Abstract
New node deployment is inevitable in a wireless sensor network because nodes in the network may be lost, exhausted, or destroyed. To secure the new node deployment process, Kim and Lee (2009) proposed an enhanced novel access control protocol (ENACP) using the elliptic curve cryptography and the hash chain. We identified an inherent flaw in their design and demonstrated that ENACP is vulnerable to a new node masquerading attack and a legal node masquerading attack, in violation of their security claims. We hope that by identifying this design flaw, similar structural mistakes can be avoided in future designs
| Original language | English |
|---|---|
| Article number | 5505971 |
| Pages (from-to) | 566-569 |
| Number of pages | 4 |
| Journal | IEEE Transactions on Consumer Electronics |
| Volume | 56 |
| Issue number | 2 |
| DOIs | |
| State | Published - May 2010 |
Keywords
- Wireless sensor networks
- access control
- authentication
- key establishment
- security analysis