메뉴 건너뛰기




Volumn 9, Issue 15, 2016, Pages 2643-2655

A new authentication protocol for healthcare applications using wireless medical sensor networks with user anonymity

Author keywords

authentication; biometric; password; smart card; wireless medical sensor networks

Indexed keywords

BIOMETRICS; COPYRIGHTS; DENIAL-OF-SERVICE ATTACK; HEALTH CARE; MOBILE DEVICES; SENSOR NODES; SMART CARDS; WIRELESS TELECOMMUNICATION SYSTEMS;

EID: 84923405290     PISSN: 19390114     EISSN: 19390122     Source Type: Journal    
DOI: 10.1002/sec.1214     Document Type: Conference Paper
Times cited : (134)

References (36)
  • 2
    • 77956882701 scopus 로고    scopus 로고
    • Wireless sensor networks for healthcare: a survey
    • Alemdar H, Ersoy C. Wireless sensor networks for healthcare: a survey. Computer Networks 2010; 54(15):2688–2710.
    • (2010) Computer Networks , vol.54 , Issue.15 , pp. 2688-2710
    • Alemdar, H.1    Ersoy, C.2
  • 3
    • 84863271667 scopus 로고    scopus 로고
    • E-SAP: efficient-strong authentication protocol for healthcare applications using wireless medical sensor networks
    • Kumar P, Lee SG, Lee HJ. E-SAP: efficient-strong authentication protocol for healthcare applications using wireless medical sensor networks. Sensors 2012; 12(2):1625–1647.
    • (2012) Sensors , vol.12 , Issue.2 , pp. 1625-1647
    • Kumar, P.1    Lee, S.G.2    Lee, H.J.3
  • 4
    • 84878597719 scopus 로고    scopus 로고
    • A novel smart card and dynamic ID based remote user authentication scheme for multi-server environments
    • Li X, Ma J, Wang WD, Xiong YP, Zhang JS. A novel smart card and dynamic ID based remote user authentication scheme for multi-server environments. Mathematical and Computer Modelling 2013; 58(1):85–95.
    • (2013) Mathematical and Computer Modelling , vol.58 , Issue.1 , pp. 85-95
    • Li, X.1    Ma, J.2    Wang, W.D.3    Xiong, Y.P.4    Zhang, J.S.5
  • 5
    • 84856217617 scopus 로고    scopus 로고
    • An efficient and security dynamic identity based authentication protocol for multi-server architecture using smart cards
    • Li X, Xiong YP, Ma J, Wang WD. An efficient and security dynamic identity based authentication protocol for multi-server architecture using smart cards. Journal of Network and Computer Applications 2012; 35(2):763–769.
    • (2012) Journal of Network and Computer Applications , vol.35 , Issue.2 , pp. 763-769
    • Li, X.1    Xiong, Y.P.2    Ma, J.3    Wang, W.D.4
  • 6
    • 84938960924 scopus 로고    scopus 로고
    • An enhancement of a smart card authentication scheme for multi-server architecture
    • Li X, Niu JW, Kumari S, Liao JG, Liang W. An enhancement of a smart card authentication scheme for multi-server architecture. Wireless Personal Communications 2015; 80(1):175–192.
    • (2015) Wireless Personal Communications , vol.80 , Issue.1 , pp. 175-192
    • Li, X.1    Niu, J.W.2    Kumari, S.3    Liao, J.G.4    Liang, W.5
  • 7
    • 84903725812 scopus 로고    scopus 로고
    • Privacy and authentication protocol for mobile RFID systems
    • Niu B, Zhu X, Chi H, Li H. Privacy and authentication protocol for mobile RFID systems. Wireless Personal Communications 2014; 77(3):1713–1731.
    • (2014) Wireless Personal Communications , vol.77 , Issue.3 , pp. 1713-1731
    • Niu, B.1    Zhu, X.2    Chi, H.3    Li, H.4
  • 9
    • 36348970576 scopus 로고    scopus 로고
    • Privacy-preserving telecardiology sensor networks: toward a low-cost portable wireless hardware/software codesign
    • Hu F, Jiang M, Wagner M, Dong DC. Privacy-preserving telecardiology sensor networks: toward a low-cost portable wireless hardware/software codesign. IEEE Transactions on Information Technology in Biomedicine 2007; 11(6):619–627.
    • (2007) IEEE Transactions on Information Technology in Biomedicine , vol.11 , Issue.6 , pp. 619-627
    • Hu, F.1    Jiang, M.2    Wagner, M.3    Dong, D.C.4
  • 10
    • 67349219359 scopus 로고    scopus 로고
    • Pervasive, secure access to a hierarchical sensor-based healthcare monitoring architecture in wireless heterogeneous networks
    • Huang YM, Hsieh MY, Chao HC, Hung SH, Park JH. Pervasive, secure access to a hierarchical sensor-based healthcare monitoring architecture in wireless heterogeneous networks. IEEE Journal on Selected Areas in Communications 2009; 27(4):400–411.
    • (2009) IEEE Journal on Selected Areas in Communications , vol.27 , Issue.4 , pp. 400-411
    • Huang, Y.M.1    Hsieh, M.Y.2    Chao, H.C.3    Hung, S.H.4    Park, J.H.5
  • 11
    • 70349646298 scopus 로고    scopus 로고
    • Design and implementation of a securewireless mote-based medical sensor network
    • Malasri K, Wang L. Design and implementation of a securewireless mote-based medical sensor network. Sensors 2009; 9(8):6273–6297.
    • (2009) Sensors , vol.9 , Issue.8 , pp. 6273-6297
    • Malasri, K.1    Wang, L.2
  • 12
    • 79953065589 scopus 로고    scopus 로고
    • An efficient mutual authentication and access control scheme for wireless sensor networks in healthcare
    • Le XH, Khalid M, Sankar R, Lee S. An efficient mutual authentication and access control scheme for wireless sensor networks in healthcare. Journal of Networks 2011; 6(3):355–364.
    • (2011) Journal of Networks , vol.6 , Issue.3 , pp. 355-364
    • Le, X.H.1    Khalid, M.2    Sankar, R.3    Lee, S.4
  • 13
    • 62949130774 scopus 로고    scopus 로고
    • Two-factor user authentication in wireless sensor networks
    • Das ML. Two-factor user authentication in wireless sensor networks. IEEE Transactions on Wireless Communications 2009; 8(3):1086–1090.
    • (2009) IEEE Transactions on Wireless Communications , vol.8 , Issue.3 , pp. 1086-1090
    • Das, M.L.1
  • 14
    • 84862773089 scopus 로고    scopus 로고
    • Improvement of Das's two-factor authentication protocol in wireless sensor networks
    • Nyang D, Lee MK. Improvement of Das's two-factor authentication protocol in wireless sensor networks. IACR Cryptology ePrint Archive 2009; 2009:631.
    • (2009) IACR Cryptology ePrint Archive , vol.2009 , pp. 631
    • Nyang, D.1    Lee, M.K.2
  • 16
    • 78049334450 scopus 로고    scopus 로고
    • A robust mutual authentication protocol for wireless sensor networks
    • Chen TH, Shih WK. A robust mutual authentication protocol for wireless sensor networks. ETRI Journal 2010; 32(5):704–712.
    • (2010) ETRI Journal , vol.32 , Issue.5 , pp. 704-712
    • Chen, T.H.1    Shih, W.K.2
  • 17
    • 77955495427 scopus 로고    scopus 로고
    • Cryptanalysis and security improvements of ‘two-factor user authentication in wireless sensor networks’
    • Khan MK, Alghathbar K. Cryptanalysis and security improvements of ‘two-factor user authentication in wireless sensor networks’. Sensors 2010; 10(3):2450–2459.
    • (2010) Sensors , vol.10 , Issue.3 , pp. 2450-2459
    • Khan, M.K.1    Alghathbar, K.2
  • 18
    • 79957702363 scopus 로고    scopus 로고
    • A secured authentication protocol for wireless sensor networks using elliptic curves cryptography
    • Yeh HL, Chen TH, Liu PC, Kim TH, Wei HW. A secured authentication protocol for wireless sensor networks using elliptic curves cryptography. Sensors 2011; 11(5):4767–4779.
    • (2011) Sensors , vol.11 , Issue.5 , pp. 4767-4779
    • Yeh, H.L.1    Chen, T.H.2    Liu, P.C.3    Kim, T.H.4    Wei, H.W.5
  • 19
    • 84877308219 scopus 로고    scopus 로고
    • A new user authentication protocol for wireless sensor networks using elliptic curves cryptography
    • Shi W, Gong P. A new user authentication protocol for wireless sensor networks using elliptic curves cryptography. International Journal of Distributed Sensor Networks 2013, Article ID 730831: 7 pages. DOI: 10.1155/2013/730831.
    • (2013) International Journal of Distributed Sensor Networks , pp. 7
    • Shi, W.1    Gong, P.2
  • 20
    • 84922001116 scopus 로고    scopus 로고
    • Robust anonymous authentication protocol for health-care applications using wireless medical sensor networks
    • In press, 10 Dec 2013
    • He DB, Kumar N, Chen JH, Lee CC, Chilamkurti N, Yeo SS. Robust anonymous authentication protocol for health-care applications using wireless medical sensor networks. Multimedia Systems, In press, 10 Dec 2013, DOI: 10.1007/s00530-013-0346-9.
    • Multimedia Systems
    • He, D.B.1    Kumar, N.2    Chen, J.H.3    Lee, C.C.4    Chilamkurti, N.5    Yeo, S.S.6
  • 21
    • 78649335192 scopus 로고    scopus 로고
    • Cryptanalysis and improvement of a biometrics-based remote user authentication scheme using smart cards
    • Li X, Niu JW, Ma J, Wang WD, Liu CL. Cryptanalysis and improvement of a biometrics-based remote user authentication scheme using smart cards. Journal of Network and Computer Applications 2011; 34(1):73–79.
    • (2011) Journal of Network and Computer Applications , vol.34 , Issue.1 , pp. 73-79
    • Li, X.1    Niu, J.W.2    Ma, J.3    Wang, W.D.4    Liu, C.L.5
  • 22
    • 84908157951 scopus 로고    scopus 로고
    • Applying biometrics to design three-factor remote user authentication scheme with key agreement
    • Li X, Niu JW, Wang ZB, Chen CS. Applying biometrics to design three-factor remote user authentication scheme with key agreement. Security and Communication Networks 2014; 7(10):1488–1497.
    • (2014) Security and Communication Networks , vol.7 , Issue.10 , pp. 1488-1497
    • Li, X.1    Niu, J.W.2    Wang, Z.B.3    Chen, C.S.4
  • 23
    • 84979231101 scopus 로고    scopus 로고
    • Robust three-factor remote user authentication scheme with key agreement for multimedia systems
    • Li X, Niu JW, Khan MK, Liao JG, Zhao XK. Robust three-factor remote user authentication scheme with key agreement for multimedia systems. Security and Communication Networks 2014, DOI: 10.1002/sec.961.
    • (2014) Security and Communication Networks
    • Li, X.1    Niu, J.W.2    Khan, M.K.3    Liao, J.G.4    Zhao, X.K.5
  • 24
    • 85027949488 scopus 로고    scopus 로고
    • Robust biometrics-based authentication scheme for multiserver environment
    • He DB, Wang D. Robust biometrics-based authentication scheme for multiserver environment. IEEE Systems Journal 2013, DOI: 10.1109/JSYST.2014.2301517.
    • (2013) IEEE Systems Journal
    • He, D.B.1    Wang, D.2
  • 26
    • 12344259813 scopus 로고    scopus 로고
    • Biohashing: two factor authentication featuring fingerprint data and tokenised random number
    • Jin ATB, Ling DNC, Goh A. Biohashing: two factor authentication featuring fingerprint data and tokenised random number. Pattern Recognition 2004; 37(11):2245–2255.
    • (2004) Pattern Recognition , vol.37 , Issue.11 , pp. 2245-2255
    • Jin, A.T.B.1    Ling, D.N.C.2    Goh, A.3
  • 27
    • 33750533142 scopus 로고    scopus 로고
    • An improved biohashing for human authentication
    • Lumini A, Nanni L. An improved biohashing for human authentication. Pattern Recognition 2007; 40(3):1057–1065.
    • (2007) Pattern Recognition , vol.40 , Issue.3 , pp. 1057-1065
    • Lumini, A.1    Nanni, L.2
  • 29
  • 30
    • 0036566408 scopus 로고    scopus 로고
    • Examining smart-card security under the threat of power analysis attacks
    • Messerges TS, Dabbish EA, Sloan RH. Examining smart-card security under the threat of power analysis attacks. IEEE Transactions on Computers 2002; 51(5):541–552.
    • (2002) IEEE Transactions on Computers , vol.51 , Issue.5 , pp. 541-552
    • Messerges, T.S.1    Dabbish, E.A.2    Sloan, R.H.3
  • 31
  • 32
    • 84901198272 scopus 로고    scopus 로고
    • Understanding security failures of two-factor authentication schemes for real-time applications in hierarchical wireless sensor networks
    • Wang D, Wang P. Understanding security failures of two-factor authentication schemes for real-time applications in hierarchical wireless sensor networks. Ad Hoc Networks 2014; 20:1–15.
    • (2014) Ad Hoc Networks , vol.20 , pp. 1-15
    • Wang, D.1    Wang, P.2
  • 33
    • 79956064800 scopus 로고    scopus 로고
    • A user friendly authentication scheme with anonymity for wireless communications
    • Yoon EJ, Yoo KY, Ha KS. A user friendly authentication scheme with anonymity for wireless communications. Computers & Electrical Engineering 2011; 37(3):356–364.
    • (2011) Computers & Electrical Engineering , vol.37 , Issue.3 , pp. 356-364
    • Yoon, E.J.1    Yoo, K.Y.2    Ha, K.S.3
  • 34
    • 78751648745 scopus 로고    scopus 로고
    • A strong user authentication scheme with smart cards for wireless communications
    • He DJ, Ma MD, Zhang Y, Chen C, Bu JJ. A strong user authentication scheme with smart cards for wireless communications. Computer Communications 2011; 34(3):367–374.
    • (2011) Computer Communications , vol.34 , Issue.3 , pp. 367-374
    • He, D.J.1    Ma, M.D.2    Zhang, Y.3    Chen, C.4    Bu, J.J.5
  • 35
    • 82755189733 scopus 로고    scopus 로고
    • A novel user authentication and privacy preserving scheme with smart cards for wireless communications
    • Li CT, Lee CC. A novel user authentication and privacy preserving scheme with smart cards for wireless communications. Mathematical and Computer Modelling 2012; 55(1):35–44.
    • (2012) Mathematical and Computer Modelling , vol.55 , Issue.1 , pp. 35-44
    • Li, C.T.1    Lee, C.C.2
  • 36
    • 84911978076 scopus 로고    scopus 로고
    • Untraceable dynamic identity-based remote user authentication scheme with verifiable password update
    • Chang YF, Tai WL, Chang HC. Untraceable dynamic identity-based remote user authentication scheme with verifiable password update. International Journal of Communication Systems 2014; 27(11):3430–3440.
    • (2014) International Journal of Communication Systems , vol.27 , Issue.11 , pp. 3430-3440
    • Chang, Y.F.1    Tai, W.L.2    Chang, H.C.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.