Online citations, reference lists, and bibliographies.
← Back to Search

On The Security Of An Enhanced Novel Access Control Protocol For Wireless Sensor Networks

P. Zeng, Kim-Kwang Raymond Choo, Da-Zhi Sun
Published 2010 · Computer Science

Cite This
Download PDF
Analyze on Scholarcy
New node deployment is inevitable in a wireless sensor network because nodes in the network may be lost, exhausted, or destroyed. To secure the new node deployment process, Kim and Lee (2009) proposed an enhanced novel access control protocol (ENACP) using the elliptic curve cryptography and the hash chain. We identified an inherent flaw in their design and demonstrated that ENACP is vulnerable to a new node masquerading attack and a legal node masquerading attack, in violation of their security claims. We hope that by identifying this design flaw, similar structural mistakes can be avoided in future designs.
This paper references

This paper is referenced by
Certificate-Based Anonymous Device Access Control Scheme for IoT Environment
Saurav Malani (2019)
A Scalable and DoS-Resistant Key Management Scheme in Wireless Sensor Network
Lingyu Lee (2012)
Mobile jammer localization and tracking in multi-hop wireless network
Tongxiang Wang (2018)
An efficient and scalable re-authentication protocol over wireless sensor network
J. Kim (2011)
Improving HBQ Authentication and Access control in wireless sensor network
Babak Nouri-Moghaddam (2013)
New Node Distributed Access Control Scheme for Wireless Sensor Network
Y. Faye (2019)
An Efficient and Adaptive Mutual Authentication Framework for Heterogeneous Wireless Sensor Network-Based Applications
P. Kumar (2014)
Designing secure blockchain-based access control scheme in IoT-enabled Internet of Drones deployment
Basudeb Bera (2020)
A Survey of Access Control Schemes in Wireless Sensor Networks
Y. Faye (2011)
Cryptanalysis on Cheng et al. protocol
Tejeshwari Thakur (2016)
Measuring Two-Factor Authentication Schemes for Real-Time Data Access in Industrial Wireless Sensor Networks
Ding Wang (2018)
A secure mutual trust scheme for wireless sensor networks
Alan Dahgwo Yein (2017)
An efficient authentication and access control scheme for perception layer of Internet of Things
Y. Ning (2014)
An Improved Online/Offline Identity-Based Signature Scheme for WSNs
Ya Gao (2016)
Robust multiple frequency multiple power localization schemes in the presence of multiple jamming attacks
A. A. Hussein (2017)
Wireless Integrated Sensor Network: Boundary Intellect system for elephant detection via cognitive theory and Fuzzy Cognitive Maps
Jerline Sheebha Anni (2018)
An Access Control Protocol for Wireless Sensor Network Using Double Trapdoor Chameleon Hash Function
Tejeshwari Thakur (2016)
Secure firmware validation and update for consumer devices in home networking
Byung-Chul Choi (2016)
Practical access control protocols (PACPs) for wireless sensor networks: Analysis of security pitfalls
M. Sain (2017)
A novel authentication and access control framework in wireless sensor networks
Babak Nouri-Moghaddam (2015)
Secure and practical access control mechanism for WSN with node privacy
U. Iqbal (2020)
Algorithmes d'authentification et de cryptographie efficaces pour les réseaux de capteurs sans fil. (Efficient authentication and cryptography algorithms for wirless sensor nerworks)
Y. Faye (2014)
Survey on key revocation mechanisms in wireless sensor networks
M. Ge (2016)
Taxonomy and analysis of security protocols for Internet of Things
A. K. Das (2018)
OOS-SSS: An Efficient Online/Offline Subtree-Based Short Signature Scheme Using Chebyshev Chaotic Maps for Wireless Sensor Network
Chandrashekhar Meshram (2020)
Access Control Protocol With Node Privacy in Wireless Sensor Networks
P. Kumar (2016)
Consortium blockchain‐enabled access control mechanism in edge computing based generic Internet of Things environment
Sourav Saha (2020)
Mutual trust method for forwarding information in wireless sensor networks using random secret pre-distribution
C. Lin (2016)
Security Enhancement for Access Control Mechanism in Real-time Wireless Sensor Network
M. Sain (2019)
A Study on Vehicle to Vehicle Collision Prevention Using Fog, Cloud, Big Data and Elliptic Curve Security Based on Threshold Energy Efficient Protocol in Wireless Sensor Network
Natarajan Sathishkumar (2017)
A New Random Walk for Replica Detection in WSNs
Mohammed Y. Aalsalem (2016)
On the design of a secure user authentication and key agreement scheme for wireless sensor networks
S. Kumari (2017)
See more
Semantic Scholar Logo Some data provided by SemanticScholar