메뉴 건너뛰기




Volumn 35, Issue 5, 2012, Pages 1646-1656

A dynamic password-based user authentication scheme for hierarchical wireless sensor networks

Author keywords

Hash function; Passwords; Smart cards; User authentication; Wireless security; Wireless sensor networks

Indexed keywords

CRITICAL APPLICATIONS; DYNAMIC NODES; GATEWAY NODES; PASSWORDS; REAL-TIME DATA; USER AUTHENTICATION; USER AUTHENTICATION SCHEME; WIRELESS SECURITY;

EID: 84862762845     PISSN: 10848045     EISSN: 10958592     Source Type: Journal    
DOI: 10.1016/j.jnca.2012.03.011     Document Type: Article
Times cited : (214)

References (31)
  • 1
    • 84862759080 scopus 로고    scopus 로고
    • Advanced Encryption Standard (AES). FIPS PUB 197, National Institute of Standards and Technology (NIST), U.S. Department of Commerce; November
    • Advanced Encryption Standard (AES). FIPS PUB 197, National Institute of Standards and Technology (NIST), U.S. Department of Commerce; November 2001. 〈 http://csrc.nist.gov/publications/fips/fips197/fips-197.pdf 〉.
    • (2001)
  • 2
    • 0037086890 scopus 로고    scopus 로고
    • Wireless sensor networks: A survey
    • DOI 10.1016/S1389-1286(01)00302-4, PII S1389128601003024
    • I.F. Akyildiz, W. Su, Y. Sankarasubramaniam, and E. Cayirci Wireless sensor networks: a survey Computer Networks 38 4 2002 393 422 (Pubitemid 34181630)
    • (2002) Computer Networks , vol.38 , Issue.4 , pp. 393-422
    • Akyildiz, I.F.1    Su, W.2    Sankarasubramaniam, Y.3    Cayirci, E.4
  • 3
    • 0038487088 scopus 로고    scopus 로고
    • Random key predistribution schemes for sensor networks
    • Berkeley, California
    • Chan H, Perrig A, Song D. Random key predistribution schemes for sensor networks. In: IEEE symposium on security and privacy, Berkeley, California; 2003. p. 197-213.
    • (2003) IEEE Symposium on Security and Privacy , pp. 197-213
    • Chan, H.1    Perrig, A.2    Song, D.3
  • 4
    • 78049334450 scopus 로고    scopus 로고
    • A robust mutual authentication protocol for wireless sensor networks
    • T.-H. Chen, and W.-K. Shih A robust mutual authentication protocol for wireless sensor networks ETRI Journal 32 5 2010 704 712
    • (2010) ETRI Journal , vol.32 , Issue.5 , pp. 704-712
    • Chen, T.-H.1    Shih, W.-K.2
  • 5
    • 33750111807 scopus 로고    scopus 로고
    • An improved key distribution mechanism for large-scale hierarchical wireless sensor networks
    • DOI 10.1016/j.adhoc.2006.05.011, PII S157087050600045X, Security Issues in Sensor and Ad Hoc Networks
    • Y. Cheng, and D.P. Agrawal An improved key distribution mechanism for large-scale hierarchical wireless sensor networks Ad Hoc Networks 5 1 2007 35 48 (Pubitemid 44592580)
    • (2007) Ad Hoc Networks , vol.5 , Issue.1 , pp. 35-48
    • Cheng, Y.1    Agrawal, D.P.2
  • 6
    • 0013044825 scopus 로고    scopus 로고
    • Crossbow Technology Inc. Accessed on September
    • Crossbow Technology Inc. 2011. Wireless sensor networks, 〈 http://www.xbow.com 〉 Accessed on September.
    • (2011) Wireless Sensor Networks
  • 10
    • 62949130774 scopus 로고    scopus 로고
    • Two-factor user authentication in wireless sensor networks
    • M.L. Das Two-factor user authentication in wireless sensor networks IEEE Transactions on Wireless Communications 8 3 2009 1086 1090
    • (2009) IEEE Transactions on Wireless Communications , vol.8 , Issue.3 , pp. 1086-1090
    • Das, M.L.1
  • 16
    • 78650459565 scopus 로고    scopus 로고
    • An enhanced two-factor user authentication scheme in wireless sensor networks
    • D. He, Y. Gao, S. Chan, C. Chen, and J. Bu An enhanced two-factor user authentication scheme in wireless sensor networks Ad Hoc & Sensor Wireless Networks 10 4 2010
    • (2010) Ad Hoc & Sensor Wireless Networks , vol.10 , Issue.4
    • He, D.1    Gao, Y.2    Chan, S.3    Chen, C.4    Bu, J.5
  • 18
    • 77955495427 scopus 로고    scopus 로고
    • Cryptanalysis and security improvements of two-factor user authentication in wireless sensor networks
    • M.K. Khan, and K. Alghathbar Cryptanalysis and security improvements of two-factor user authentication in wireless sensor networks Sensors 10 2010 2450 2459
    • (2010) Sensors , vol.10 , pp. 2450-2459
    • Khan, M.K.1    Alghathbar, K.2
  • 20
    • 84862773089 scopus 로고    scopus 로고
    • Improvement of Dass two-factor authentication protocol in wireless sensor networks
    • Report 2009/631
    • Nyang DH, Lee M-K. Improvement of Dass two-factor authentication protocol in wireless sensor networks. In: Cryptology ePrint Archive. Report 2009/631; 2009.
    • (2009) Cryptology EPrint Archive
    • Nyang, D.H.1    Lee, M.-K.2
  • 21
    • 27544460282 scopus 로고    scopus 로고
    • Distributed detection of node replication attacks in sensor networks
    • Proceedings - 2005 IEEE Symposium on Security and Privacy, IEEE S and P 2005
    • Parno B, Perrig A, Gligor V. Distributed detection of node replication attacks in sensor networks. In: IEEE symposium on security and privacy; 8-11 May 2005. p. 49-63. (Pubitemid 41543646)
    • (2005) Proceedings - IEEE Symposium on Security and Privacy , pp. 49-63
    • Parno, B.1    Perrig, A.2    Gligor, V.3
  • 22
    • 0017930809 scopus 로고
    • A method for obtaining digital signatures and public-key cryptosystems
    • DOI 10.1145/359340.359342
    • R.L. Rivest, A. Shamir, and L.M. Adleman A method for obtaining digital signatures and public-key cryptosystems Communications of the ACM 21 1978 120 126 (Pubitemid 8591219)
    • (1978) Communications of the ACM , vol.21 , Issue.2 , pp. 120-126
    • Rivest, R.L.1    Shamir, A.2    Adleman, L.M.3
  • 23
    • 0003629991 scopus 로고
    • FIPS PUB 180-1, National Institute of Standards and Technology (NIST), U.S. Department of Commerce; April
    • Secure hash standard. FIPS PUB 180-1, National Institute of Standards and Technology (NIST), U.S. Department of Commerce; April 1995.
    • (1995) Secure Hash Standard
  • 24
    • 84862757576 scopus 로고    scopus 로고
    • Sun SPOT Accessed on September
    • Sun SPOT. 2011. Wireless sensor networks and beyond. 〈 http://www.sunspotworld.com 〉 Accessed on September.
    • (2011) Wireless Sensor Networks and beyond
  • 29
    • 77952339469 scopus 로고    scopus 로고
    • A biometric-based user authentication for wireless sensor networks
    • J. Yuan, C. Jiang, and Z. Jiang A biometric-based user authentication for wireless sensor networks Wuhan University Journal of Natural Sciences 15 3 2010 272 276
    • (2010) Wuhan University Journal of Natural Sciences , vol.15 , Issue.3 , pp. 272-276
    • Yuan, J.1    Jiang, C.2    Jiang, Z.3
  • 30
    • 77952973912 scopus 로고    scopus 로고
    • Localized multicast: Efficient and distributed replica detection in large-scale sensor networks
    • B. Zhu, S. Setia, S. Jajodia, S. Roy, and L. Wang Localized multicast: efficient and distributed replica detection in large-scale sensor networks IEEE Transactions on Mobile Computing 9 7 2010 913 926
    • (2010) IEEE Transactions on Mobile Computing , vol.9 , Issue.7 , pp. 913-926
    • Zhu, B.1    Setia, S.2    Jajodia, S.3    Roy, S.4    Wang, L.5


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.