TY - JOUR
T1 - On the Security of an Enhanced Novel Access Control Protocol for Wireless Sensor Networks
AU - Choo, Kim-Kwang (Raymond)
AU - Peng, Zeng
AU - Sun, Da-Zhi
PY - 2010
Y1 - 2010
N2 - New node deployment is inevitable in a wireless sensor network because nodes in the network may be lost, exhausted, or destroyed. To secure the new node deployment process, Kim and Lee (2009) proposed an enhanced novel access control protocol (ENACP) using the elliptic curve cryptography and the hash chain. We identified an inherent flaw in their design and demonstrated that ENACP is vulnerable to a new node masquerading attack and a legal node masquerading attack, in violation of their security claims. We hope that by identifying this design flaw, similar structural mistakes can be avoided in future designs
AB - New node deployment is inevitable in a wireless sensor network because nodes in the network may be lost, exhausted, or destroyed. To secure the new node deployment process, Kim and Lee (2009) proposed an enhanced novel access control protocol (ENACP) using the elliptic curve cryptography and the hash chain. We identified an inherent flaw in their design and demonstrated that ENACP is vulnerable to a new node masquerading attack and a legal node masquerading attack, in violation of their security claims. We hope that by identifying this design flaw, similar structural mistakes can be avoided in future designs
U2 - 10.1109/TCE.2010.5505971
DO - 10.1109/TCE.2010.5505971
M3 - Article
SN - 0098-3063
VL - 56
SP - 566
EP - 569
JO - IEEE Transactions on Consumer Electronics
JF - IEEE Transactions on Consumer Electronics
IS - 2
ER -