메뉴 건너뛰기




Volumn 14, Issue 11, 2014, Pages 21023-21044

A provably-secure ECC-based authentication scheme for wireless sensor networks

Author keywords

Authenticated key exchange; Authentication scheme; Smart card; Two factor security; User anonymity; Wireless sensor network

Indexed keywords

WIRELESS SENSOR NETWORKS;

EID: 84908621929     PISSN: 14248220     EISSN: None     Source Type: Journal    
DOI: 10.3390/s141121023     Document Type: Article
Times cited : (53)

References (35)
  • 1
    • 84904043180 scopus 로고    scopus 로고
    • Wireless sensor networks: A survey on recent developments and potential synergies
    • Rawat, P.; Singh, K.; Chaouchi, H.; Bonnin, J. Wireless sensor networks: A survey on recent developments and potential synergies. J. Supercomput. 2014, 68, 1–48.
    • (2014) J. Supercomput , vol.68 , pp. 1-48
    • Rawat, P.1    Singh, K.2    Chaouchi, H.3    Bonnin, J.4
  • 2
    • 79957718973 scopus 로고    scopus 로고
    • RUASN: A robust user authentication framework for wireless sensor networks
    • Kumar, P.; Choudhury, A.; Sain, M.; Lee, S.; Lee, H. RUASN: A robust user authentication framework for wireless sensor networks. Sensors 2011, 11, 5020–5046.
    • (2011) Sensors , vol.11 , pp. 5020-5046
    • Kumar, P.1    Choudhury, A.2    Sain, M.3    Lee, S.4    Lee, H.5
  • 3
    • 84901008838 scopus 로고    scopus 로고
    • An improved user authentication protocol for healthcare services via wireless medical sensor networks
    • 347169
    • Khan, M.; Kumari, S. An improved user authentication protocol for healthcare services via wireless medical sensor networks. Int. J. Distrib. Sens. Netw. 2014, 2014, No. 347169.
    • (2014) Int. J. Distrib. Sens. Netw , pp. 2014
    • Khan, M.1    Kumari, S.2
  • 4
    • 33646779184 scopus 로고    scopus 로고
    • Errors in computational complexity proofs for protocols
    • Chennai, India, 4–8 December
    • Choo, K.K.R.; Boyd, C.; Hitchcock, Y. Errors in computational complexity proofs for protocols. In Proceedings of ASIACRYPT 2005, Chennai, India, 4–8 December 2005; pp. 624–643.
    • (2005) Proceedings of ASIACRYPT 2005 , pp. 624-643
    • Choo, K.K.R.1    Boyd, C.2    Hitchcock, Y.3
  • 5
    • 77958106074 scopus 로고    scopus 로고
    • A security weakness in Abdalla et al.’s generic construction of a group key exchange protocol
    • Nam, J.; Paik, J.; Won, D. A security weakness in Abdalla et al.’s generic construction of a group key exchange protocol. Inf. Sci. 2011, 181, 234–238.
    • (2011) Inf. Sci , vol.181 , pp. 234-238
    • Nam, J.1    Paik, J.2    Won, D.3
  • 6
    • 84891596035 scopus 로고    scopus 로고
    • Dictionary attacks against password-based authenticated three-party key exchange protocols
    • Nam, J.; Choo, K.K.R.; Kim, M.; Paik, J.; Won, D. Dictionary attacks against password-based authenticated three-party key exchange protocols. KSII Trans. Internet Inf. Syst. 2013, 7, 3244–3260.
    • (2013) KSII Trans. Internet Inf. Syst , vol.7 , pp. 3244-3260
    • Nam, J.1    Choo, K.K.R.2    Kim, M.3    Paik, J.4    Won, D.5
  • 7
    • 33845638668 scopus 로고    scopus 로고
    • Refuting security proofs for tripartite key exchange with model checker in planning problem setting
    • Venice, Italy, 5–7 July
    • Choo, K.K.R. Refuting security proofs for tripartite key exchange with model checker in planning problem setting. In Proceedings of 19th IEEE Computer Security Foundations Workshop, Venice, Italy, 5–7 July 2006; pp. 297–308.
    • (2006) Proceedings of 19th IEEE Computer Security Foundations Workshop , pp. 297-308
    • Choo, K.K.R.1
  • 9
    • 0020720357 scopus 로고
    • On the security of public key protocols
    • Dolev, D.; Yao, A. On the security of public key protocols. IEEE Trans. Inf. Theory 1983, 29, 198–208.
    • (1983) IEEE Trans. Inf. Theory , vol.29 , pp. 198-208
    • Dolev, D.1    Yao, A.2
  • 10
    • 84873466407 scopus 로고    scopus 로고
    • Authenticated key exchange secure against dictionary attacks
    • Bruges, Belgium, 14–18 May
    • Bellare, M.; Pointcheval, D.; Rogaway, P. Authenticated key exchange secure against dictionary attacks. In Proceedings of EUROCRYPT 2000, Bruges, Belgium, 14–18 May 2000; pp. 139–155.
    • (2000) Proceedings of EUROCRYPT 2000 , pp. 139-155
    • Bellare, M.1    Pointcheval, D.2    Rogaway, P.3
  • 12
    • 62949130774 scopus 로고    scopus 로고
    • Two-factor user authentication in wireless sensor networks
    • Das, M. Two-factor user authentication in wireless sensor networks. IEEE Trans. Wirel. Commun. 2009, 8, 1086–1090.
    • (2009) IEEE Trans. Wirel. Commun , vol.8 , pp. 1086-1090
    • Das, M.1
  • 13
    • 78650459565 scopus 로고    scopus 로고
    • An enhanced two-factor user authentication scheme in wireless sensor networks
    • He, D.; Gao, Y.; Chan, S.; Chen, C.; Bu, J. An enhanced two-factor user authentication scheme in wireless sensor networks. Adhoc Sens. Wirel. Netw. 2010, 10, 361–371.
    • (2010) Adhoc Sens. Wirel. Netw , vol.10 , pp. 361-371
    • He, D.1    Gao, Y.2    Chan, S.3    Chen, C.4    Bu, J.5
  • 14
    • 77955495427 scopus 로고    scopus 로고
    • Cryptanalysis and security improvements of “two-factor user authentication in wireless sensor networks”
    • Khan, M.; Alghathbar, K. Cryptanalysis and security improvements of “two-factor user authentication in wireless sensor networks”. Sensors 2010, 10, 2450–2459.
    • (2010) Sensors , vol.10 , pp. 2450-2459
    • Khan, M.1    Alghathbar, K.2
  • 15
    • 78049334450 scopus 로고    scopus 로고
    • A robust mutual authentication protocol for wireless sensor networks
    • Chen, T.; Shih, W. A robust mutual authentication protocol for wireless sensor networks. ETRI J. 2010, 32, 704–712.
    • (2010) ETRI J , vol.32 , pp. 704-712
    • Chen, T.1    Shih, W.2
  • 16
    • 79957702363 scopus 로고    scopus 로고
    • A secured authentication protocol for wireless sensor networks using elliptic curves cryptography
    • Yeh, H.; Chen, T.; Liu, P.; Kim, T.; Wei, H. A secured authentication protocol for wireless sensor networks using elliptic curves cryptography. Sensors 2011, 11, 4767–4779.
    • (2011) Sensors , vol.11 , pp. 4767-4779
    • Yeh, H.1    Chen, T.2    Liu, P.3    Kim, T.4    Wei, H.5
  • 17
    • 84863271667 scopus 로고    scopus 로고
    • E-SAP: Efficient-strong authentication protocol for healthcare applications using wireless medical sensor networks
    • Kumar, P.; Lee, S.; Lee, H. E-SAP: Efficient-strong authentication protocol for healthcare applications using wireless medical sensor networks. Sensors 2012, 12, 1625–1647.
    • (2012) Sensors , vol.12 , pp. 1625-1647
    • Kumar, P.1    Lee, S.2    Lee, H.3
  • 18
    • 84863637154 scopus 로고    scopus 로고
    • A security-performance-balanced user authentication scheme for wireless sensor networks
    • No. 382810
    • Yoo, S.; Park, K.; Kim, J. A security-performance-balanced user authentication scheme for wireless sensor networks. Int. J. Distrib. Sens. Netw. 2012, 2012, No. 382810.
    • (2012) Int. J. Distrib. Sens. Netw , pp. 2012
    • Yoo, S.1    Park, K.2    Kim, J.3
  • 19
    • 84961312004 scopus 로고    scopus 로고
    • Two-factor mutual authentication with key agreement in wireless sensor networks
    • Vaidya, B.; Makrakis, D.; Mouftah, H. Two-factor mutual authentication with key agreement in wireless sensor networks. Secur. Commun. Netw. 2012, doi:10.1002/sec.517.
    • (2012) Secur. Commun. Netw
    • Vaidya, B.1    Makrakis, D.2    Mouftah, H.3
  • 20
    • 84870693016 scopus 로고    scopus 로고
    • A temporal-credential-based mutual authentication and key agreement scheme for wireless sensor networks
    • Xue, K.; Ma, C.; Hong, P.; Ding, R. A temporal-credential-based mutual authentication and key agreement scheme for wireless sensor networks. J. Netw. Comput. Appl. 2013, 36, 316–323.
    • (2013) J. Netw. Comput. Appl , vol.36 , pp. 316-323
    • Xue, K.1    Ma, C.2    Hong, P.3    Ding, R.4
  • 21
    • 84877308219 scopus 로고    scopus 로고
    • A new user authentication protocol for wireless sensor networks using elliptic curves cryptography
    • No. 730831
    • Shi, W.; Gong, P. A new user authentication protocol for wireless sensor networks using elliptic curves cryptography. Int. J. Distrib. Sens. Netw. 2013, 2013, No. 730831.
    • (2013) Int. J. Distrib. Sens. Netw , pp. 2013
    • Shi, W.1    Gong, P.2
  • 22
    • 84885231928 scopus 로고    scopus 로고
    • A strong authentication scheme with user privacy for wireless sensor networks
    • Kumar, P.; Gurtov, A.; Ylianttila, M.; Lee, S.; Lee, H. A strong authentication scheme with user privacy for wireless sensor networks. ETRI J. 2013, 35, 889–899.
    • (2013) ETRI J , vol.35 , pp. 889-899
    • Kumar, P.1    Gurtov, A.2    Ylianttila, M.3    Lee, S.4    Lee, H.5
  • 23
    • 84922001116 scopus 로고    scopus 로고
    • Robust anonymous authentication protocol for health-care applications using wireless medical sensor networks
    • He, D.; Kumar, N.; Chen, J.; Lee, C.; Chilamkurti, N.; Yeo, S. Robust anonymous authentication protocol for health-care applications using wireless medical sensor networks. Multimed. Syst. 2013, doi:10.1007/s00530-013-0346-9.
    • (2013) Multimed. Syst
    • He, D.1    Kumar, N.2    Chen, J.3    Lee, C.4    Chilamkurti, N.5    Yeo, S.6
  • 24
    • 84899502865 scopus 로고    scopus 로고
    • Analysis and improvement of a robust user authentication framework for ubiquitous sensor networks
    • 637684
    • Chi, L.; Hu, L.; Li, H.; Chu, J. Analysis and improvement of a robust user authentication framework for ubiquitous sensor networks. Int. J. Distrib. Sens. Netw. 2014, 2014, No. 637684.
    • (2014) Int. J. Distrib. Sens. Netw , pp. 2014
    • Chi, L.1    Hu, L.2    Li, H.3    Chu, J.4
  • 25
    • 84898648439 scopus 로고    scopus 로고
    • Security analysis and improvements of two-factor mutual authentication with key agreement in wireless sensor networks
    • Kim, J.; Lee, D.; Jeon, W.; Lee, Y.; Won, D. Security analysis and improvements of two-factor mutual authentication with key agreement in wireless sensor networks. Sensors 2014, 14, 6443–6462.
    • (2014) Sensors , vol.14 , pp. 6443-6462
    • Kim, J.1    Lee, D.2    Jeon, W.3    Lee, Y.4    Won, D.5
  • 26
    • 84939576175 scopus 로고    scopus 로고
    • An efficient two-factor user authentication scheme with unlinkability for wireless sensor networks
    • Jiang, Q.; Ma, J.; Lu, X.; Tian, Y. An efficient two-factor user authentication scheme with unlinkability for wireless sensor networks. Peer-to-Peer Netw. Appl. 2014, doi:10.1007/s12083-014-0285-z.
    • (2014) Peer-to-Peer Netw. Appl
    • Jiang, Q.1    Ma, J.2    Lu, X.3    Tian, Y.4
  • 27
    • 84902296026 scopus 로고    scopus 로고
    • Security enhanced user authentication protocol for wireless sensor networks using elliptic curves cryptography
    • Choi, Y.; Lee, D.; Kim, J.; Jung, J.; Nam, J.; Won, D. Security enhanced user authentication protocol for wireless sensor networks using elliptic curves cryptography. Sensors 2014, 14, 10081–10106.
    • (2014) Sensors , vol.14 , pp. 10081-10106
    • Choi, Y.1    Lee, D.2    Kim, J.3    Jung, J.4    Nam, J.5    Won, D.6
  • 28
    • 84939573910 scopus 로고    scopus 로고
    • Differential power analysis
    • Santa Barbara, CA, USA, 15–19 August
    • Kocher, P.; Jaffe, J.; Jun, B. Differential power analysis. In Proceedings of CRYPTO 1999, Santa Barbara, CA, USA, 15–19 August 1999; pp. 388–397.
    • (1999) Proceedings of CRYPTO 1999 , pp. 388-397
    • Kocher, P.1    Jaffe, J.2    Jun, B.3
  • 29
    • 0036566408 scopus 로고    scopus 로고
    • Examining smart-card security under the threat of power analysis attacks
    • Messerges, T.; Dabbish, E.; Sloan, R. Examining smart-card security under the threat of power analysis attacks. IEEE Trans. Comput. 2002, 51, 541–552.
    • (2002) IEEE Trans. Comput , vol.51 , pp. 541-552
    • Messerges, T.1    Dabbish, E.2    Sloan, R.3
  • 31
    • 80052427734 scopus 로고    scopus 로고
    • Cryptanalysis on two user authentication protocols using smart card or wireless sensor networks
    • London, UK, 20–22 June
    • Kumar, P.; Lee, H. Cryptanalysis on two user authentication protocols using smart card or wireless sensor networks. In Proceedings of the IEEE Wireless Advanced (WiAd), London, UK, 20–22 June 2011; pp. 241–245.
    • (2011) Proceedings of the IEEE Wireless Advanced (WiAd) , pp. 241-245
    • Kumar, P.1    Lee, H.2
  • 32
    • 84929941120 scopus 로고    scopus 로고
    • Password-only authenticated three-party key exchange proven secure against insider dictionary attacks
    • 802359
    • Nam, J.; Choo, K.K.R.; Paik, J.; Won, D. Password-only authenticated three-party key exchange proven secure against insider dictionary attacks. Sci. World J. 2014, 2014, No. 802359.
    • (2014) Sci. World J , pp. 2014
    • Nam, J.1    Choo, K.K.R.2    Paik, J.3    Won, D.4
  • 33
    • 84891688392 scopus 로고    scopus 로고
    • Anonymous two-factor authentication for consumer roaming service in global mobility networks
    • He, D.; Kumar, N.; Khan, M.; Lee, J. Anonymous two-factor authentication for consumer roaming service in global mobility networks. IEEE Trans. Consum. Electron. 2013, 59, 811–817.
    • (2013) IEEE Trans. Consum. Electron , vol.59 , pp. 811-817
    • He, D.1    Kumar, N.2    Khan, M.3    Lee, J.4
  • 34
    • 84895056653 scopus 로고    scopus 로고
    • Cryptanalysis and improvement of an anonymous authentication protocol for wireless access networks
    • He, D.; Zhang, Y.; Chen, J. Cryptanalysis and improvement of an anonymous authentication protocol for wireless access networks. Wirel. Pers. Commun. 2014, 74, 229–243.
    • (2014) Wirel. Pers. Commun , vol.74 , pp. 229-243
    • He, D.1    Zhang, Y.2    Chen, J.3
  • 35
    • 84898048082 scopus 로고    scopus 로고
    • Enhanced three-factor security protocol for USB mass storage devices
    • He, D.; Kumar, N.; Lee, J.; Sherratt, R. Enhanced three-factor security protocol for USB mass storage devices. IEEE Trans. Consum. Electron. 2014, 60, 30–37.
    • (2014) IEEE Trans. Consum. Electron , vol.60 , pp. 30-37
    • He, D.1    Kumar, N.2    Lee, J.3    Sherratt, R.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.