Security Analysis of an Adaptable and Scalable Group Access Control Scheme for Managing Wireless Sensor Networks

  • Vanga Odelu
  • Ashok Kumar Das
  • Adrijit Goswami
Part of the Communications in Computer and Information Science book series (CCIS, volume 467)

Abstract

Recently, Wu et al. proposed an adaptable and scalable group access control scheme (GAC) for managing wireless sensor networks (WSNs) [Telematics and Informatics, 30:144-157, 2013], and they claimed that their proposed GAC mechanism provides forward secrecy and backward secrecy, and it also prevents man-in-the-middle attack. However, in this paper, we revisit Wu et al.’s scheme and show that Wu et al.’s scheme fails to provide the forward secrecy as well as the backward secrecy and also their scheme does not prevent the man-in-the-middle attack. As a result, Wu et al.’s scheme is not suitable for practical applications.

Keywords

Cryptanalysis Group access control SGC Adaptability Scalability WSNs 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Akyildiz, I.F., Su, W., Sankarasubramaniam, Y., Cayirci, E.: Wireless sensor networks: A Survey. Computer Networks 38(4), 393–422 (2002)CrossRefGoogle Scholar
  2. 2.
    Ben-Or, M.: Probabilistic algorithms in finite fields. In: Proceedings of 22nd Annual Symposium on Foundations of Computer Science (IEEE FOCS 1981), pp. 394–398 (1981)Google Scholar
  3. 3.
    Chatterjee, S., Das, A.K., Sing, J.K.: A secure and effective access control scheme for distributed wireless sensor networks. International Journal of Communication Networks and Distributed Systems (in press, 2014)Google Scholar
  4. 4.
    Chatterjee, S., Das, A.K., Sing, J.K.: Analysis and Formal Security Verification of Access Control Schemes in Wireless Sensor Networks: A Critical Survey. Journal of Information Assurance and Security 8(1), 33–57 (2013)Google Scholar
  5. 5.
    Chatterjee, S., Das, A.K., Sing, J.K.: An enhanced access control scheme in wireless sensor networks. Ad Hoc & Sensor Wireless Networks 21(1-2), 121–149 (2014)Google Scholar
  6. 6.
    Das, A.K.: Design and Analysis of Key Distribution Mechanisms in Wireless Sensor Networks. PhD thesis, Department of Computer Science and Engineering, Indian Institute of Technology Kharagpur, India (June 2008)Google Scholar
  7. 7.
    Das, A.K.: A Survey on Analytic Studies of Key Distribution Mechanisms in Wireless Sensor Networks. Journal of Information Assurance and Security 5(5), 526–553 (2010)Google Scholar
  8. 8.
    Das, A.K., Chatterjee, S., Sing, J.K.: A novel efficient access control scheme for large-scale distributed wireless sensor networks. International Journal of Foundations of Computer Science 24(05), 625–653 (2013)CrossRefMATHMathSciNetGoogle Scholar
  9. 9.
    Das, A.K., Paul, N.R., Tripathy, L.: Cryptanalysis and improvement of an access control in user hierarchy based on elliptic curve cryptosystem. Information Sciences 209, 80–92 (2012)CrossRefMATHMathSciNetGoogle Scholar
  10. 10.
    Du, X., Chen, H.H.: Security in wireless sensor networks. IEEE Wireless Communications 15(4), 60–66 (2008)CrossRefMathSciNetGoogle Scholar
  11. 11.
    Huang, H.F.: A novel access control protocol for secure sensor networks. Computer Standards & Interfaces 31(2), 272–276 (2009)CrossRefGoogle Scholar
  12. 12.
    Kim, Y., Perrig, A., Tsudik, G.: Group key agreement efficient in communication. IEEE Transactions on Computers 53(7), 905–921 (2004)CrossRefGoogle Scholar
  13. 13.
    Perrig, A., Stankovic, J., Wagner, D.: Security in wireless sensor networks. Communications of the ACM 47(6), 53–57 (2004)CrossRefGoogle Scholar
  14. 14.
    Sorniotti, A., Molva, R., Gomez, L., Trefois, C., Laube, A., Scaglioso, P.: Efficient access control for wireless sensor data. International Journal of Wireless Information Networks 16(3), 165–174 (2009)CrossRefGoogle Scholar
  15. 15.
    Wu, F., Pai, H.T., Zhu, X., Hsueh, P.Y., Hu, Y.H.: An adaptable and scalable group access control scheme for managing wireless sensor networks. Telematics and Informatics 30, 144–157 (2013), http://dx.doi.org/10.1016/j.tele.2012.03.011 CrossRefGoogle Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2014

Authors and Affiliations

  • Vanga Odelu
    • 1
  • Ashok Kumar Das
    • 2
  • Adrijit Goswami
    • 1
  1. 1.Department of MathematicsIndian Institute of TechnologyKharagpurIndia
  2. 2.Center for Security, Theory and Algorithmic ResearchInternational Institute of Information TechnologyHyderabadIndia

Personalised recommendations