메뉴 건너뛰기




Volumn 35, Issue 5, 2013, Pages 889-899

A strong authentication scheme with user privacy for wireless sensor networks

Author keywords

Authentication; Confidentiality; Session key establishment; User privacy; Wireless sensor network

Indexed keywords

CONFIDENTIALITY; MUTUAL AUTHENTICATION; REAL-TIME APPLICATION; SESSION-KEY ESTABLISHMENT; STRONG AUTHENTICATION; USER AUTHENTICATION SCHEME; USER PRIVACY; WIRELESS SENSOR NETWORK (WSNS);

EID: 84885231928     PISSN: 12256463     EISSN: 22337326     Source Type: Journal    
DOI: 10.4218/etrij.13.0113.0103     Document Type: Article
Times cited : (33)

References (33)
  • 1
    • 33845458336 scopus 로고    scopus 로고
    • A dynamic user authentication scheme for wireless sensor networks
    • Ubiquitous, Trustworthy Comput., Taichung, Taiwan
    • K.H.M. Wong et al., "A Dynamic User Authentication Scheme for Wireless Sensor Networks," Proc. IEEE Int. Conf. Sensor Netw., Ubiquitous, Trustworthy Comput., Taichung, Taiwan, 2006.
    • (2006) Proc. IEEE Int. Conf. Sensor Netw.
    • Wong, K.H.M.1
  • 2
    • 84867754544 scopus 로고    scopus 로고
    • accessed 21 Dec. Available:
    • MICAz Datasheet, accessed 21 Dec. 2012. Available: http://www. openautomation.net/uploadsproductos/micaz-datasheet.pdf
    • (2012) MICAz Datasheet
  • 3
    • 84861793851 scopus 로고    scopus 로고
    • TelosB Datasheet. http://www.willow.co.uk/TelosB-Datasheet. pdf
    • TelosB Datasheet
  • 4
    • 62949130774 scopus 로고    scopus 로고
    • Two-factor user authentication in wireless sensor networks
    • M.L. Das, "Two-Factor User Authentication in Wireless Sensor Networks," IEEE Trans. Wireless Commun., vol. 8, no. 3, 2009, pp. 1086-1090.
    • (2009) IEEE Trans. Wireless Commun. , vol.8 , Issue.3 , pp. 1086-1090
    • Das, M.L.1
  • 5
    • 78049334450 scopus 로고    scopus 로고
    • A robust mutual authentication protocol for wireless sensor networks
    • Oct
    • T.-H. Chen and W.-K. Shih, "A Robust Mutual Authentication Protocol for Wireless Sensor Networks," ETRI J., vol. 32, no. 5, Oct. 2010, pp. 704-712.
    • (2010) ETRI J. , vol.32 , Issue.5 , pp. 704-712
    • Chen, T.-H.1    Shih, W.-K.2
  • 6
    • 79957783970 scopus 로고    scopus 로고
    • An enhanced two-factor user authentication scheme in wireless sensor networks
    • D. He et al., "An Enhanced Two-Factor User Authentication Scheme in Wireless Sensor Networks," Ad Hoc Sensor Wireless Netw., vol. 0, 2010, pp. 1-11.
    • (2010) Ad Hoc Sensor Wireless Netw. , vol.0 , pp. 1-11
    • He, D.1
  • 7
    • 77955495427 scopus 로고    scopus 로고
    • Cryptanalysis and security improvement of two-factor user authentication in wireless sensor networks
    • M.K. Khan and K. Alghathbar, "Cryptanalysis and Security Improvement of Two-Factor User Authentication in Wireless Sensor Networks," Sensors, 2010, pp. 2450-2459.
    • (2010) Sensors , pp. 2450-2459
    • Khan, M.K.1    Alghathbar, K.2
  • 8
    • 84863637154 scopus 로고    scopus 로고
    • A security-performance-balanced user authentication scheme for wireless sensor networks
    • Article ID 382810
    • S.-G. Yoo, K.-Y. Park, and J. Kim, "A Security-Performance-Balanced User Authentication Scheme for Wireless Sensor Networks," Int. J. Distr. Sensor Netw., 2012, Article ID 382810.
    • (2012) Int. J. Distr. Sensor Netw
    • Yoo, S.-G.1    Park, K.-Y.2    Kim, J.3
  • 9
    • 84885198232 scopus 로고    scopus 로고
    • Improvement of das's two-factor authentication protocol in wireless sensor networks
    • accessed 21 Apr
    • D. Nyang and M. Lee, "Improvement of Das's Two-Factor Authentication Protocol in Wireless Sensor Networks," Cryptology ePrint Archive 2009/631, accessed 21 Apr. 2012. http://eprint.iacr.org/2009 /631.pdf
    • (2012) Cryptology ePrint Archive2009/631
    • Nyang, D.1    Lee, M.2
  • 11
    • 79957718973 scopus 로고    scopus 로고
    • Ruasn: A robust user authentication framework for wireless sensor networks
    • P. Kumar et al., "RUASN: A Robust User Authentication Framework for Wireless Sensor Networks," Sensors, vol. 11, 2011, pp. 5020-5046.
    • (2011) Sensors , vol.11 , pp. 5020-5046
    • Kumar, P.1
  • 12
    • 78651563219 scopus 로고    scopus 로고
    • Security weaknesses of dynamic id-based remote user authentication protocol
    • H. Lee et al., "Security Weaknesses of Dynamic ID-Based Remote User Authentication Protocol," World Academy Sci., Eng., Technol., vol. 59, no. 35, 2009, pp. 190-193.
    • (2009) World Academy Sci., Eng., Technol. , vol.59 , Issue.35 , pp. 190-193
    • Lee, H.1
  • 13
    • 39349093196 scopus 로고    scopus 로고
    • An improved dynamic user authentication scheme for wireless sensor networks
    • Washington, DC
    • H.R. Tseng, R.H. Jan, and W. Yang, "An Improved Dynamic User Authentication Scheme for Wireless Sensor Networks," IEEE GLOBECOM, Washington, DC, 2007, pp. 986-990.
    • (2007) IEEE GLOBECOM , pp. 986-990
    • Tseng, H.R.1    Jan, R.H.2    Yang, W.3
  • 14
    • 55849086208 scopus 로고    scopus 로고
    • Simple dynamic user authentication protocols for wireless sensor networks
    • Cap Esterel, France
    • T.H. Lee, "Simple Dynamic User Authentication Protocols for Wireless Sensor Networks," Proc. 2nd Int. Conf. Sensor Technol. Appl., Cap Esterel, France, 2008, pp. 657-660.
    • (2008) Proc. 2nd Int. Conf. Sensor Technol. Appl. , pp. 657-660
    • Lee, T.H.1
  • 15
    • 62449290253 scopus 로고    scopus 로고
    • A novel dynamic user authentication scheme for wireless sensor networks
    • Reykjavik, Iceland
    • L.-C. Ko, "A Novel Dynamic User Authentication Scheme for Wireless Sensor Networks," Proc. IEEE ISWCS, Reykjavik, Iceland, 2008, pp. 608-612.
    • (2008) Proc. IEEE ISWCS , pp. 608-612
    • Ko, L.-C.1
  • 17
    • 77956388579 scopus 로고    scopus 로고
    • User authentication schemes with pseudonymity for ubiquitous sensor network in ngn
    • Sept.-Oct
    • B. Vaidya, J.J.P.C. Rodrigues, and J.H. Park, "User Authentication Schemes with Pseudonymity for Ubiquitous Sensor Network in NGN," Int. J. Commun. Syst., vol. 23, issue 9-10, Sept.-Oct. 2010, pp. 1201-1222.
    • (2010) Int. J. Commun. Syst. , vol.23 , Issue.9-10 , pp. 1201-1222
    • Vaidya, B.1    Rodrigues, J.J.P.C.2    Park, J.H.3
  • 18
    • 80053293841 scopus 로고    scopus 로고
    • Cryptanalysis of robust mutual authentication protocol for wireless sensor networks
    • Banff, Alberta, Canada
    • E.-J. Yoon and K.-Y. Yoo, "Cryptanalysis of Robust Mutual Authentication Protocol for Wireless Sensor Networks," Proc. 10th IEEE Int. Conf. Cog. Inf. Cog. Comput., Banff, Alberta, Canada, 2011, pp. 392-396.
    • (2011) Proc. 10th IEEE Int. Conf. Cog. Inf. Cog. Comput. , pp. 392-396
    • Yoon, E.-J.1    Yoo, K.-Y.2
  • 19
    • 80052427734 scopus 로고    scopus 로고
    • Cryptanalysis on two user authentication protocols using smartcard for wireless sensor networks
    • King's College, London, U.K., June
    • P. Kumar and H.-J. Lee, "Cryptanalysis on Two User Authentication Protocols Using Smartcard for Wireless Sensor Networks," Proc. 7th IEEE Conf. Wireless Adv., King's College, London, U.K., June 2011, pp. 241-245.
    • (2011) Proc. 7th IEEE Conf. Wireless Adv. , pp. 241-245
    • Kumar, P.1    Lee, H.-J.2
  • 20
    • 78049329614 scopus 로고    scopus 로고
    • Security enhancement on two remote user authentication schemes using smart cards
    • Apr
    • T.-H. Chen, H.-C. Hsiang, and W.-K. Shih, "Security Enhancement on Two Remote User Authentication Schemes Using Smart Cards," Future Generation Comput. Syst., vol. 27 Apr. 2011, pp. 377-380.
    • (2011) Future Generation Comput. Syst. , vol.27 , pp. 377-380
    • Chen, T.-H.1    Hsiang, H.-C.2    Shih, W.-K.3
  • 22
    • 84885238174 scopus 로고    scopus 로고
    • accessed 21 Dec. Available:
    • Crossbow Stargate Datasheet, accessed 21 Dec. 2012. Available: http://platformx.sourceforge.net/home.html
    • (2012) Crossbow Stargate Datasheet
  • 23
    • 84861039290 scopus 로고    scopus 로고
    • A wireless sensor network for precise volatile organic compound monitoring
    • Article ID 820716
    • G. Manes et al., "A Wireless Sensor Network for Precise Volatile Organic Compound Monitoring," Int. J. Distr. Sensor Netw., 2012, Article ID 820716.
    • (2012) Int. J. Distr. Sensor Netw
    • Manes, G.1
  • 24
    • 67349253018 scopus 로고    scopus 로고
    • Sage: A strong privacy-preserving scheme against global eavesdropping for ehealth systems
    • May
    • X. Lin et al., "SAGE: A Strong Privacy-Preserving Scheme against Global Eavesdropping for eHealth Systems," IEEE J. Sel. Areas Commun., vol. 27, no. 4, May 2009, pp. 365-378.
    • (2009) IEEE J. Sel. Areas Commun. , vol.27 , Issue.4 , pp. 365-378
    • Lin, X.1
  • 25
    • 84905854254 scopus 로고    scopus 로고
    • Design and deployment of industrial sensor networks: Experiences from a semiconductor plant and the north sea
    • 2-4 Nov
    • L. Krishnamurthy et al., "Design and Deployment of Industrial Sensor Networks: Experiences from a Semiconductor Plant and the North Sea," Proc. SenSys, San Diego, CA, USA, 2-4 Nov. 2005, pp. 64-75.
    • (2005) Proc. SenSys, San Diego, CA, USA , pp. 64-75
    • Krishnamurthy, L.1
  • 26
    • 33947675345 scopus 로고    scopus 로고
    • A two-tiered architecture for real-time communications in large-scale wireless sensor networks: Research challenges
    • July accessed 18 Jan. 2013. Available:
    • A. Koubaa and M. Alves, "A Two-tiered Architecture for Real-Time Communications in Large-Scale Wireless Sensor Networks: Research Challenges," Technical Report (TR-050701), v. 1.0, July 2005, accessed 18 Jan. 2013. Available: http://www. open-zb.net/publications/tr-hurray-050701.pdf
    • (2005) Technical Report (TR-050701 , vol.10
    • Koubaa, A.1    Alves, M.2
  • 27
    • 84994900236 scopus 로고    scopus 로고
    • A robust password-based authentication scheme for heterogeneous sensor networks
    • H.-R. Tseng, R.-H. Jan, and W. Yang, "A Robust Password-based Authentication Scheme for Heterogeneous Sensor Networks," Commun. Institute Inf. Comput. Mach., vol. 11, no. 3, 2008, pp. 1-13.
    • (2008) Commun. Institute Inf. Comput. Mach. , vol.11 , Issue.3 , pp. 1-13
    • Tseng, H.-R.1    Jan, R.-H.2    Yang, W.3
  • 28
    • 77955080013 scopus 로고    scopus 로고
    • Host identity protocol: Identifier/locator split for host mobility identity and multihoming
    • Mar
    • A. Gurtov, M. Komu, and R. Moskowitz, "Host Identity Protocol: Identifier/Locator Split for Host Mobility Identity and Multihoming," Internet Protocol J., vol. 12, no. 1, Mar. 2009, pp. 27-32.
    • (2009) Internet Protocol J. , vol.12 , Issue.1 , pp. 27-32
    • Gurtov, A.1    Komu, M.2    Moskowitz, R.3
  • 29
    • 84867371233 scopus 로고    scopus 로고
    • A secure hierarchical key management scheme in wireless sensor networks
    • Article ID547471
    • Y. Zhang et al., "A Secure Hierarchical Key Management Scheme in Wireless Sensor Networks," Int. J. Distr. Sensor Netw., 2012, Article ID547471.
    • (2012) Int. J. Distr. Sensor Netw
    • Zhang, Y.1
  • 30
    • 26444574670 scopus 로고    scopus 로고
    • Tinysec: A link layer security architecture for wireless sensor networks
    • Baltimore, MD, USA, Nov. 3-5
    • C. Karlor, N. Sastry, and D. Wagner, "TinySec: A Link Layer Security Architecture for Wireless Sensor Networks," Proc. ACM SenSys, Baltimore, MD, USA, Nov. 3-5, 2004, pp. 162-175.
    • (2004) Proc. ACM SenSys , pp. 162-175
    • Karlor, C.1    Sastry, N.2    Wagner, D.3
  • 31
    • 79952059658 scopus 로고    scopus 로고
    • Lightweight and provably secure user authentication with anonymity for the global mobility networks
    • C. Chen et al., "Lightweight and Provably Secure User Authentication with Anonymity for the Global Mobility Networks," Int. J. Commun. Syst., vol. 24, no. 3, 2011, pp. 347-362.
    • (2011) Int. J. Commun. Syst. , vol.24 , Issue.3 , pp. 347-362
    • Chen, C.1
  • 32
    • 84939573910 scopus 로고    scopus 로고
    • Differential power analysis
    • Santa Barbara, CA, USA, Aug
    • P. Kocher, J. Jaffe, and B. Jun, "Differential Power Analysis," Proc. Adv. Cryptology, Santa Barbara, CA, USA, Aug. 1999, pp. 388-397.
    • (1999) Proc. Adv. Cryptology , pp. 388-397
    • Kocher, P.1    Jaffe, J.2    Jun, B.3
  • 33
    • 0036566408 scopus 로고    scopus 로고
    • Examining smart-card security under the threat of power analysis attack
    • May
    • T.S. Messerges, E.A. Dabbish, and R.H. Sloan, "Examining Smart-Card Security Under the Threat of Power Analysis Attack," IEEE Trans. Comput., vol. 51, no. 5, May 2002, pp. 541-552.
    • (2002) IEEE Trans. Comput. , vol.51 , Issue.5 , pp. 541-552
    • Messerges, T.S.1    Dabbish, E.A.2    Sloan, R.H.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.