A Secure and Scalable Group Access Control Scheme for Wireless Sensor Networks

被引:10
作者
Odelu, Vanga [1 ]
Das, Ashok Kumar [2 ]
Goswami, Adrijit [1 ]
机构
[1] Indian Inst Technol, Dept Math, Kharagpur 721302, W Bengal, India
[2] Ctr Secur Theory & Algorithm Res, Int Inst Informat Technol, Hyderabad 500032, Andhra Pradesh, India
关键词
Wireless sensor networks; Group access control; Adaptability; Scalability; Secure group communication; BAN logic; Security; KEY-MANAGEMENT SCHEME; CONTROL PROTOCOL; EFFICIENT;
D O I
10.1007/s11277-015-2866-4
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
Recently, in 2013, Wu et al. proposed an efficient adaptable and scalable group access control scheme (GAC) for managing wireless sensor networks and they claimed that their proposed GAC approach provides the forward secrecy and backward secrecy, and it also prevents the man-in-the-middle attack. However, in this paper, we revisit Wu et al.'s scheme and show that Wu et al.'s scheme fails to provide the forward and backward secrecy to the group access key (GAK), and also their scheme does not prevent the man-in-the-middle attack and it does not provide the mutual authentication between a node and the task manager. Moreover, in Wu et al.'s scheme, all the past GAKs used by a node can be revealed to an adversary when that node is compromised. We then aim to propose a novel group access control mechanism to withstand the security weaknesses found in Wu et al.'s scheme while retaining the original merits of their scheme. Through the rigorous informal security analysis and the formal security analysis using the widely-accepted Burrows-Abadi-Needham logic, we show that our scheme is secure against various known attacks including the attacks found in Wu et al.'s scheme. Moreover, in our scheme, the vulnerability of the GAKs used by a node is limited and bounded to the last GAK update protocol interval when that node is compromised by an adversary. Our scheme provides efficient dynamic properties such as joining and leaving of a node from a group along with high security and the required desirable features as compared to Wu et al.'s scheme, and as a result, our scheme is very suitable for the practical applications.
引用
收藏
页码:1765 / 1788
页数:24
相关论文
共 38 条
[1]   Wireless sensor networks: a survey [J].
Akyildiz, IF ;
Su, W ;
Sankarasubramaniam, Y ;
Cayirci, E .
COMPUTER NETWORKS, 2002, 38 (04) :393-422
[2]  
[Anonymous], J INFORM ASSURANCE S
[3]  
[Anonymous], 2001, FIPS PUB
[4]  
[Anonymous], 2009, PROC 1 INT C COMMUNI
[5]  
Ben-Or M., 1981, 22nd Annual Symposium on Foundations of Computer Science, P394, DOI 10.1109/SFCS.1981.37
[6]  
BURROWS M, 1990, ACM T COMPUT SYST, V8, P18, DOI [10.1145/77648.77649, 10.1145/74851.74852]
[7]   An effective ECC-based user access control scheme with attribute-based encryption for wireless sensor networks [J].
Chatterjee, Santanu ;
Das, Ashok Kumar .
SECURITY AND COMMUNICATION NETWORKS, 2015, 8 (09) :1752-1771
[8]  
Chatterjee S, 2013, J INF ASSUR SECUR, V8, P33
[9]  
Das AK, 2005, LECT NOTES COMPUT SC, V3803, P205