2015
DOI: 10.1007/s11277-015-2866-4
|View full text |Cite
|
Sign up to set email alerts
|

A Secure and Scalable Group Access Control Scheme for Wireless Sensor Networks

Abstract: Recently, in 2013, Wu et al. proposed an efficient adaptable and scalable group access control scheme (GAC) for managing wireless sensor networks and they claimed that their proposed GAC approach provides the forward secrecy and backward secrecy, and it also prevents the man-in-the-middle attack. However, in this paper, we revisit Wu et al.'s scheme and show that Wu et al.'s scheme fails to provide the forward and backward secrecy to the group access key (GAK), and also their scheme does not prevent the man-i… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2015
2015
2018
2018

Publication Types

Select...
6

Relationship

4
2

Authors

Journals

citations
Cited by 10 publications
(4 citation statements)
references
References 34 publications
0
4
0
Order By: Relevance
“…We present the formal security verification of our proposed scheme by simulating the scheme using AVISPA tool, which is a powerful validation tool for network security protocols and applications and is accepted by wide variety of audience . Using AVISPA tool, we show that our proposed scheme is free from man‐in‐the‐middle and replay attacks.…”
Section: Simulation For Formal Security Verification Using Avispa Toolmentioning
confidence: 97%
See 1 more Smart Citation
“…We present the formal security verification of our proposed scheme by simulating the scheme using AVISPA tool, which is a powerful validation tool for network security protocols and applications and is accepted by wide variety of audience . Using AVISPA tool, we show that our proposed scheme is free from man‐in‐the‐middle and replay attacks.…”
Section: Simulation For Formal Security Verification Using Avispa Toolmentioning
confidence: 97%
“…Chen and Shih proposed a robust and improved mutual authentication scheme over Das's scheme showing that Das's scheme fails to provide proper mutual authentication. Fan et al , also proposed a simple and efficient user authentication scheme for two‐tiered WSN that is secure from denial‐of‐service attack and supports session key establishment between a legal user and master node.…”
Section: Related Workmentioning
confidence: 99%
“…AVISPA is an automated validation tool with a high‐level language specification for the security sensitive applications and protocols . In recent years, AVISPA becomes a popular and powerful tool for the formal security verification . AVISPA provides various automatic analysis techniques through its 4 back ends: (1) OFMC, (2) CL‐AtSe, (3) SATMC, and (4) TA4SP.…”
Section: Formal Security Verification Using Avispa Tool: Simulation Smentioning
confidence: 99%
“…AVISPA is a widely-accepted powerful tool and it provides a modular and expressive formal language for specifying protocols and their security properties, and integrates different back-ends that implement a variety of state-of-theart automatic analysis techniques (Chatterjee et al, 2014;Das, 2015Das, , 2016Das and Goswami, 2013;Mishra et al, 2014Mishra et al, , 2016Odelu et al, 2015aOdelu et al, , 2015bOdelu et al, , 2015cOdelu et al, , 2015dOdelu et al, , 2016. The architecture of the AVISPA tool v.1.1 provided in Fig.…”
Section: Article In Pressmentioning
confidence: 99%