메뉴 건너뛰기




Volumn 321, Issue , 2015, Pages 263-277

A secure temporal-credential-based mutual authentication and key agreement scheme with pseudo identity for wireless sensor networks

Author keywords

Key agreement; Mutual authentication; Smart card; Temporal credential; Wireless sensor network

Indexed keywords

ALUMINUM; AUTHENTICATION; ENERGY UTILIZATION; MILITARY APPLICATIONS; MOBILE SECURITY; NETWORK SECURITY; SENSOR NODES; SMART CARDS; WIRELESS TELECOMMUNICATION SYSTEMS;

EID: 84935865949     PISSN: 00200255     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.ins.2015.02.010     Document Type: Article
Times cited : (236)

References (25)
  • 3
    • 74049156258 scopus 로고    scopus 로고
    • Robust dynamic user authentication scheme for ireless sensor networks
    • V. Binod, S.S. Jorge, J.P. Joel, Robust dynamic user authentication scheme for ireless sensor networks, in: Proceedings of ACM Q2SWinet, 2009, pp. 88-91.
    • (2009) Proceedings of ACM Q2SWinet , pp. 88-91
    • Binod, V.1    Jorge, S.S.2    Joel, J.P.3
  • 4
    • 77956388579 scopus 로고    scopus 로고
    • User authentication schemes with pseudonymity for ubiquitous sensor network in NGN
    • V. Binod, S.S. Jorge, and J.P. Joel User authentication schemes with pseudonymity for ubiquitous sensor network in NGN Int. J. Commun. Syst. 23 9 2010 1201 1222
    • (2010) Int. J. Commun. Syst. , vol.23 , Issue.9 , pp. 1201-1222
    • Binod, V.1    Jorge, S.S.2    Joel, J.P.3
  • 6
    • 78049334450 scopus 로고    scopus 로고
    • A robust mutual authentication protocol for wireless sensor networks
    • T.H. Chen, and W.K. Shih A robust mutual authentication protocol for wireless sensor networks ETRI J. 2 5 2010 704 712
    • (2010) ETRI J. , vol.2 , Issue.5 , pp. 704-712
    • Chen, T.H.1    Shih, W.K.2
  • 7
    • 2942686425 scopus 로고    scopus 로고
    • Sensor networks: evolution, opportunities and challenges
    • C.Y. Chong, and S. Kumar Sensor networks: evolution, opportunities and challenges Proc. IEEE 91 8 2003 1247 1256
    • (2003) Proc. IEEE , vol.91 , Issue.8 , pp. 1247-1256
    • Chong, C.Y.1    Kumar, S.2
  • 8
    • 62949130774 scopus 로고    scopus 로고
    • Two-factor user authentication in wireless sensor networks
    • M. Das Two-factor user authentication in wireless sensor networks IEEE Trans. Wirel. Commun. 8 3 2009 1086 1090
    • (2009) IEEE Trans. Wirel. Commun. , vol.8 , Issue.3 , pp. 1086-1090
    • Das, M.1
  • 9
    • 84922001116 scopus 로고    scopus 로고
    • Robust anonymous authentication protocol for healthcare applications using wireless medical sensor networks
    • D. He, N. Kumar, and M.K. Khan Robust anonymous authentication protocol for healthcare applications using wireless medical sensor networks Multimedia Syst. 2014 10.1007/s00530-013-0346-9
    • (2014) Multimedia Syst.
    • He, D.1    Kumar, N.2    Khan, M.K.3
  • 10
    • 84898048082 scopus 로고    scopus 로고
    • Enhanced three-factor security protocol for USB consumer storage devices
    • 2014
    • D. He, N. Kumar, and J.-H. Lee Enhanced three-factor security protocol for USB consumer storage devices IEEE Trans. Consum. Electron. 60 1 2014 30 37 (2014)
    • (2014) IEEE Trans. Consum. Electron. , vol.60 , Issue.1 , pp. 30-37
    • He, D.1    Kumar, N.2    Lee, J.-H.3
  • 11
    • 85027949488 scopus 로고    scopus 로고
    • Robust biometrics-based authentication scheme for multi-server environment
    • D. He, and D. Wang Robust biometrics-based authentication scheme for multi-server environment IEEE Syst. J. 2014 10.1109/JSYST.2014.2301517
    • (2014) IEEE Syst. J.
    • He, D.1    Wang, D.2
  • 12
    • 84895056653 scopus 로고    scopus 로고
    • Cryptanalysis and improvement of an anonymous authentication protocol for wireless access networks
    • D. He, Y. Zhang, and J. Chen Cryptanalysis and improvement of an anonymous authentication protocol for wireless access networks Wirel. Pers. Commun. 74 2 2014 229 243
    • (2014) Wirel. Pers. Commun. , vol.74 , Issue.2 , pp. 229-243
    • He, D.1    Zhang, Y.2    Chen, J.3
  • 13
    • 77955495427 scopus 로고    scopus 로고
    • Cryptanalysis and security improvements of 'two-factor user authentication in wireless sensor networks'
    • M.K. Khan, and K. Alghathbar Cryptanalysis and security improvements of 'two-factor user authentication in wireless sensor networks' Sensors 10 3 2010 2450 2459
    • (2010) Sensors , vol.10 , Issue.3 , pp. 2450-2459
    • Khan, M.K.1    Alghathbar, K.2
  • 14
    • 62449290253 scopus 로고    scopus 로고
    • A novel dynamic user authentication scheme for wireless sensor networks
    • L.C. Ko, A novel dynamic user authentication scheme for wireless sensor networks, in: Proceedings of IEEE ISWCS, 2008, pp. 608-612.
    • (2008) Proceedings of IEEE ISWCS , pp. 608-612
    • Ko, L.C.1
  • 15
    • 84939573910 scopus 로고    scopus 로고
    • Differential power analysis
    • P.C. Kocher, J. Jaffe, B. Jun, Differential power analysis, in: CRYPTO99, 1999, pp. 388-397.
    • (1999) CRYPTO99 , pp. 388-397
    • Kocher, P.C.1    Jaffe, J.2    Jun, B.3
  • 17
    • 0036566408 scopus 로고    scopus 로고
    • Examining smart card security under the threat of power analysis attacks
    • T.S. Messerges, A. Dabbish, and R.H. Sloan Examining smart card security under the threat of power analysis attacks IEEE Trans. Comput. 51 5 2002 541 552
    • (2002) IEEE Trans. Comput. , vol.51 , Issue.5 , pp. 541-552
    • Messerges, T.S.1    Dabbish, A.2    Sloan, R.H.3
  • 19
    • 84877308219 scopus 로고    scopus 로고
    • A new user authentication protocol for wireless sensor networks using elliptic curves cryptography
    • W. Shi, and P. Gong A new user authentication protocol for wireless sensor networks using elliptic curves cryptography Int. J. Distrib. Sens. Netw. 2013 7 (Article ID 730831)
    • (2013) Int. J. Distrib. Sens. Netw. , pp. 7
    • Shi, W.1    Gong, P.2
  • 20
    • 39349093196 scopus 로고    scopus 로고
    • An improved dynamic user authentication scheme for wireless sensor networks
    • H.R. Tseng, R.H. Jan, W. Yang, An improved dynamic user authentication scheme for wireless sensor networks, in: Proceedings of IEEE Globecom, 2007, pp. 986-990.
    • (2007) Proceedings of IEEE Globecom , pp. 986-990
    • Tseng, H.R.1    Jan, R.H.2    Yang, W.3
  • 23
    • 84870693016 scopus 로고    scopus 로고
    • A temporal-credential-based MAAKA scheme for wireless sensor networks
    • K. Xue, C. Ma, P. Hong, and et al. A temporal-credential-based MAAKA scheme for wireless sensor networks J. Netw. Comput. Appl. 36 1 2013 316 323
    • (2013) J. Netw. Comput. Appl. , vol.36 , Issue.1 , pp. 316-323
    • Xue, K.1    Ma, C.2    Hong, P.3
  • 24
    • 79957702363 scopus 로고    scopus 로고
    • A secured authentication protocol for wireless sensor networks using elliptic curves cryptography
    • H.L. Yeh, T.H. Chen, P.C. Liu, and et al. A secured authentication protocol for wireless sensor networks using elliptic curves cryptography Sensors 11 5 2011 4767 4779
    • (2011) Sensors , vol.11 , Issue.5 , pp. 4767-4779
    • Yeh, H.L.1    Chen, T.H.2    Liu, P.C.3
  • 25
    • 84901234489 scopus 로고    scopus 로고
    • An enhanced two-factor user authentication in wireless sensor networks
    • J.J. Yuan An enhanced two-factor user authentication in wireless sensor networks Telecommun. Syst. 55 1 2014 105 113
    • (2014) Telecommun. Syst. , vol.55 , Issue.1 , pp. 105-113
    • Yuan, J.J.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.