메뉴 건너뛰기




Volumn , Issue , 2012, Pages 124-129

A user authentication-based probabilistic risk approach for wireless sensor networks

Author keywords

authentication; password; Wireless Sensor Networks

Indexed keywords

COMPUTING RESOURCE; DENIAL OF SERVICE ATTACKS; DOS ATTACKS; ENERGY COST; FORGERY ATTACKS; LEGITIMATE USERS; LIMITED ENERGY RESOURCE; LOW POWER; LOW-POWER DEVICES; PASSWORD; PROBABILISTIC RISK; RESOURCE-CONSTRAINED; SECURITY FUNCTIONS; SENSOR DATA; SENSOR NETWORK APPLICATIONS; USER AUTHENTICATION SCHEME; WIRELESS SENSOR NETWORK (WSNS);

EID: 84867049459     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/iCOST.2012.6271279     Document Type: Conference Paper
Times cited : (4)

References (15)
  • 2
    • 84862733493 scopus 로고    scopus 로고
    • A Survey of Access Control Schemes in Wireless Sensor Networks
    • Paris, France, November 2011
    • Y. Faye, I. Niang and T. Noêl. A Survey of Access Control Schemes in Wireless Sensor Networks. World Academy of Science, Engineering and Technology, Issue 59: 2011, Paris, France, Pages 814-823, November 2011.
    • (2011) World Academy of Science, Engineering and Technology , Issue.59 , pp. 814-823
    • Faye, Y.1    Niang, I.2    Noêl, T.3
  • 3
    • 1542647564 scopus 로고    scopus 로고
    • A remote user authentication scheme using smart cards with Forward Secrecy
    • Nov.
    • A. K. Awasthi, and S. Lal, A remote user authentication scheme using smart cards with Forward Secrecy, IEEE Transactions on Consumer Electronics, vol.49, no.4, pp.1246-1248, Nov. 2003.
    • (2003) IEEE Transactions on Consumer Electronics , vol.49 , Issue.4 , pp. 1246-1248
    • Awasthi, A.K.1    Lal, S.2
  • 5
    • 0041698517 scopus 로고    scopus 로고
    • A remote user authentication scheme using hash functions
    • C. C. Lee, L. H. Li, and M. S. Hwang, A remote user authentication scheme using hash functions, ACM Operating Systems Review, vol.36, no.4, pp.23-29, 2002.
    • (2002) ACM Operating Systems Review , vol.36 , Issue.4 , pp. 23-29
    • Lee, C.C.1    Li, L.H.2    Hwang, M.S.3
  • 6
    • 0042196051 scopus 로고    scopus 로고
    • A modified remote user authentication scheme using smart cards
    • May
    • J. J. Shen, C. W. Lin, and M. S. Hwang, A modified remote user authentication scheme using smart cards, IEEE Trans. on Consumer Electron., vol.49, no.2, pp.414-416, May 2003.
    • (2003) IEEE Trans. on Consumer Electron. , vol.49 , Issue.2 , pp. 414-416
    • Shen, J.J.1    Lin, C.W.2    Hwang, M.S.3
  • 7
    • 0034318245 scopus 로고    scopus 로고
    • An Efficient remote user authentication scheme using smart cards
    • Nov.
    • H. M. Sun, An Efficient remote user authentication scheme using smart cards, IEEE Trans. on Consumer Electron., vol. 46, no. 4, pp. 958-961, Nov. 2000.
    • (2000) IEEE Trans. on Consumer Electron. , vol.46 , Issue.4 , pp. 958-961
    • Sun, H.M.1
  • 8
    • 0019634370 scopus 로고
    • Password authentication with insecure communication
    • L. Lamport, Password authentication with insecure communication, Communications of the ACM, vol.24, no.11, pp.770-772, 1981.
    • (1981) Communications of the ACM , vol.24 , Issue.11 , pp. 770-772
    • Lamport, L.1
  • 15
    • 84959038623 scopus 로고    scopus 로고
    • Fast Universal Hashing with Small Keys and No Preprocessing: The PolyR Construction
    • D. Won (Ed.): ICISC 2000, Springer-Verlag Berlin Heidelberg
    • Ted Krovetz, Phillip Rogaway,Fast Universal Hashing with Small Keys and No Preprocessing: The PolyR Construction, D. Won (Ed.): ICISC 2000, LNCS 2015, pp. 73-89, 2001. Springer-Verlag Berlin Heidelberg
    • (2001) LNCS , vol.2015 , pp. 73-89
    • Krovetz, T.1    Rogaway, P.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.