메뉴 건너뛰기




Volumn 2015, Issue 1, 2015, Pages

Efficient authenticated key exchange protocols for wireless body area networks

Author keywords

AES; BAN logic; Security protocol; Wireless body area network

Indexed keywords

AUTHENTICATION; CHIP SCALE PACKAGES; COMPUTATION THEORY; ELECTRIC NETWORK TOPOLOGY; MOBILE SECURITY; NETWORK LAYERS; NETWORK PROTOCOLS; NETWORKS (CIRCUITS); SECURITY OF DATA; TOPOLOGY; WIRELESS LOCAL AREA NETWORKS (WLAN); WIRELESS NETWORKS;

EID: 84937436587     PISSN: 16871472     EISSN: 16871499     Source Type: Journal    
DOI: 10.1186/s13638-015-0406-2     Document Type: Article
Times cited : (40)

References (25)
  • 1
    • 77950583205 scopus 로고    scopus 로고
    • Security analysis of NSSK protocol and its improvement
    • J Liao, B Zhu, Y He, Security analysis of NSSK protocol and its improvement. IEEE Int. Conf, 115–118 (2009). doi:10.1109/DASC.2009.44.
    • (2009) IEEE Int. Conf , pp. 115-118
    • Liao, J.1    Zhu, B.2    He, Y.3
  • 3
    • 70449458980 scopus 로고    scopus 로고
    • Based on BAN logic analysis Otway-Rees protocol[J]
    • YJ Deng, Based on BAN logic analysis Otway-Rees protocol[J]. Chaohu Coll. J. 78(3), 36–37 (2006).
    • (2006) Chaohu Coll. J , vol.78 , Issue.3 , pp. 36-37
    • Deng, Y.J.1
  • 4
    • 0345098454 scopus 로고    scopus 로고
    • Efficient three-party authentication and key agreement protocols resistant to password guessing attacks
    • HT Yeh, HM Sun, T Hwang, Efficient three-party authentication and key agreement protocols resistant to password guessing attacks. J. Inform. Sci. Eng. 19(6), 1059–1070 (2003).
    • (2003) J. Inform. Sci. Eng , vol.19 , Issue.6 , pp. 1059-1070
    • Yeh, H.T.1    Sun, H.M.2    Hwang, T.3
  • 5
    • 33846817471 scopus 로고    scopus 로고
    • Simple three-party key exchange protocol
    • R Lu, Z Cao, Simple three-party key exchange protocol. Comput. Secur. 26(1), 94–97 (2007).
    • (2007) Comput. Secur , vol.26 , Issue.1 , pp. 94-97
    • Lu, R.1    Cao, Z.2
  • 6
    • 47549109760 scopus 로고    scopus 로고
    • A round and computation-efficient three-party authenticated key exchange protocol
    • T Chen, WB Lee, HB Chen, A round and computation-efficient three-party authenticated key exchange protocol. J. Syst. Softw. 81(9), 1581–1590 (2008).
    • (2008) J. Syst. Softw , vol.81 , Issue.9 , pp. 1581-1590
    • Chen, T.1    Lee, W.B.2    Chen, H.B.3
  • 7
    • 68049147074 scopus 로고    scopus 로고
    • A simple three-party password-based key exchange protocol
    • HF Huang, A simple three-party password-based key exchange protocol. Int. J. Commun. Syst. 22(7), 857–862 (2009).
    • (2009) Int. J. Commun. Syst , vol.22 , Issue.7 , pp. 857-862
    • Huang, H.F.1
  • 8
    • 67649791953 scopus 로고    scopus 로고
    • Communication-efficient three-party protocols for authentication and key agreement
    • TF Lee, JL Liu, MJ Sung, SB Yang, CM Chen, Communication-efficient three-party protocols for authentication and key agreement. Comput. Math. Appl. 58(4), 641–648 (2009).
    • (2009) Comput. Math. Appl , vol.58 , Issue.4 , pp. 641-648
    • Lee, T.F.1    Liu, J.L.2    Sung, M.J.3    Yang, S.B.4    Chen, C.M.5
  • 9
    • 84940005131 scopus 로고    scopus 로고
    • Liang, Design and analysis of a chaotic maps-based three-party authenticated key agreement protocol
    • X Li, JW Niu, S Kumari, MK Khan, J Liao, W Liang, Design and analysis of a chaotic maps-based three-party authenticated key agreement protocol. Nonlinear Dyn. 80 (2015). doi:10.1007/s11071-015-1937-0.
    • (2015) Nonlinear Dyn , pp. 80
    • X Li, J.W.1    Niu, S.2    Kumari, M.K.3    Khan, J.4    Liao, W.5
  • 10
    • 84883653668 scopus 로고    scopus 로고
    • Liao, An enhanced smart card based remote user password authentication scheme
    • X Li, J Niu, MK Khan, JG Liao, An enhanced smart card based remote user password authentication scheme. J. Netw. Comp. Appl. 365, 1365–1371 (2013).
    • (2013) J. Netw. Comp. Appl , vol.365 , pp. 1365-1371
    • X Li, J.1    Niu, M.K.2    Khan, J.G.3
  • 11
    • 44849118543 scopus 로고    scopus 로고
    • Cryptanalysis of simple three-party key exchange protocol
    • H Guo, Z Li, Y Mu, X Zhang, Cryptanalysis of simple three-party key exchange protocol. Comput. Secur. 27(1-2), 16–21 (2008).
    • (2008) Comput. Secur , vol.27 , Issue.1-2 , pp. 16-21
    • Guo, H.1    Li, Z.2    Mu, Y.3    Zhang, X.4
  • 12
    • 58049215501 scopus 로고    scopus 로고
    • Enhanced password-based simple three-party key exchange protocol.Comput
    • HS Kim, JY Choi, Enhanced password-based simple three-party key exchange protocol.Comput. Electrical Eng. 35(1), 107–114 (2009).
    • (2009) Electrical Eng , vol.35 , Issue.1 , pp. 107-114
    • Kim, H.S.1    Choi, J.Y.2
  • 14
    • 84937471347 scopus 로고    scopus 로고
    • B Zhen, P Maulin, L SungHyup, W EunTae, A Arthur, TG6 technical Requirements Document (TRD). IEEE (2008). ID: 802.15-08-0644
    • B Zhen, P Maulin, L SungHyup, W EunTae, A Arthur, TG6 technical Requirements Document (TRD). IEEE (2008). ID: 802.15-08-0644.
  • 16
    • 84869181957 scopus 로고    scopus 로고
    • JM Ho, in The 8th International Wireless Communications and Mobile Computing Conference (IWCMC). A versatile suite of strong authenticated key agreement protocols for body area networks (IEEE,Limassol, 2012), pp. 683–688
    • JM Ho, in The 8th International Wireless Communications and Mobile Computing Conference (IWCMC). A versatile suite of strong authenticated key agreement protocols for body area networks (IEEE,Limassol, 2012), pp. 683–688, doi:10.1109/IWCMC.2012.6314287.
  • 17
    • 33750836663 scopus 로고    scopus 로고
    • in Proceeding of Wearable and Implantable Body Sensor Networks. A design proposal of security architecture for medical body sensor networks (IEEE
    • SD Bao, YT Zhang, LF Shen, in Proceeding of Wearable and Implantable Body Sensor Networks. A design proposal of security architecture for medical body sensor networks (IEEE, BSN, 2006), pp. 84–90, doi:10.1109/BSN.2006.2.
    • (2006) BSN , pp. 84-90
    • Bao, S.D.1    Zhang, Y.T.2    Shen, L.F.3
  • 18
    • 84891804845 scopus 로고    scopus 로고
    • Certificateless remote anonymous authentication schemes for wireless body area networks
    • JW Liu, ZH Zhang, XF Chen, K Sup Kwak, Certificateless remote anonymous authentication schemes for wireless body area networks. IEEE Trans. Parallel Distributed Syst. 25(2), 332–342 (2014).
    • (2014) IEEE Trans. Parallel Distributed Syst , vol.25 , Issue.2 , pp. 332-342
    • Liu, J.W.1    Zhang, Z.H.2    Chen, X.F.3    Sup Kwak, K.4
  • 19
    • 79951723271 scopus 로고    scopus 로고
    • A survey on wireless body area networks
    • B Latré, B Braem, I Moerman, A survey on wireless body area networks. J. Wireless Netw. 17(1), 1–18 (2011).
    • (2011) J. Wireless Netw , vol.17 , Issue.1
    • Latré, B.1    Braem, B.2    Moerman, I.3
  • 20
    • 84937471349 scopus 로고    scopus 로고
    • M Rostami, W Burleson, A Juels, in Design Automation Conference (DAC). Balancing security and utility in medical devices? (IEEE, 2013), pp. 1–6. 50th ACM/EDAC/IEEE
    • M Rostami, W Burleson, A Juels, in Design Automation Conference (DAC). Balancing security and utility in medical devices? (IEEE, 2013), pp. 1–6. 50th ACM/EDAC/IEEE.
  • 22
    • 77953856139 scopus 로고    scopus 로고
    • The study on the application of BAN logic in formal analysis of authentication protocols
    • 7th International Conference on Electronic Commerce, ICEC05: Towards Ubiquitous Business
    • JH Wen, M Zhang, X Li, The study on the application of BAN logic in formal analysis of authentication protocols. ACM Int. Conf. Proc. Series. 113, 744–747 (2005). 7th International Conference on Electronic Commerce, ICEC05: Towards Ubiquitous Business.
    • (2005) ACM Int. Conf. Proc. Series , vol.113 , pp. 744-747
    • Wen, J.H.1    Zhang, M.2    Li, X.3
  • 23
    • 84937471351 scopus 로고    scopus 로고
    • PXA, 270 processor electrical, mechanical, and thermal specification
    • PXA, 270 processor electrical, mechanical, and thermal specification. http://pdf.dzsc.com/CXX/NHPXA270Cxxx.pdf.
  • 24
    • 42949161502 scopus 로고    scopus 로고
    • Improving the novel three-party encrypted key exchange protocol
    • EJ Yoon, KY Yoo, Improving the novel three-party encrypted key exchange protocol. Comput. Stand. Interfaces. 30(5), 309–314 (2008).
    • (2008) Comput. Stand. Interfaces , vol.30 , Issue.5 , pp. 309-314
    • Yoon, E.J.1    Yoo, K.Y.2
  • 25
    • 77953893048 scopus 로고    scopus 로고
    • Ma, An efficient three-party authenticated key exchange protocol with one-time key
    • C Lv, M Ma, H Li, J Ma, An efficient three-party authenticated key exchange protocol with one-time key. IEEE INFOCOM, 1–5 (2010). doi:10.1109/INFCOMW.2010.5466648.
    • (2010) IEEE INFOCOM
    • C Lv, M.1    Ma, H.2    Li, J.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.