메뉴 건너뛰기




Volumn 19, Issue 6, 2013, Pages 109-116

An improved dynamic password-based user authentication scheme for hierarchical wireless sensor networks

Author keywords

Password based; Smart card; User authentication; Wireless sensor networks

Indexed keywords


EID: 84879297926     PISSN: 13921215     EISSN: None     Source Type: Journal    
DOI: 10.5755/j01.eee.19.6.2038     Document Type: Article
Times cited : (84)

References (28)
  • 2
    • 75149127612 scopus 로고    scopus 로고
    • Wireless sensor network key management survey and taxonomy
    • [Online]. Available
    • J. Zhang, V. Varadharajan, "Wireless sensor network key management survey and taxonomy", Journal of Network and Computer Applications, vol. 33, no. 2, pp. 63-75, 2010. [Online]. Available: http://dx.doi.org/10.1016/j. jnca.2009.10.001
    • (2010) Journal of Network and Computer Applications , vol.33 , Issue.2 , pp. 63-75
    • Zhang, J.1    Varadharajan, V.2
  • 3
    • 2942656255 scopus 로고    scopus 로고
    • Secure routing in wireless sensor networks: Attacks and countermeasures
    • [Online]. Available
    • C. Karlof, D. Wagner, "Secure routing in wireless sensor networks: attacks and countermeasures", Ad Hoc Networks, vol. 1, no. 2-3, pp. 293-315, 2003. [Online]. Available: http://dx.doi.org/10.1016/S1570- 8705(03)00008-8
    • (2003) Ad Hoc Networks , vol.1 , Issue.2-3 , pp. 293-315
    • Karlof, C.1    Wagner, D.2
  • 4
    • 78049298573 scopus 로고    scopus 로고
    • The price of security in wireless sensor networks
    • [Online]. Available
    • J. Lee, K. Kapitanova, S. H. Son, "The price of security in wireless sensor networks", Computer Networks, vol. 54, no. 17, pp. 2967- 2978, 2010. [Online]. Available: http://dx.doi.org/10.1016 j.comnet.2010.05.011
    • (2010) Computer Networks , vol.54 , Issue.17 , pp. 2967-2978
    • Lee, J.1    Kapitanova, K.2    Son, S.H.3
  • 5
    • 39049146014 scopus 로고    scopus 로고
    • Defense against outside attacks in wireless sensor networks
    • [Online]. Available
    • S. Tripathy, S. Nandi, "Defense against outside attacks in wireless sensor networks", Computer Communications, vol. 31, no. 4, pp. 818-826, 2008. [Online]. Available: http://dx.doi.org/10.1016/ j.comcom.2007.10.025
    • (2008) Computer Communications , vol.31 , Issue.4 , pp. 818-826
    • Tripathy, S.1    Nandi, S.2
  • 6
    • 0017930809 scopus 로고
    • A method for obtaining digital signatures and public-key cryptosystems
    • [Online]. Available
    • R. L. Rivest, A. Shamir, L. Adleman, "A method for obtaining digital signatures and public-key cryptosystems", Commun. ACM, vol. 21, no. 2, pp. 120-126, 1978. [Online]. Available: http://dx.doi.org/ 10.1145/359340.359342
    • (1978) Commun. ACM , vol.21 , Issue.2 , pp. 120-126
    • Rivest, R.L.1    Shamir, A.2    Adleman, L.3
  • 7
    • 0017018484 scopus 로고
    • New directions in cryptography [Online]. Available
    • W. Diffie, M. E. Hellman, "New Directions in Cryptography", IEEE Transactions on Information Theory, vol. 22, no 6, pp. 10, 1976. [Online]. Available: http://dx.doi.org/10.1109/TIT.1976.1055638
    • (1976) IEEE Transactions on Information Theory , vol.22 , Issue.6 , pp. 10
    • Diffie, W.1    Hellman, M.E.2
  • 10
    • 66549123136 scopus 로고    scopus 로고
    • An unconditionally secure key management scheme for large-scale heterogeneous wireless sensor networks
    • Bangalore, India
    • A. K. Das, "An unconditionally secure key management scheme for large-scale heterogeneous wireless sensor networks", in Proc. of the First international conference on COMmunication Systems and NETworks, Bangalore, India, 2009, pp. 653-662.
    • (2009) Proc. of the First international conference on COMmunication Systems and NETworks , pp. 653-662
    • Das, A.K.1
  • 11
    • 77955495427 scopus 로고    scopus 로고
    • Cryptanalysis and security improvements of 'two-factor user authentication in wireless sensor Networks
    • [Online]. Available
    • M. K. Khan, K. Alghathbar, "Cryptanalysis and Security Improvements of 'Two-Factor User Authentication in Wireless Sensor Networks'", Sensors, vol. 10, no 3, pp. 2450-2459, 2010. [Online]. Available: http://dx.doi.org/10. 3390/s100302450
    • (2010) Sensors , vol.10 , Issue.3 , pp. 2450-2459
    • Khan, M.K.1    Alghathbar, K.2
  • 14
    • 84862762845 scopus 로고    scopus 로고
    • A dynamic password-based user authentication scheme for hierarchical wireless sensor networks
    • [Online]. Available
    • A. Das, Kumar, et al., "A dynamic password-based user authentication scheme for hierarchical wireless sensor networks" Journal of Network and Computer Applications, vol. 35, no. 5, pp. 1646-1656, 2012. [Online]. Available: http://dx.doi.org/10.1016/ j.jnca.2012.03.011
    • (2012) Journal of Network and Computer Applications , vol.35 , Issue.5 , pp. 1646-1656
    • Das Kumar, A.1
  • 15
    • 85014416953 scopus 로고    scopus 로고
    • Improvement of das's two-factor authentication protocol in wireless sensor Networks
    • D. Nyang, M.-K. Lee, "Improvement of Das's Two-Factor Authentication Protocol in Wireless Sensor Networks", in Proc. of the CORD Conference, 2009.
    • (2009) Proc. of the CORD Conference
    • Nyang, D.1    Lee, M.-K.2
  • 17
    • 78650459565 scopus 로고    scopus 로고
    • An enhanced two-factor user authentication scheme in wireless sensor networks
    • D. He, et al., "An Enhanced Two-factor User Authentication Scheme in Wireless Sensor Networks", Ad Hoc & Sensor Wireless Networks, vol. 10, no. 4, pp. 361-371, 2010.
    • (2010) Ad Hoc & Sensor Wireless Networks , vol.10 , Issue.4 , pp. 361-371
    • He, D.1
  • 18
    • 78049334450 scopus 로고    scopus 로고
    • A robust mutual authentication protocol for wireless sensor networks
    • [Online]. Available
    • T. H. Chen, W. K. Shih, "A Robust Mutual Authentication Protocol for Wireless Sensor Networks", Etri Journal, vol. 32, no. 5, pp. 704- 712, 2010. [Online]. Available: http://dx.doi.org/ 10.4218/etrij.10.1510.0134
    • (2010) Etri Journal , vol.32 , Issue.5 , pp. 704-712
    • Chen, T.H.1    Shih, W.K.2
  • 19
    • 77956882701 scopus 로고    scopus 로고
    • Wireless sensor networks for healthcare: A survey
    • [Online]. Available
    • H. Alemdar, C. Ersoy, "Wireless sensor networks for healthcare: A survey", Computer Networks, vol. 54, no 15, pp. 2688-2710, 2010. [Online]. Available: http://dx.doi.org/10.1016/j.comnet.2010.05.003
    • (2010) Computer Networks , vol.54 , Issue.15 , pp. 2688-2710
    • Alemdar, H.1    Ersoy, C.2
  • 20
    • 0037086890 scopus 로고    scopus 로고
    • Wireless sensor networks: A survey
    • [Online]. Available
    • I. F. Akyildiz, et al., "Wireless sensor networks: a survey", Computer Networks, vol. 38, no. 4, pp. 393-422, 2002. [Online]. Available: http://dx.doi.org/10.1016/S1389-1286(01)00302-4
    • (2002) Computer Networks , vol.38 , Issue.4 , pp. 393-422
    • Akyildiz, I.F.1
  • 21
    • 46449122114 scopus 로고    scopus 로고
    • Wireless sensor network survey
    • [Online]. Available
    • J. Yick, B. Mukherjee, D. Ghosal, "Wireless sensor network survey", Computer Networks, vol. 52, no 12, pp. 2292-2330, 2008. [Online]. Available: http://dx.doi.org/10.1016/j.comnet.2008.04.002
    • (2008) Computer Networks , vol.52 , Issue.12 , pp. 2292-2330
    • Yick, J.1    Mukherjee, B.2    Ghosal, D.3
  • 22
    • 33750127563 scopus 로고    scopus 로고
    • Current trends in wireless sensor network design
    • [Online]. Available
    • N. Jain, D. P. Agrawal, "Current Trends in Wireless Sensor Network Design", International Journal of Distributed Sensor Networks, vol. 1, no. 1, pp. 101-122, 2005. [Online]. Available: http://dx.doi.org/10.1080/ 15501320590901865
    • (2005) International Journal of Distributed Sensor Networks , vol.1 , Issue.1 , pp. 101-122
    • Jain, N.1    Agrawal, D.P.2
  • 25
    • 34249276408 scopus 로고    scopus 로고
    • Threshold password authentication against guessing attacks in Ad hoc networks
    • [Online]. Available
    • Z. Chai, Z. Cao, R. Lu, "Threshold password authentication against guessing attacks in Ad hoc networks", Ad Hoc Networks, vol. 5, no. 7, pp. 1046-1054, 2007. [Online]. Available: http://dx.doi.org/10.1016/j.adhoc.2006.05. 003
    • (2007) Ad Hoc Networks , vol.5 , Issue.7 , pp. 1046-1054
    • Chai, Z.1    Cao, Z.2    Lu, R.3
  • 26
    • 55749099619 scopus 로고    scopus 로고
    • On handling insider attacks in wireless sensor networks
    • Technical Report, [Online]. Available
    • C. Krauß, M. Schneider, C. Eckert, "On handling insider attacks in wireless sensor networks", Information Security, Technical Report, vol. 13, no. 3, pp. 165-172, 2008. [Online]. Available: http://dx.doi.org/10.1016/j.istr.2008.10.011
    • (2008) Information Security , vol.13 , Issue.3 , pp. 165-172
    • Krauß, C.1    Schneider, M.2    Eckert, C.3
  • 28
    • 78049334450 scopus 로고    scopus 로고
    • A robust mutual authentication protocol for wireless sensor networks
    • Research Institute
    • T.-H. Chen, W.-K. Shih, "A Robust Mutual Authentication Protocol for Wireless Sensor Networks", Electronics and Telecommunications Research Institute, vol. 32, no. 9, 2010.
    • Electronics and Telecommunications , vol.32 , Issue.9 , pp. 2010
    • Chen, T.-H.1    Shih, W.-K.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.