메뉴 건너뛰기




Volumn 20, Issue , 2014, Pages 96-112

A novel user authentication and key agreement scheme for heterogeneous ad hoc wireless sensor networks, based on the Internet of Things notion

Author keywords

Ad hoc; Internet of Things; Key agreement; Mutual authentication; Smart card; Wireless sensor network

Indexed keywords

AUTHENTICATION; GATEWAYS (COMPUTER NETWORKS); INTERNET OF THINGS; NETWORK SECURITY; SMART CARDS; WIRELESS SENSOR NETWORKS;

EID: 84901188390     PISSN: 15708705     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.adhoc.2014.03.009     Document Type: Article
Times cited : (591)

References (47)
  • 1
    • 77956877124 scopus 로고    scopus 로고
    • The Internet of things: A survey
    • L. Atzori, A. Iera, and G. Morabito The Internet of things: a survey Comput. Netw. 54 2010 2787 2805
    • (2010) Comput. Netw. , vol.54 , pp. 2787-2805
    • Atzori, L.1    Iera, A.2    Morabito, G.3
  • 2
    • 11144332044 scopus 로고    scopus 로고
    • The design space of wireless sensor networks
    • K. Romer, and F. Mattern The design space of wireless sensor networks Wireless Commun., IEEE 11 2004 54 61
    • (2004) Wireless Commun., IEEE , vol.11 , pp. 54-61
    • Romer, K.1    Mattern, F.2
  • 4
    • 84875736615 scopus 로고    scopus 로고
    • Focal design issues affecting the deployment of wireless sensor networks for pipeline monitoring
    • G. Owojaiye, and Y. Sun Focal design issues affecting the deployment of wireless sensor networks for pipeline monitoring Ad Hoc Netw. 11 2013 1237 1253
    • (2013) Ad Hoc Netw. , vol.11 , pp. 1237-1253
    • Owojaiye, G.1    Sun, Y.2
  • 5
    • 84888872009 scopus 로고    scopus 로고
    • Design, development, and deployment of a wireless sensor network for detection of landslides
    • M.V. Ramesh Design, development, and deployment of a wireless sensor network for detection of landslides Ad Hoc Netw. 13 2014 2 18
    • (2014) Ad Hoc Netw. , vol.13 , pp. 2-18
    • Ramesh, M.V.1
  • 8
    • 84883452685 scopus 로고    scopus 로고
    • Autonomous precision agriculture through integration of wireless underground sensor networks with center pivot irrigation systems
    • X. Dong, M.C. Vuran, and S. Irmak Autonomous precision agriculture through integration of wireless underground sensor networks with center pivot irrigation systems Ad Hoc Netw. 11 2013 1975 1987
    • (2013) Ad Hoc Netw. , vol.11 , pp. 1975-1987
    • Dong, X.1    Vuran, M.C.2    Irmak, S.3
  • 9
    • 84870719671 scopus 로고    scopus 로고
    • Wireless sensor networks for rehabilitation applications: Challenges and opportunities
    • A. Hadjidj, M. Souil, A. Bouabdallah, Y. Challal, and H. Owen Wireless sensor networks for rehabilitation applications: challenges and opportunities J. Netw. Comput. Appl. 36 2013 1 15
    • (2013) J. Netw. Comput. Appl. , vol.36 , pp. 1-15
    • Hadjidj, A.1    Souil, M.2    Bouabdallah, A.3    Challal, Y.4    Owen, H.5
  • 10
    • 84857124514 scopus 로고    scopus 로고
    • Ubiquitous tutoring in laboratories based on wireless sensor networks
    • M. Jou, and J. Wang Ubiquitous tutoring in laboratories based on wireless sensor networks Comput. Hum. Behav. 29 2013 439 444
    • (2013) Comput. Hum. Behav. , vol.29 , pp. 439-444
    • Jou, M.1    Wang, J.2
  • 11
    • 84877742201 scopus 로고    scopus 로고
    • Optimal planning of sensor networks for asset tracking in hospital environments
    • A. Pietrabissa, C. Poli, D.G. Ferriero, and M. Grigioni Optimal planning of sensor networks for asset tracking in hospital environments Decis. Support Syst. 55 2013 304 313
    • (2013) Decis. Support Syst. , vol.55 , pp. 304-313
    • Pietrabissa, A.1    Poli, C.2    Ferriero, D.G.3    Grigioni, M.4
  • 12
    • 84875703066 scopus 로고    scopus 로고
    • An experimental study of wireless connectivity and routing in ad hoc sensor networks for real-time soccer player monitoring
    • V. Sivaraman, A. Dhamdhere, H. Chen, A. Kurusingal, and S. Grover An experimental study of wireless connectivity and routing in ad hoc sensor networks for real-time soccer player monitoring Ad Hoc Netw. 11 2013 798 817
    • (2013) Ad Hoc Netw. , vol.11 , pp. 798-817
    • Sivaraman, V.1    Dhamdhere, A.2    Chen, H.3    Kurusingal, A.4    Grover, S.5
  • 13
    • 84890435965 scopus 로고    scopus 로고
    • HOCA: Healthcare aware optimized congestion avoidance and control protocol for wireless sensor networks
    • A.A. Rezaee, M.H. Yaghmaee, A.M. Rahmani, and A.H. Mohajerzadeh HOCA: healthcare aware optimized congestion avoidance and control protocol for wireless sensor networks J. Netw. Comput. Appl. 37 2014 216 228
    • (2014) J. Netw. Comput. Appl. , vol.37 , pp. 216-228
    • Rezaee, A.A.1    Yaghmaee, M.H.2    Rahmani, A.M.3    Mohajerzadeh, A.H.4
  • 15
    • 84866059840 scopus 로고    scopus 로고
    • Novel wireless pervasive sensor network to improve the understanding of noise in street canyons
    • M.C. Bell, and F. Galatioto Novel wireless pervasive sensor network to improve the understanding of noise in street canyons Appl. Acoust. 74 2013 169 180
    • (2013) Appl. Acoust. , vol.74 , pp. 169-180
    • Bell, M.C.1    Galatioto, F.2
  • 16
  • 18
    • 78650459565 scopus 로고    scopus 로고
    • An enhanced two-factor user authentication scheme in wireless sensor networks
    • D. He, Y. Gao, S. Chan, C. Chen, and J. Bu An enhanced two-factor user authentication scheme in wireless sensor networks Ad Hoc Sens. Wirel. Netw. 10 2010 361 371
    • (2010) Ad Hoc Sens. Wirel. Netw. , vol.10 , pp. 361-371
    • He, D.1    Gao, Y.2    Chan, S.3    Chen, C.4    Bu, J.5
  • 21
    • 77955495427 scopus 로고    scopus 로고
    • Cryptanalysis and security improvements of 'two-factor user authentication in wireless sensor networks'
    • M.K. Khan, and K. Alghathbar Cryptanalysis and security improvements of 'two-factor user authentication in wireless sensor networks' Sensors 10 2010 2450 2459
    • (2010) Sensors , vol.10 , pp. 2450-2459
    • Khan, M.K.1    Alghathbar, K.2
  • 22
    • 78049334450 scopus 로고    scopus 로고
    • A robust mutual authentication protocol for wireless sensor networks
    • T.H. Chen, and W.K. Shih A robust mutual authentication protocol for wireless sensor networks Etri J. 32 2010 704 712
    • (2010) Etri J. , vol.32 , pp. 704-712
    • Chen, T.H.1    Shih, W.K.2
  • 23
    • 79957702363 scopus 로고    scopus 로고
    • A secured authentication protocol for wireless sensor networks using elliptic curves cryptography
    • H.-L. Yeh, T.-H. Chen, P.-C. Liu, T.-H. Kim, and H.-W. Wei A secured authentication protocol for wireless sensor networks using elliptic curves cryptography Sensors 11 2011 4767 4779
    • (2011) Sensors , vol.11 , pp. 4767-4779
    • Yeh, H.-L.1    Chen, T.-H.2    Liu, P.-C.3    Kim, T.-H.4    Wei, H.-W.5
  • 24
    • 62949130774 scopus 로고    scopus 로고
    • Two-factor user authentication in wireless sensor networks
    • M.L. Das Two-factor user authentication in wireless sensor networks Wirel. Commun. IEEE Trans. 8 2009 1086 1090
    • (2009) Wirel. Commun. IEEE Trans. , vol.8 , pp. 1086-1090
    • Das, M.L.1
  • 26
    • 84862762845 scopus 로고    scopus 로고
    • A dynamic password-based user authentication scheme for hierarchical wireless sensor networks
    • A. Das, Kumar, P. Sharma, S. Chatterjee, S.J. Sing, and Kanta A dynamic password-based user authentication scheme for hierarchical wireless sensor networks J. Netw. Comput. Appl. 35 2012 1646 1656
    • (2012) J. Netw. Comput. Appl. , vol.35 , pp. 1646-1656
    • Das, A.1    Kumar2    Sharma, P.3    Chatterjee, S.4    Sing, S.J.5    Kanta6
  • 27
    • 84870693016 scopus 로고    scopus 로고
    • A temporal-credential-based mutual authentication and key agreement scheme for wireless sensor networks
    • K. Xue, C. Ma, P. Hong, and R. Ding A temporal-credential-based mutual authentication and key agreement scheme for wireless sensor networks J. Netw. Comput. Appl. 36 2012 316 323
    • (2012) J. Netw. Comput. Appl. , vol.36 , pp. 316-323
    • Xue, K.1    Ma, C.2    Hong, P.3    Ding, R.4
  • 29
    • 67549118456 scopus 로고    scopus 로고
    • Secure data aggregation in wireless sensor networks: A comprehensive overview
    • S. Ozdemir, and Y. Xiao Secure data aggregation in wireless sensor networks: a comprehensive overview Comput. Netw. 53 2009 2022 2037
    • (2009) Comput. Netw. , vol.53 , pp. 2022-2037
    • Ozdemir, S.1    Xiao, Y.2
  • 31
  • 34
    • 0017018484 scopus 로고
    • New directions in cryptography (invited paper)
    • W. Diffie, and M.E. Hellman New directions in cryptography (invited paper) IEEE Trans. Inf. Theory IT-22 1976 10
    • (1976) IEEE Trans. Inf. Theory , vol.22 IT , pp. 10
    • Diffie, W.1    Hellman, M.E.2
  • 35
    • 64249125305 scopus 로고    scopus 로고
    • An improved smart card based password authentication scheme with provable security
    • J. Xu, W.-T. Zhu, and D.-G. Feng An improved smart card based password authentication scheme with provable security Comput. Stand. Interf. 31 2009 723 728
    • (2009) Comput. Stand. Interf. , vol.31 , pp. 723-728
    • Xu, J.1    Zhu, W.-T.2    Feng, D.-G.3
  • 36
    • 77955312905 scopus 로고    scopus 로고
    • Advanced smart card based password authentication protocol
    • R. Song Advanced smart card based password authentication protocol Comput. Stand. Interf. 32 2010 321 325
    • (2010) Comput. Stand. Interf. , vol.32 , pp. 321-325
    • Song, R.1
  • 38
    • 84862773089 scopus 로고    scopus 로고
    • Improvement of Das's two-factor authentication protocol in wireless sensor networks
    • D. Nyang, M.-K. Lee, Improvement of Das's two-factor authentication protocol in wireless sensor networks, in: CORD Conference Proceedings, 2009 (2009).
    • (2009) CORD Conference Proceedings, 2009
    • Nyang, D.1    Lee, M.-K.2
  • 39
    • 84875664097 scopus 로고    scopus 로고
    • A new user authentication scheme for hierarchical wireless sensor networks
    • S. Xu, and X. Wang A new user authentication scheme for hierarchical wireless sensor networks Int. Rev. Comput. Softw. 8 2013 197 203
    • (2013) Int. Rev. Comput. Softw. , vol.8 , pp. 197-203
    • Xu, S.1    Wang, X.2
  • 40
    • 84879297926 scopus 로고    scopus 로고
    • An improved dynamic password-based user authentication scheme for hierarchical wireless sensor networks
    • M. Turkanović, and M. Hölbl An improved dynamic password-based user authentication scheme for hierarchical wireless sensor networks Electron. Electric. Eng. 19 2013 109 116
    • (2013) Electron. Electric. Eng. , vol.19 , pp. 109-116
    • Turkanović, M.1    Hölbl, M.2
  • 41
    • 84880828581 scopus 로고    scopus 로고
    • An advanced temporal credential-based security scheme with mutual authentication and key agreement for wireless sensor networks
    • C.-T. Li, C.-Y. Weng, and C.-C. Lee An advanced temporal credential-based security scheme with mutual authentication and key agreement for wireless sensor networks Sensors 13 2013 9589 9603
    • (2013) Sensors , vol.13 , pp. 9589-9603
    • Li, C.-T.1    Weng, C.-Y.2    Lee, C.-C.3
  • 42
    • 85034663846 scopus 로고    scopus 로고
    • Notes on "a temporal-credential-based mutual authentication and key agreement scheme for wireless sensor networks"
    • M. Turkanović, and M. Hölbl Notes on "a temporal-credential-based mutual authentication and key agreement scheme for wireless sensor networks" Wireless Pers. Commun. 2013 1 16
    • (2013) Wireless Pers. Commun. , pp. 1-16
    • Turkanović, M.1    Hölbl, M.2
  • 44
    • 0036793924 scopus 로고    scopus 로고
    • Denial of service in sensor networks
    • A. Wood, and J.A. Stankovic Denial of service in sensor networks Computer 35 2002 54 62
    • (2002) Computer , vol.35 , pp. 54-62
    • Wood, A.1    Stankovic, J.A.2
  • 46
    • 84901221399 scopus 로고    scopus 로고
    • I. Crossbow technology. MICA 2, Wireless Measurement System
    • I. Crossbow technology. MICA 2, Wireless Measurement System, in, EOL: Crossbow.
    • EOL: Crossbow


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.