메뉴 건너뛰기




Volumn 9, Issue 10, 2012, Pages 103-111

Security enhancement of robust user authentication framework for wireless sensor networks

Author keywords

Anonymity; Authentication; Smart card; Untraceabiliy; WSNs

Indexed keywords


EID: 84872473654     PISSN: 16735447     EISSN: None     Source Type: Journal    
DOI: None     Document Type: Article
Times cited : (20)

References (22)
  • 1
    • 80051956974 scopus 로고    scopus 로고
    • Smart home based on wireless sensor-actuator networks
    • SUN Yan, CHEN Qiang, LUO Hong. Smart home based on wireless sensor-actuator networks [J]. China Communications, 2011, 8(1): 102-109.
    • (2011) China Communications , vol.8 , Issue.1 , pp. 102-109
    • Sun, Y.1    Chen, Q.2    Luo, H.3
  • 2
    • 84855481512 scopus 로고    scopus 로고
    • Improved implementation and evaluation of wireless sensor networks in intelligent building
    • DUAN Junqi, ZHANG Sidong, ZHENG Tao. Improved implementation and evaluation of wireless sensor networks in intelligent building [J]. China Communications, 2011, 8(8): 64-71.
    • (2011) China Communications , vol.8 , Issue.8 , pp. 64-71
    • Duan, J.1    Zhang, S.2    Zheng, T.3
  • 3
    • 77956022266 scopus 로고    scopus 로고
    • Dynamic cluster key management scheme on wireless sensor networks
    • PEI Qingqi, LI Hongning, PANG Liaojun, et al. Dynamic cluster key management scheme on wireless sensor networks[J]. China Communications, 2010, 7(1): 73-79.
    • (2010) China Communications , vol.7 , Issue.1 , pp. 73-79
    • Pei, Q.1    Li, H.2    Pang, L.3
  • 4
    • 80052006487 scopus 로고    scopus 로고
    • An authenticated dynamic key management scheme for clustered sensor networks
    • ZHOU Yajian, PAN Anwei, LI Jiguo. An authenticated dynamic key management scheme for clustered sensor networks[J]. China Communications, 2010, 7(4): 7-17.
    • (2010) China Communications , vol.7 , Issue.4 , pp. 7-17
    • Zhou, Y.1    Pan, A.2    Li, J.3
  • 5
    • 62949130774 scopus 로고    scopus 로고
    • Two-factor user authentication in wireless sensor networks
    • DAS M. Two-factor user authentication in wireless sensor networks[J]. IEEE Transactions on Wireless Communications, 2009, 8(3): 1086-1090.
    • (2009) IEEE Transactions on Wireless Communications , vol.8 , Issue.3 , pp. 1086-1090
    • Das, M.1
  • 6
    • 79955690469 scopus 로고    scopus 로고
    • Improvement of das's two-factor authentication protocol in wireless sensor networks
    • NYANG D, LEE M. Improvement of das's two-factor authentication protocol in wireless sensor networks [EB/OL]. http://eprint.iacr.org/2009/631.pdf.
    • Nyang, D.1    Lee, M.2
  • 7
    • 78650459565 scopus 로고    scopus 로고
    • An enhanced two-factor user authentication scheme in wireless sensor networks
    • HE Daojing, GAO Yi, CHAN S, et al. An enhanced two-factor user authentication scheme in wireless sensor networks [J]. International Journal Ad Hoc Sensor Wireless Network, 2010, 10(4): 361-371.
    • (2010) International Journal Ad Hoc Sensor Wireless Network , vol.10 , Issue.4 , pp. 361-371
    • He, D.1    Gao, Y.2    Chan, S.3
  • 8
    • 78049334450 scopus 로고    scopus 로고
    • A robust mutual authentication protocol for wireless sensor networks
    • CHEN T, SHIH W. A robust mutual authentication protocol for wireless sensor networks[J]. ETRI Journal, 2010, 32(5): 704-712.
    • (2010) ETRI Journal , vol.32 , Issue.5 , pp. 704-712
    • Chen, T.1    Shih, W.2
  • 9
    • 77955495427 scopus 로고    scopus 로고
    • Cryptanalysis and security improvements of two-factor user authentication in wireless sensor networks
    • KHAN M, ALGHATHBAR K. Cryptanalysis and security improvements of two-factor user authentication in wireless sensor networks[J]. Sensors, 2010, 10(3): 2450-2459.
    • (2010) Sensors , vol.10 , Issue.3 , pp. 2450-2459
    • Khan, M.1    Alghathbar, K.2
  • 10
    • 79958799640 scopus 로고    scopus 로고
    • Cryptanalysis of a two-factor user authentication scheme in wireless sensor networks
    • TAN Z. Cryptanalysis of a two-factor user authentication scheme in wireless sensor networks[J]. Advances in Information Sciences and Service Sciences, 2011, 3(4): 117-126.
    • (2011) Advances in Information Sciences and Service Sciences , vol.3 , Issue.4 , pp. 117-126
    • Tan, Z.1
  • 11
    • 79957702363 scopus 로고    scopus 로고
    • A secured authentication protocol for wireless sensor networks using elliptic curves cryptography
    • YEH H, CHEN T, LIU P, et al. A secured authentication protocol for wireless sensor networks using elliptic curves cryptography[J]. Sensors, 2011, 11(5): 4767-4779.
    • (2011) Sensors , vol.11 , Issue.5 , pp. 4767-4779
    • Yeh, H.1    Chen, T.2    Liu, P.3
  • 12
    • 80052427734 scopus 로고    scopus 로고
    • Cryptanalysis on two user authentication protocols using smart card or wireless sensor networks
    • June 20-22, 2011, London, UK. IEEE Press
    • KUMAR P, LEE H. Cryptanalysis on two user authentication protocols using smart card or wireless sensor networks [C]//Proceedings of the IEEE Wireless Advanced: June 20-22, 2011, London, UK. IEEE Press, 2011: 241-245.
    • (2011) Proceedings of the IEEE Wireless Advanced , pp. 241-245
    • Kumar, P.1    Lee, H.2
  • 13
    • 79957718973 scopus 로고    scopus 로고
    • RUASN: A robust user authentication framework for wireless sensor networks
    • KUMAR P, CHOUDHURY A, SAIN M, et al. RUASN: A robust user authentication framework for wireless sensor networks[J]. Sensors, 2011, 11(5): 5020-5046.
    • (2011) Sensors , vol.11 , Issue.5 , pp. 5020-5046
    • Kumar, P.1    Choudhury, A.2    Sain, M.3
  • 15
    • 0036566408 scopus 로고    scopus 로고
    • Examining smart card security under the threat of power analysis attacks
    • MESSERGES T, DABBISH E A, SLOAN R. Examining smart card security under the threat of power analysis attacks[J]. IEEE Transactions on Computers, 2002, 51(5): 541-552.
    • (2002) IEEE Transactions on Computers , vol.51 , Issue.5 , pp. 541-552
    • Messerges, T.1    Dabbish, E.A.2    Sloan, R.3
  • 17
    • 52949137008 scopus 로고    scopus 로고
    • Two-factor mutual authentication based on smart cards and passwords
    • YANG Guomin, WONG D, WANG Huaxiong, et al. Two-factor mutual authentication based on smart cards and passwords[J]. Journal of Computer and System Sciences, 2008, 74(7): 1160-1172.
    • (2008) Journal of Computer and System Sciences , vol.74 , Issue.7 , pp. 1160-1172
    • Yang, G.1    Wong, D.2    Wang, H.3
  • 18
    • 84863056589 scopus 로고    scopus 로고
    • Robust smart-cards-based user authentication scheme with user anonymity
    • WU Shuhua, ZHU Yuefei, PU Qiong. Robust smart-cards-based user authentication scheme with user anonymity[J]. Security and Communication Networks, 2011, 5(2): 236-248.
    • (2011) Security and Communication Networks , vol.5 , Issue.2 , pp. 236-248
    • Wu, S.1    Zhu, Y.2    Pu, Q.3
  • 19
    • 84878975055 scopus 로고    scopus 로고
    • An enhanced authentication scheme with anonymity for roaming service in global mobility networks
    • DOI: 10.1007/s11277-012-0535-4.
    • JIANG Qi, MA Jianfeng, LI Guangsong, et al. An enhanced authentication scheme with anonymity for roaming service in global mobility networks [J]. Wireless Personal Communications, 2012, DOI: 10.1007/s11277-012-0535-4.
    • (2012) Wireless Personal Communications
    • Jiang, Q.1    Ma, J.2    Li, G.3
  • 20
    • 84863985527 scopus 로고    scopus 로고
    • A secure mutual authentication scheme for session initiation protocol using elliptic curve cryptography
    • DOI: 10.1002/sec.506.
    • HE Debiao, CHEN Jianhua, CHEN Yitao. A secure mutual authentication scheme for session initiation protocol using elliptic curve cryptography [J]. Security and Communication Networks, 2012, DOI: 10.1002/sec.506.
    • (2012) Security and Communication Networks
    • He, D.1    Chen, J.2    Chen, Y.3
  • 21
    • 84864058187 scopus 로고    scopus 로고
    • A more secure authentication scheme for telecare medicine information systems
    • DOI: 10.1007/s10916-011-9658-5.
    • HE Debiao, CHEN Jianhua, ZHANG Rui. A more secure authentication scheme for telecare medicine information systems[J]. Journal of Medical Systems, 2012, DOI: 10.1007/s10916-011-9658-5.
    • (2012) Journal of Medical Systems
    • He, D.1    Chen, J.2    Zhang, R.3
  • 22
    • 75449106985 scopus 로고    scopus 로고
    • Anonymity enhancement on robust and efficient password-authenticated key agreement using smart cards
    • LI Xiangxue, QIU Weidong. ZHENG Dong, et al. Anonymity enhancement on robust and efficient password-authenticated key agreement using smart cards[J]. IEEE Transactions on Industrial Electronics, 2010, 57(2): 793-800.
    • (2010) IEEE Transactions on Industrial Electronics , vol.57 , Issue.2 , pp. 793-800
    • Li, X.1    Qiu, W.2    Zheng, D.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.