On the Security of an Enhanced Novel Access Control Protocol for Wireless Sensor Networks

被引:33
|
作者
Zeng, Peng [1 ]
Choo, Kim-Kwang Raymond
Sun, Da-Zhi [2 ]
机构
[1] E China Normal Univ, Inst Software Engn, Shanghai, Peoples R China
[2] Tianjin Univ, Sch Comp Sci & Technol, Tianjin 300072, Peoples R China
关键词
Wireless sensor networks; access control; authentication; key establishment; security analysis;
D O I
10.1109/TCE.2010.5505971
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
New node deployment is inevitable in a wireless sensor network because nodes in the network may be lost, exhausted, or destroyed. To secure the new node deployment process, Kim and Lee (2009) proposed an enhanced novel access control protocol (ENACP) using the elliptic curve cryptography and the hash chain. We identified an inherent flaw in their design and demonstrated that ENACP is vulnerable to a new node masquerading attack and a legal node masquerading attack, in violation of their security claims. We hope that by identifying this design flaw, similar structural mistakes can be avoided in future designs(1).
引用
收藏
页码:566 / 569
页数:4
相关论文
共 50 条
  • [41] Game-theoretic medium access control protocol for wireless sensor networks
    Zhao, L.
    Guo, L.
    Zhang, J.
    Zhang, H.
    IET COMMUNICATIONS, 2009, 3 (08) : 1274 - 1283
  • [43] A low power medium access control protocol for wireless medical sensor networks
    Lamprinos, IE
    Prentza, A
    Sakka, E
    Koutsouris, D
    PROCEEDINGS OF THE 26TH ANNUAL INTERNATIONAL CONFERENCE OF THE IEEE ENGINEERING IN MEDICINE AND BIOLOGY SOCIETY, VOLS 1-7, 2004, 26 : 2129 - 2132
  • [44] Analysis of Security Routing Protocol for Wireless Sensor Networks
    Wang, Yi
    Cao, Zhenjie
    Bai, Xue
    PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON LOGISTICS, ENGINEERING, MANAGEMENT AND COMPUTER SCIENCE (LEMCS 2015), 2015, 117 : 1074 - 1078
  • [45] Energy efficient security protocol for wireless sensor networks
    Çam, H
    Özdemir, S
    Muthuavinashiappan, D
    Nair-, P
    2003 IEEE 58TH VEHICULAR TECHNOLOGY CONFERENCE, VOLS1-5, PROCEEDINGS, 2003, : 2981 - 2984
  • [46] On Security of Opportunistic Routing Protocol in Wireless Sensor Networks
    Sharma, Archana
    Singh, Yashwant
    PROCEEDINGS OF RECENT INNOVATIONS IN COMPUTING, ICRIC 2019, 2020, 597 : 407 - 419
  • [47] Efficient Security Authentication Protocol in Wireless Sensor Networks
    Latha, S. Asha
    Sivabalan, A.
    ADVANCEMENTS IN AUTOMATION AND CONTROL TECHNOLOGIES, 2014, 573 : 418 - +
  • [48] The Study on Wireless Sensor Networks Security Access Scheme
    Miao, Xiaofeng
    Fan, Panguo
    Mu, Dejun
    ADVANCED TECHNOLOGY IN TEACHING - PROCEEDINGS OF THE 2009 3RD INTERNATIONAL CONFERENCE ON TEACHING AND COMPUTATIONAL SCIENCE (WTCS 2009), VOL 2: EDUCATION, PSYCHOLOGY AND COMPUTER SCIENCE, 2012, 117 : 233 - 241
  • [49] Enhanced synchronized medium access control protocol for wireless ad hoc networks
    Cao, Xiaojun
    Liu, Shenbo
    Pan, Lei
    Wu, Hongyi
    PROCEEDINGS - 16TH INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATIONS AND NETWORKS, VOLS 1-3, 2007, : 278 - +
  • [50] DominoMAC: A Wireless Sensor Networks Medium Access Protocol
    Gebali, Fayez
    Sulaimani, Rami
    Elmiligi, Haytham
    2012 SEVENTH INTERNATIONAL CONFERENCE ON BROADBAND, WIRELESS COMPUTING, COMMUNICATION AND APPLICATIONS (BWCCA 2012), 2012, : 8 - 13