Online citations, reference lists, and bibliographies.
← Back to Search

A Novel Access Control Protocol For Secure Sensor Networks

Hui-Feng Huang
Published 2009 · Computer Science

Cite This
Download PDF
Analyze on Scholarcy
Share
Nodes in a sensor network may be lost because of power exhaustion or malicious attacks. Therefore, new node deployment is necessary. Based on elliptic curve cryptography (ECC), this paper presents a new access control protocol for secure wireless sensor networks. The authentication procedure and common key generation are very simple and efficient. It is quite adequate for power and resource constrained sensor nodes. In addition, the proposed scheme can be easily implemented as a dynamic access control because all the old secret keys and broadcasting information in existing nodes should not be updated once a new node is added.
This paper references
10.1145/129902.129905
Responses to NIST's proposal
R. Rivest (1992)
Tamper resistance: a cautionary note
R. Anderson (1996)
10.1007/11596042_111
An Efficient Key Pre-distribution Scheme for Secure Distributed Sensor Networks
S. J. Choi (2005)
10.1145/948109.948119
Establishing pairwise keys in distributed sensor networks
D. Liu (2003)
10.1016/S0039-9140(04)00381-9
Biosensors for environmental monitoringA global perspective
S. Rodríguez-Mozaz (2005)
10.1109/MCOM.2002.1024422
A survey on sensor networks
I. Akyildiz (2002)
10.1145/586110.586117
A key-management scheme for distributed sensor networks
Laurent Eschenauer (2002)
10.1109/TIT.1976.1055638
New directions in cryptography
W. Diffie (1976)
10.1007/11596981_73
A Noble Key Pre-distribution Scheme with LU Matrix for Secure Wireless Sensor Networks
C. Park (2005)
10.1109/INFCOM.2003.1209219
Packet leashes: a defense against wormhole attacks in wireless networks
Y. Hu (2003)
10.1145/357980.358017
A method for obtaining digital signatures and public-key cryptosystems
R. Rivest (1983)
Number theory with computer applications
Ramanujachary Kumanduri (1997)
10.1090/S0025-5718-1987-0866109-5
Elliptic curve cryptosystems
N. Koblitz (1987)
10.1017/cbo9781107360211
Elliptic Curves in Cryptography
I. Blake (1999)
10.1109/JSAC.2005.861382
Location-based compromise-tolerant security mechanisms for wireless sensor networks
Yanchao Zhang (2006)
10.1016/j.talanta.2004.07.006
Biosensors for environmental monitoring A global perspective.
S. Rodríguez-Mozaz (2005)
10.1145/138859.138865
Competitive agents for information filtering
Paul E. Baclace (1992)
10.1109/SECPRI.2003.1199337
Random key predistribution schemes for sensor networks
H. Chan (2003)
10.1016/j.adhoc.2006.05.014
Access control in wireless sensor networks
Yun Zhou (2007)
10.1109/SP.2005.8
Distributed detection of node replication attacks in sensor networks
Bryan Parno (2005)



This paper is referenced by
10.1109/ICSAI.2012.6223323
A secure access control scheme based on group for peer to peer network
Xiaoming Wang (2012)
10.1002/ett.3995
Consortium blockchain‐enabled access control mechanism in edge computing based generic Internet of Things environment
Sourav Saha (2020)
10.23919/ICACT.2019.8701985
Security Enhancement for Access Control Mechanism in Real-time Wireless Sensor Network
Mangal Sain (2019)
10.1109/TCE.2010.5505971
On the security of an enhanced novel access control protocol for wireless sensor networks
P. Zeng (2010)
ECC Based Authentication System for Performance Improvement in Security of Cloud
Sumita Dey (2016)
A Scalable and DoS-Resistant Key Management Scheme in Wireless Sensor Network
Lingyu Lee (2012)
10.1016/j.csi.2011.03.004
A review of wireless sensors and networks' applications in agriculture
Aqeel-ur Rehman (2014)
10.5772/13158
Security of Wireless Sensor Networks: Current Status and Key Issues
C. Li (2010)
10.1063/1.4952487
Cryptanalysis on Cheng et al. protocol
Tejeshwari Thakur (2016)
10.1109/CCNC.2011.5766345
A brief survey of access control in Wireless Sensor Networks
I. Butun (2011)
10.1016/j.tele.2012.03.011
An adaptable and scalable group access control scheme for managing wireless sensor networks
Fan Wu (2013)
10.1504/IJTMCC.2014.067303
A survey on user access control in wireless sensor networks with formal security verification
Santanu Chatterjee (2014)
10.1109/SERA.2019.8886776
Project Management Model Based on Consistency Strategy for Blockchain Platform
Eunhee Lee (2019)
10.5815/IJWMT.2011.01.05
A Group-oriented Access Control Scheme for P2P Networks
Wang Xiao-ming (2011)
10.1109/IFSA-NAFIPS.2013.6608583
A system based on interval fuzzy approach to predict the appearance of pests in agriculture
Leonardo Martins Rodrigues (2013)
10.3390/s140202732
An Efficient and Adaptive Mutual Authentication Framework for Heterogeneous Wireless Sensor Network-Based Applications
P. Kumar (2014)
10.1109/WICOM.2010.5601157
User Authentication Scheme for Sensor Networks
Xiaoming Wang (2010)
10.1109/NSWCTC.2010.205
An Admission Control Scheme for Sensor Networks
W. Xiao-ming (2010)
A Survey of Access Control Schemes in Wireless Sensor Networks
Y. Faye (2011)
10.3390/info8020044
BBDS: Blockchain-Based Data Sharing for Electronic Medical Records in Cloud Environments
Q. Xia (2017)
10.1016/J.PROCS.2016.06.013
Implementation of Node Authentication for WSN Using Hash Chains
Ayaz Hassan Moon (2016)
10.1186/1687-1499-2012-241
Providing perfect forward secrecy for location-aware wireless sensor networks
Chi-Tung Chen (2012)
10.1007/S12652-018-1006-X
Authentication protocols for the internet of drones: taxonomy, analysis and future directions
M. Wazid (2018)
10.1109/MITS.2015.2417974
Multimedia Services in Cloud-Based Vehicular Networks
Ming-Kai Jiau (2015)
10.1109/TCE.2010.5606360
Comment: "Eenhanced novel access control protocol over wireless sensor networks"
Jian Shen (2010)
10.1016/j.comcom.2020.02.011
Designing secure blockchain-based access control scheme in IoT-enabled Internet of Drones deployment
Basudeb Bera (2020)
10.1142/S0129054113500214
A Novel Efficient Access Control Scheme for Large-Scale Distributed Wireless Sensor Networks
Ashok Kumar Das (2013)
10.1109/JIOT.2019.2931372
Certificate-Based Anonymous Device Access Control Scheme for IoT Environment
Saurav Malani (2019)
10.1109/ISIE.2017.8001445
A secure mutual trust scheme for wireless sensor networks
Alan Dahgwo Yein (2017)
10.1155/2014/671038
Spatiotemporal Access Model Based on Reputation for the Sensing Layer of the IoT
Y. Guo (2014)
10.1109/ICOAC.2014.7229712
Monitoring of soil parameters for effective irrigation using Wireless Sensor Networks
B. Balaji Bhanu (2014)
10.1109/JSEN.2016.2610000
Access Control Protocol With Node Privacy in Wireless Sensor Networks
Pardeep Kumar (2016)
See more
Semantic Scholar Logo Some data provided by SemanticScholar