers from selected authors
  • Updated daily for 49'000+ journals and 6000+ publishers
  • Define your Scifeed now

SciFeed Share & Cite This Article

MDPI and ACS Style

Maw, H.A.; Xiao, H.; Christianson, B.; Malcolm, J.A. A Survey of Access Control Models in Wireless Sensor Networks. J. Sens. Actuator Netw. 2014, 3, 150-180.

Show more citation formats Show less citations formats

Related Articles

Article Metrics

Article Access Statistics



[Return to top]
J. Sens. Actuator Netw. EISSN 2224-2708 Published by MDPI AG, Basel, Switzerland RSS E-Mail Table of Contents Alert
Back to Top