메뉴 건너뛰기




Volumn 14, Issue 6, 2014, Pages 10081-10106

Security enhanced user authentication protocol for wireless sensor networks using elliptic curves cryptography

Author keywords

Authentication protocol; Elliptic curves cryptography; Wireless sensor network

Indexed keywords

AUTHENTICATION; GEOMETRY; PUBLIC KEY CRYPTOGRAPHY; SENSORS; SMART CARDS;

EID: 84902296026     PISSN: 14248220     EISSN: None     Source Type: Journal    
DOI: 10.3390/s140610081     Document Type: Article
Times cited : (205)

References (36)
  • 1
    • 69949134676 scopus 로고    scopus 로고
    • Authenticated reliable and semi-reliable communication in wireless sensor networks
    • Dressler, F. Authenticated reliable and semi-reliable communication in wireless sensor networks. Int. J. Netw. Secur. 2008, 7, 61-68.
    • (2008) Int. J. Netw. Secur. , vol.7 , pp. 61-68
    • Dressler, F.1
  • 2
    • 79957702363 scopus 로고    scopus 로고
    • A secured authentication protocol for wireless sensor networks using elliptic curves cryptography
    • Yeh, H.L.; Chen, T.H.; Liu, P.C.; Kim, T.H.; Wei, H.W. A secured authentication protocol for wireless sensor networks using elliptic curves cryptography. Sensors 2011, 11, 4767-4779.
    • (2011) Sensors , vol.11 , pp. 4767-4779
    • Yeh, H.L.1    Chen, T.H.2    Liu, P.C.3    Kim, T.H.4    Wei, H.W.5
  • 3
    • 84877308219 scopus 로고    scopus 로고
    • A new user authentication protocol for wireless sensor networks using elliptic curves cryptography
    • 2013
    • Shi, W.; Gong, P. A new user authentication protocol for wireless sensor networks using elliptic curves cryptography. Int. J. Distrib. Sens. Netw. 2013, 2013, 730831.
    • (2013) Int. J. Distrib. Sens. Netw. , pp. 730831
    • Shi, W.1    Gong, P.2
  • 8
    • 62949130774 scopus 로고    scopus 로고
    • Two-factor user authentication in wireless sensor networks
    • Das, M.L. Two-factor user authentication in wireless sensor networks. IEEE Trans. Wirel. Commun. 2009, 8, 1086-1090.
    • (2009) IEEE Trans. Wirel. Commun. , vol.8 , pp. 1086-1090
    • Das, M.L.1
  • 9
    • 78650459565 scopus 로고    scopus 로고
    • An enhanced two-factor user authentication scheme in wireless sensor networks
    • He, D.; Gao, Y.; Chan, S.; Chen, C.; Bu, J. An enhanced two-factor user authentication scheme in wireless sensor networks. Ad Hoc Sens. Wirel. Netw. 2010, 10, 361-371.
    • (2010) Ad Hoc Sens. Wirel. Netw. , vol.10 , pp. 361-371
    • He, D.1    Gao, Y.2    Chan, S.3    Chen, C.4    Bu, J.5
  • 10
    • 77955495427 scopus 로고    scopus 로고
    • Cryptanalysis and security improvements of "two-factor user authentication in wireless sensor networks"
    • Khan, M.K.; Alghathbar, K. Cryptanalysis and security improvements of "two-factor user authentication in wireless sensor networks". Sensors 2010, 10, 2450-2459.
    • (2010) Sensors , vol.10 , pp. 2450-2459
    • Khan, M.K.1    Alghathbar, K.2
  • 11
    • 78049334450 scopus 로고    scopus 로고
    • A robust mutual authentication protocol for wireless sensor networks
    • Chen, T.H.; Shih, W.K. A robust mutual authentication protocol for wireless sensor networks. ETRI J. 2010, 32, 704-712.
    • (2010) ETRI J. , vol.32 , pp. 704-712
    • Chen, T.H.1    Shih, W.K.2
  • 14
    • 0036566408 scopus 로고    scopus 로고
    • Examining smart-card security under the threat of power analysis attacks
    • Messerges, T.S.; Dabbish, E.A.; Sloan, R.H. Examining smart-card security under the threat of power analysis attacks. IEEE Trans. Comput. 2002, 51, 541-552
    • (2002) IEEE Trans. Comput. , vol.51 , pp. 541-552
    • Messerges, T.S.1    Dabbish, E.A.2    Sloan, R.H.3
  • 15
    • 84902241575 scopus 로고    scopus 로고
    • A Survey of Elliptic Curve Cryptography Implementation Approaches for Efficient Smart Card Processing
    • Muthukuru, J.; Sathyanarayana, B. A Survey of Elliptic Curve Cryptography Implementation Approaches for Efficient Smart Card Processing. Glob. J. Comput. Sci. Technol. 2012, 12, 7-12.
    • (2012) Glob. J. Comput. Sci. Technol. , vol.12 , pp. 7-12
    • Muthukuru, J.1    Sathyanarayana, B.2
  • 17
    • 33744525893 scopus 로고    scopus 로고
    • A distributed multi-party key agreement protocol for dynamic collaborative groups using ECC
    • Venkata, C.; Saikat, C.; Mukesh, S. A distributed multi-party key agreement protocol for dynamic collaborative groups using ECC. J. Parall. Distrib. Comput. 2006, 66, 959-970.
    • (2006) J. Parall. Distrib. Comput. , vol.66 , pp. 959-970
    • Venkata, C.1    Saikat, C.2    Mukesh, S.3
  • 18
    • 70349791260 scopus 로고    scopus 로고
    • A simple user authentication scheme for grid computing
    • Lu, R.; Cao, Z.; Chai, Z.; Liang, X. A simple user authentication scheme for grid computing. Int. J. Netw. Secur. 2008, 7, 202-206.
    • (2008) Int. J. Netw. Secur. , vol.7 , pp. 202-206
    • Lu, R.1    Cao, Z.2    Chai, Z.3    Liang, X.4
  • 19
    • 63649090970 scopus 로고    scopus 로고
    • An off-line dictionary attack on a simple three-party key exchange protocol
    • Nam, J.; Paik, J.; Kang, H.K.; Kim, U.M.; Won, D. An off-line dictionary attack on a simple three-party key exchange protocol. IEEE Commun. Lett. 2009, 13, 205-207.
    • (2009) IEEE Commun. Lett. , vol.13 , pp. 205-207
    • Nam, J.1    Paik, J.2    Kang, H.K.3    Kim, U.M.4    Won, D.5
  • 20
    • 72449211714 scopus 로고    scopus 로고
    • Enhancement of two-factor authenticated key exchange protocols in public wireless LANs
    • Lee, Y.; Kim, S.; Won, D. Enhancement of two-factor authenticated key exchange protocols in public wireless LANs. Comput. Electr. Eng. 2010, 36, 213-223.
    • (2010) Comput. Electr. Eng. , vol.36 , pp. 213-223
    • Lee, Y.1    Kim, S.2    Won, D.3
  • 21
    • 84891596035 scopus 로고    scopus 로고
    • Dictionary attacks against password-based authenticated three-party key exchange protocols
    • Nam, J.; Choo, K.K.R.; Kim, M.; Paik, J.; Won, D. Dictionary attacks against password-based authenticated three-party key exchange protocols. KSII Trans. Internet Inf. Syst. 2013, 7, 3244-3260.
    • (2013) KSII Trans. Internet Inf. Syst. , vol.7 , pp. 3244-3260
    • Nam, J.1    Choo, K.K.R.2    Kim, M.3    Paik, J.4    Won, D.5
  • 22
    • 84863463143 scopus 로고    scopus 로고
    • An enhanced secure authentication scheme with anonymity for wireless environments
    • Jeon, W.; Kim, J.; Nam, J.; Lee, Y.; Won, W. An enhanced secure authentication scheme with anonymity for wireless environments. IEICE Trans. Commun. 2012, E95. B, 2505-2508.
    • (2012) IEICE Trans. Commun. , vol.E95-B , pp. 2505-2508
    • Jeon, W.1    Kim, J.2    Nam, J.3    Lee, Y.4    Won, W.5
  • 25
    • 80053630581 scopus 로고    scopus 로고
    • Maximum damage battery depletion attack in mobile sensor networks
    • Khouzani, M.H.R.; Sarkar, S. Maximum damage battery depletion attack in mobile sensor networks. IEEE Trans. Autom. Control 2011, 56, 2358-2368.
    • (2011) IEEE Trans. Autom. Control , vol.56 , pp. 2358-2368
    • Khouzani, M.H.R.1    Sarkar, S.2
  • 26
    • 84867839301 scopus 로고    scopus 로고
    • Maximum damage malware attack in mobile wireless networks
    • Khouzani, M.H.R.; Sarkar, S.; Altman, E. Maximum damage malware attack in mobile wireless networks. ACM Trans. Netw. 2012, 20, 1347-1360.
    • (2012) ACM Trans. Netw. , vol.20 , pp. 1347-1360
    • Khouzani, M.H.R.1    Sarkar, S.2    Altman, E.3
  • 27
    • 34347393777 scopus 로고    scopus 로고
    • Identity-based key agreement protocols from pairings
    • Chen, L.; Cheng, Z.; Smart, N.P. Identity-based key agreement protocols from pairings. Int. J. Inf. Secur. 2007, 6, 213-241.
    • (2007) Int. J. Inf. Secur. , vol.6 , pp. 213-241
    • Chen, L.1    Cheng, Z.2    Smart, N.P.3
  • 28
    • 69549116775 scopus 로고    scopus 로고
    • Identity-based anonymous remote authentication for value-added services in mobile networks
    • Cao, X.; Zeng, X.; Kou, W.; Hu, L. Identity-based anonymous remote authentication for value-added services in mobile networks. IEEE Trans. Veh. Technol. 2009, 58, 3508-3517.
    • (2009) IEEE Trans. Veh. Technol. , vol.58 , pp. 3508-3517
    • Cao, X.1    Zeng, X.2    Kou, W.3    Hu, L.4
  • 29
    • 80051571433 scopus 로고    scopus 로고
    • An ID-based client authentication with key agreement protocol for mobile client-server environment on ECC with provable security
    • He, D.; Chen, J.; Hu, J. An ID-based client authentication with key agreement protocol for mobile client-server environment on ECC with provable security. Inf. Fusion 2012, 13, 223-230.
    • (2012) Inf. Fusion , vol.13 , pp. 223-230
    • He, D.1    Chen, J.2    Hu, J.3
  • 30
    • 77957997482 scopus 로고    scopus 로고
    • Weaknesses and improvement of secure hash-based strong-password authentication protocol
    • Jeong, H.; Won, D.; Kim, S. Weaknesses and improvement of secure hash-based strong-password authentication protocol. J. Inf. Sci. Eng. 2010, 26, 1845-1858.
    • (2010) J. Inf. Sci. Eng. , vol.26 , pp. 1845-1858
    • Jeong, H.1    Won, D.2    Kim, S.3
  • 31
    • 33750133438 scopus 로고    scopus 로고
    • Security enhancement on a new authentication scheme with anonymity for wireless environments
    • Lee, C.C.; Hwang, M.S.; Liao, I.E. Security enhancement on a new authentication scheme with anonymity for wireless environments. IEEE Trans. Ind. Electron. 2006, 53, 1683-1687.
    • (2006) IEEE Trans. Ind. Electron. , vol.53 , pp. 1683-1687
    • Lee, C.C.1    Hwang, M.S.2    Liao, I.E.3
  • 32
  • 36
    • 84961312004 scopus 로고    scopus 로고
    • Two-factor mutual authentication with key agreement in wireless sensor networks
    • doi:10.1002/sec.517
    • Vaidya, B.; Makrakis, D.; Mouftah, H. Two-factor mutual authentication with key agreement in wireless sensor networks. Secur. Commun. Netw. 2012, doi:10.1002/sec.517.
    • (2012) Secur. Commun. Netw.
    • Vaidya, B.1    Makrakis, D.2    Mouftah, H.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.