Abstract
New node deployment is inevitable in a wireless sensor network because nodes in the network may be lost, exhausted, or destroyed. To secure the new node deployment process, Kim and Lee (2009) proposed an enhanced novel access control protocol (ENACP) using the elliptic curve cryptography and the hash chain. We identified an inherent flaw in their design and demonstrated that ENACP is vulnerable to a new node masquerading attack and a legal node masquerading attack, in violation of their security claims. We hope that by identifying this design flaw, similar structural mistakes can be avoided in future designs
Original language | English |
---|---|
Article number | 5505971 |
Pages (from-to) | 566-569 |
Number of pages | 4 |
Journal | IEEE Transactions on Consumer Electronics |
Volume | 56 |
Issue number | 2 |
DOIs | |
Publication status | Published - May 2010 |
Externally published | Yes |