2012
DOI: 10.1109/tce.2012.6227452
|View full text |Cite
|
Sign up to set email alerts
|

PACPs: practical access control protocols for wireless sensor networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
42
0

Year Published

2015
2015
2022
2022

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 21 publications
(42 citation statements)
references
References 21 publications
0
42
0
Order By: Relevance
“…In 2012, Lee et al [13] demonstrated that ENACP is not practical for real environments and is susceptible to message forgery attack and a new node masquerade attack. To solve ENACP problems, Lee et al proposed practical access control protocols (PACPs) for WSNs and claimed that PACPs are secure against many attacks [13].…”
Section: A Access Control Protocolsmentioning
confidence: 99%
See 2 more Smart Citations
“…In 2012, Lee et al [13] demonstrated that ENACP is not practical for real environments and is susceptible to message forgery attack and a new node masquerade attack. To solve ENACP problems, Lee et al proposed practical access control protocols (PACPs) for WSNs and claimed that PACPs are secure against many attacks [13].…”
Section: A Access Control Protocolsmentioning
confidence: 99%
“…In addition, an adversary can purposefully interrupt the network smooth functionality by deploying the malicious nodes into the network. Therefore, to protect such a information leakage from the global adversaries and malicious nodes, access control mechanisms are to be enforced to real WSNs from the beginning of a WSN deployment [7]- [13].…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…As a result, we can realize that communication cost is an important consideration same as the computation cost. Table 3 presents the computation and the transmission costs incurred by using the methods put forward by Zhou et al [2], Huang [3], Kim and Lee [4], and Lee et al [7]. It also displays the costs incurred by using our proposed method.…”
Section: Performance Analysismentioning
confidence: 99%
“…In 2010, Shen et al [5] and Zeng et al [6] demonstrated that the scheme presented by Kim and Lee was vulnerable to masquerade attacks executed by new as well as legal nodes because it lacked hash chain renewability. In 2012, Lee et al [7] proposed a practical access control scheme, still based on elliptic curve and hash chain. However, such a large number of key distribution schemes [2][3][4][5][6][7] are vulnerable to various 2 International Journal of Distributed Sensor Networks adversary attacks and had huge storage overhead at the sensors node.…”
Section: Introductionmentioning
confidence: 99%