메뉴 건너뛰기




Volumn 3, Issue 4, 2011, Pages 117-126

Cryptanalyses of a two-factor user authentication scheme in wireless sensor networks

Author keywords

Authentication; Password; Smart card; Wireless sensor network

Indexed keywords

GATEWAY NODES; HIGHER EFFICIENCY; IMPROVED SCHEME; MUTUAL AUTHENTICATION; NETWORKING ENVIRONMENT; OPEN ENVIRONMENT; PASSWORD; PASSWORD GUESSING ATTACK; SECURITY ISSUES; SECURITY STRENGTHS; STOLEN VERIFIER ATTACK; UNAUTHORIZED USERS; USER AUTHENTICATION; USER AUTHENTICATION SCHEME; WIRELESS SENSOR;

EID: 79958799640     PISSN: 19763700     EISSN: None     Source Type: Journal    
DOI: 10.4156/aiss.vol3.issue4.14     Document Type: Article
Times cited : (9)

References (24)
  • 2
    • 4344643901 scopus 로고    scopus 로고
    • Environmental Sensor Networks
    • K. Martinez, J.K. Hart, R. Ong, "Environmental Sensor Networks", IEEE Comput. vol. 37, no.8, pp.50-56, 2004.
    • (2004) IEEE Comput , vol.37 , Issue.8 , pp. 50-56
    • Martinez, K.1    Hart, J.K.2    Ong, R.3
  • 3
    • 20344401315 scopus 로고    scopus 로고
    • Glacsweb: A Sensor Network for Hostile Environments
    • K. Martinez, R. Ong, J. Hart, "Glacsweb: a Sensor Network for Hostile Environments", In Proc. IEEE SECON 2004, pp. 81-87, 2004.
    • (2004) In Proc. IEEE SECON , vol.2004 , pp. 81-87
    • Martinez, K.1    Ong, R.2    Hart, J.3
  • 7
    • 78549260205 scopus 로고    scopus 로고
    • Common Security Issues and Challenges in Wireless Sensor Networks and IEEE 802.11 Wireless Mesh Networks
    • Tahir Naeem, Kok-Keong Loo, "Common Security Issues and Challenges in Wireless Sensor Networks and IEEE 802.11 Wireless Mesh Networks", JDCTA, vol. 3, no. 1, pp. 88-93, 2009.
    • (2009) JDCTA , vol.3 , Issue.1 , pp. 88-93
    • Naeem, T.1    Loo, K.-K.2
  • 8
    • 78651575800 scopus 로고    scopus 로고
    • High Effect Secure Data Transmission Mechanisms in Wireless Sensor Networks Using ID-Based Key Management Scheme
    • Hua-Yi Lin, "High Effect Secure Data Transmission Mechanisms in Wireless Sensor Networks Using ID-Based Key Management Scheme", JCIT, vol. 4, no. 1, pp. 77-83, 2009.
    • (2009) JCIT , vol.4 , Issue.1 , pp. 77-83
    • Lin, H.-Y.1
  • 9
    • 2942686425 scopus 로고    scopus 로고
    • Sensor Networks: Evolution, Opportunities, and Challenges
    • C.Y Chong, S. Kumar, "Sensor Networks: Evolution, Opportunities, and Challenges", In Proc. IEEE 2003, pp.1247-1256, 2003.
    • (2003) In Proc. IEEE , vol.2003 , pp. 1247-1256
    • Chong, C.Y.1    Kumar, S.2
  • 12
    • 39049146014 scopus 로고    scopus 로고
    • Defense against Outside Attacks in Wireless Sensor Networks
    • S. Tripathy, S. Nandi, "Defense against Outside Attacks in Wireless Sensor Networks", Computer Communications, vol.31, pp.818-826, 2008.
    • (2008) Computer Communications , vol.31 , pp. 818-826
    • Tripathy, S.1    Nandi, S.2
  • 13
    • 39049094066 scopus 로고    scopus 로고
    • IMBAS: Identity-based Multi-user Broadcast Authentication in Wireless Sensor Networks
    • X.F. Cao, W.D. Kou, L.J. Dang, B. Zhao, "IMBAS: Identity-based Multi-user Broadcast Authentication in Wireless Sensor Networks", Computer Communications, vol.31, pp.659-667, 2008.
    • (2008) Computer Communications , vol.31 , pp. 659-667
    • Cao, X.F.1    Kou, W.D.2    Dang, L.J.3    Zhao, B.4
  • 15
    • 39349093196 scopus 로고    scopus 로고
    • An Improved Dynamic User Authentication Scheme For Wireless Sensor Networks
    • Washington, DC, USA
    • H.R. Tseng, R.H. Jan, W. Yang, "An Improved Dynamic User Authentication Scheme for Wireless Sensor Networks", In Proceedings of IEEE Globecom, Washington, DC, USA, pp. 986-990, 2007.
    • (2007) In Proceedings of IEEE Globecom , pp. 986-990
    • Tseng, H.R.1    Jan, R.H.2    Yang, W.3
  • 16
    • 62949130774 scopus 로고    scopus 로고
    • Two-Factor User Authentication in Wireless Sensor Networks
    • M.L. Das, "Two-Factor User Authentication in Wireless Sensor Networks", IEEE Trans. Wireless Comm. 8, pp.1086-1090, 2009.
    • (2009) IEEE Trans. Wireless Comm , vol.8 , pp. 1086-1090
    • Das, M.L.1
  • 17
    • 62449290253 scopus 로고    scopus 로고
    • A Novel Dynamic User Authentication Scheme For Wireless Sensor Networks
    • Reykjavik, Iceland
    • L.C. Ko, "A Novel Dynamic User Authentication Scheme for Wireless Sensor Networks", In Proceedings of IEEE ISWCS, Reykjavik, Iceland, pp. 608-612, 2008.
    • (2008) In Proceedings of IEEE ISWCS , pp. 608-612
    • Ko, L.C.1
  • 18
    • 74049156258 scopus 로고    scopus 로고
    • Robust Dynamic User Authentication Scheme For Wireless AASensor Networks
    • Canary Islands, Spain
    • V. Binod, S.S. Jorge, J.P.C.R. Joel, "Robust Dynamic User Authentication Scheme for Wireless AASensor Networks", In Proceedings of ACM Q2SWinet, Canary Islands, Spain, pp. 88-91, 2009.
    • (2009) In Proceedings of ACM Q2SWinet , pp. 88-91
    • Binod, V.1    Jorge, S.S.2    Joel, J.P.C.R.3
  • 19
    • 0019634370 scopus 로고
    • Password Authentication with Insecure Communication
    • L. Lamport, "Password Authentication with Insecure Communication", Communication of ACM, vol. 24, pp.28-30, 1981.
    • (1981) Communication of ACM , vol.24 , pp. 28-30
    • Lamport, L.1
  • 20
    • 79952424939 scopus 로고    scopus 로고
    • Cryptanalysis of Two ID Based Password Authentication Schemes for Multi-server Environments
    • Zuowen Tan, "Cryptanalysis of Two ID Based Password Authentication Schemes for Multi-server Environments", JDCTA, Vol. 5, No. 1, pp. 87-94, 2011.
    • (2011) JDCTA , vol.5 , Issue.1 , pp. 87-94
    • Tan, Z.1
  • 21
    • 77955495427 scopus 로고    scopus 로고
    • Cryptanalysis and Security Improvements of 'Two-Factor User Authentication in Wireless Sensor Networks'
    • M.K. Khan, K. Alghathbar, "Cryptanalysis and Security Improvements of 'Two-Factor User Authentication in Wireless Sensor Networks'", Sensors, vol.10, pp.2450-2459, 2010.
    • (2010) Sensors , vol.10 , pp. 2450-2459
    • Khan, M.K.1    Alghathbar, K.2
  • 22
    • 0036566408 scopus 로고    scopus 로고
    • Examining Smart-card Security under the Threat of Power Analysis Attacks
    • T.S. Messerges, E.A. Dabbish, R.H. Sloan, "Examining Smart-card Security under the Threat of Power Analysis Attacks", IEEE Transactions on Computers, vol.51, no.5, pp. 541-552,2002.
    • (2002) IEEE Transactions On Computers , vol.51 , Issue.5 , pp. 541-552
    • Messerges, T.S.1    Dabbish, E.A.2    Sloan, R.H.3
  • 23
    • 84939573910 scopus 로고    scopus 로고
    • In Advances in Cryptology-CRYPTO '99, Santa Barbara, California, USA, LN C S, Springer
    • P. Kocher, J. Jaffe, B. Jun, "Differential Power Analysis", In Advances in Cryptology-CRYPTO '99, Santa Barbara, California, USA, LN C S, vol. 1666, Springer, pp. 388-397,1999.
    • (1999) Differential Power Analysis , vol.1666 , pp. 388-397
    • Kocher, P.1    Jaffe, J.2    Jun, B.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.