메뉴 건너뛰기




Volumn 30, Issue 1, 2017, Pages

A secure and effective biometric-based user authentication scheme for wireless sensor networks using smart card and fuzzy extractor

Author keywords

AVISPA; biometrics; cryptanalysis; security; smart cards; user authentication; wireless sensor networks

Indexed keywords

AUTHENTICATION; BIOMETRICS; COPYRIGHTS; CRYPTOGRAPHY; SMART CARDS; WIRELESS SENSOR NETWORKS;

EID: 84921852751     PISSN: 10745351     EISSN: 10991131     Source Type: Journal    
DOI: 10.1002/dac.2933     Document Type: Article
Times cited : (131)

References (55)
  • 1
    • 84892444069 scopus 로고    scopus 로고
    • An indicator kriging method for distributed estimation in wireless sensor networks
    • Liu G, Xu B, Chen H. An indicator kriging method for distributed estimation in wireless sensor networks. International Journal of Communication Systems 2014; 27(1):68–80.
    • (2014) International Journal of Communication Systems , vol.27 , Issue.1 , pp. 68-80
    • Liu, G.1    Xu, B.2    Chen, H.3
  • 2
    • 84896704964 scopus 로고    scopus 로고
    • TREE: routing strategy with guarantee of QOS for industrial wireless sensor networks
    • Xue L, Guan X, Liu Z, Yang B. TREE: routing strategy with guarantee of QOS for industrial wireless sensor networks. International Journal of Communication Systems 2014; 27(3):459–481.
    • (2014) International Journal of Communication Systems , vol.27 , Issue.3 , pp. 459-481
    • Xue, L.1    Guan, X.2    Liu, Z.3    Yang, B.4
  • 5
    • 84885618675 scopus 로고    scopus 로고
    • DDRP: an efficient data-driven routing protocol for wireless sensor networks with mobile sinks
    • Shi L, Zhang B, Mouftah HT, Ma J. DDRP: an efficient data-driven routing protocol for wireless sensor networks with mobile sinks. International Journal of Communication Systems 2013; 26(10):1341–1355.
    • (2013) International Journal of Communication Systems , vol.26 , Issue.10 , pp. 1341-1355
    • Shi, L.1    Zhang, B.2    Mouftah, H.T.3    Ma, J.4
  • 6
    • 84873703641 scopus 로고    scopus 로고
    • High energy-efficient and privacy-preserving secure data aggregation for wireless sensor networks
    • Liu CX, Liu Y, Zhang ZJ, Cheng ZY. High energy-efficient and privacy-preserving secure data aggregation for wireless sensor networks. International Journal of Communication Systems 2013; 26(3):380–394.
    • (2013) International Journal of Communication Systems , vol.26 , Issue.3 , pp. 380-394
    • Liu, C.X.1    Liu, Y.2    Zhang, Z.J.3    Cheng, Z.Y.4
  • 9
    • 84865623128 scopus 로고    scopus 로고
    • An energy efficient medium access control protocol for target tracking based on dynamic convey tree collaboration in wireless sensor networks
    • Wang Y, Shi P, Li K, Chen Z. An energy efficient medium access control protocol for target tracking based on dynamic convey tree collaboration in wireless sensor networks. International Journal of Communication Systems 2012; 25(9):1139–1159.
    • (2012) International Journal of Communication Systems , vol.25 , Issue.9 , pp. 1139-1159
    • Wang, Y.1    Shi, P.2    Li, K.3    Chen, Z.4
  • 11
    • 84915759809 scopus 로고    scopus 로고
    • Analysis formal security verification of access control schemes in wireless sensor networks: a critical survey
    • Chatterjee S, Das AK, Sing JK. Analysis formal security verification of access control schemes in wireless sensor networks: a critical survey. Journal of Information Assurance and Security 2013; 8(1):33–57.
    • (2013) Journal of Information Assurance and Security , vol.8 , Issue.1 , pp. 33-57
    • Chatterjee, S.1    Das, A.K.2    Sing, J.K.3
  • 13
    • 84858227508 scopus 로고    scopus 로고
    • A survey on analytic studies of key distribution mechanisms in wireless sensor networks
    • Das AK. A survey on analytic studies of key distribution mechanisms in wireless sensor networks. Journal of Information Assurance and Security 2010; 5(5):526–553.
    • (2010) Journal of Information Assurance and Security , vol.5 , Issue.5 , pp. 526-553
    • Das, A.K.1
  • 15
    • 84860253312 scopus 로고    scopus 로고
    • Security and privacy issues in wireless sensor networks for healthcare applications
    • Ameen MA, Liu J, Kwak K. Security and privacy issues in wireless sensor networks for healthcare applications. Journal of Medical Systems 2012; 36(1):93–101.
    • (2012) Journal of Medical Systems , vol.36 , Issue.1 , pp. 93-101
    • Ameen, M.A.1    Liu, J.2    Kwak, K.3
  • 16
    • 84862762845 scopus 로고    scopus 로고
    • A dynamic password-based user authentication scheme for hierarchical wireless sensor networks
    • Das AK, Sharma P, Chatterjee S, Sing JK. A dynamic password-based user authentication scheme for hierarchical wireless sensor networks. Journal of Network and Computer Applications 2012; 35(5):1646–1656.
    • (2012) Journal of Network and Computer Applications , vol.35 , Issue.5 , pp. 1646-1656
    • Das, A.K.1    Sharma, P.2    Chatterjee, S.3    Sing, J.K.4
  • 17
    • 78049334450 scopus 로고    scopus 로고
    • A robust mutual authentication protocol for wireless sensor networks
    • Chen TH, Shih WK. A robust mutual authentication protocol for wireless sensor networks. ETRI Journal 2010; 32(5):704–712.
    • (2010) ETRI Journal , vol.32 , Issue.5 , pp. 704-712
    • Chen, T.H.1    Shih, W.K.2
  • 19
    • 78650459565 scopus 로고    scopus 로고
    • An enhanced two-factor user authentication scheme in wireless sensor networks
    • He D, Gao Y, Chan S, Chen C, Bu J. An enhanced two-factor user authentication scheme in wireless sensor networks. Ad Hoc & Sensor Wireless Networks 2010; 10(4):361–371.
    • (2010) Ad Hoc & Sensor Wireless Networks , vol.10 , Issue.4 , pp. 361-371
    • He, D.1    Gao, Y.2    Chan, S.3    Chen, C.4    Bu, J.5
  • 20
    • 77955495427 scopus 로고    scopus 로고
    • Cryptanalysis and security improvements of two-factor user authentication in wireless sensor networks
    • Khan MK, Alghathbar K. Cryptanalysis and security improvements of two-factor user authentication in wireless sensor networks. Sensors 2010; 10:2450–2459.
    • (2010) Sensors , vol.10 , pp. 2450-2459
    • Khan, M.K.1    Alghathbar, K.2
  • 21
    • 79953085274 scopus 로고    scopus 로고
    • Two attacks on a two-factor user authentication in wireless sensor networks
    • Lee CC, Li CT, Chen SD. Two attacks on a two-factor user authentication in wireless sensor networks. Parallel Processing Letters 2011; 21(1):21–26.
    • (2011) Parallel Processing Letters , vol.21 , Issue.1 , pp. 21-26
    • Lee, C.C.1    Li, C.T.2    Chen, S.D.3
  • 25
    • 84901198272 scopus 로고    scopus 로고
    • Understanding security failures of two-factor authentication schemes for real-time applications in hierarchical wireless sensor networks
    • In Press. [Accessed on April 2014]
    • Wang D, Wang P. Understanding security failures of two-factor authentication schemes for real-time applications in hierarchical wireless sensor networks. Ad Hoc Networks 2014; 20: 1–15. In Press. Available from: http://dx.doi.org/10.1016/j.adhoc.2014.03.003 [Accessed on April 2014]
    • (2014) Ad Hoc Networks , vol.20 , pp. 1-15
    • Wang, D.1    Wang, P.2
  • 26
    • 77952339469 scopus 로고    scopus 로고
    • A biometric-based user authentication for wireless sensor networks
    • Yuan J, Jiang C, Jiang Z. A biometric-based user authentication for wireless sensor networks. Wuhan University Journal of Natural Sciences 2010; 15(3):272–276.
    • (2010) Wuhan University Journal of Natural Sciences , vol.15 , Issue.3 , pp. 272-276
    • Yuan, J.1    Jiang, C.2    Jiang, Z.3
  • 27
    • 62949130774 scopus 로고    scopus 로고
    • Two-factor user authentication in wireless sensor networks
    • Das ML. Two-factor user authentication in wireless sensor networks. IEEE Transactions on Wireless Communications 2009; 8(3):1086–1090.
    • (2009) IEEE Transactions on Wireless Communications , vol.8 , Issue.3 , pp. 1086-1090
    • Das, M.L.1
  • 28
    • 84941217626 scopus 로고    scopus 로고
    • A new biometric-based remote user authentication scheme in hierarchical wireless body area sensor networks
    • In Press
    • Das AK, Chatterjee S, Sing JK. A new biometric-based remote user authentication scheme in hierarchical wireless body area sensor networks. Ad Hoc & Sensor Wireless Networks 2014. In Press.
    • (2014) Ad Hoc & Sensor Wireless Networks
    • Das, A.K.1    Chatterjee, S.2    Sing, J.K.3
  • 29
    • 84878645187 scopus 로고    scopus 로고
    • An efficient biometric authentication protocol for wireless sensor networks
    • [Accessed on April 2013]
    • Althobaiti O, Al-Rodhaan M, Al-Dhelaan A. An efficient biometric authentication protocol for wireless sensor networks. International Journal of Distributed Sensor Networks 2013; 2013:1–13. Article ID 407971, Available from: http://dx.doi.org/10.1155/2013/407971 [Accessed on April 2013].
    • (2013) International Journal of Distributed Sensor Networks , vol.2013 , pp. 1-13
    • Althobaiti, O.1    Al-Rodhaan, M.2    Al-Dhelaan, A.3
  • 30
    • 84927623620 scopus 로고    scopus 로고
    • Cryptanalysis of an efficient biometric authentication protocol for wireless sensor networks
    • In, Mauri J, Thampi S, Rawat D, Jin D, (eds)., Springer, Berlin, Heidelberg, [Accessed on September 2014]
    • Das AK. Cryptanalysis of an efficient biometric authentication protocol for wireless sensor networks. In Security in Computing and Communications, Communications in Computer and Information Science, Vol. 467, Mauri J, Thampi S, Rawat D, Jin D (eds). Springer: Berlin, Heidelberg, 2014; 1–9. Available from: http://dx.doi.org/10.1007/978-3-662-44966-0_{1} [Accessed on September 2014].
    • (2014) Security in Computing and Communications, Communications in Computer and Information Science , vol.467 , pp. 1-9
    • Das, A.K.1
  • 32
    • 84953352636 scopus 로고    scopus 로고
    • A secure and robust temporal credential-based three-factor user authentication scheme for wireless sensor networks
    • [Accessed on August 2013]
    • Das AK. A secure and robust temporal credential-based three-factor user authentication scheme for wireless sensor networks. Peer-to-Peer Networking and Applications 2014; 1–22. Available from: http://dx.doi.org/10.1007/s12083-014-0324-9 [Accessed on August 2013].
    • (2014) Peer-to-Peer Networking and Applications , pp. 1-22
    • Das, A.K.1
  • 34
    • 84877090869 scopus 로고    scopus 로고
    • A secure and efficient uniqueness-and-anonymity-preserving remote user authentication scheme for connected health care
    • Das AK, Goswami A. A secure and efficient uniqueness-and-anonymity-preserving remote user authentication scheme for connected health care. Journal of Medical Systems 2013; 37(3):1–16.
    • (2013) Journal of Medical Systems , vol.37 , Issue.3 , pp. 1-16
    • Das, A.K.1    Goswami, A.2
  • 35
    • 78651389846 scopus 로고    scopus 로고
    • A simple and generic construction of authenticated encryption with associated data
    • Sarkar P. A simple and generic construction of authenticated encryption with associated data. ACM Transactions on Information and System Security 2010; 13(4):33.
    • (2010) ACM Transactions on Information and System Security , vol.13 , Issue.4 , pp. 33
    • Sarkar, P.1
  • 36
    • 30744432873 scopus 로고    scopus 로고
    • Some observations on the theory of cryptographic hash functions
    • Stinson DR. Some observations on the theory of cryptographic hash functions. Designs, Codes and Cryptography 2006; 38(2):259–277.
    • (2006) Designs, Codes and Cryptography , vol.38 , Issue.2 , pp. 259-277
    • Stinson, D.R.1
  • 37
    • 84897055589 scopus 로고    scopus 로고
    • A secure effective key management scheme for dynamic access control in a large leaf class hierarchy
    • Odelu V, Das AK, Goswami A. A secure effective key management scheme for dynamic access control in a large leaf class hierarchy. Information Sciences 2014; 269(C):270–285.
    • (2014) Information Sciences , vol.269 , Issue.C , pp. 270-285
    • Odelu, V.1    Das, A.K.2    Goswami, A.3
  • 38
    • 84873031582 scopus 로고    scopus 로고
    • An efficient key-management scheme for hierarchical access control in e-medicine system
    • Wu S, Chen K. An efficient key-management scheme for hierarchical access control in e-medicine system. Journal of Medical Systems 2012; 36(4):2325–2337.
    • (2012) Journal of Medical Systems , vol.36 , Issue.4 , pp. 2325-2337
    • Wu, S.1    Chen, K.2
  • 40
    • 35048865463 scopus 로고    scopus 로고
    • Fuzzy extractors: how to generate strong keys from biometrics and other noisy data
    • Interlaken, Switzerland
    • Dodis Y, Reyzin L, Smith A. Fuzzy extractors: how to generate strong keys from biometrics and other noisy data. Proceedings of the Advances in Cryptology (Eurocrypt'04), LNCS, Vol. 3027, Interlaken, Switzerland, 2004; 523–540.
    • (2004) Proceedings of the Advances in Cryptology (Eurocrypt'04), LNCS , vol.3027 , pp. 523-540
    • Dodis, Y.1    Reyzin, L.2    Smith, A.3
  • 42
    • 0009504774 scopus 로고
    • National Institute of Standards and Technology (NIST), U.S. Department of Commerce
    • Standard SH. FIPS PUB 180-1,National Institute of Standards and Technology (NIST), U.S. Department of Commerce, 1995.
    • (1995) FIPS PUB 180-1
  • 44
    • 0036566408 scopus 로고    scopus 로고
    • Examining smart-card security under the threat of power analysis attacks
    • Messerges TS, Dabbish EA, Sloan RH. Examining smart-card security under the threat of power analysis attacks. IEEE Transactions on Computers 2002; 51(5):541–552.
    • (2002) IEEE Transactions on Computers , vol.51 , Issue.5 , pp. 541-552
    • Messerges, T.S.1    Dabbish, E.A.2    Sloan, R.H.3
  • 46
    • 77954920932 scopus 로고    scopus 로고
    • An efficient dynamic group key agreement protocol for imbalanced wireless networks
    • Chuang YH, Tseng YM. An efficient dynamic group key agreement protocol for imbalanced wireless networks. International Journal of Network Management 2010; 20(4):167–180.
    • (2010) International Journal of Network Management , vol.20 , Issue.4 , pp. 167-180
    • Chuang, Y.H.1    Tseng, Y.M.2
  • 49
    • 70349371604 scopus 로고    scopus 로고
    • The high-level protocol specification language HLPSL developed in the EU project avispa
    • Tallinn
    • von Oheimb D. The high-level protocol specification language HLPSL developed in the EU project avispa. Proceedings of APPSEM 2005 Workshop, Tallinn, 2005; 1–17.
    • (2005) Proceedings of APPSEM 2005 Workshop , pp. 1-17
    • von Oheimb, D.1
  • 51
    • 84877723487 scopus 로고    scopus 로고
    • [Accessed on July 2014]
    • AVISPA Web Tool. Available from: http://www.avispa-project.org/web-interface/expert.php/ [Accessed on July 2014].
    • AVISPA Web Tool
  • 52
    • 84863637154 scopus 로고    scopus 로고
    • A security-performance-balanced user authentication scheme for wireless sensor networks
    • Yoo SG, Park KY, Kim J. A security-performance-balanced user authentication scheme for wireless sensor networks. International Journal of Distributed Sensor Networks 2012; 2012:11. Article ID 382810, DOI: 10.1155/2012/382810.
    • (2012) International Journal of Distributed Sensor Networks , vol.2012 , pp. 11
    • Yoo, S.G.1    Park, K.Y.2    Kim, J.3
  • 53
    • 84883446358 scopus 로고    scopus 로고
    • On the security and improvement of a two-factor user authentication scheme in wireless sensor networks
    • Sun DZ, Li JX, Feng ZY, Cao ZF, Xu GQ. On the security and improvement of a two-factor user authentication scheme in wireless sensor networks. Personal and Ubiquitous Computing 2013; 17(5):895–905.
    • (2013) Personal and Ubiquitous Computing , vol.17 , Issue.5 , pp. 895-905
    • Sun, D.Z.1    Li, J.X.2    Feng, Z.Y.3    Cao, Z.F.4    Xu, G.Q.5
  • 54
    • 84870693016 scopus 로고    scopus 로고
    • A temporal-credential-based mutual authentication and key agreement scheme for wireless sensor networks
    • Xue K, Ma C, Hong P, Ding R. A temporal-credential-based mutual authentication and key agreement scheme for wireless sensor networks. Journal of Network and Computer Applications 2013; 36(1):316–323.
    • (2013) Journal of Network and Computer Applications , vol.36 , Issue.1 , pp. 316-323
    • Xue, K.1    Ma, C.2    Hong, P.3    Ding, R.4
  • 55
    • 84939576175 scopus 로고    scopus 로고
    • An efficient two-factor user authentication scheme with unlinkability for wireless sensor networks
    • Jiang Q, Ma J, Lu X, Tian Y. An efficient two-factor user authentication scheme with unlinkability for wireless sensor networks. Peer-to-Peer Networking and Applications 2014; 1–12. DOI: 10.1007/s12083-014-0285-z.
    • (2014) Peer-to-Peer Networking and Applications , pp. 1-12
    • Jiang, Q.1    Ma, J.2    Lu, X.3    Tian, Y.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.