메뉴 건너뛰기




Volumn 17, Issue 5, 2013, Pages 895-905

ON the security and improvement of a two-factor user authentication scheme in wireless sensor networks

Author keywords

Authentication; Gateway node bypassing attack; Gateway node impersonation attack; Privileged insider attack; Wireless sensor network

Indexed keywords

GATEWAY NODES; HOSTILE ENVIRONMENTS; IMPERSONATION ATTACK; MILITARY BATTLEFIELDS; PRIVILEGED-INSIDER ATTACK; SECURITY APPLICATION; SECURITY REQUIREMENTS; USER AUTHENTICATION SCHEME;

EID: 84883446358     PISSN: 16174909     EISSN: None     Source Type: Journal    
DOI: 10.1007/s00779-012-0540-3     Document Type: Conference Paper
Times cited : (56)

References (28)
  • 1
    • 79960755996 scopus 로고    scopus 로고
    • A single mobile target tracking in Voronoi-based clustered wireless sensor network
    • Chen JH, Salim MB, Matsumoto M (2011) A single mobile target tracking in Voronoi-based clustered wireless sensor network. J Inf Process Syst 7(1):17-28
    • (2011) J Inf Process Syst , vol.7 , Issue.1 , pp. 17-28
    • Chen, J.H.1    Salim, M.B.2    Matsumoto, M.3
  • 2
    • 84255212842 scopus 로고    scopus 로고
    • Multi-hop communication routing (MCR) protocol for heterogeneous wireless sensor networks
    • Kumar D, Aseri TC, Patel RB (2011) Multi-hop communication routing (MCR) protocol for heterogeneous wireless sensor networks. Int J Inf Technol Commun Converg 1(2):130-145
    • (2011) Int J Inf Technol Commun Converg , vol.1 , Issue.2 , pp. 130-145
    • Kumar, D.1    Aseri, T.C.2    Patel, R.B.3
  • 3
    • 84875527298 scopus 로고    scopus 로고
    • Lifetime-aware geographic routing under a realistic link layer model in wireless sensor networks
    • Zhao G, Kumar A (2011) Lifetime-aware geographic routing under a realistic link layer model in wireless sensor networks. Int J Inf Technol Commun Converg 1(3):297-317
    • (2011) Int J Inf Technol Commun Converg , vol.1 , Issue.3 , pp. 297-317
    • Zhao, G.1    Kumar, A.2
  • 4
    • 79957944903 scopus 로고    scopus 로고
    • Secure key management protocol in the wireless sensor network
    • Jeong YS, Lee SH (2006) Secure key management protocol in the wireless sensor network. J Inf Process Syst 2(1):48-51
    • (2006) J Inf Process Syst , vol.2 , Issue.1 , pp. 48-51
    • Jeong, Y.S.1    Lee, S.H.2
  • 5
    • 84856665180 scopus 로고    scopus 로고
    • Intrusion detection based on traffic analysis and fuzzy inference system in wireless sensor networks
    • Ponomarchuk Y, Seo DW (2010) Intrusion detection based on traffic analysis and fuzzy inference system in wireless sensor networks. J Converg 1(1):35-42
    • (2010) J Converg , vol.1 , Issue.1 , pp. 35-42
    • Ponomarchuk, Y.1    Seo, D.W.2
  • 6
    • 84867615498 scopus 로고    scopus 로고
    • Security enhanced communication in wireless sensor networks using Reed-Muller codes and partially balanced incomplete block designs
    • Sarkar P, Saha A (2011) Security enhanced communication in wireless sensor networks using Reed-Muller codes and partially balanced incomplete block designs. J Converg 2(1):23-30
    • (2011) J Converg , vol.2 , Issue.1 , pp. 23-30
    • Sarkar, P.1    Saha, A.2
  • 11
    • 78751642743 scopus 로고    scopus 로고
    • TinyPBC: Pairings for authenticated identity-based non-interactive key distribution in sensor networks
    • 10.1016/j.comcom.2010.05.013
    • Oliveira LB, Aranha DF, Gouvêa CPL, Scott M, Câmara DF, López J, Dahab R (2011) TinyPBC: pairings for authenticated identity-based non-interactive key distribution in sensor networks. Comput Commun 34(3):485-493
    • (2011) Comput Commun , vol.34 , Issue.3 , pp. 485-493
    • Oliveira, L.B.1    Aranha, D.F.2    Gouvêa, C.P.L.3    Scott, M.4    Câmara, D.F.5    López, J.6    Dahab, R.7
  • 17
    • 62949130774 scopus 로고    scopus 로고
    • Two-factor user authentication in wireless sensor networks
    • 10.1109/TWC.2008.080128
    • Das ML (2009) Two-factor user authentication in wireless sensor networks. IEEE Trans Wirel Commun 8(3):1086-1090
    • (2009) IEEE Trans Wirel Commun , vol.8 , Issue.3 , pp. 1086-1090
    • Das, M.L.1
  • 18
    • 77955495427 scopus 로고    scopus 로고
    • Cryptanalysis and security improvements of 'two-factor user authentication in wireless sensor networks'
    • 10.3390/s100302450
    • Khan MK, Alghathbar K (2010) Cryptanalysis and security improvements of 'two-factor user authentication in wireless sensor networks'. Sensors 10(3):2450-2459
    • (2010) Sensors , vol.10 , Issue.3 , pp. 2450-2459
    • Khan, M.K.1    Alghathbar, K.2
  • 21
    • 0027615231 scopus 로고
    • Protecting poorly chosen secrets from guessing attacks
    • 10.1109/49.223865
    • Li G, Lomas MA, Needham RM, Saltzer JH (1993) Protecting poorly chosen secrets from guessing attacks. IEEE J Sel Areas Commun 11(5):648-656
    • (1993) IEEE J Sel Areas Commun , vol.11 , Issue.5 , pp. 648-656
    • Li, G.1    Lomas, M.A.2    Needham, R.M.3    Saltzer, J.H.4
  • 22
    • 71849087704 scopus 로고    scopus 로고
    • Public-key cryptography and password protocols
    • 10.1145/322510.322514
    • Halevi S, Krawczyk H (1999) Public-key cryptography and password protocols. ACM Trans Inf Syst Secur 2(3):230-268
    • (1999) ACM Trans Inf Syst Secur , vol.2 , Issue.3 , pp. 230-268
    • Halevi, S.1    Krawczyk, H.2
  • 23
    • 27144545000 scopus 로고    scopus 로고
    • Weakness and improvement on Wang-Li-Tie's user-friendly remote authentication scheme
    • 2175277 1083.94016 10.1016/j.amc.2005.01.013
    • Sun DZ, Zhong JD, Sun Y (2005) Weakness and improvement on Wang-Li-Tie's user-friendly remote authentication scheme. Appl Math Comput 170(2):1185-1193
    • (2005) Appl Math Comput , vol.170 , Issue.2 , pp. 1185-1193
    • Sun, D.Z.1    Zhong, J.D.2    Sun, Y.3
  • 24
    • 67649386419 scopus 로고    scopus 로고
    • Improvements of Juang et al.'s password-authenticated key agreement scheme using smart cards
    • 10.1109/TIE.2009.2016508
    • Sun DZ, Huai JP, Sun JZ, Li JX, Zhang JW, Feng ZY (2009) Improvements of Juang et al.'s password-authenticated key agreement scheme using smart cards. IEEE Trans Ind Electron 56(6):2284-2291
    • (2009) IEEE Trans Ind Electron , vol.56 , Issue.6 , pp. 2284-2291
    • Sun, D.Z.1    Huai, J.P.2    Sun, J.Z.3    Li, J.X.4    Zhang, J.W.5    Feng, Z.Y.6
  • 25
    • 39549112119 scopus 로고    scopus 로고
    • An efficient modular exponentiation algorithm against simple power analysis attacks
    • 1152.28321 10.1109/TCE.2007.4429275
    • Sun DZ, Huai JP, Sun JZ, Cao ZF (2007) An efficient modular exponentiation algorithm against simple power analysis attacks. IEEE Trans Consum Electron 53(4):1718-1723
    • (2007) IEEE Trans Consum Electron , vol.53 , Issue.4 , pp. 1718-1723
    • Sun, D.Z.1    Huai, J.P.2    Sun, J.Z.3    Cao, Z.F.4
  • 28
    • 72449181354 scopus 로고    scopus 로고
    • Defining strong privacy for RFID
    • Juels A, Weis SA (2009) Defining strong privacy for RFID. ACM Trans Inf Syst Secur 13(1): 7:1-7:23
    • (2009) ACM Trans Inf Syst Secur , vol.13 , Issue.1 , pp. 71-723
    • Juels, A.1    Weis, S.A.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.