메뉴 건너뛰기




Volumn 12, Issue 7, 2011, Pages 550-560

An efficient and DoS-resistant user authentication scheme for two-tiered wireless sensor networks

Author keywords

Smart card; Two tiered; User anonymity; User authentication; Wireless sensor network (WSN)

Indexed keywords

CLEVER DESIGNS; COMPUTATIONAL LOADS; DENIAL OF SERVICE; EXCLUSIVE-OR; ONE WAY HASH FUNCTIONS; REQUEST MESSAGES; RESOURCE CONSTRAINT; SECURITY AND PERFORMANCE; SECURITY ATTACKS; SIMPLE OPERATION; TWO-TIERED; USER ANONYMITY; USER AUTHENTICATION; USER AUTHENTICATION SCHEME; WIRELESS SENSOR; TWO TIERED ARCHITECTURES; TWO-TIERED WIRELESS SENSOR NETWORKS; WIRELESS SENSOR NETWORK (WSNS);

EID: 79960062320     PISSN: 18691951     EISSN: 1869196X     Source Type: Journal    
DOI: 10.1631/jzus.C1000377     Document Type: Article
Times cited : (52)

References (36)
  • 1
    • 33751197641 scopus 로고    scopus 로고
    • Comment on a dynamic ID-based remote user authentication scheme
    • A. Awasthi 2004 Comment on a dynamic ID-based remote user authentication scheme Trans. Cryptol. 1 2 15 17
    • (2004) Trans. Cryptol. , vol.1 , Issue.2 , pp. 15-17
    • Awasthi, A.1
  • 2
    • 4043089982 scopus 로고    scopus 로고
    • An enhanced remote user authentication scheme using smart cards
    • 10.1109/TCE.2004.1309430
    • A. Awasthi S. Lal 2004 An enhanced remote user authentication scheme using smart cards IEEE Trans. Consum. Electron. 50 2 583 586 10.1109/TCE.2004.1309430
    • (2004) IEEE Trans. Consum. Electron. , vol.50 , Issue.2 , pp. 583-586
    • Awasthi, A.1    Lal, S.2
  • 4
    • 0026153410 scopus 로고
    • Remote password authentication with smart cards
    • 10.1049/ip-e.1991.0022
    • C.C. Chang T.C. Wu 1991 Remote password authentication with smart cards IEE Proc. E Comput. Digit. Tech. 138 3 165 168 10.1049/ip-e.1991.0022
    • (1991) IEe Proc. e Comput. Digit. Tech. , vol.138 , Issue.3 , pp. 165-168
    • Chang, C.C.1    Wu, T.C.2
  • 5
    • 62949130774 scopus 로고    scopus 로고
    • Two-factor user authentication in wireless sensor networks
    • 10.1109/TWC.2008.080128
    • M.L. Das 2009 Two-factor user authentication in wireless sensor networks IEEE Trans. Wirel. Commun. 8 3 1086 1090 10.1109/TWC.2008.080128
    • (2009) IEEE Trans. Wirel. Commun. , vol.8 , Issue.3 , pp. 1086-1090
    • Das, M.L.1
  • 6
    • 4043122631 scopus 로고    scopus 로고
    • A dynamic IDbased remote user authentication scheme
    • 10.1109/TCE.2004.1309441
    • M.L. Das A. Saxena V.P. Gulati 2004 A dynamic IDbased remote user authentication scheme IEEE Trans. Consum. Electron. 50 2 629 631 10.1109/TCE.2004.1309441
    • (2004) IEEE Trans. Consum. Electron. , vol.50 , Issue.2 , pp. 629-631
    • Das, M.L.1    Saxena, A.2    Gulati, V.P.3
  • 9
    • 0020720357 scopus 로고
    • On the security of public key protocols
    • 0502.94005 10.1109/TIT.1983.1056650
    • D. Dolev A. Yao 1983 On the security of public key protocols IEEE Trans. Inform. Theory 29 2 198 208 0502.94005 10.1109/TIT.1983.1056650
    • (1983) IEEE Trans. Inform. Theory , vol.29 , Issue.2 , pp. 198-208
    • Dolev, D.1    Yao, A.2
  • 12
    • 28044451335 scopus 로고    scopus 로고
    • Robust remote authentication scheme with smart cards
    • DOI 10.1016/j.cose.2005.03.006, PII S0167404805000477
    • C.I. Fan Y.C. Chan Z.K. Zhang 2005 Robust remote authentication scheme with smart cards Comput. & Secur. 24 8 619 628 10.1016/j.cose.2005.03.006 (Pubitemid 41690975)
    • (2005) Computers and Security , vol.24 , Issue.8 , pp. 619-628
    • Fan, C.-I.1    Chan, Y.-C.2    Zhang, Z.-K.3
  • 14
    • 67649354423 scopus 로고    scopus 로고
    • Design and verification of enhanced secure localization scheme in wireless sensor networks
    • 10.1109/TPDS.2008.166
    • D.J. He L. Cui H. Huang M. Ma 2009 Design and verification of enhanced secure localization scheme in wireless sensor networks IEEE Trans. Parall. Distr. Syst. 20 7 1050 1058 10.1109/TPDS.2008.166
    • (2009) IEEE Trans. Parall. Distr. Syst. , vol.20 , Issue.7 , pp. 1050-1058
    • He, D.J.1    Cui, L.2    Huang, H.3    Ma, M.4
  • 15
    • 78650459565 scopus 로고    scopus 로고
    • An enhanced two-factor user authentication scheme in wireless sensor networks
    • D.J. He Y. Gao S. Chan C. Chen J.J. Bu 2010 An enhanced two-factor user authentication scheme in wireless sensor networks Int. J. Ad Hoc Sensor Wirel. Networks 10 4 361 371
    • (2010) Int. J. Ad Hoc Sensor Wirel. Networks , vol.10 , Issue.4 , pp. 361-371
    • He, D.J.1    Gao, Y.2    Chan, S.3    Chen, C.4    Bu, J.J.5
  • 16
    • 78751648745 scopus 로고    scopus 로고
    • A strong user authentication scheme with smart cards for wireless communications
    • 10.1016/j.comcom.2010.02.031
    • D.J. He M. Ma Y. Zhang C. Chen J.J. Bu 2011 A strong user authentication scheme with smart cards for wireless communications Comput. Commun. 34 3 367 374 10.1016/j.comcom.2010.02.031
    • (2011) Comput. Commun. , vol.34 , Issue.3 , pp. 367-374
    • He, D.J.1    Ma, M.2    Zhang, Y.3    Chen, C.4    Bu, J.J.5
  • 17
    • 68849128250 scopus 로고    scopus 로고
    • Improvement of the secure dynamic ID based remote user authentication scheme for multi-server environment
    • 10.1016/j.csi.2008.11.002
    • H.C. Hsiang W.K. Shih 2009 Improvement of the secure dynamic ID based remote user authentication scheme for multi-server environment Comput. Stand. Interfaces 31 6 1118 1123 10.1016/j.csi.2008.11.002
    • (2009) Comput. Stand. Interfaces , vol.31 , Issue.6 , pp. 1118-1123
    • Hsiang, H.C.1    Shih, W.K.2
  • 18
    • 0034140374 scopus 로고    scopus 로고
    • New remote user authentication scheme using smart cards
    • DOI 10.1109/30.826377
    • M.S. Hwang L.H. Li 2000 A new remote user authentication scheme using smart cards IEEE Trans. Consum. Electron. 46 1 28 30 10.1109/30.826377 (Pubitemid 30582655)
    • (2000) IEEE Transactions on Consumer Electronics , vol.46 , Issue.1 , pp. 28-30
    • Hwang Min-Shiang1    Li Li-Hua2
  • 19
    • 36749002169 scopus 로고    scopus 로고
    • Mutual authentication and key exchange protocols for roaming services in wireless mobile networks
    • 10.1109/TWC.2006.05063
    • Y. Jiang C. Lin X. Shen M. Shi 2006 Mutual authentication and key exchange protocols for roaming services in wireless mobile networks IEEE Trans. Wirel. Commun. 5 9 2569 2577 10.1109/TWC.2006.05063
    • (2006) IEEE Trans. Wirel. Commun. , vol.5 , Issue.9 , pp. 2569-2577
    • Jiang, Y.1    Lin, C.2    Shen, X.3    Shi, M.4
  • 20
    • 11244264140 scopus 로고    scopus 로고
    • SeRLoc: Secure range-independent localization for wireless sensor networks
    • Proceedings of the 2004 ACM Workshop on Wireless Security, WiSe
    • Lazos, L.; Poovendran, R.; 2004. SeRLoc: Secure Range-Independent Localization for Wireless Sensor Networks. Proc. 3rd ACM Workshop on Wireless Security, p.21-30. [doi:10.1145/1023646.1023650] (Pubitemid 40062792)
    • (2004) Proceedings of the 2004 ACM Workshop on Wireless Security, WiSe , pp. 21-30
    • Lazos, L.1    Poovendran, R.2
  • 21
    • 33750133438 scopus 로고    scopus 로고
    • Security enhancement on a new authentication scheme with anonymity for wireless environments
    • DOI 10.1109/TIE.2006.881998
    • C.C. Lee M.S. Hwang I.E. Liao 2006 Security enhancement on a new authentication scheme with anonymity for wireless environments IEEE Trans. Ind. Electron. 53 5 1683 1687 10.1109/TIE.2006.881998 (Pubitemid 44593519)
    • (2006) IEEE Transactions on Industrial Electronics , vol.53 , Issue.5 , pp. 1683-1687
    • Lee, C.-C.1    Hwang, M.-S.2    Liao, I.-E.3
  • 23
    • 67649184080 scopus 로고    scopus 로고
    • Security flaw of authentication scheme with anonymity for wireless communications
    • 10.1109/LCOMM.2009.090074
    • J.S. Lee J.H. Chang D.H. Lee 2009 Security flaw of authentication scheme with anonymity for wireless communications IEEE Commun. Lett. 13 5 292 293 10.1109/LCOMM.2009.090074
    • (2009) IEEE Commun. Lett. , vol.13 , Issue.5 , pp. 292-293
    • Lee, J.S.1    Chang, J.H.2    Lee, D.H.3
  • 24
    • 54449094667 scopus 로고    scopus 로고
    • A secure dynamic ID based remote user authentication scheme for multi-server environment
    • 10.1016/j.csi.2007.10.007
    • Y.P. Liao S.S. Wang 2009 A secure dynamic ID based remote user authentication scheme for multi-server environment Comput. Stand. Interfaces 31 1 24 29 10.1016/j.csi.2007.10.007
    • (2009) Comput. Stand. Interfaces , vol.31 , Issue.1 , pp. 24-29
    • Liao, Y.P.1    Wang, S.S.2
  • 26
    • 41449098948 scopus 로고    scopus 로고
    • LEDS: Providing location-aware end-to-end data security in wireless sensor networks
    • DOI 10.1109/TMC.2007.70753, 4358997
    • K. Ren W. Lou Y. Zhang 2008 LEDS: providing location-aware end-to-end data security in wireless sensor networks IEEE Trans. Mob. Comput. 7 5 585 598 10.1109/TMC.2007.70753 (Pubitemid 351454006)
    • (2008) IEEE Transactions on Mobile Computing , vol.7 , Issue.5 , pp. 585-598
    • Ren, K.1    Lou, W.2    Zhang, Y.3
  • 27
    • 70349690087 scopus 로고    scopus 로고
    • Secure Range Queries in Tiered Sensor Networks
    • [doi:10.1109/INFCOM.2009.5062005]
    • Shi, J.; Zhang, R.; Zhang, Y.; 2009. Secure Range Queries in Tiered Sensor Networks. IEEE INFOCOM, p.945-953. [doi:10.1109/INFCOM.2009.5062005]
    • (2009) IEEE INFOCOM , pp. 945-953
    • Shi, J.1    Zhang, R.2    Zhang, Y.3
  • 28
    • 49849096355 scopus 로고    scopus 로고
    • Efficient multi-server authentication scheme based on one-way hash function without verification table
    • 10.1016/j.cose.2008.04.001
    • J.L. Tsai 2008 Efficient multi-server authentication scheme based on one-way hash function without verification table Comput. & Secur. 27 3-4 115 121 10.1016/j.cose.2008.04.001
    • (2008) Comput. & Secur. , vol.27 , Issue.34 , pp. 115-121
    • Tsai, J.L.1
  • 30
    • 54949140749 scopus 로고    scopus 로고
    • A secure authentication scheme with anonymity for wireless communications
    • 10.1109/LCOMM.2008.080283
    • C.C. Wu W.B. Lee W.J. Tsaur 2008 A secure authentication scheme with anonymity for wireless communications IEEE Commun. Lett. 12 10 722 723 10.1109/LCOMM.2008.080283
    • (2008) IEEE Commun. Lett. , vol.12 , Issue.10 , pp. 722-723
    • Wu, C.C.1    Lee, W.B.2    Tsaur, W.J.3
  • 31
    • 68949149518 scopus 로고    scopus 로고
    • Security flaws in authentication protocols with anonymity for wireless environments
    • 10.4218/etrij.09.0209.0026
    • J. Xu D. Feng 2009 Security flaws in authentication protocols with anonymity for wireless environments ETRI J. 31 4 460 462 10.4218/etrij.09.0209. 0026
    • (2009) ETRI J. , vol.31 , Issue.4 , pp. 460-462
    • Xu, J.1    Feng, D.2
  • 32
    • 63649131787 scopus 로고    scopus 로고
    • On the anonymity of some authentication schemes for wireless communications
    • 10.1109/LCOMM.2009.081821
    • P. Zeng Z. Cao K.K. Choo S. Wang 2009 On the anonymity of some authentication schemes for wireless communications IEEE Commun. Lett. 13 3 170 171 10.1109/LCOMM.2009.081821
    • (2009) IEEE Commun. Lett. , vol.13 , Issue.3 , pp. 170-171
    • Zeng, P.1    Cao, Z.2    Choo, K.K.3    Wang, S.4
  • 34
    • 33947309703 scopus 로고    scopus 로고
    • Secure localization and authentication in ultra-wideband sensor networks
    • DOI 10.1109/JSAC.2005.863855
    • Y. Zhang W. Liu Y. Fang D. Wu 2006 Secure localization and authentication in ultra-wideband sensor networks IEEE J. Sel. Areas Commun. 24 4 829 835 10.1109/JSAC.2005.863855 (Pubitemid 46438080)
    • (2006) IEEE Journal on Selected Areas in Communications , vol.24 , Issue.4 , pp. 829-835
    • Zhang, Y.1    Liu, W.2    Fang, Y.3    Wu, D.4
  • 35
    • 34547411877 scopus 로고    scopus 로고
    • A two-layer key establishment scheme for wireless sensor networks
    • DOI 10.1109/TMC.2007.1008
    • Y. Zhou Y. Fang 2007 A two-layer key establishment scheme for wireless sensor networks IEEE Trans. Mob. Comput. 6 9 1009 1020 10.1109/TMC.2007.1008 (Pubitemid 47171282)
    • (2007) IEEE Transactions on Mobile Computing , vol.6 , Issue.9 , pp. 1009-1020
    • Zhou, Y.1    Fang, Y.2
  • 36
    • 33750012404 scopus 로고    scopus 로고
    • Access control in wireless sensor networks
    • DOI 10.1016/j.adhoc.2006.05.014, PII S1570870506000497, Security Issues in Sensor and Ad Hoc Networks
    • Y. Zhou Y. Zhang Y. Fang 2007 Access control in wireless sensor networks Ad Hoc Networks 5 1 3 13 10.1016/j.adhoc.2006.05.014 (Pubitemid 44573007)
    • (2007) Ad Hoc Networks , vol.5 , Issue.1 , pp. 3-13
    • Zhou, Y.1    Zhang, Y.2    Fang, Y.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.