메뉴 건너뛰기




Volumn 10, Issue 4, 2015, Pages

Efficient and anonymous two-factor user authentication in wireless sensor networks:Achieving user anonymity with lightweight sensor computation

Author keywords

[No Author keywords available]

Indexed keywords

ACCESS TO INFORMATION; ARTICLE; AUTHENTICATED KEY EXCHANGE SECURITY; BIOSENSOR; COMPUTER ANALYSIS; COMPUTER SECURITY; COMPUTER SYSTEM; CONTROLLED STUDY; DATA PROCESSING; HUMAN COMPUTER INTERACTION; LIGHTWEIGHT CRYPTOGRAPHIC OPERATION; MATHEMATICAL ANALYSIS; REGISTRATION; SMART CARD BASED USER AUTHENTICATION SCHEME; SPATIOTEMPORAL ANALYSIS; USER ANONYMITY; WIRELESS SENSOR NETWORK; ALGORITHM; COMPUTER NETWORK; CONFIDENTIALITY; DEVICES; HUMAN; SMART CARD; THEORETICAL MODEL; WIRELESS COMMUNICATION;

EID: 84928914432     PISSN: None     EISSN: 19326203     Source Type: Journal    
DOI: 10.1371/journal.pone.0116709     Document Type: Article
Times cited : (63)

References (34)
  • 1
    • 84904043180 scopus 로고    scopus 로고
    • Wireless sensor networks: A survey on recent developments and potential synergies
    • Rawat P, Singh K, Chaouchi H, Bonnin J (2014) Wireless sensor networks: a survey on recent developments and potential synergies. The Journal of Supercomputing 68: 1-48.
    • (2014) The Journal of Supercomputing , vol.68 , pp. 1-48
    • Rawat, P.1    Singh, K.2    Chaouchi, H.3    Bonnin, J.4
  • 2
    • 62949130774 scopus 로고    scopus 로고
    • Two-factor user authentication in wireless sensor networks
    • Das M (2009) Two-factor user authentication in wireless sensor networks. IEEE Transactions on Wirelelss Communications 8: 1086-1090. doi: 10.1109/TWC.2008.080128
    • (2009) IEEE Transactions on Wirelelss Communications , vol.8 , pp. 1086-1090
    • Das, M.1
  • 3
    • 78650459565 scopus 로고    scopus 로고
    • An enhanced two-factor user authentication scheme in wireless sensor networks
    • He D, Gao Y, Chan S, Chen C, Bu J (2010) An enhanced two-factor user authentication scheme in wireless sensor networks. Ad Hoc & Sensor Wireless Networks 10: 361-371.
    • (2010) Ad Hoc & Sensor Wireless Networks , vol.10 , pp. 361-371
    • He, D.1    Gao, Y.2    Chan, S.3    Chen, C.4    Bu, J.5
  • 4
    • 77955495427 scopus 로고    scopus 로고
    • Cryptanalysis and security improvements of "two-factor user authentication in wireless sensor networks"
    • PMID: 22294935
    • Khan M, Alghathbar K (2010) Cryptanalysis and security improvements of "two-factor user authentication in wireless sensor networks". Sensors 10: 2450-2459. doi: 10.3390/s100302450 PMID: 22294935
    • (2010) Sensors , vol.10 , pp. 2450-2459
    • Khan, M.1    Alghathbar, K.2
  • 5
    • 78049334450 scopus 로고    scopus 로고
    • A robust mutual authentication protocol for wireless sensor networks
    • Chen T, ShihW(2010) A robust mutual authentication protocol for wireless sensor networks. ETRI Journal 32: 704-712. doi: 10.4218/etrij.10.1510.0134
    • (2010) ETRI Journal , vol.32 , pp. 704-712
    • Chen, T.1    Shih, W.2
  • 6
    • 79957702363 scopus 로고    scopus 로고
    • A secured authentication protocol for wireless sensor networks using elliptic curves cryptography
    • PMID: 22163874
    • Yeh H, Chen T, Liu P, Kim T, Wei H (2011) A secured authentication protocol for wireless sensor networks using elliptic curves cryptography. Sensors 11: 4767-4779. doi: 10.3390/s110504767 PMID: 22163874
    • (2011) Sensors , vol.11 , pp. 4767-4779
    • Yeh, H.1    Chen, T.2    Liu, P.3    Kim, T.4    Wei, H.5
  • 7
    • 79957718973 scopus 로고    scopus 로고
    • RUASN:A robust user authentication framework for wireless sensor networks
    • PMID: 22163888
    • Kumar P, Choudhury A, Sain M, Lee S, Lee H (2011) RUASN: a robust user authentication framework for wireless sensor networks. Sensors 11: 5020-5046. doi: 10.3390/s110505020 PMID: 22163888
    • (2011) Sensors , vol.11 , pp. 5020-5046
    • Kumar, P.1    Choudhury, A.2    Sain, M.3    Lee, S.4    Lee, H.5
  • 8
    • 84863271667 scopus 로고    scopus 로고
    • E-SAP:Efficient-strong authentication protocol for healthcare applications using wireless medical sensor networks
    • PMID: 22438729
    • Kumar P, Lee S, Lee H (2012) E-SAP: efficient-strong authentication protocol for healthcare applications using wireless medical sensor networks. Sensors 12: 1625-1647. doi: 10.3390/s120201625 PMID: 22438729
    • (2012) Sensors , vol.12 , pp. 1625-1647
    • Kumar, P.1    Lee, S.2    Lee, H.3
  • 9
    • 84863637154 scopus 로고    scopus 로고
    • A security-performance-balanced user authentication scheme for wireless sensor networks
    • Yoo S, Park K, Kim J (2012) A security-performance-balanced user authentication scheme for wireless sensor networks. International Journal of Distributed Sensor Networks 2012: Article ID 382810.
    • (2012) International Journal of Distributed Sensor Networks , vol.2012 , pp. 382810
    • Yoo, S.1    Park, K.2    Kim, J.3
  • 11
    • 84870693016 scopus 로고    scopus 로고
    • A temporal-credential-based mutual authentication and key agreement scheme for wireless sensor networks
    • Xue K, Ma C, Hong P, Ding R (2013) A temporal-credential-based mutual authentication and key agreement scheme for wireless sensor networks. Journal of Network and Computer Applications 36: 316-323. doi: 10.1016/j.jnca.2012.05.010
    • (2013) Journal of Network and Computer Applications , vol.36 , pp. 316-323
    • Xue, K.1    Ma, C.2    Hong, P.3    Ding, R.4
  • 12
    • 84877308219 scopus 로고    scopus 로고
    • A new user authentication protocol for wireless sensor networks using elliptic curves cryptography
    • Shi W, Gong P (2013) A new user authentication protocol for wireless sensor networks using elliptic curves cryptography. Internation Journal of Distributed Sensor Networks 2013: Article ID 730831.
    • (2013) Internation Journal of Distributed Sensor Networks , vol.2013 , pp. 730831
    • Shi, W.1    Gong, P.2
  • 13
    • 84880828581 scopus 로고    scopus 로고
    • An advanced temporal credential-based security scheme with mutual authentication and key agreement for wireless sensor networks
    • PMID: 23887085
    • Li C, Weng C, Lee C (2013) An advanced temporal credential-based security scheme with mutual authentication and key agreement for wireless sensor networks. Sensors 13: 9589-9603. doi: 10.3390/ s130809589 PMID: 23887085
    • (2013) Sensors , vol.13 , pp. 9589-9603
    • Li, C.1    Weng, C.2    Lee, C.3
  • 14
    • 84885231928 scopus 로고    scopus 로고
    • A strong authentication scheme with user privacy for wireless sensor networks
    • Kumar P, Gurtov A, Ylianttila M, Lee S, Lee H (2013) A strong authentication scheme with user privacy for wireless sensor networks. ETRI Journal 35: 889-899. doi: 10.4218/etrij.13.0113.0103
    • (2013) ETRI Journal , vol.35 , pp. 889-899
    • Kumar, P.1    Gurtov, A.2    Ylianttila, M.3    Lee, S.4    Lee, H.5
  • 16
    • 84899502865 scopus 로고    scopus 로고
    • Analysis and improvement of a robust user authentication framework for ubiquitous sensor networks
    • Chi L, Hu L, Li H, Chu J (2014) Analysis and improvement of a robust user authentication framework for ubiquitous sensor networks. International Journal of Distributed Sensor Networks 2014: Article ID 637684.
    • (2014) International Journal of Distributed Sensor Networks , vol.2014 , pp. 637684
    • Chi, L.1    Hu, L.2    Li, H.3    Chu, J.4
  • 17
    • 84898648439 scopus 로고    scopus 로고
    • Security analysis and improvements of two-factor mutual authentication with key agreement in wireless sensor networks
    • PMID: 24721764
    • Kim J, Lee D, Jeon W, Lee Y, Won D (2014) Security analysis and improvements of two-factor mutual authentication with key agreement in wireless sensor networks. Sensors 14: 6443-6462. doi: 10.3390/ s140406443 PMID: 24721764
    • (2014) Sensors , vol.14 , pp. 6443-6462
    • Kim, J.1    Lee, D.2    Jeon, W.3    Lee, Y.4    Won, D.5
  • 18
    • 84901008838 scopus 로고    scopus 로고
    • An improved user authentication protocol for healthcare services via wireless medical sensor networks
    • Khan M, Kumari S (2014) An improved user authentication protocol for healthcare services via wireless medical sensor networks. Internation Journal of Distributed Sensor Networks 2014: Article ID 347169.
    • (2014) Internation Journal of Distributed Sensor Networks , vol.2014 , pp. 347169
    • Khan, M.1    Kumari, S.2
  • 20
    • 84902296026 scopus 로고    scopus 로고
    • Security enhanced user authentication protocol for wireless sensor networks using elliptic curves cryptography
    • PMID: 24919012
    • Choi Y, Lee D, Kim J, Jung J, Nam J, Won D (2014) Security enhanced user authentication protocol for wireless sensor networks using elliptic curves cryptography. Sensors 14: 10081-10106. doi: 10.3390/ s140610081 PMID: 24919012
    • (2014) Sensors , vol.14 , pp. 10081-10106
    • Choi, Y.1    Lee, D.2    Kim, J.3    Jung, J.4    Nam, J.5    Won, D.6
  • 21
    • 84868014129 scopus 로고    scopus 로고
    • A new dynamic identity-based authentication protocol for multi-server environment using elliptic curve cryptography
    • Khan M, He D (2012) A new dynamic identity-based authentication protocol for multi-server environment using elliptic curve cryptography. Security and Communication Networks 5: 1260-1266.
    • (2012) Security and Communication Networks , vol.5 , pp. 1260-1266
    • Khan, M.1    He, D.2
  • 22
    • 84878471679 scopus 로고    scopus 로고
    • Cryptanalysis of an 'efficient-strong authentiction protocol (E-SAP) for healthcare applications using wireless medical sensor networks'
    • Khan M, Kumari S, Singh P (2013) Cryptanalysis of an 'efficient-strong authentiction protocol (E-SAP) for healthcare applications using wireless medical sensor networks'. KSII Transactions on Internet & Information Systems 7: 967-979. doi: 10.3837/tiis.2013.05.002
    • (2013) KSII Transactions on Internet & Information Systems , vol.7 , pp. 967-979
    • Khan, M.1    Kumari, S.2    Singh, P.3
  • 23
    • 84891688392 scopus 로고    scopus 로고
    • Anonymous two-factor authentication for consumer roaming service in global mobility networks
    • He D, Kumar N, Khan M, Lee J (2013) Anonymous two-factor authentication for consumer roaming service in global mobility networks. IEEE Transactions on Consumer Electronics 59: 811-817. doi: 10. 1109/TCE.2013.6689693
    • (2013) IEEE Transactions on Consumer Electronics , vol.59 , pp. 811-817
    • He, D.1    Kumar, N.2    Khan, M.3    Lee, J.4
  • 24
    • 84895058980 scopus 로고    scopus 로고
    • Robust anonymous two-factor authentication scheme for roaming service in global mobility network
    • Xie Q, Hu B, Tan X, Bao M, Yu X (2014) Robust anonymous two-factor authentication scheme for roaming service in global mobility network. Wireless Personal Communications 74: 601-614. doi: 10.1007/ s11277-013-1309-3
    • (2014) Wireless Personal Communications , vol.74 , pp. 601-614
    • Xie, Q.1    Hu, B.2    Tan, X.3    Bao, M.4    Yu, X.5
  • 25
    • 84895056653 scopus 로고    scopus 로고
    • Cryptanalysis and improvement of an anonymous authentication protocol for wireless access networks
    • He D, Zhang Y, Chen J (2014) Cryptanalysis and improvement of an anonymous authentication protocol for wireless access networks. Wireless Personal Communications 74: 229-243. doi: 10.1007/ s11277-013-1282-x
    • (2014) Wireless Personal Communications , vol.74 , pp. 229-243
    • He, D.1    Zhang, Y.2    Chen, J.3
  • 26
    • 84939573910 scopus 로고    scopus 로고
    • Proceedings of CRYPTO 1999, Santa Barbara, California, USA
    • Kocher P, Jaffe J, Jun B (1999) Differential power analysis. Proceedings of CRYPTO 1999, Santa Barbara, California, USA, pp. 388-397.
    • (1999) Differential Power Analysis , pp. 388-397
    • Kocher, P.1    Jaffe, J.2    Jun, B.3
  • 27
    • 0036566408 scopus 로고    scopus 로고
    • Examining smart-card security under the threat of power analysis attacks
    • Messerges T, Dabbish E, Sloan R (2002) Examining smart-card security under the threat of power analysis attacks. IEEE Transactions on Computers 51: 541-552. doi: 10.1109/TC.2002.1004593
    • (2002) IEEE Transactions on Computers , vol.51 , pp. 541-552
    • Messerges, T.1    Dabbish, E.2    Sloan, R.3
  • 28
    • 84901198272 scopus 로고    scopus 로고
    • Understanding security failures of two-factor authentication schemes for realtime applications in hierarchical wireless sensor networks
    • Wang D, Wang P (2014) Understanding security failures of two-factor authentication schemes for realtime applications in hierarchical wireless sensor networks. Ad Hoc Networks 20: 1-15. doi: 10.1016/j. adhoc.2014.03.003
    • (2014) Ad Hoc Networks , vol.20 , pp. 1-15
    • Wang, D.1    Wang, P.2
  • 29
    • 84906774949 scopus 로고    scopus 로고
    • On the anonymity of two-factor authentication schemes for wireless sensor networks: Attacks, principle and solutions
    • Wang D, Wang P (2014) On the anonymity of two-factor authentication schemes for wireless sensor networks: Attacks, principle and solutions. Computer Networks 73: 41-57. doi: 10.1016/j.comnet. 2014.07.010
    • (2014) Computer Networks , vol.73 , pp. 41-57
    • Wang, D.1    Wang, P.2
  • 30
    • 84873466407 scopus 로고    scopus 로고
    • Authenticated key exchange secure against dictionary attacks
    • 2000, Bruges, Belgium
    • Bellare M, Pointcheval D, Rogaway P (2000) Authenticated key exchange secure against dictionary attacks. Proceedings of EUROCRYPT 2000, Bruges, Belgium, pp. 139-155.
    • (2000) Proceedings of EUROCRYPT , pp. 139-155
    • Bellare, M.1    Pointcheval, D.2    Rogaway, P.3
  • 33
    • 84922002292 scopus 로고    scopus 로고
    • Weakness of a secured authentication protocol for wireless sensor networks using elliptic curves cryptography
    • HanW(2011) Weakness of a secured authentication protocol for wireless sensor networks using elliptic curves cryptography. IACR Cryptology ePrint Archive. Available: http://eprint.iacr.org/2011/293.
    • (2011) IACR Cryptology ePrint Archive
    • Han, W.1
  • 34
    • 84898048082 scopus 로고    scopus 로고
    • Enhanced three-factor security protocol for USB mass storage devices
    • He D, Kumar N, Lee J, Sherratt R (2014) Enhanced three-factor security protocol for USB mass storage devices. IEEE Transactions on Consumer Electronics 60: 30-37. doi: 10.1109/TCE.2014.6780922
    • (2014) IEEE Transactions on Consumer Electronics , vol.60 , pp. 30-37
    • He, D.1    Kumar, N.2    Lee, J.3    Sherratt, R.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.