2013
DOI: 10.1016/j.tele.2012.03.011
|View full text |Cite
|
Sign up to set email alerts
|

An adaptable and scalable group access control scheme for managing wireless sensor networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
13
0

Year Published

2014
2014
2020
2020

Publication Types

Select...
3
3

Relationship

0
6

Authors

Journals

citations
Cited by 9 publications
(13 citation statements)
references
References 32 publications
0
13
0
Order By: Relevance
“…Further, Tsaur and Pai [16] proposed a dynamic key management mechanism using the hash-based polynomial instead of using the public-key and secret- A Secure and Scalable Group Access Control Scheme for… key, and hence, their scheme significantly reduces the communication, computation and storage overheads during the group key generation and distribution. However, in some practical scenarios, Tsaur-Pai's scheme does not prevent an impersonation attack [7]. After that, several approaches [17][18][19][20] are presented in the literature.…”
Section: Related Workmentioning
confidence: 99%
See 3 more Smart Citations
“…Further, Tsaur and Pai [16] proposed a dynamic key management mechanism using the hash-based polynomial instead of using the public-key and secret- A Secure and Scalable Group Access Control Scheme for… key, and hence, their scheme significantly reduces the communication, computation and storage overheads during the group key generation and distribution. However, in some practical scenarios, Tsaur-Pai's scheme does not prevent an impersonation attack [7]. After that, several approaches [17][18][19][20] are presented in the literature.…”
Section: Related Workmentioning
confidence: 99%
“…However, these schemes [21,22] do not consider the access privilege with respect to nodes leaving scenario. Thus, these approaches do not provide the forward secrecy and backward secrecy in secure group communication based WSNs [7]. Moreover, Kim and Lee [23] pointed out that Huang's scheme [22] is vulnerable to replay attacks.…”
Section: Related Workmentioning
confidence: 99%
See 2 more Smart Citations
“…Additionally, full pairwise key schemes limit scalability as addition of any new node requires change in all existing nodes of the network. A group based key management schemes [6][7] are lightweight but cannot offer a high amount of security. Trusted third party became a bottleneck and single point of failure in trusted third party based key management schemes [8][9].…”
Section: Introductionmentioning
confidence: 99%