메뉴 건너뛰기




Volumn 55, Issue 1, 2014, Pages 105-113

An enhanced two-factor user authentication in wireless sensor networks

Author keywords

Authentication; Biometrics; Security; Smart card; Wireless sensor networks

Indexed keywords

BIOMETRICS; SENSOR NODES; SMART CARDS; WIRELESS SENSOR NETWORKS;

EID: 84901234489     PISSN: 10184864     EISSN: 15729451     Source Type: Journal    
DOI: 10.1007/s11235-013-9755-5     Document Type: Article
Times cited : (36)

References (28)
  • 1
    • 2942686425 scopus 로고    scopus 로고
    • Sensor networks: Evolution, opportunities and challenges
    • 10.1109/JPROC.2003.814918
    • Chong, C. Y.; Kumar, S. (2003). Sensor networks: evolution, opportunities and challenges. Proceedings of the IEEE, 91(8), 1247-1256.
    • (2003) Proceedings of the IEEE , vol.91 , Issue.8 , pp. 1247-1256
    • Chong, C.Y.1    Kumar, S.2
  • 2
    • 62949130774 scopus 로고    scopus 로고
    • Two-factor user authentication in wireless sensor networks
    • 10.1109/TWC.2008.080128
    • Das, M. L. (2009). Two-factor user authentication in wireless sensor networks. IEEE Transactions on Wireless Communications, 8(3), 1086-1090.
    • (2009) IEEE Transactions on Wireless Communications , vol.8 , Issue.3 , pp. 1086-1090
    • Das, M.L.1
  • 4
    • 11244354854 scopus 로고    scopus 로고
    • Security considerations for IEEE 802.15.4 networks
    • Philadelphia, USA
    • Sastry, N.; Wagner, D. (2004). Security considerations for IEEE 802.15.4 networks. In Proceedings of ACM workshop wireless security, Philadelphia, USA (pp. 32-42).
    • (2004) Proceedings of ACM Workshop Wireless Security , pp. 32-42
    • Sastry, N.1    Wagner, D.2
  • 5
    • 78650508247 scopus 로고    scopus 로고
    • Model checking wireless sensor network security protocols: TinySec plus LEAP plus TinyPK
    • 10.1007/s11235-008-9131-z
    • Tobarra, L.; Cazorla, D.; Cuartero, F. (2009). Model checking wireless sensor network security protocols: TinySec plus LEAP plus TinyPK. Telecommunications Systems, 40(3-4), 91-99.
    • (2009) Telecommunications Systems , vol.40 , Issue.3-4 , pp. 91-99
    • Tobarra, L.1    Cazorla, D.2    Cuartero, F.3
  • 8
    • 77956388579 scopus 로고    scopus 로고
    • User authentication schemes with pseudonymity for ubiquitous sensor network in NGN
    • Binod, V.; Jorge, S. S.; Joel, J. P. C. R. (2010). User authentication schemes with pseudonymity for ubiquitous sensor network in NGN. International Journal of Communication Systems, 23(9), 1201-1222.
    • (2010) International Journal of Communication Systems , vol.23 , Issue.9 , pp. 1201-1222
    • Binod, V.1    Jorge, S.S.2    Joel, J.P.C.R.3
  • 11
    • 39349093196 scopus 로고    scopus 로고
    • An improved dynamic user authentication scheme for wireless sensor networks
    • Washington, DC, USA
    • Tseng, H. R.; Jan, R. H.; Yang, W. (2007). An improved dynamic user authentication scheme for wireless sensor networks. In Proceedings of IEEE Globecom, Washington, DC, USA (pp. 986-990).
    • (2007) Proceedings of IEEE Globecom , pp. 986-990
    • Tseng, H.R.1    Jan, R.H.2    Yang, W.3
  • 13
    • 62449290253 scopus 로고    scopus 로고
    • A novel dynamic user authentication scheme for wireless sensor networks
    • Reykjavik, Iceland
    • Ko, L. C. (2008). A novel dynamic user authentication scheme for wireless sensor networks. In Proceedings of IEEE ISWCS, Reykjavik, Iceland (pp. 608-612).
    • (2008) Proceedings of IEEE ISWCS , pp. 608-612
    • Ko, L.C.1
  • 14
    • 74049156258 scopus 로고    scopus 로고
    • Robust dynamic user authentication scheme for wireless sensor networks
    • Canary Islands, Spain
    • Binod, V.; Jorge, S. S.; Joel, J. P. C. R. (2009). Robust dynamic user authentication scheme for wireless sensor networks. In Proceedings of ACM Q2SWinet, Canary Islands, Spain (pp. 88-91).
    • (2009) Proceedings of ACM Q2SWinet , pp. 88-91
    • Binod, V.1    Jorge, S.S.2    Joel, J.P.C.R.3
  • 15
    • 84862773089 scopus 로고    scopus 로고
    • Improvement of Das's two-factor authentication protocol in wireless sensor networks
    • ePrint archive Accessed 28 February 2010
    • Nyang, D. H.; Lee, M. K. (2009). Improvement of Das's two-factor authentication protocol in wireless sensor networks. Cryptology, ePrint archive. http://eprint.iacr.org/2009/631.pdf. Accessed 28 February 2010.
    • (2009) Cryptology
    • Nyang D., .H.1    Lee M., .K.2
  • 16
    • 77955495427 scopus 로고    scopus 로고
    • Cryptanalysis and security improvements of 'two-factor user authentication in wireless sensor networks'
    • 10.3390/s100302450
    • Khan, M. K.; Alghathbar, K. (2010). Cryptanalysis and security improvements of 'two-factor user authentication in wireless sensor networks'. Sensors, 10(3), 2450-2459.
    • (2010) Sensors , vol.10 , Issue.3 , pp. 2450-2459
    • Khan, M.K.1    Alghathbar, K.2
  • 18
    • 0036566408 scopus 로고    scopus 로고
    • Examining smartcard security under the threat of power analysis attacks
    • 10.1109/TC.2002.1004593
    • Messerges, T. S.; Dabbish, E. A.; Sloan, R. H. (2002). Examining smartcard security under the threat of power analysis attacks. IEEE Transactions on Computers, 51(5), 541-552.
    • (2002) IEEE Transactions on Computers , vol.51 , Issue.5 , pp. 541-552
    • Messerges, T.S.1    Dabbish, E.A.2    Sloan, R.H.3
  • 19
    • 33751167604 scopus 로고    scopus 로고
    • Improving the security of 'a flexible biometrics remote user authentication scheme'
    • 10.1016/j.csi.2006.01.002
    • Khan, M. K.; Zhang, J. (2007). Improving the security of 'a flexible biometrics remote user authentication scheme'. Computer Standards & Interfaces, 29(1), 82-85.
    • (2007) Computer Standards & Interfaces , vol.29 , Issue.1 , pp. 82-85
    • Khan, M.K.1    Zhang, J.2
  • 20
    • 34548620637 scopus 로고    scopus 로고
    • Chaotic hash-based fingerprint biometric remote user authentication scheme on mobile devices
    • 10.1016/j.chaos.2006.05.061
    • Khan, M. K.; Zhang, J.; Wang, X. (2008). Chaotic hash-based fingerprint biometric remote user authentication scheme on mobile devices. Chaos, Solitons and Fractals, 35(3), 519-524.
    • (2008) Chaos, Solitons and Fractals , vol.35 , Issue.3 , pp. 519-524
    • Khan, M.K.1    Zhang, J.2    Wang, X.3
  • 21
    • 70349792182 scopus 로고    scopus 로고
    • An efficient biometrics-based remote user authentication scheme using smart cards
    • 10.1016/j.jnca.2009.08.001
    • Li, C. T.; Hwang, M. S. (2010). An efficient biometrics-based remote user authentication scheme using smart cards. Journal of Network and Computer Applications, 33(1), 1-5.
    • (2010) Journal of Network and Computer Applications , vol.33 , Issue.1 , pp. 1-5
    • Li, C.T.1    Hwang, M.S.2
  • 22
    • 0037030525 scopus 로고    scopus 로고
    • Fingerprint-based remote user authentication scheme using smart cards
    • 10.1049/el:20020380
    • Lee, J. K.; Ryu, S. R.; Yoo, K. Y. (2002). Fingerprint-based remote user authentication scheme using smart cards. Electronics Letters, 38(12), 554-555.
    • (2002) Electronics Letters , vol.38 , Issue.12 , pp. 554-555
    • Lee, J.K.1    Ryu, S.R.2    Yoo, K.Y.3
  • 23
    • 79958119500 scopus 로고    scopus 로고
    • Privacy-preserving and tokenless chaotic revocable face authentication scheme
    • 10.1007/s11235-010-9314-2
    • Khan, M. K.; Alghathbar, K.; Zhang, J. (2011). Privacy-preserving and tokenless chaotic revocable face authentication scheme. Telecommunications Systems, 47(3-4), 227-234.
    • (2011) Telecommunications Systems , vol.47 , Issue.3-4 , pp. 227-234
    • Khan, M.K.1    Alghathbar, K.2    Zhang, J.3
  • 24
    • 79958162287 scopus 로고    scopus 로고
    • Biometric bits extraction through phase quantization based on feature level fusion
    • 10.1007/s11235-010-9317-z
    • Lee, H.; Teoh, A. B. J.; Kim, J. (2011). Biometric bits extraction through phase quantization based on feature level fusion. Telecommunications Systems, 47(3-4), 255-273.
    • (2011) Telecommunications Systems , vol.47 , Issue.3-4 , pp. 255-273
    • Lee, H.1    Teoh, A.B.J.2    Kim, J.3
  • 27
    • 0025405980 scopus 로고
    • A critique of the Burrows, Abadi, and Needham logic
    • 10.1145/382258.382789
    • Nessett, D. M. (1990). A critique of the Burrows, Abadi, and Needham logic. Operating Systems Review, 24(2), 35-38.
    • (1990) Operating Systems Review , vol.24 , Issue.2 , pp. 35-38
    • Nessett, D.M.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.