메뉴 건너뛰기




Volumn 10, Issue 1, 2017, Pages 16-30

A new and secure authentication scheme for wireless sensor networks with formal proof

Author keywords

Formal proof; Off line guessing attack; Smart card; Wireless sensor network

Indexed keywords

ALUMINUM; AUTHENTICATION; COMPUTER CRIME; CRYPTOGRAPHY; SMART CARDS;

EID: 84940853317     PISSN: 19366442     EISSN: 19366450     Source Type: Journal    
DOI: 10.1007/s12083-015-0404-5     Document Type: Article
Times cited : (88)

References (30)
  • 1
    • 58449088433 scopus 로고    scopus 로고
    • Anonymous and transparent gateway-based password-authenticated key exchange. Cryptology and Network Security
    • Abdalla M, Izabachene M, Pointcheval D (2008) Anonymous and transparent gateway-based password-authenticated key exchange. Cryptology and Network Security. Springer, pp 133–148
    • (2008) Springer , pp. 133-148
    • Abdalla, M.1    Izabachene, M.2    Pointcheval, D.3
  • 2
    • 18744393738 scopus 로고    scopus 로고
    • Security proofs for an efficient password-based key exchange. In: Proceedings of the 10th ACM conference on Computer and communications security, pp 241–250
    • Bresson E, Chevassut O, Pointcheval D (2003) Security proofs for an efficient password-based key exchange. In: Proceedings of the 10th ACM conference on Computer and communications security, pp 241–250. ACM
    • (2003) ACM
    • Bresson, E.1    Chevassut, O.2    Pointcheval, D.3
  • 3
    • 78049334450 scopus 로고    scopus 로고
    • A robust mutual authentication protocol for wireless sensor networks
    • Chen TH, Shih WK (2010) A robust mutual authentication protocol for wireless sensor networks. Etri Journal 32(5):704–712
    • (2010) Etri Journal , vol.32 , Issue.5 , pp. 704-712
    • Chen, T.H.1    Shih, W.K.2
  • 4
    • 84880153208 scopus 로고    scopus 로고
    • Authenticated blind issuing of symmetric keys for mobile access control system without trusted parties. Math Probl Eng 2013
    • 858579
    • Chiou SY (2013) Authenticated blind issuing of symmetric keys for mobile access control system without trusted parties. Math Probl Eng 2013, Article ID 858579
    • (2013) Article ID
    • Chiou, S.Y.1
  • 5
    • 84902296026 scopus 로고    scopus 로고
    • Security enhanced user authentication protocol for wireless sensor networks using elliptic curves cryptography
    • Choi Y, Lee D, Kim J, Jung J, Nam J, Won D (2014) Security enhanced user authentication protocol for wireless sensor networks using elliptic curves cryptography. Sensors 14(6):10, 081–10,106
    • (2014) Sensors , vol.14 , Issue.6 , pp. 10, 081-10,106
    • Choi, Y.1    Lee, D.2    Kim, J.3    Jung, J.4    Nam, J.5    Won, D.6
  • 6
    • 62949130774 scopus 로고    scopus 로고
    • Two-factor user authentication in wireless sensor networks
    • Das ML (2009) Two-factor user authentication in wireless sensor networks. IEEE T Wirel Commun 8 (3):1086–1090
    • (2009) IEEE T Wirel Commun , vol.8 , Issue.3 , pp. 1086-1090
    • Das, M.L.1
  • 7
    • 79960062320 scopus 로고    scopus 로고
    • An efficient and dos-resistant user authentication scheme for two-tiered wireless sensor networks
    • Fan R, He Dj, Pan Xz (2011) An efficient and dos-resistant user authentication scheme for two-tiered wireless sensor networks. J Zhejiang Univ Sci C 12(7):550–560
    • (2011) J Zhejiang Univ Sci C , vol.12 , Issue.7 , pp. 550-560
    • Fan, R.1    He, D.2    Pan, X.3
  • 8
    • 84922002292 scopus 로고    scopus 로고
    • Weakness of a secured authentication protocol for wireless sensor networks using elliptic curves cryptography
    • Han W (2011) Weakness of a secured authentication protocol for wireless sensor networks using elliptic curves cryptography. IACR Cryptology ePrint Archive 2011:293
    • (2011) IACR Cryptology ePrint Archive , vol.2011 , pp. 293
    • Han, W.1
  • 9
    • 84879121354 scopus 로고    scopus 로고
    • Security analysis and improvement of a secure and distributed reprogramming protocol for wireless sensor networks
    • He D, Chen C, Chan S, Bu J, Yang LT (2013) Security analysis and improvement of a secure and distributed reprogramming protocol for wireless sensor networks. IEEE Trans Ind Electron 60(11):5348–5354
    • (2013) IEEE Trans Ind Electron , vol.60 , Issue.11 , pp. 5348-5354
    • He, D.1    Chen, C.2    Chan, S.3    Bu, J.4    Yang, L.T.5
  • 10
    • 78650459565 scopus 로고    scopus 로고
    • An enhanced two-factor user authentication scheme in wireless sensor networks
    • He D, Gao Y, Chan S, Chen C, Bu J (2010) An enhanced two-factor user authentication scheme in wireless sensor networks. Ad Hoc Sensor Wirel Netw 10(4):361–371
    • (2010) Ad Hoc Sensor Wirel Netw , vol.10 , Issue.4 , pp. 361-371
    • He, D.1    Gao, Y.2    Chan, S.3    Chen, C.4    Bu, J.5
  • 11
    • 84922001116 scopus 로고    scopus 로고
    • Robust anonymous authentication protocol for health-care applications using wireless medical sensor networks. Multimed Syst
    • He D, Kumar N, Chen J, Lee CC, Chilamkurti N, Yeo SS (2013) Robust anonymous authentication protocol for health-care applications using wireless medical sensor networks. Multimed Syst. doi:10.1007/s00530-013-0346-9
    • (2013) doi:10.1007/s00530-013-0346-9
    • He, D.1    Kumar, N.2    Chen, J.3    Lee, C.C.4    Chilamkurti, N.5    Yeo, S.S.6
  • 12
    • 84939576175 scopus 로고    scopus 로고
    • An efficient two-factor user authentication scheme with unlinkability for wireless sensor networks
    • Jiang Q, Ma J, Lu X, Tian Y (2015) An efficient two-factor user authentication scheme with unlinkability for wireless sensor networks. Peer-to-Peer Netw Appl 8(6):1070–1081. doi:10.1007/s12083-014-0285-z
    • (2015) Peer-to-Peer Netw Appl , vol.8 , Issue.6 , pp. 1070-1081
    • Jiang, Q.1    Ma, J.2    Lu, X.3    Tian, Y.4
  • 13
    • 77955495427 scopus 로고    scopus 로고
    • Cryptanalysis and security improvements of two-factor user authentication in wireless sensor networks
    • Khan MK, Alghathbar K (2010) Cryptanalysis and security improvements of two-factor user authentication in wireless sensor networks. Sensors 10(3):2450–2459
    • (2010) Sensors , vol.10 , Issue.3 , pp. 2450-2459
    • Khan, M.K.1    Alghathbar, K.2
  • 14
    • 84939573910 scopus 로고    scopus 로고
    • Differential power analysis. In: Advances in Cryptology-CRYPTO99, pp 388–397
    • Kocher P, Jaffe J, Jun B (1999) Differential power analysis. In: Advances in Cryptology-CRYPTO99, pp 388–397. Springer
    • (1999) Springer
    • Kocher, P.1    Jaffe, J.2    Jun, B.3
  • 15
    • 84921608595 scopus 로고    scopus 로고
    • User authentication schemes for wireless sensor networks: A review
    • Kumari S, Khan MK, Atiquzzaman M (2015) User authentication schemes for wireless sensor networks: A review. Ad Hoc Netw 27:159–194. doi:10.1016/j.adhoc.2014.11.018
    • (2015) Ad Hoc Netw , vol.27 , pp. 159-194
    • Kumari, S.1    Khan, M.K.2    Atiquzzaman, M.3
  • 16
    • 79959430513 scopus 로고    scopus 로고
    • One for allcall for one: unifying standard differential power analysis attacks
    • Mangard S, Oswald E, Standaert FX (2011) One for allcall for one: unifying standard differential power analysis attacks. IET Inform Secur 5(2):100–110
    • (2011) IET Inform Secur , vol.5 , Issue.2 , pp. 100-110
    • Mangard, S.1    Oswald, E.2    Standaert, F.X.3
  • 17
    • 84944878354 scopus 로고    scopus 로고
    • Vanstone SA: Handbook of applied cryptography. CRC press
    • Menezes AJ, Van Oorschot PC, Vanstone SA (1996) Handbook of applied cryptography. CRC press
    • (1996) Van Oorschot PC
    • Menezes, A.J.1
  • 18
    • 0036566408 scopus 로고    scopus 로고
    • Examining smart-card security under the threat of power analysis attacks
    • Messerges TS, Dabbish EA, Sloan RH (2002) Examining smart-card security under the threat of power analysis attacks. IEEE T Comput 51(5):541–552
    • (2002) IEEE T Comput , vol.51 , Issue.5 , pp. 541-552
    • Messerges, T.S.1    Dabbish, E.A.2    Sloan, R.H.3
  • 19
    • 84877308219 scopus 로고    scopus 로고
    • A new user authentication protocol for wireless sensor networks using elliptic curves cryptography. Int J Distribu Sens Netw 2013
    • 730831
    • Shi W, Gong P (2013) A new user authentication protocol for wireless sensor networks using elliptic curves cryptography. Int J Distribu Sens Netw 2013, Article ID 730831
    • (2013) Article ID
    • Shi, W.1    Gong, P.2
  • 20
    • 85008348658 scopus 로고    scopus 로고
    • Cryptography and network security, principles and practices, 5th edition
    • Stallings W (2010) Cryptography and network security, principles and practices, 5th edition. Practice Hall
    • (2010) Practice Hall
    • Stallings, W.1
  • 21
    • 84883446358 scopus 로고    scopus 로고
    • On the security and improvement of a two-factor user authentication scheme in wireless sensor networks
    • Sun DZ, Li JX, Feng ZY, Cao ZF, Xu GQ (2013) On the security and improvement of a two-factor user authentication scheme in wireless sensor networks. Pers Ubiquit Comput 17(5):895– 905
    • (2013) Pers Ubiquit Comput , vol.17 , Issue.5 , pp. 895-905
    • Sun, D.Z.1    Li, J.X.2    Feng, Z.Y.3    Cao, Z.F.4    Xu, G.Q.5
  • 22
    • 78650750082 scopus 로고    scopus 로고
    • Improved two-factor user authentication in wireless sensor networks. In: Wireless and Mobile Computing, Networking and Communications (WiMob), 2010 IEEE 6th International Conference on, pp 600–606
    • Vaidya B, Makrakis D, Mouftah HT (2010) Improved two-factor user authentication in wireless sensor networks. In: Wireless and Mobile Computing, Networking and Communications (WiMob), 2010 IEEE 6th International Conference on, pp 600–606. IEEE
    • (2010) IEEE
    • Vaidya, B.1    Makrakis, D.2    Mouftah, H.T.3
  • 23
    • 84901198272 scopus 로고    scopus 로고
    • Understanding security failures of two-factor authentication schemes for real-time applications in hierarchical wireless sensor networks
    • Wang D, Wang P (2014) Understanding security failures of two-factor authentication schemes for real-time applications in hierarchical wireless sensor networks. Ad Hoc Netw 20:1– 15
    • (2014) Ad Hoc Netw , vol.20 , pp. 1-15
    • Wang, D.1    Wang, P.2
  • 24
    • 14844304757 scopus 로고    scopus 로고
    • Cuti, S.f., Gardiner, C., Lynn, C., Kruus, P.: Tinypk: securing sensor networks with public key technology. In: Proceedings of the 2nd ACM workshop on Security of ad hoc and sensor networks, pp 59–64
    • Watro R, Kong D (2004) Cuti, S.f., Gardiner, C., Lynn, C., Kruus, P.: Tinypk: securing sensor networks with public key technology. In: Proceedings of the 2nd ACM workshop on Security of ad hoc and sensor networks, pp 59–64. ACM
    • (2004) ACM
    • Watro, R.1    Kong, D.2
  • 25
    • 84942364844 scopus 로고    scopus 로고
    • A novel and provably secure biometrics-based three-factor remote authentication scheme for mobile clientcserver networks
    • Wu F, Xu L, Kumari S, Li X (2015) A novel and provably secure biometrics-based three-factor remote authentication scheme for mobile clientcserver networks. Comput Electr Eng 45:316–327. doi:10.1016/j.compeleceng.2015.02.015
    • (2015) Comput Electr Eng , vol.45 , pp. 316-327
    • Wu, F.1    Xu, L.2    Kumari, S.3    Li, X.4
  • 26
    • 84963958402 scopus 로고    scopus 로고
    • Cryptanalysis and improvement of a user authentication scheme preserving uniqueness and anonymity for connected health care. J Med Syst 39(2)
    • Xu L, Wu F (2015) Cryptanalysis and improvement of a user authentication scheme preserving uniqueness and anonymity for connected health care. J Med Syst 39(2), Article no. 179. doi:10.1007/s10916-014-0179-x
    • (2015) Article no , pp. 179
    • Xu, L.1    Wu, F.2
  • 27
    • 84919348312 scopus 로고    scopus 로고
    • An improved and provable remote user authentication scheme based on elliptic curve cryptosystem with user anonymity
    • Xu L, Wu F (2015) An improved and provable remote user authentication scheme based on elliptic curve cryptosystem with user anonymity. Secur Commun Netw 8(2):245–260
    • (2015) Secur Commun Netw , vol.8 , Issue.2 , pp. 245-260
    • Xu, L.1    Wu, F.2
  • 28
    • 84870693016 scopus 로고    scopus 로고
    • A temporal-credential-based mutual authentication and key agreement scheme for wireless sensor networks
    • Xue K, Ma C, Hong P, Ding R (2013) A temporal-credential-based mutual authentication and key agreement scheme for wireless sensor networks. J Netw Comput Appl 36(1):316– 323
    • (2013) J Netw Comput Appl , vol.36 , Issue.1 , pp. 316-323
    • Xue, K.1    Ma, C.2    Hong, P.3    Ding, R.4
  • 29
    • 79957702363 scopus 로고    scopus 로고
    • A secured authentication protocol for wireless sensor networks using elliptic curves cryptography
    • Yeh HL, Chen TH, Liu PC, Kim TH, Wei HW (2011) A secured authentication protocol for wireless sensor networks using elliptic curves cryptography. Sensors 11(5):4767–4779
    • (2011) Sensors , vol.11 , Issue.5 , pp. 4767-4779
    • Yeh, H.L.1    Chen, T.H.2    Liu, P.C.3    Kim, T.H.4    Wei, H.W.5
  • 30
    • 84863637154 scopus 로고    scopus 로고
    • A security-performance-balanced user authentication scheme for wireless sensor networks. Int J Distribu Sens Netw 2012
    • 382810
    • Yoo SG, Park KY, Kim J (2012) A security-performance-balanced user authentication scheme for wireless sensor networks. Int J Distribu Sens Netw 2012, Article ID 382810
    • (2012) Article ID
    • Yoo, S.G.1    Park, K.Y.2    Kim, J.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.