메뉴 건너뛰기




Volumn 11, Issue 5, 2011, Pages 5020-5046

RUASN: A robust user authentication framework for wireless sensor networks

Author keywords

Confidentiality; Session key establishment; User anonymity; User authentication; Wireless sensor network security

Indexed keywords

ARTICLE; COMPUTER NETWORK; COMPUTER SECURITY; INSTRUMENTATION; WIRELESS COMMUNICATION;

EID: 79957718973     PISSN: 14248220     EISSN: None     Source Type: Journal    
DOI: 10.3390/s110505020     Document Type: Article
Times cited : (40)

References (42)
  • 6
    • 79955703585 scopus 로고    scopus 로고
    • TriSec: A secure data framework for wireless sensor networks using authenticated encryption
    • Kumar, P.; Cho, S.; Lee, D.S.; Lee, Y.D.; Lee, H.J. TriSec: A secure data framework for wireless sensor networks using authenticated encryption. Int. J. Marit. Inf. Commun. Sci. 2010, 8, 129-135.
    • (2010) Int. J. Marit. Inf. Commun. Sci. , vol.8 , pp. 129-135
    • Kumar, P.1    Cho, S.2    Lee, D.S.3    Lee, Y.D.4    Lee, H.J.5
  • 7
    • 2942656255 scopus 로고    scopus 로고
    • Secure routing in wireless sensor networks: Attacks and countermeasure
    • Karlof, C.; Wagner, D. Secure routing in wireless sensor networks: Attacks and countermeasure. Ad Hoc Netw. 2003, 293-315.
    • (2003) Ad Hoc Netw , pp. 293-315
    • Karlof, C.1    Wagner, D.2
  • 14
    • 77956388579 scopus 로고    scopus 로고
    • User authentication schemes with pseudonymity for ubiquitous sensor network in NGN
    • Vaidya, B.; Rodrigues, J.J.P.C.; Park, J.H. User authentication schemes with pseudonymity for ubiquitous sensor network in NGN. Int. J. Commun. Syst. 2010, 23, 1201-1222.
    • (2010) Int. J. Commun. Syst. , vol.23 , pp. 1201-1222
    • Vaidya, B.1    Rodrigues, J.J.P.C.2    Park, J.H.3
  • 16
    • 77956376884 scopus 로고    scopus 로고
    • A user authentication scheme with privacy protection for wireless sensor networks
    • Tokyo, Japan, 6-7 August
    • Yoon, S.J.; Lee, H.; Ji, S.B.; Kim, K. A user authentication scheme with privacy protection for wireless sensor networks. In Proceedings of the 2nd Joint Workshop on Information Security, Tokyo, Japan, 6-7 August 2007; pp. 233-244.
    • (2007) Proceedings of the 2nd Joint Workshop on Information Security , pp. 233-244
    • Yoon, S.J.1    Lee, H.2    Ji, S.B.3    Kim, K.4
  • 17
    • 82755189733 scopus 로고    scopus 로고
    • A novel user authentication and privacy preserving scheme with smart cards for wireless communications
    • doi:10.1016/j.mcm.2011.01.010
    • Li, C.T.; Lee, C.C. A novel user authentication and privacy preserving scheme with smart cards for wireless communications. Math. Comput. Modelling 2011, doi:10.1016/j.mcm.2011.01.010.
    • (2011) Math. Comput. Modelling
    • Li, C.T.1    Lee, C.C.2
  • 18
    • 62949130774 scopus 로고    scopus 로고
    • Two-factor user authentication in wireless sensor networks
    • Das, M.L. Two-factor user authentication in wireless sensor networks. IEEE Trans. Wireless Comm. 2009, 8, 1086-1090.
    • (2009) IEEE Trans. Wireless Comm. , vol.8 , pp. 1086-1090
    • Das, M.L.1
  • 20
    • 77955495427 scopus 로고    scopus 로고
    • Cryptanalysis and security improvement of 'two-factor user authentication in wireless sensor networks'
    • Khan, M.K.; Alghathbar, K. Cryptanalysis and security improvement of 'two-factor user authentication in wireless sensor networks'. Sensors 2010, 10, 2450-2459.
    • (2010) Sensors , vol.10 , pp. 2450-2459
    • Khan, M.K.1    Alghathbar, K.2
  • 21
    • 78650459565 scopus 로고    scopus 로고
    • An enhanced two-factor user authentication scheme in wireless sensor networks
    • He, D.; Gao, Y.; Chan, S.; Chen, C.; Bu, J. An enhanced two-factor user authentication scheme in wireless sensor networks. Int. J. Ad-Hoc Sensor Wirel. Netw. 2010, 0, 1-11.
    • (2010) Int. J. Ad-Hoc Sensor Wirel. Netw. , vol.0 , pp. 1-11
    • He, D.1    Gao, Y.2    Chan, S.3    Chen, C.4    Bu, J.5
  • 22
    • 78751648745 scopus 로고    scopus 로고
    • A strong user authentication scheme with smart cards for wireless communications
    • He, D.J.; Mab, M.D.; Zhang, Y.; Chen, C.; Bu, J.J. A strong user authentication scheme with smart cards for wireless communications. Comput. Commun. 2011, 34, 367-374.
    • (2011) Comput. Commun , vol.34 , pp. 367-374
    • He, D.J.1    Mab, M.D.2    Zhang, Y.3    Chen, C.4    Bu, J.J.5
  • 23
    • 84876670486 scopus 로고    scopus 로고
    • RSA. Available Online, accessed on 12 August
    • RSA. Available Online: http://www.rsa.com/node.aspx?id=1156 (accessed on 12 August 2010).
    • (2010)
  • 25
    • 84876690295 scopus 로고    scopus 로고
    • Available Online, accessed on 10 January
    • MICAz. Available Online: http://www.openautomation.net/uploadsproductos/micaz_datasheet.pdf (accessed on 10 January 2010).
    • (2010) MICAz
  • 26
    • 79958054827 scopus 로고    scopus 로고
    • Available Online, accessed on 12 January
    • TelosB Datasheet. Available Online: http://www.willow.co.uk/TelosB_Datasheet.pdf/ (accessed on 12 January 2010).
    • (2010) TelosB Datasheet
  • 27
    • 33748126252 scopus 로고    scopus 로고
    • A password authentication scheme over insecure networks
    • Liao, I.E.; Lee, C.C.; Hwang, M.S. A password authentication scheme over insecure networks. J. Comput. Syst. Sci. 2006, 72, 727-740.
    • (2006) J. Comput. Syst. Sci. , vol.72 , pp. 727-740
    • Liao, I.E.1    Lee, C.C.2    Hwang, M.S.3
  • 29
    • 0017930809 scopus 로고
    • A method for obtaining digital signatures and public-key cryptosystems
    • Rivest, R.L.; Shamir, A.; Adleman, L. A method for obtaining digital signatures and public-key cryptosystems. Comm. ACM 1978, 21, 120-126.
    • (1978) Comm. ACM , vol.21 , pp. 120-126
    • Rivest, R.L.1    Shamir, A.2    Adleman, L.3
  • 30
    • 0009504774 scopus 로고    scopus 로고
    • National Institute of Standards and Technology, US Department of Commerce: Gaithersburg, MD, USA. Available Online, accessed on 9 August
    • National Institute of Standards and Technology, FIPS PUB 180-1, Secure Hash Standard. US Department of Commerce: Gaithersburg, MD, USA. Available Online: http://www.techheap.com/cryptography/hash/fip180-1.pdf/ (accessed on 9 August 2009).
    • (2009) FIPS PUB 180-1, Secure Hash Standard
  • 31
    • 77956946974 scopus 로고    scopus 로고
    • Integrity Regions: Authentication through Presence in Wireless Networks
    • Capkun, S.; Cagalj, M.; Karame, G.; Tippenhauer, N.O. Integrity Regions: Authentication through Presence in Wireless Networks. IEEE Trans. Mob. Comput. 2010, 9, 1608-1621.
    • (2010) IEEE Trans. Mob. Comput , vol.9 , pp. 1608-1621
    • Capkun, S.1    Cagalj, M.2    Karame, G.3    Tippenhauer, N.O.4
  • 33
    • 85032128552 scopus 로고    scopus 로고
    • The security of the cipher block chaining message authentication code
    • Bellare, M.; Kilian, J.; Rogaway, P. The security of the cipher block chaining message authentication code. J. Comput. Syst. Sci. 2000, 61, 362-399.
    • (2000) J. Comput. Syst. Sci. , vol.61 , pp. 362-399
    • Bellare, M.1    Kilian, J.2    Rogaway, P.3
  • 34
    • 78751650849 scopus 로고    scopus 로고
    • Robust one-time password authentication scheme using smart card for home network environment
    • Vaidya, B.; Park, J.H.; Yeo, S.S.; Rodrigues, J.J.P.C. Robust one-time password authentication scheme using smart card for home network environment. Comput. Commun. 2011, 34, 326-336.
    • (2011) Comput. Commun , vol.34 , pp. 326-336
    • Vaidya, B.1    Park, J.H.2    Yeo, S.S.3    Rodrigues, J.J.P.C.4
  • 37
    • 0036566408 scopus 로고    scopus 로고
    • Examining Smart-card security under the threat of Power Analysis attacks
    • Messerges, T.S.; Dabbish, E.A.; Sloan, R.H. Examining Smart-card security under the threat of Power Analysis attacks. IEEE Trans. Comput. 2002, 51, 541-552.
    • (2002) IEEE Trans. Comput. , vol.51 , pp. 541-552
    • Messerges, T.S.1    Dabbish, E.A.2    Sloan, R.H.3
  • 38
    • 52949137008 scopus 로고    scopus 로고
    • Two-factor mutual authentication based on smart card and passwords
    • Yang, G.; Wong, D.S.; Wang, H.; Deng, X. Two-factor mutual authentication based on smart card and passwords. J. Comput. Syst. Sci. 2008, 74, 1160-1172.
    • (2008) J. Comput. Syst. Sci. , vol.74 , pp. 1160-1172
    • Yang, G.1    Wong, D.S.2    Wang, H.3    Deng, X.4
  • 39
  • 40
    • 0142007776 scopus 로고    scopus 로고
    • Cryptanalysis of a variant of peyravian-zunic's password authentication scheme
    • Ku, W.C.; Chen, C.M.; Lee, H.L. Cryptanalysis of a variant of peyravian-zunic's password authentication scheme. IEICE Trans. Commun. 2003, E86-B, 1682-1684.
    • (2003) IEICE Trans. Commun. , vol.E86-B , pp. 1682-1684
    • Ku, W.C.1    Chen, C.M.2    Lee, H.L.3
  • 41
    • 1942423677 scopus 로고    scopus 로고
    • Weaknesses and improvements of an efficient password based remote user authentication scheme using smart cards
    • Ku, W.C.; Chen, S.M. Weaknesses and improvements of an efficient password based remote user authentication scheme using smart cards. IEEE Trans. Consum. Electron. 2004, 50, 204-207.
    • (2004) IEEE Trans. Consum. Electron. , vol.50 , pp. 204-207
    • Ku, W.C.1    Chen, S.M.2
  • 42
    • 59649101587 scopus 로고    scopus 로고
    • Enhanced Authentication scheme with anonymity for roaming service in global mobility networks
    • Chang, C.C.; Lee, C.Y.; Chiu, Y.C. Enhanced Authentication scheme with anonymity for roaming service in global mobility networks. Comput. Commun. 2009, 32, 611-618.
    • (2009) Comput. Commun. , vol.32 , pp. 611-618
    • Chang, C.C.1    Lee, C.Y.2    Chiu, Y.C.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.