Online citations, reference lists, and bibliographies.
← Back to Search

On The Security Of An Enhanced Novel Access Control Protocol For Wireless Sensor Networks

P. Zeng, Kim-Kwang Raymond Choo, Da-Zhi Sun
Published 2010 · Computer Science

Cite This
Download PDF
Analyze on Scholarcy
Share
New node deployment is inevitable in a wireless sensor network because nodes in the network may be lost, exhausted, or destroyed. To secure the new node deployment process, Kim and Lee (2009) proposed an enhanced novel access control protocol (ENACP) using the elliptic curve cryptography and the hash chain. We identified an inherent flaw in their design and demonstrated that ENACP is vulnerable to a new node masquerading attack and a legal node masquerading attack, in violation of their security claims. We hope that by identifying this design flaw, similar structural mistakes can be avoided in future designs.
This paper references



This paper is referenced by
10.1109/JIOT.2019.2931372
Certificate-Based Anonymous Device Access Control Scheme for IoT Environment
Saurav Malani (2019)
A Scalable and DoS-Resistant Key Management Scheme in Wireless Sensor Network
Lingyu Lee (2012)
10.1007/S12652-018-0708-4
Mobile jammer localization and tracking in multi-hop wireless network
Tongxiang Wang (2018)
10.1109/TCE.2011.5955187
An efficient and scalable re-authentication protocol over wireless sensor network
J. Kim (2011)
10.1109/IKT.2013.6620043
Improving HBQ Authentication and Access control in wireless sensor network
Babak Nouri-Moghaddam (2013)
10.1145/3361570.3361605
New Node Distributed Access Control Scheme for Wireless Sensor Network
Y. Faye (2019)
10.3390/s140202732
An Efficient and Adaptive Mutual Authentication Framework for Heterogeneous Wireless Sensor Network-Based Applications
P. Kumar (2014)
10.1016/j.comcom.2020.02.011
Designing secure blockchain-based access control scheme in IoT-enabled Internet of Drones deployment
Basudeb Bera (2020)
A Survey of Access Control Schemes in Wireless Sensor Networks
Y. Faye (2011)
10.1063/1.4952487
Cryptanalysis on Cheng et al. protocol
Tejeshwari Thakur (2016)
10.1109/TII.2018.2834351
Measuring Two-Factor Authentication Schemes for Real-Time Data Access in Industrial Wireless Sensor Networks
Ding Wang (2018)
10.1109/ISIE.2017.8001445
A secure mutual trust scheme for wireless sensor networks
Alan Dahgwo Yein (2017)
10.12785/AMIS/080416
An efficient authentication and access control scheme for perception layer of Internet of Things
Y. Ning (2014)
An Improved Online/Offline Identity-Based Signature Scheme for WSNs
Ya Gao (2016)
10.1371/journal.pone.0177326
Robust multiple frequency multiple power localization schemes in the presence of multiple jamming attacks
A. A. Hussein (2017)
10.1016/j.future.2017.02.019
Wireless Integrated Sensor Network: Boundary Intellect system for elephant detection via cognitive theory and Fuzzy Cognitive Maps
Jerline Sheebha Anni (2018)
10.1155/2016/1210938
An Access Control Protocol for Wireless Sensor Network Using Double Trapdoor Chameleon Hash Function
Tejeshwari Thakur (2016)
10.1109/TCE.2016.7448561
Secure firmware validation and update for consumer devices in home networking
Byung-Chul Choi (2016)
10.23919/ICACT.2017.7890207
Practical access control protocols (PACPs) for wireless sensor networks: Analysis of security pitfalls
M. Sain (2017)
10.14419/JACST.V4I1.4307
A novel authentication and access control framework in wireless sensor networks
Babak Nouri-Moghaddam (2015)
10.1016/j.jksuci.2020.05.010
Secure and practical access control mechanism for WSN with node privacy
U. Iqbal (2020)
Algorithmes d'authentification et de cryptographie efficaces pour les réseaux de capteurs sans fil. (Efficient authentication and cryptography algorithms for wirless sensor nerworks)
Y. Faye (2014)
10.1016/j.jnca.2016.01.012
Survey on key revocation mechanisms in wireless sensor networks
M. Ge (2016)
10.1016/j.future.2018.06.027
Taxonomy and analysis of security protocols for Internet of Things
A. K. Das (2018)
10.1109/ACCESS.2020.2991348
OOS-SSS: An Efficient Online/Offline Subtree-Based Short Signature Scheme Using Chebyshev Chaotic Maps for Wireless Sensor Network
Chandrashekhar Meshram (2020)
10.1109/JSEN.2016.2610000
Access Control Protocol With Node Privacy in Wireless Sensor Networks
P. Kumar (2016)
10.1002/ett.3995
Consortium blockchain‐enabled access control mechanism in edge computing based generic Internet of Things environment
Sourav Saha (2020)
10.1177/1687814016642385
Mutual trust method for forwarding information in wireless sensor networks using random secret pre-distribution
C. Lin (2016)
10.23919/ICACT.2019.8701985
Security Enhancement for Access Control Mechanism in Real-time Wireless Sensor Network
M. Sain (2019)
10.1109/ICRTCCM.2017.32
A Study on Vehicle to Vehicle Collision Prevention Using Fog, Cloud, Big Data and Elliptic Curve Security Based on Threshold Energy Efficient Protocol in Wireless Sensor Network
Natarajan Sathishkumar (2017)
10.1371/journal.pone.0158072
A New Random Walk for Replica Detection in WSNs
Mohammed Y. Aalsalem (2016)
10.1002/cpe.3930
On the design of a secure user authentication and key agreement scheme for wireless sensor networks
S. Kumari (2017)
See more
Semantic Scholar Logo Some data provided by SemanticScholar