<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE article PUBLIC "-//TaxonX//DTD Taxonomic Treatment Publishing DTD v0 20100105//EN" "../../nlm/tax-treatment-NS0.dtd">
<article xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:xlink="http://www.w3.org/1999/xlink" xmlns:tp="http://www.plazi.org/taxpub" article-type="research-article" dtd-version="3.0" xml:lang="en">
  <front>
    <journal-meta>
      <journal-id journal-id-type="publisher-id">109</journal-id>
      <journal-id journal-id-type="index">urn:lsid:arphahub.com:pub:3dc5f44e-8666-58db-bc76-a455210e8891</journal-id>
      <journal-title-group>
        <journal-title xml:lang="en">JUCS - Journal of Universal Computer Science</journal-title>
        <abbrev-journal-title xml:lang="en">jucs</abbrev-journal-title>
      </journal-title-group>
      <issn pub-type="ppub">0948-695X</issn>
      <issn pub-type="epub">0948-6968</issn>
      <publisher>
        <publisher-name>Journal of Universal Computer Science</publisher-name>
      </publisher>
    </journal-meta>
    <article-meta>
      <article-id pub-id-type="doi">10.3217/jucs-019-17-2490</article-id>
      <article-id pub-id-type="publisher-id">23945</article-id>
      <article-categories>
        <subj-group subj-group-type="heading">
          <subject>Research Article</subject>
        </subj-group>
        <subj-group subj-group-type="scientific_subject">
          <subject>C.2.4 - Distributed Systems</subject>
          <subject>E.3 - DATA ENCRYPTION</subject>
        </subj-group>
      </article-categories>
      <title-group>
        <article-title>Enabling User Access Control in Energy-constrained Wireless Smart Environments</article-title>
      </title-group>
      <contrib-group content-type="authors">
        <contrib contrib-type="author" corresp="yes">
          <name name-style="western">
            <surname>Naranjo</surname>
            <given-names>Juan Álvaro Muñoz</given-names>
          </name>
          <email xlink:type="simple">jmn843@ual.es</email>
          <xref ref-type="aff" rid="A1">1</xref>
        </contrib>
        <contrib contrib-type="author" corresp="no">
          <name name-style="western">
            <surname>Orduña</surname>
            <given-names>Pablo</given-names>
          </name>
          <xref ref-type="aff" rid="A2">2</xref>
        </contrib>
        <contrib contrib-type="author" corresp="no">
          <name name-style="western">
            <surname>Gómez-Goiri</surname>
            <given-names>Aitor</given-names>
          </name>
          <xref ref-type="aff" rid="A3">3</xref>
        </contrib>
        <contrib contrib-type="author" corresp="no">
          <name name-style="western">
            <surname>López-De-Ipiña</surname>
            <given-names>Diego</given-names>
          </name>
          <xref ref-type="aff" rid="A3">3</xref>
        </contrib>
        <contrib contrib-type="author" corresp="no">
          <name name-style="western">
            <surname>Casado</surname>
            <given-names>Leocadio González</given-names>
          </name>
          <xref ref-type="aff" rid="A1">1</xref>
        </contrib>
      </contrib-group>
      <aff id="A1">
        <label>1</label>
        <addr-line content-type="verbatim">University of Almería, Almería, Spain</addr-line>
        <institution>University of Almería</institution>
        <addr-line content-type="city">Almería</addr-line>
        <country>Spain</country>
      </aff>
      <aff id="A2">
        <label>2</label>
        <addr-line content-type="verbatim">DeustoTech-Deusto Foundation, Bilbao, Spain</addr-line>
        <institution>DeustoTech-Deusto Foundation</institution>
        <addr-line content-type="city">Bilbao</addr-line>
        <country>Spain</country>
      </aff>
      <aff id="A3">
        <label>3</label>
        <addr-line content-type="verbatim">University of Deusto, Bilbao, Spain</addr-line>
        <institution>University of Deusto</institution>
        <addr-line content-type="city">Bilbao</addr-line>
        <country>Spain</country>
      </aff>
      <author-notes>
        <fn fn-type="corresp">
          <p>Corresponding author: Juan Álvaro Muñoz Naranjo (<email xlink:type="simple">jmn843@ual.es</email>).</p>
        </fn>
        <fn fn-type="edited-by">
          <p>Academic editor: </p>
        </fn>
      </author-notes>
      <pub-date pub-type="collection">
        <year>2013</year>
      </pub-date>
      <pub-date pub-type="epub">
        <day>01</day>
        <month>11</month>
        <year>2013</year>
      </pub-date>
      <volume>19</volume>
      <issue>17</issue>
      <fpage>2490</fpage>
      <lpage>2502</lpage>
      <uri content-type="arpha" xlink:href="http://openbiodiv.net/9D51A149-6CF0-51FF-8907-D8ACFCE717C7">9D51A149-6CF0-51FF-8907-D8ACFCE717C7</uri>
      <uri content-type="zenodo_dep_id" xlink:href="https://zenodo.org/record/5506133">5506133</uri>
      <history>
        <date date-type="received">
          <day>15</day>
          <month>02</month>
          <year>2013</year>
        </date>
        <date date-type="accepted">
          <day>22</day>
          <month>04</month>
          <year>2013</year>
        </date>
      </history>
      <permissions>
        <copyright-statement>Juan Álvaro Muñoz Naranjo, Pablo Orduña, Aitor Gómez-Goiri, Diego López-De-Ipiña, Leocadio González Casado</copyright-statement>
        <license license-type="creative-commons-attribution" xlink:href="" xlink:type="simple">
          <license-p>This article is freely available under the J.UCS Open Content License.</license-p>
        </license>
      </permissions>
      <abstract>
        <label>Abstract</label>
        <p>This work introduces a novel access control solution for wireless network services in Internet of Things scenarios. We focus on a minimal use of computation, energy and storage resources at wireless sensors so as to address constrained devices: the proposed methods for key distribution and access control rely on extremely fast key derivation functions and, for the same reason, memory usage is reduced since keys are computed on the fly when needed. Our solution achieves privacy, authentication, semantic security, low energy, low computational demand and impacts mitigation of compromised devices on a simple manner. The access control provided is based on user identity and time intervals. We discuss these properties, compare our proposal to previous related work and provide experimental results that confirm its viability.</p>
      </abstract>
    </article-meta>
  </front>
</article>
