2016
DOI: 10.1109/jsen.2016.2610000
|View full text |Cite
|
Sign up to set email alerts
|

Access Control Protocol With Node Privacy in Wireless Sensor Networks

Abstract: Abstract-For preventing malicious nodes joining wireless sensor networks (WSNs), an access control mechanism is necessary for the trustworthy cooperation between the nodes. In addition to access control, recently, privacy has been an important topic regarding how to achieve privacy without disclosing the real identity of communicating entities in the WSNs. Based on elliptic curve cryptography (ECC), in this paper we present an access control protocol with node privacy (called ACP) for the WSN. The proposed sch… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
7
0

Year Published

2018
2018
2024
2024

Publication Types

Select...
6
2

Relationship

0
8

Authors

Journals

citations
Cited by 16 publications
(7 citation statements)
references
References 30 publications
0
7
0
Order By: Relevance
“…However, WSNs are vulnerable to various attacks because of its distributed wireless nature, which results in delays and loss of data in the network [3], [4]. WSNs have a high data sensitivity, thereby allowing the adversary to discreetly intercept information from the nodes [5]. For example, the adversary can intercept the transmitted packets by disconnecting the link between the source and destination nodes, generate a fake node with similar identity as the authentic node, or change the path of the transmission.…”
Section: Introductionmentioning
confidence: 99%
“…However, WSNs are vulnerable to various attacks because of its distributed wireless nature, which results in delays and loss of data in the network [3], [4]. WSNs have a high data sensitivity, thereby allowing the adversary to discreetly intercept information from the nodes [5]. For example, the adversary can intercept the transmitted packets by disconnecting the link between the source and destination nodes, generate a fake node with similar identity as the authentic node, or change the path of the transmission.…”
Section: Introductionmentioning
confidence: 99%
“…An access control scheme should monitor the deployment of the new nodes in the network keeping the node identities disclosed to ensure privacy. One such access control scheme, called as access control with node (identity) privacy (ACP) is proposed by Kumar et al [ 104 ]. The whole network is divided into cells with one co-ordinator (C) each.…”
Section: Access Control Protocols In Iotmentioning
confidence: 99%
“…The scheme also flexibly deploys new nodes in the network via new node addition phase. [ 104 ] resists message replay attack, legal node masquerading attack, message forgery attack, identity threat, sybil attack, node capture and fabrication threat.…”
Section: Access Control Protocols In Iotmentioning
confidence: 99%
“…Generally, sensors are deployed in unattended and hostile environments. Therefore, an intruder can easily receive a physical access to a sensor and extract all the stored keys [ 32 ]. The recent encryption schemes use a source-destination path key to protect data transmitted over the route instead of using multiple pairwise shared keys to repeatedly perform encryption and decryption over every link [ 33 ].…”
Section: Related Workmentioning
confidence: 99%