메뉴 건너뛰기




Volumn 32, Issue 5, 2010, Pages 704-712

A robust mutual authentication protocol for wireless sensor networks

Author keywords

Hash function; Mutual authentication; Parallel session attack; Security; Wireless sensor networks

Indexed keywords

AUTHENTICATION PROTOCOLS; COMMUNICATION COST; GUESSING ATTACKS; MUTUAL AUTHENTICATION; PARALLEL SESSION ATTACK; SECURITY; SECURITY WEAKNESS; WIRELESS SENSOR;

EID: 78049334450     PISSN: 12256463     EISSN: None     Source Type: Journal    
DOI: 10.4218/etrij.10.1510.0134     Document Type: Article
Times cited : (237)

References (18)
  • 1
    • 0036688074 scopus 로고    scopus 로고
    • A survey on sensor networks
    • Aug
    • I. F. Akyildiz et al., "A Survey on Sensor Networks, " IEEE Commun. Mag., vol. 40, no. 8, Aug. 2002, pp. 102-114.
    • (2002) IEEE Commun. Mag. , vol.40 , Issue.8 , pp. 102-114
    • Akyildiz, I.F.1
  • 4
    • 14844304757 scopus 로고    scopus 로고
    • C. Lynn, and P. Kruus, TinyPK: Securing sensor networks with public key technology
    • R. Watro et al., "C. Lynn, and P. Kruus, Tiny PK: Securing Sensor Networks with Public Key Technology, " Proc. ACM Workshop Security Ad Hoc Sensor Netw., 2004, pp. 59-64.
    • (2004) Proc. ACM Workshop Security Ad Hoc Sensor Netw. , pp. 59-64
    • Watro, R.1
  • 6
    • 62949130774 scopus 로고    scopus 로고
    • Two-factor user authentication in wireless sensor networks
    • M. L. Das, "Two-Factor User Authentication in Wireless Sensor Networks, " IEEE Trans. Wireless Commun., vol. 8, no. 3, 2009, pp. 1086-1090.
    • (2009) IEEE Trans. Wireless Commun. , vol.8 , Issue.3 , pp. 1086-1090
    • Das, M.L.1
  • 7
    • 39349093196 scopus 로고    scopus 로고
    • An improved dynamic user authentication scheme for wireless sensor networks
    • H. R. Tseng, R. H. Jan, and W. Yang, "An Improved Dynamic User Authentication Scheme for Wireless Sensor Networks, " IEEE Global Telecommun. Conf., 2007, pp. 986-990.
    • (2007) IEEE Global Telecommun. Conf. , pp. 986-990
    • Tseng, H.R.1    Jan, R.H.2    Yang, W.3
  • 8
    • 39049146014 scopus 로고    scopus 로고
    • Defense against outside attacks in wireless sensor networks
    • S. Tripathy and S. Nandi, "Defense Against Outside Attacks in Wireless Sensor Networks, " Computer Commun., vol. 31, no. 4, 2008, pp. 818-826.
    • (2008) Computer Commun. , vol.31 , Issue.4 , pp. 818-826
    • Tripathy, S.1    Nandi, S.2
  • 10
    • 38949096793 scopus 로고    scopus 로고
    • Security improvement on chien Et Al.'s remote user authentication scheme using smart cards
    • X. Duan, J. W. Liu, and Q. Zhang, "Security Improvement on Chien Et Al.'s Remote User Authentication Scheme Using Smart Cards, " IEEE Int. Conf. Computational Intell. Secur., 2006, pp. 1133-1135.
    • (2006) IEEE Int. Conf. Computational Intell. Secur. , pp. 1133-1135
    • Duan, X.1    Liu, J.W.2    Zhang, Q.3
  • 11
    • 68849128250 scopus 로고    scopus 로고
    • Improvement of the secure dynamic ID based remote user authentication scheme for multi-server environment
    • Nov
    • C. H. Han and W. K. Shih, "Improvement of the Secure Dynamic ID Based Remote User Authentication Scheme for Multi-server Environment, " Comput. Stand. Interfaces, vol. 31, no. 6, Nov. 2009, pp. 1118-1123.
    • (2009) Comput. Stand. Interfaces , vol.31 , Issue.6 , pp. 1118-1123
    • Han, C.H.1    Shih, W.K.2
  • 12
    • 71849087704 scopus 로고    scopus 로고
    • Public-key cryptography and password protocols
    • S. Halevi and H. Krawczyk, "Public-Key Cryptography and Password Protocols, " ACM Trans. Inf. Syst. Secur., vol. 2, no. 3, 1999, pp. 230-268.
    • (1999) ACM Trans. Inf. Syst. Secur. , vol.2 , Issue.3 , pp. 230-268
    • Halevi, S.1    Krawczyk, H.2
  • 13
    • 52949137008 scopus 로고    scopus 로고
    • Two-factor mutual authentication based on smart cards and passwords
    • G. Yang et al., "Two-Factor Mutual Authentication Based on Smart Cards and Passwords, " J. Comput. Syst. Sci., vol. 74, no. 7, 2008, pp. 1160-1172.
    • (2008) J. Comput. Syst. Sci. , vol.74 , Issue.7 , pp. 1160-1172
    • Yang, G.1
  • 14
    • 0036302680 scopus 로고    scopus 로고
    • An efficient and practical solution to remote authentication: Smart card
    • H. Y. Chien, J. K. Jan, and Y. M. Tseng, "An Efficient and Practical Solution to Remote Authentication: Smart Card, " Computers & Security, vol. 21, no. 4, 2002, pp. 372-375.
    • (2002) Computers & Security , vol.21 , Issue.4 , pp. 372-375
    • Chien, H.Y.1    Jan, J.K.2    Tseng, Y.M.3
  • 15
    • 0020720357 scopus 로고
    • On the security of public-key protocols
    • D. Dolev and A. C. Yao, "On the Security of Public-Key Protocols, " IEEE Trans. Inform. Theory, vol. 29, no. 2, 1983, pp. 198-208.
    • (1983) IEEE Trans. Inform. Theory , vol.29 , Issue.2 , pp. 198-208
    • Dolev, D.1    Yao, A.C.2
  • 16
    • 59649086399 scopus 로고    scopus 로고
    • Weaknesses and improvements of the yoon-ryu-yoo remote user authentication scheme using smart cards
    • Hsiang and W. K. Shih, "Weaknesses and Improvements of the Yoon-Ryu-Yoo Remote User Authentication Scheme Using Smart Cards, " Computer Commun., vol. 32, no. 4, 2009, pp. 649-652.
    • (2009) Computer Commun. , vol.32 , Issue.4 , pp. 649-652
    • Hsiang1    Shih, W.K.2
  • 18
    • 78049329614 scopus 로고    scopus 로고
    • Security enhancement on an improvement on two remote user authentication schemes using smart cards
    • Accepted, doi:10.1016/j.future.2010.08.007
    • T. H. Chen, H. C. Hsiang, and W. K. Shih, "Security Enhancement on an Improvement on Two Remote User Authentication Schemes Using Smart Cards, " Future Gen. Comput. Syst., Accepted, doi:10.1016/j.future.2010.08.007. 2010.
    • (2010) Future Gen. Comput. Syst.
    • Chen, T.H.1    Hsiang, H.C.2    Shih, W.K.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.