메뉴 건너뛰기




Volumn 7, Issue 8, 2011, Pages 4821-4831

A secure billing service with two-factor user authentication in wireless sensor networks

Author keywords

Billing service; Hash function; Information security; Smart cards; User authentication; Wireless sensor networks

Indexed keywords

AUTHENTICATION SCHEME; BILLING SERVICE; LOW POWER; PASSWORD GUESSING; RESOURCECONSTRAINED DEVICES; USER AUTHENTICATION; USER AUTHENTICATION SCHEME; WIRELESS SENSOR;

EID: 80052436479     PISSN: 13494198     EISSN: None     Source Type: Journal    
DOI: None     Document Type: Article
Times cited : (20)

References (26)
  • 1
    • 62949130774 scopus 로고    scopus 로고
    • Two-factor user authentication in wireless sensor networks
    • M. L. Das, Two-factor user authentication in wireless sensor networks, IEEE Transactions on Wire-less Communications, vol.8, no.3, pp.1086-1090, 2009.
    • (2009) IEEE Transactions On Wire-less Communications , vol.8 , Issue.3 , pp. 1086-1090
    • Das, M.L.1
  • 4
    • 62449290253 scopus 로고    scopus 로고
    • A novel dynamic user authentication scheme for wireless sensor networks
    • L. C. Ko, A novel dynamic user authentication scheme for wireless sensor networks, Proc. of IEEE ISWCS, pp.608-612, 2008.
    • (2008) Proc. of IEEE ISWCS , pp. 608-612
    • Ko, L.C.1
  • 5
    • 33750133438 scopus 로고    scopus 로고
    • Security enhancement on a new authentication scheme with anonymity for wireless environments
    • C. C. Lee, M. S. Hwang and I. E. Liao, Security enhancement on a new authentication scheme with anonymity for wireless environments, IEEE Transactions on Industrial Electronics, vol.53, no.5, pp.1683-1687, 2006.
    • (2006) IEEE Transactions On Industrial Electronics , vol.53 , Issue.5 , pp. 1683-1687
    • Lee, C.C.1    Hwang, M.S.2    Liao, I.E.3
  • 6
    • 46749099079 scopus 로고    scopus 로고
    • A secure and efficient communication scheme with authenticated key establishment and privacy preservation for vehicular ad hoc networks
    • C.-T. Li, M.-S. Hwang and Y.-P. Chu, A secure and efficient communication scheme with authenticated key establishment and privacy preservation for vehicular ad hoc networks, Computer Communications, vol.31, no.12, pp.2803-2814, 2008.
    • (2008) Computer Com- Munications , vol.31 , Issue.12 , pp. 2803-2814
    • Li, C.-T.1    Hwang, M.-S.2    Chu, Y.-P.3
  • 7
    • 44549085989 scopus 로고    scopus 로고
    • An electronic voting protocol with deniable authentication for mobile ad hoc networks
    • C.-T. Li, M.-S. Hwang and C.-Y. Liu, An electronic voting protocol with deniable authentication for mobile ad hoc networks, Computer Communications, vol.31, no.10, pp.2534-2540, 2008.
    • (2008) Computer Communications , vol.31 , Issue.10 , pp. 2534-2540
    • Li, C.-T.1    Hwang, M.-S.2    Liu, C.-Y.3
  • 8
    • 57049115409 scopus 로고    scopus 로고
    • Further improvement on a novel privacy preserving authenti-cation and access control scheme for pervasive computing environments
    • C.-T. Li, M.-S. Hwang and Y.-P. Chu, Further improvement on a novel privacy preserving authenti-cation and access control scheme for pervasive computing environments, Computer Communications, vol.31, no.18, pp.4255-4258, 2008.
    • (2008) Computer Communications , vol.31 , Issue.18 , pp. 4255-4258
    • Li, C.-T.1    Hwang, M.-S.2    Chu, Y.-P.3
  • 9
    • 49549085074 scopus 로고    scopus 로고
    • Improving the security of a secure anonymous routing protocol with authenticated key exchange for ad hoc networks
    • C.-T. Li, M.-S. Hwang and Y.-P. Chu, Improving the security of a secure anonymous routing protocol with authenticated key exchange for ad hoc networks, International Journal of Computer Systems Science and Engineering, vol.23, no.3, pp.227-234, 2008.
    • (2008) International Journal of Computer Systems Science and Engineering , vol.23 , Issue.3 , pp. 227-234
    • Li, C.-T.1    Hwang, M.-S.2    Chu, Y.-P.3
  • 10
    • 69949155644 scopus 로고    scopus 로고
    • An efficient sensor-to-sensor authenticated path-key estab-lishment scheme for secure communications in wireless sensor networks
    • C.-T. Li, M.-S. Hwang and Y.-P. Chu, An efficient sensor-to-sensor authenticated path-key estab-lishment scheme for secure communications in wireless sensor networks, International Journal of Innovative Computing, Information and Control, vol.5, no.8, pp.2107-2124, 2009.
    • (2009) International Journal of Innovative Computing, Information and Control , vol.5 , Issue.8 , pp. 2107-2124
    • Li, C.-T.1    Hwang, M.-S.2    Chu, Y.-P.3
  • 11
    • 70349809938 scopus 로고    scopus 로고
    • Cryptanalysis of threshold password authentication against guessing attacks in ad hoc networks
    • C.-T. Li and Y.-P. Chu, Cryptanalysis of threshold password authentication against guessing attacks in ad hoc networks, International Journal of Network Security, vol.8, no.2, pp.166-168, 2009.
    • (2009) International Journal of Network Security , vol.8 , Issue.2 , pp. 166-168
    • Li, C.-T.1    Chu, Y.-P.2
  • 12
    • 74349090986 scopus 로고    scopus 로고
    • A secure event update protocol for peer-to-peer massively mul-tiplayer online games against masquerade attacks
    • C.-T. Li, C. H. Wei and Y. H. Chin, A secure event update protocol for peer-to-peer massively mul-tiplayer online games against masquerade attacks, International Journal of Innovative Computing, Information and Control, vol.5, no.12(A), pp.4715-4723, 2009.
    • (2009) International Journal of Innovative Computing, Information and Control , vol.5 , Issue.12 , pp. 4715-4723
    • Li, C.-T.1    Wei, C.H.2    Chin, Y.H.3
  • 13
    • 77952997430 scopus 로고    scopus 로고
    • An online biometrics-based secret sharing scheme for multiparty cryptosystem using smart cards
    • C.-T. Li and M.-S. Hwang, An online biometrics-based secret sharing scheme for multiparty cryptosystem using smart cards, International Journal of Innovative Computing, Information and Control, vol.6, no.5, pp.2181-2188, 2010.
    • (2010) International Journal of Innovative Computing, Information and Control , vol.6 , Issue.5 , pp. 2181-2188
    • Li, C.-T.1    Hwang, M.-S.2
  • 14
    • 77952307259 scopus 로고    scopus 로고
    • An efficient and secure communication scheme for trusted computing environments
    • C.-T. Li, An efficient and secure communication scheme for trusted computing environments, Journal of Computers, vol.20, no.3, pp.17-24, 2009.
    • (2009) Journal of Computers , vol.20 , Issue.3 , pp. 17-24
    • Li, C.-T.1
  • 17
    • 70349792182 scopus 로고    scopus 로고
    • An efficient biometrics-based remote user authentication scheme using smart cards
    • C.-T. Li and M.-S. Hwang, An efficient biometrics-based remote user authentication scheme using smart cards, Journal of Network and Computer Applications, vol.33, no.1, pp.1-5, 2010.
    • (2010) Journal of Network and Computer Applications , vol.33 , Issue.1 , pp. 1-5
    • Li, C.-T.1    Hwang, M.-S.2
  • 18
    • 79957680480 scopus 로고    scopus 로고
    • A novel user authentication and privacy preserving scheme with smart cards for wireless communications
    • C.-T. Li and C.-C. Lee, A novel user authentication and privacy preserving scheme with smart cards for wireless communications, Mathematical and Computer Modelling, 2011.
    • (2011) Mathematical and Computer Modelling
    • Li, C.-T.1    Lee, C.-C.2
  • 19
    • 77952308617 scopus 로고    scopus 로고
    • A two-factor user authentication scheme providing mutual authentication and key agreement over insecure channels
    • C.-T. Li, C.-C. Lee and L.-J. Wang, A two-factor user authentication scheme providing mutual authentication and key agreement over insecure channels, Journal of Information Assurance and Security, vol.5, no.2, pp.201-208, 2010.
    • (2010) Journal of Information Assurance and Security , vol.5 , Issue.2 , pp. 201-208
    • Li, C.-T.1    Lee, C.-C.2    Wang, L.-J.3
  • 21
    • 0017930809 scopus 로고
    • A method for obtaining digital signatures and public key cryptosystems
    • R. L. Rivest, A. Shamir and L. Adleman, A method for obtaining digital signatures and public key cryptosystems, Communications of the ACM, vol.21, pp.120-126, 1978.
    • (1978) Communications of the ACM , vol.21 , pp. 120-126
    • Rivest, R.L.1    Shamir, A.2    Adleman, L.3
  • 22
    • 39349093196 scopus 로고    scopus 로고
    • An improved dynamic user authentication scheme for wireless sensor networks
    • H. R. Tseng, R. H. Jan and W. Yang, An improved dynamic user authentication scheme for wireless sensor networks, Proc. of IEEE Globecom, pp.986-990, 2007.
    • (2007) Proc. of IEEE Globecom , pp. 986-990
    • Tseng, H.R.1    Jan, R.H.2    Yang, W.3
  • 25
    • 54949140749 scopus 로고    scopus 로고
    • A secure authentication scheme with anonymity for wireless communications
    • C. C. Wu, W. B. Lee and W. J. Tsaur, A secure authentication scheme with anonymity for wireless communications, IEEE Communicate Letters, vol.12, no.10, pp.722-723, 2008.
    • (2008) IEEE Communicate Letters , vol.12 , Issue.10 , pp. 722-723
    • Wu, C.C.1    Lee, W.B.2    Tsaur, W.J.3
  • 26
    • 63649131787 scopus 로고    scopus 로고
    • On the anonymity of some authentication schemes for wireless communications
    • P. Zeng, Z. Cao, K. K. R. Choo and S. Wang, On the anonymity of some authentication schemes for wireless communications, IEEE Communicate Letters, vol.13, no.3, pp.170-171, 2009.
    • (2009) IEEE Communicate Letters , vol.13 , Issue.3 , pp. 170-171
    • Zeng, P.1    Cao, Z.2    Choo, K.K.R.3    Wang, S.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.