{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,28]],"date-time":"2025-10-28T00:28:38Z","timestamp":1761611318675,"version":"build-2065373602"},"reference-count":54,"publisher":"MDPI AG","issue":"1","license":[{"start":{"date-parts":[[2013,1,18]],"date-time":"2013-01-18T00:00:00Z","timestamp":1358467200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/3.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Sensors"],"abstract":"<jats:p>Low power over wireless personal area networks (LoWPAN), in particular wireless sensor networks, represent an emerging technology with high potential to be employed in critical situations like security surveillance, battlefields, smart-grids, and in  e-health applications. The support of security services in LoWPAN is considered a challenge. First, this type of networks is usually deployed in unattended environments, making them vulnerable to security attacks. Second, the constraints inherent to LoWPAN, such as scarce resources and limited battery capacity, impose a careful planning on how and where the security services should be deployed. Besides protecting the network from some well-known threats, it is important that security mechanisms be able to withstand attacks that have not been identified before. One way of reaching this goal is to control, at the network access level, which nodes can be attached to the network and to enforce their security compliance. This paper presents a network access security framework that can be used to control the nodes that have access to the network, based on administrative approval, and to enforce security compliance to the authorized nodes.<\/jats:p>","DOI":"10.3390\/s130101210","type":"journal-article","created":{"date-parts":[[2013,1,18]],"date-time":"2013-01-18T11:04:23Z","timestamp":1358507063000},"page":"1210-1230","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":23,"title":["A Network Access Control Framework for 6LoWPAN Networks"],"prefix":"10.3390","volume":"13","author":[{"given":"Lu\u00eds","family":"Oliveira","sequence":"first","affiliation":[{"name":"Instituto de Telecomunica\u00e7\u00f5es, Universidade da Beira Interior, Rua Marqu\u00eas d'\u00c1vila e Bolama, 6201-001 Covilh\u00e3, Portugal"},{"name":"Instituto Polit\u00e9cnico de Tomar, Quinta do Contador, Estrada da Serra, 2300-313 Tomar, Portugal"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8657-3800","authenticated-orcid":false,"given":"Joel","family":"Rodrigues","sequence":"additional","affiliation":[{"name":"Instituto de Telecomunica\u00e7\u00f5es, Universidade da Beira Interior, Rua Marqu\u00eas d'\u00c1vila e Bolama, 6201-001 Covilh\u00e3, Portugal"}]},{"given":"Amaro","family":"De Sousa","sequence":"additional","affiliation":[{"name":"Instituto de Telecomunica\u00e7\u00f5es, Universidade de Aveiro, Campus Universit\u00e1rio de Santiago, 3810-193 Aveiro, Portugal"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0862-0533","authenticated-orcid":false,"given":"Jaime","family":"Lloret","sequence":"additional","affiliation":[{"name":"Instituto de Investigaci\u00f3n para la Gesti\u00f3n Integrada de Zonas Costeras, Universidad Polit\u00e9cnica de Valencia, C\/Paranimf, n\u00b0 1, 46730 Grao de Gandia, Spain"}]}],"member":"1968","published-online":{"date-parts":[[2013,1,18]]},"reference":[{"unstructured":"Kushalnagar, N., Montenegro, G., and Schumacher, C. Available online: http:\/\/www.ietf.org\/rfc\/rfc4919.txt (accessed on 27 August 2012).","key":"ref_1"},{"key":"ref_2","doi-asserted-by":"crossref","first-page":"1445","DOI":"10.1002\/dac.1228","article-title":"Routing and mobility approaches in IPv6 over LoWPAN mesh networks","volume":"24","author":"Oliveira","year":"2011","journal-title":"Int. J. Commun. Syst."},{"key":"ref_3","doi-asserted-by":"crossref","first-page":"76","DOI":"10.1038\/scientificamerican1004-76","article-title":"The internet of things","volume":"4","author":"Gershenfeld","year":"2004","journal-title":"Sci. Am."},{"key":"ref_4","doi-asserted-by":"crossref","first-page":"37","DOI":"10.1109\/MIC.2008.79","article-title":"Extending IP to low-power, wireless personal area networks","volume":"4","author":"Hui","year":"2008","journal-title":"IEEE Internet Comput."},{"unstructured":"Narten, T., Nordmark, E., Simpson, W., and Soliman, H. Available online: http:\/\/www.ietf.org\/rfc\/rfc4861.txt (accessed on 27 August 2012).","key":"ref_5"},{"unstructured":"Shelby, Z., Chakrabarti, S., and Nordmark, E. (2012). Neighbor Discovery Optimization for Low Power and Lossy Networks, unpublished work.","key":"ref_6"},{"unstructured":"Sarikaya, B., Xia, F., and Zaverucha, G. (2012). Lightweight Secure Neighbor Discovery for Low-Power and Lossy Networks, unpublished work.","key":"ref_7"},{"key":"ref_8","doi-asserted-by":"crossref","first-page":"2","DOI":"10.1109\/COMST.2006.315852","article-title":"A survey of security issues in wireless sensor networks","volume":"8","author":"Yong","year":"2006","journal-title":"IEEE Commun. Surv. Tut."},{"key":"ref_9","doi-asserted-by":"crossref","first-page":"129","DOI":"10.1002\/cpe.2850","article-title":"Denial of service mitigation approach for IPv6-enabled smart object networks","volume":"25","author":"Oliveira","year":"2013","journal-title":"Concurr. Comp.-Pract. E."},{"key":"ref_10","doi-asserted-by":"crossref","first-page":"60","DOI":"10.1109\/MWC.2008.4599222","article-title":"Security in wireless sensor networks","volume":"15","author":"Du","year":"2008","journal-title":"IEEE Wirel. Commun."},{"key":"ref_11","doi-asserted-by":"crossref","first-page":"245","DOI":"10.1109\/SURV.2011.041110.00022","article-title":"Denial of service attacks in wireless networks: The Case of Jammers","volume":"13","author":"Pelechrinis","year":"2011","journal-title":"IEEE Commun. Surv. Tut."},{"key":"ref_12","doi-asserted-by":"crossref","first-page":"289","DOI":"10.1007\/978-3-642-03829-7_10","article-title":"Analysis of security threats, requirements, technologies and standards in wireless sensor network","volume":"5705","author":"Lopez","year":"2009","journal-title":"Lect. Notes Comput. Sci."},{"key":"ref_13","first-page":"31","article-title":"Security vulnerabilities in wireless sensor networks: A survey","volume":"5","author":"Kavitha","year":"2010","journal-title":"J. Inf. Assur. Secur."},{"key":"ref_14","first-page":"814","article-title":"A survey of access control schemes in wireless sensor networks","volume":"59","author":"Faye","year":"2011","journal-title":"Proc. World Acad. Sci. Eng. Tech."},{"unstructured":"Sun, K., Liu, A., Xu, R., Ning, P., and Maughan, D. Securing Network Access in Wireless Sensor Networks.","key":"ref_15"},{"key":"ref_16","doi-asserted-by":"crossref","first-page":"38","DOI":"10.1109\/MWC.2004.1368895","article-title":"Designing secure sensor networks","volume":"11","author":"Shi","year":"2004","journal-title":"IEEE Wirel. Commun."},{"key":"ref_17","doi-asserted-by":"crossref","first-page":"102","DOI":"10.1109\/MCOM.2008.4481348","article-title":"Situation awareness mechanisms for wireless sensor networks","volume":"46","author":"Ramen","year":"2008","journal-title":"IEEE Comm. Mag."},{"key":"ref_18","doi-asserted-by":"crossref","first-page":"8","DOI":"10.1109\/MWC.2007.4396938","article-title":"Security Services in Group Communications over wireless infrastructure, mobile Ad Hoc and sensor networks","volume":"14","author":"Sakerindr","year":"2007","journal-title":"IEEE Wirel. Commun."},{"key":"ref_19","first-page":"1","article-title":"A survey on network security and attack defense mechanism for wireless sensor networks","volume":"5\u20136","author":"Singh","year":"2011","journal-title":"Int. J. Comput. Trends Tech."},{"key":"ref_20","doi-asserted-by":"crossref","first-page":"2450","DOI":"10.3390\/s100302450","article-title":"Cryptanalysis and security improvements of \u2018two-factor user authentication in wireless sensor networks\u2019","volume":"10","author":"Khan","year":"2010","journal-title":"Sensors"},{"key":"ref_21","doi-asserted-by":"crossref","first-page":"2314","DOI":"10.1016\/j.comcom.2007.04.009","article-title":"A survey of key management schemes in wireless sensor networks","volume":"30","author":"Xiao","year":"2007","journal-title":"Comput. Commun."},{"unstructured":"Wood, A., Fang, L., Stankovic, J., and He, T. SIGF: a family of configurable, secure routing protocols for wireless sensor networks.","key":"ref_22"},{"unstructured":"Brankovic, L., and Miller, M. Secure Data Aggregation in Wireless Sensor Network: A Survey. Volume 81.","key":"ref_23"},{"key":"ref_24","doi-asserted-by":"crossref","first-page":"177","DOI":"10.1109\/TDSC.2005.36","article-title":"Fault-tolerant cluster-wise clock synchronization for wireless sensor networks","volume":"2","author":"Sun","year":"2005","journal-title":"IEEE Trans. Depend. Secure."},{"unstructured":"Yong, W., Ramamurthy, B., Xue, Y., and Zou, X. (2008, January 8\u201311). A security Framework for Wireless Sensor Networks Utilizing a Unique Session Key. London, UK.","key":"ref_25"},{"key":"ref_26","doi-asserted-by":"crossref","first-page":"521","DOI":"10.1023\/A:1016598314198","article-title":"SPINS: Security protocols for sensor networks","volume":"8","author":"Perrig","year":"2001","journal-title":"Wirel. Netw."},{"key":"ref_27","first-page":"53","article-title":"A lightweight security framework for wireless sensor networks","volume":"2","author":"Zia","year":"2011","journal-title":"J. Wirel. Mobile Netw., Ubiquitous Comput. Dependable Appl. (JoWUA)"},{"unstructured":"Gura, N., Patel, A., Wander, A., Eberle, H., and Chang-Shantz, S. Comparing Elliptic Curve Cryptography and RSA on 8-bit CPUs.","key":"ref_28"},{"key":"ref_29","doi-asserted-by":"crossref","first-page":"158","DOI":"10.1504\/IJSN.2006.011775","article-title":"Load balanced key establishment methodologies in wireless sensor networks","volume":"1","author":"Ortal","year":"2006","journal-title":"Int. J. Secur. Netw."},{"unstructured":"Montenegro, G., Kushalnagar, N., Hui, J., and Culler, D. Available online: http:\/\/www.ietf.org\/rfc\/rfc4944.txt (accessed on 25 August 2012).","key":"ref_30"},{"unstructured":"Winter, T., Thubert, P., Brandt, A., Hui, J., Kelsey, R., Levis, P., Pister, K., Struik, R., Vasseur, JP., and Alexander, R. Available online: http:\/\/www.ietf.org\/rfc\/rfc6550.txt (accessed on 25 August 2012).","key":"ref_31"},{"unstructured":"Thomson, S., Narten, T., and Jinmei, T. Available online: http:\/\/www.ietf.org\/rfc\/rfc4862.txt (accessed on 25 August 2012).","key":"ref_32"},{"unstructured":"Hinden, R., and Deering, S. Available online: http:\/\/www.ietf.org\/rfc\/rfc4291.txt (accessed on 25 August 2012).","key":"ref_33"},{"unstructured":"Arkko, J., Kempf, J., Sommerfeld, B., Zill, B., and Nikander, P. Available online: http:\/\/www.ietf.org\/rfc\/rfc3971.txt (accessed on 25 August 2012).","key":"ref_34"},{"unstructured":"Driessen, B., Poschmann, A., and Paar, C. Comparison of Innovative Signature Algorithms for WSNs.","key":"ref_35"},{"doi-asserted-by":"crossref","unstructured":"Zhu, R., and Ma, Y. (2012). Information Engineering and Applications, Springer. Volume 153.","key":"ref_36","DOI":"10.1007\/978-1-4471-2386-6"},{"unstructured":"Dohler, M., Watteyne, T., Winter, T., and Barthel, D. Available online: http:\/\/www.ietf.org\/rfc\/rfc5548.txt (accessed on 25 August 2012).","key":"ref_37"},{"unstructured":"Pister, K., Thubert, P., Dwars, S., and Phinney, T. Available online: http:\/\/www.ietf.org\/rfc\/rfc5673.txt (accessed on 25 August 2012).","key":"ref_38"},{"unstructured":"Brandt, A., Buron, J., and Porcu, G. Available online: http:\/\/www.ietf.org\/rfc\/rfc5826.txt (accessed on 25 August 2012).","key":"ref_39"},{"unstructured":"Martocci, J., Mi, P.D., Riou, N., and Vermeylen, W. Available online: http:\/\/www.ietf.org\/rfc\/rfc5867.txt (accessed on 25 August 2012).","key":"ref_40"},{"key":"ref_41","doi-asserted-by":"crossref","first-page":"96","DOI":"10.1109\/MCOM.2011.5741163","article-title":"Connecting low-power and lossy networks to the Internet","volume":"49","author":"Ko","year":"2011","journal-title":"IEEE Commun. Mag."},{"key":"ref_42","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/1922649.1922656","article-title":"Programming wireless sensor networks: Fundamental concepts and state of the art","volume":"43","author":"Mottola","year":"2011","journal-title":"ACM Comput. Surv."},{"unstructured":"Hui, J., and Culler, D. The Dynamic Behavior of a Data Dissemination Protocol for Network Programming at Scale.","key":"ref_43"},{"unstructured":"Brown, S., and Sreenan, J. (2006). Updating Software in Wireless Sensor Networks: A Survey, Department of Computer Science, University College Cork. Tech. Rep. UCC-CS-2006-13-07.","key":"ref_44"},{"doi-asserted-by":"crossref","unstructured":"Levis, P., and Culler, D. (2002, January 5\u20139). Mat\u00e9: A Tiny Virtual Machine for Sensor Networks. San Jose, CA, USA.","key":"ref_45","DOI":"10.1145\/635508.605407"},{"unstructured":"Stann, F., and Heidemann, J. (2003, January 11). RMST: Reliable Data Transport in Sensor Networks. Anchorage, AK, USA.","key":"ref_46"},{"key":"ref_47","doi-asserted-by":"crossref","first-page":"2","DOI":"10.1109\/TNET.2002.808417","article-title":"Directed diffusion for wireless sensor networking","volume":"11","author":"Intanagonwiwat","year":"2011","journal-title":"IEEE\/ACM Trans. Netw."},{"unstructured":"Hui, J., and Culler, D. (November, January 3\u2013). The Dynamic Behavior of a Data Dissemination Protocol for network Programming at Scale. Baltimore MD, USA.","key":"ref_48"},{"doi-asserted-by":"crossref","unstructured":"Hyun, S., Ning, P., Liu, A., and Du, W. (2008, January 22\u201324). Seluge: Secure and DoS-Resistant Code Dissemination in Wireless Sensor Networks. St. Louis, MO, USA.","key":"ref_49","DOI":"10.1109\/IPSN.2008.12"},{"unstructured":"TinyOS Community Deluge T2-TinyOS Documentation Wiki. Available online: http:\/\/docs.tinyos.net\/tinywiki\/index.php\/Deluge_T2 (accessed on 1 September 2012).","key":"ref_50"},{"unstructured":"Reijers, N., and Langendoen, K. Efficient Code Distribution in Wireless Sensor Networks.","key":"ref_51"},{"unstructured":"Jeong, J. (2004, January 4\u20137). Incremental Network Programming for Wireless Sensors. Santa Clara, CA, USA.","key":"ref_52"},{"unstructured":"Koshy, J., and Pandey, R. (February, January 31). Remote Incremental Linking for Energy-Efficient Reprogramming of Sensor Networks. Istanbul, Turkey.","key":"ref_53"},{"unstructured":"Carman, D., Kruus, S., and Matt, B. (2000). Constraints and Approaches for Distributed Sensor Network Security, NAI Labs Technical Report #00-010.","key":"ref_54"}],"container-title":["Sensors"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1424-8220\/13\/1\/1210\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T21:44:24Z","timestamp":1760219064000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1424-8220\/13\/1\/1210"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,1,18]]},"references-count":54,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2013,1]]}},"alternative-id":["s130101210"],"URL":"https:\/\/doi.org\/10.3390\/s130101210","relation":{},"ISSN":["1424-8220"],"issn-type":[{"type":"electronic","value":"1424-8220"}],"subject":[],"published":{"date-parts":[[2013,1,18]]}}}