메뉴 건너뛰기




Volumn 11, Issue 5, 2011, Pages 4767-4779

A secured authentication protocol for wireless sensor networks using Elliptic Curves Cryptography

Author keywords

Authentication; ECC; Security; Wireless sensor network

Indexed keywords

COMPUTER NETWORK; COMPUTER SECURITY; INSTRUMENTATION; REVIEW; WIRELESS COMMUNICATION;

EID: 79957702363     PISSN: 14248220     EISSN: None     Source Type: Journal    
DOI: 10.3390/s110504767     Document Type: Review
Times cited : (337)

References (20)
  • 1
    • 85056041682 scopus 로고    scopus 로고
    • Auerbach Publications; Taylor & Francis Group: Boca Raton, FL, USA
    • E.H. Wireless Sensor Networks, Architectures and Protocols; Auerbach Publications; Taylor & Francis Group: Boca Raton, FL, USA, 2003.
    • (2003) Wireless Sensor Networks, Architectures and Protocols
  • 3
    • 13944269967 scopus 로고    scopus 로고
    • Clock Synchronization for Wireless Sensor Network: A Survey
    • Sundararaman, B.; Buy, U.; Kshemkalyani, A.D. Clock Synchronization for Wireless Sensor Network: A Survey. Ad-Hoc Networks 2005, 3, 281-323.
    • (2005) Ad-Hoc Networks , vol.3 , pp. 281-323
    • Sundararaman, B.1    Buy, U.2    Kshemkalyani, A.D.3
  • 4
    • 4344643901 scopus 로고    scopus 로고
    • Environmental Sensor Networks
    • Martinez, K.; Hart, J.K.; Ong, R. Environmental Sensor Networks. Computer 2004, 37, 50-56.
    • (2004) Computer , vol.37 , pp. 50-56
    • Martinez, K.1    Hart, J.K.2    Ong, R.3
  • 7
    • 1542542636 scopus 로고    scopus 로고
    • Cryptanalysis of a Modified Remote User Authentication Scheme Using Smart Cards
    • Leung, K.C.; Cheng, L.M.; Fong, A.S.; Chan, C.K. Cryptanalysis of a Modified Remote User Authentication Scheme Using Smart Cards. IEEE Trans. Consum. Electron. 2003, 49, 1243-1245.
    • (2003) IEEE Trans. Consum. Electron , vol.49 , pp. 1243-1245
    • Leung, K.C.1    Cheng, L.M.2    Fong, A.S.3    Chan, C.K.4
  • 9
    • 11244354854 scopus 로고    scopus 로고
    • Security considerations for IEEE 802.15.4 networks
    • Philadelphia, PA, USA, October
    • Sastry, N.; Wagner, D. Security Considerations for IEEE 802.15.4 Networks. In Proceedings of ACM Workshop on Wireless Security, Philadelphia, PA, USA, 1 October 2004; pp. 32-42.
    • (2004) Proceedings of ACM Workshop on Wireless Security , vol.1 , pp. 32-42
    • Sastry, N.1    Wagner, D.2
  • 12
    • 62949130774 scopus 로고    scopus 로고
    • Two-Factor User Authentication in Wireless Sensor Networks
    • Das, M.L. Two-Factor User Authentication in Wireless Sensor Networks. IEEE Trans. Wirel. Commun. 2009, 8, 1086-1090.
    • (2009) IEEE Trans. Wirel. Commun , vol.8 , pp. 1086-1090
    • Das, M.L.1
  • 13
    • 39349093196 scopus 로고    scopus 로고
    • An Improved Dynamic User Authentication Scheme for Wireless Sensor Networks
    • Washington, DC, USA, 26-30 November
    • Tseng, H.R.; Jan, R.H.; Yang, W. An Improved Dynamic User Authentication Scheme for Wireless Sensor Networks. In Proceedings of IEEE Globecom, Washington, DC, USA, 26-30 November 2007; pp. 986-990.
    • (2007) Proceedings of IEEE Globecom , pp. 986-990
    • Tseng, H.R.1    Jan, R.H.2    Yang, W.3
  • 15
    • 77955495427 scopus 로고    scopus 로고
    • Cryptanalysis and Security Improvements of 'Two-Factor User Authentication in Wireless Sensor Networks'
    • Khan, M.K.; Alghathbar, K. Cryptanalysis and Security Improvements of 'Two-Factor User Authentication in Wireless Sensor Networks'. Sensors J. 2010, 10, 2450-2459.
    • (2010) Sensors J , vol.10 , pp. 2450-2459
    • Khan, M.K.1    Alghathbar, K.2
  • 16
    • 78049334450 scopus 로고    scopus 로고
    • A Robust Mutual Authentication Protocol for Wireless Sensor Networks
    • Chen, T.H.; Shih, W.K. A Robust Mutual Authentication Protocol for Wireless Sensor Networks. ETRI J. 2010, 32, 704-712.
    • (2010) ETRI J , vol.32 , pp. 704-712
    • Chen, T.H.1    Shih, W.K.2
  • 18
    • 84968503742 scopus 로고
    • Elliptic Curve Cryptosystems
    • Koblitz, N. Elliptic Curve Cryptosystems. Math. Comput. 1987, 48, 203-209.
    • (1987) Math. Comput , vol.48 , pp. 203-209
    • Koblitz, N.1
  • 19
    • 85015402934 scopus 로고
    • Use of Elliptic Curves in Cryptography
    • LNCS Cryptography Volume; Springer: Berlin/Heidelberg, Germany
    • Miller, V.S. Use of Elliptic Curves in Cryptography. In Advances in Cryptology-CRYPTO '85: Proceedings; LNCS Cryptography Volume; Springer: Berlin/Heidelberg, Germany, 1986; p. 417.
    • (1986) Advances in Cryptology-CRYPTO '85: Proceedings , pp. 417
    • Miller, V.S.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.