메뉴 건너뛰기




Volumn 8, Issue 3, 2009, Pages 1086-1090

Two-factor user authentication in wireless sensor networks

Author keywords

Authentication; Hash function; Sensor networks; Wireless security

Indexed keywords

AUTHENTICATION; SENSOR NETWORKS;

EID: 62949130774     PISSN: 15361276     EISSN: None     Source Type: Journal    
DOI: 10.1109/TWC.2008.080128     Document Type: Article
Times cited : (649)

References (15)
  • 1
    • 62949118177 scopus 로고    scopus 로고
    • E. H. (Jr) Callaway. Wireless Sensor Networks, Architectures and Protocols. Auerbach Publications, 2003.
    • E. H. (Jr) Callaway. Wireless Sensor Networks, Architectures and Protocols. Auerbach Publications, 2003.
  • 5
    • 62949179479 scopus 로고    scopus 로고
    • Online] Available
    • "RSA SecureID, "Secure identity." [Online] Available: http://www.rsa.com/node.aspx?id=1156.
    • Secure identity
  • 6
    • 4043122631 scopus 로고    scopus 로고
    • A dynamic ID-based remote user authentication scheme
    • M. L. Das, A. Saxena, and V. P. Gulati. "A dynamic ID-based remote user authentication scheme," IEEE Trans. Consumer Electron., vol. 50, no. 2, pp. 629-631, 2004.
    • (2004) IEEE Trans. Consumer Electron , vol.50 , Issue.2 , pp. 629-631
    • Das, M.L.1    Saxena, A.2    Gulati, V.P.3
  • 8
    • 62949177571 scopus 로고    scopus 로고
    • Z. Benenson, F. Gartner, and D. Kesdogan. User authentication in sensor networks, in Proc. Workshop Sensor Networks, Lecture Notes Informatics Proceedings Informatik, 2004.
    • Z. Benenson, F. Gartner, and D. Kesdogan. "User authentication in sensor networks," in Proc. Workshop Sensor Networks, Lecture Notes Informatics Proceedings Informatik, 2004.
  • 10
    • 62949131293 scopus 로고    scopus 로고
    • IEEE Standards for 802.15.4; Part 15.4: Wireless medium access control and physical layer specifications for low-rate wireless personal area networks, 2003.
    • IEEE Standards for 802.15.4; Part 15.4: "Wireless medium access control and physical layer specifications for low-rate wireless personal area networks," 2003.
  • 12
    • 84939573910 scopus 로고    scopus 로고
    • Differential power analysis
    • Proc. Advances Cryptology, Springer-Verlag
    • P. C. Kocher, J. Jaffe, and B. Jun. "Differential power analysis," in Proc. Advances Cryptology, Springer-Verlag, LNCS 1666, pp. 388-397, 1999.
    • (1999) LNCS , vol.1666 , pp. 388-397
    • Kocher, P.C.1    Jaffe, J.2    Jun, B.3
  • 13
    • 0020720357 scopus 로고
    • On the security of public-key protocols
    • D. Dolev and A. C. Yao. "On the security of public-key protocols," IEEE Trans. Inform. Theory, vol. 29, no. 2, pp. 198-208, 1983.
    • (1983) IEEE Trans. Inform. Theory , vol.29 , Issue.2 , pp. 198-208
    • Dolev, D.1    Yao, A.C.2
  • 14
    • 33745738746 scopus 로고    scopus 로고
    • One-time sensors: A novel concept to mitigate node-capture attacks
    • Proc. Workshop Security Privacy in Ad-hoc Sensor Networks
    • K. Bicakci, C. Gamage, B. Crispo, and A. S. Tanenbaum. "One-time sensors: a novel concept to mitigate node-capture attacks," in Proc. Workshop Security Privacy in Ad-hoc Sensor Networks, LNCS 3813, pp. 80-90, 2005.
    • (2005) LNCS , vol.3813 , pp. 80-90
    • Bicakci, K.1    Gamage, C.2    Crispo, B.3    Tanenbaum, A.S.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.