Security Analysis of an Adaptable and Scalable Group Access Control Scheme for Managing Wireless Sensor Networks
Recently, Wu et al. proposed an adaptable and scalable group access control scheme (GAC) for managing wireless sensor networks (WSNs) [Telematics and Informatics, 30:144-157, 2013], and they claimed that their proposed GAC mechanism provides forward secrecy and backward secrecy, and it also prevents man-in-the-middle attack. However, in this paper, we revisit Wu et al.’s scheme and show that Wu et al.’s scheme fails to provide the forward secrecy as well as the backward secrecy and also their scheme does not prevent the man-in-the-middle attack. As a result, Wu et al.’s scheme is not suitable for practical applications.
KeywordsCryptanalysis Group access control SGC Adaptability Scalability WSNs
Unable to display preview. Download preview PDF.
- 2.Ben-Or, M.: Probabilistic algorithms in finite fields. In: Proceedings of 22nd Annual Symposium on Foundations of Computer Science (IEEE FOCS 1981), pp. 394–398 (1981)Google Scholar
- 3.Chatterjee, S., Das, A.K., Sing, J.K.: A secure and effective access control scheme for distributed wireless sensor networks. International Journal of Communication Networks and Distributed Systems (in press, 2014)Google Scholar
- 4.Chatterjee, S., Das, A.K., Sing, J.K.: Analysis and Formal Security Verification of Access Control Schemes in Wireless Sensor Networks: A Critical Survey. Journal of Information Assurance and Security 8(1), 33–57 (2013)Google Scholar
- 5.Chatterjee, S., Das, A.K., Sing, J.K.: An enhanced access control scheme in wireless sensor networks. Ad Hoc & Sensor Wireless Networks 21(1-2), 121–149 (2014)Google Scholar
- 6.Das, A.K.: Design and Analysis of Key Distribution Mechanisms in Wireless Sensor Networks. PhD thesis, Department of Computer Science and Engineering, Indian Institute of Technology Kharagpur, India (June 2008)Google Scholar
- 7.Das, A.K.: A Survey on Analytic Studies of Key Distribution Mechanisms in Wireless Sensor Networks. Journal of Information Assurance and Security 5(5), 526–553 (2010)Google Scholar