메뉴 건너뛰기




Volumn 24, Issue , 2015, Pages 210-223

Secure authentication scheme for IoT and cloud servers

Author keywords

Authentication; Cloud computing; Cookies; Elliptic Curve Cryptography; Internet of Things

Indexed keywords

AUTHENTICATION; CHROMIUM COMPOUNDS; CLOUD COMPUTING; DATA PRIVACY; GEOMETRY; HTTP; HYPERTEXT SYSTEMS; PUBLIC KEY CRYPTOGRAPHY; CRYPTOGRAPHY; INTERNET;

EID: 84959862120     PISSN: 15741192     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.pmcj.2015.08.001     Document Type: Article
Times cited : (254)

References (42)
  • 1
    • 52949102546 scopus 로고    scopus 로고
    • Secure communication in microcomputer bus systems for embedded devices
    • M. Sascha, W. Sebastian, Secure communication in microcomputer bus systems for embedded devices, J. Syst. Archit. 54 (2008) 1065-1076.
    • (2008) J. Syst. Archit. , vol.54 , pp. 1065-1076
    • Sascha, M.1    Sebastian, W.2
  • 2
    • 84962562081 scopus 로고    scopus 로고
    • An analysis of RFID authentication schemes for internet of things in health care environment using elliptic curve cryptography
    • H. Debiao, Z. Sherali, An analysis of RFID authentication schemes for Internet of Things in health care environment using elliptic curve cryptography, IEEE Internet Things J. 2 (1) (2015) 72-83.
    • (2015) IEEE Internet Things J. , vol.2 , Issue.1 , pp. 72-83
    • Debiao, H.1    Sherali, Z.2
  • 3
    • 84901816013 scopus 로고    scopus 로고
    • A review on elliptic curve cryptography for embedded systems
    • A. Rahat, S.C. Mehrotra, A review on elliptic curve cryptography for embedded systems, Int. J. Comput. Sci. Inf. Technol. 3 (3) (2011) 84-103.
    • (2011) Int. J. Comput. Sci. Inf. Technol. , vol.3 , Issue.3 , pp. 84-103
    • Rahat, A.1    Mehrotra, S.C.2
  • 4
    • 84904620267 scopus 로고    scopus 로고
    • A secure framework for OTA smart device ecosystem using ECC encryption and biometrics
    • Springer-Verlag
    • M. Salas, A secure framework for OTA smart device ecosystem using ECC encryption and biometrics, in: Communications in Computer and Information Sciences (CCIS), Vol. 381, Springer-Verlag, 2013, pp. 204-218.
    • (2013) Communications in Computer and Information Sciences (CCIS) , vol.381 , pp. 204-218
    • Salas, M.1
  • 5
    • 77949548551 scopus 로고    scopus 로고
    • Embedded interaction: Interacting with the internet of things
    • M. Kranz, P. Holleis, A. Schmidt, Embedded interaction: Interacting with the Internet of Things, IEEE Internet Comput. 14 (2) (2010) 46-53.
    • (2010) IEEE Internet Comput. , vol.14 , Issue.2 , pp. 46-53
    • Kranz, M.1    Holleis, P.2    Schmidt, A.3
  • 6
    • 78649322624 scopus 로고    scopus 로고
    • A survey on security issues in service delivery models of cloud computing
    • S. Subashini, V. Kavitha, A survey on security issues in service delivery models of cloud computing, J. Netw. Comput. Appl. 34 (1) (2011) 1-11.
    • (2011) J. Netw. Comput. Appl. , vol.34 , Issue.1 , pp. 1-11
    • Subashini, S.1    Kavitha, V.2
  • 7
    • 84908645668 scopus 로고    scopus 로고
    • Security threats on cloud computing vulnerabilities
    • T.S. Chou, Security threats on cloud computing vulnerabilities, Int. J. Comput. Sci. Inf. Technol. 5 (3) (2013) 79-88.
    • (2013) Int. J. Comput. Sci. Inf. Technol. , vol.5 , Issue.3 , pp. 79-88
    • Chou, T.S.1
  • 8
    • 78149305944 scopus 로고    scopus 로고
    • (accessed June 2015)
    • Amazon.com, Amazon elastic compute cloud, URL: http://aws.amazon.com/ec2/ (accessed June 2015).
    • Amazon Elastic Compute Cloud
  • 9
    • 84870509974 scopus 로고    scopus 로고
    • (accessed June 2015)
    • Amazon.com, Amazon elastic block store, URL: http://aws.amazon.com/ebs/ (accessed June 2015).
    • Amazon Elastic Block Store
  • 10
    • 84876109666 scopus 로고    scopus 로고
    • (accessed June 2015)
    • Microsoft Windows Azure Platform, URL: http://www.microsoft.com/azure/default.mspx (accessed June 2015).
    • Microsoft Windows Azure Platform
  • 13
    • 56949095051 scopus 로고    scopus 로고
    • Virtual password using random linear functions for online services. ATM machines and pervasive computing
    • M. Lei, Y. Xiao, S.V. Vrbsky, C.C. Li, Virtual password using random linear functions for online services. ATM machines and pervasive computing, Comput. Comm. 31 (18) (2008) 4367-4375.
    • (2008) Comput. Comm. , vol.31 , Issue.18 , pp. 4367-4375
    • Lei, M.1    Xiao, Y.2    Vrbsky, S.V.3    Li, C.C.4
  • 14
    • 48249105468 scopus 로고    scopus 로고
    • Minimizing SSO effort in verifying SSL anti-phishing indicators
    • IFIP TC 11
    • Y. Wu, H. Yao, F. Bao, Minimizing SSO effort in verifying SSL anti-phishing indicators, in: International Information Security Conference, IFIP TC 11, Vol. 278, 2008, pp. 47-61.
    • (2008) International Information Security Conference , vol.278 , pp. 47-61
    • Wu, Y.1    Yao, H.2    Bao, F.3
  • 15
    • 84959880083 scopus 로고    scopus 로고
    • (accessed June 2015)
    • Microsoft Passport, 2009. Available from: http://www.passport.net/ (accessed June 2015).
    • (2009)
  • 16
    • 79953032611 scopus 로고    scopus 로고
    • Dynamic identity-based single password anti-phishing protocol
    • S.K. Sood, A.K. Sarje, K. Singh, Dynamic identity-based single password anti-phishing protocol, Secur. Commun. Netw. 4 (4) (2009) 418-427.
    • (2009) Secur. Commun. Netw. , vol.4 , Issue.4 , pp. 418-427
    • Sood, S.K.1    Sarje, A.K.2    Singh, K.3
  • 17
    • 79956340437 scopus 로고    scopus 로고
    • Inverse cookie-based virtual password authentication protocol
    • S.K. Sood, A.K. Sarje, K. Singh, Inverse cookie-based virtual password authentication protocol, Int. J. Netw. Secur. 12 (3) (2011) 292-302.
    • (2011) Int. J. Netw. Secur. , vol.12 , Issue.3 , pp. 292-302
    • Sood, S.K.1    Sarje, A.K.2    Singh, K.3
  • 18
    • 23144441485 scopus 로고    scopus 로고
    • Design and analysis of diffie-hellman based key exchange using one-time ID by SVO logic
    • K. Imamoto, K. Sakurai, Design and analysis of Diffie-Hellman based key exchange using one-time ID by SVO logic, Electron. Notes Theor. Comput. Sci. 135 (2005) 79-94.
    • (2005) Electron. Notes Theor. Comput. Sci. , vol.135 , pp. 79-94
    • Imamoto, K.1    Sakurai, K.2
  • 21
    • 28244469017 scopus 로고    scopus 로고
    • Analysis and improvement of authenticated key exchange protocol for sensor networks
    • X. Tian, D.S. Wong, R.W. Zhu, Analysis and improvement of authenticated key exchange protocol for sensor networks, IEEE Commun. Lett. 9 (11) (2005) 970-972.
    • (2005) IEEE Commun. Lett. , vol.9 , Issue.11 , pp. 970-972
    • Tian, X.1    Wong, D.S.2    Zhu, R.W.3
  • 23
    • 63049116480 scopus 로고    scopus 로고
    • An ID based remote mutual authentication with key agreement scheme for mobile devices on elliptic curves cryptosystems
    • J.H. Yang, C.C. Chang, An ID based remote mutual authentication with key agreement scheme for mobile devices on elliptic curves cryptosystems, Comput. Secur. 28 (3-4) (2009) 138-143.
    • (2009) Comput. Secur. , vol.28 , Issue.3-4 , pp. 138-143
    • Yang, J.H.1    Chang, C.C.2
  • 24
    • 80052774690 scopus 로고    scopus 로고
    • Amore efficient and secure ID-based remote mutual authentication with key agreement scheme for mobile deviceson elliptic curve cryptosystems
    • S.K. Hafizul, G.P. Biswas, Amore efficient and secure ID-based remote mutual authentication with key agreement scheme for mobile deviceson elliptic curve cryptosystems, J. Syst. Softw. 84 (11) (2011) 1892-1898.
    • (2011) J. Syst. Softw. , vol.84 , Issue.11 , pp. 1892-1898
    • Hafizul, S.K.1    Biswas, G.P.2
  • 25
    • 80051571433 scopus 로고    scopus 로고
    • A ID-based client authentication with key agreement protocol for mobile client-server environment on ECC with provable security
    • H. Debiao, C. Jianhua, H. Jin, A ID-based client authentication with key agreement protocol for mobile client-server environment on ECC with provable security, Inform. Fusion 13 (3) (2012) 223-230.
    • (2012) Inform. Fusion , vol.13 , Issue.3 , pp. 223-230
    • Debiao, H.1    Jianhua, C.2    Jin, H.3
  • 26
    • 84930753105 scopus 로고    scopus 로고
    • Establishment of ECC based initial secrecy usable for IKE implementation
    • S. Ray, G.P. Biswas, Establishment of ECC based initial secrecy usable for IKE implementation, in: World Congress on Expert Systems, 2012, pp. 1-9.
    • (2012) World Congress on Expert Systems , pp. 1-9
    • Ray, S.1    Biswas, G.P.2
  • 27
    • 84890847807 scopus 로고    scopus 로고
    • End to end transport layer security for internet integrated sensing applications with ECC public-key authentication
    • J. Granjal, E. Monteiro, J. Silva, End to end transport layer security for Internet integrated sensing applications with ECC public-key authentication, in: IFIP Networking Conference, 2013, pp. 530-535.
    • (2013) IFIP Networking Conference , pp. 530-535
    • Granjal, J.1    Monteiro, E.2    Silva, J.3
  • 28
    • 84888870405 scopus 로고    scopus 로고
    • EAP based group authentication and key agreement protocol for machine type communication
    • R. Jiang, C. Lai, J. Luo, X. Wang, H. Wang, EAP based group authentication and key agreement protocol for machine type communication, Int. J. Distrib. Sens. Netw. (2013) http://dx.doi.org/10.1155/2013/304601.
    • (2013) Int. J. Distrib. Sens. Netw.
    • Jiang, R.1    Lai, C.2    Luo, J.3    Wang, X.4    Wang, H.5
  • 29
    • 84928806604 scopus 로고    scopus 로고
    • A lightweight attribute-based encryption scheme for the internet of things
    • X. Yao, Z. Chen, Y. Tian, A lightweight attribute-based encryption scheme for the Internet of Things, Future Gener. Comput. Syst. (2014) http://dx.doi.org/10.1016/j.future.2014.10.010.
    • (2014) Future Gener. Comput. Syst.
    • Yao, X.1    Chen, Z.2    Tian, Y.3
  • 31
    • 84899644274 scopus 로고    scopus 로고
    • A secure ECC-based RFID authentication scheme integrated with ID-verifier transfer protocol
    • Y.P. Liao, C.M. Hsiao, A secure ECC-based RFID authentication scheme integrated with ID-verifier transfer protocol, Ad Hoc Networks 18 (2014) 133-146.
    • (2014) Ad Hoc Networks , vol.18 , pp. 133-146
    • Liao, Y.P.1    Hsiao, C.M.2
  • 32
    • 84901188390 scopus 로고    scopus 로고
    • Anovel user authentication and key agreement scheme for heterogeneous ad hoc wireless sensor networks based on the internet of things notion
    • M. Turkanovic, B. Brumen, M. Holbl, Anovel user authentication and key agreement scheme for heterogeneous ad hoc wireless sensor networks based on the Internet of Things notion, Ad Hoc Networks 20 (2015) 96-112.
    • (2015) Ad Hoc Networks , vol.20 , pp. 96-112
    • Turkanovic, M.1    Brumen, B.2    Holbl, M.3
  • 33
    • 84930763799 scopus 로고    scopus 로고
    • Survey on secure communication protocols for the internet of things
    • K.T. Nguyen, M. Laurent, N. Oualha, Survey on secure communication protocols for the Internet of Things, Ad Hoc Networks 32 (2015) 17-31.
    • (2015) Ad Hoc Networks , vol.32 , pp. 17-31
    • Nguyen, K.T.1    Laurent, M.2    Oualha, N.3
  • 36
    • 0032624280 scopus 로고    scopus 로고
    • Security views
    • B. Hancock, Security views, Comput. Secur. 18 (7) (1999) 553-564.
    • (1999) Comput. Secur. , vol.18 , Issue.7 , pp. 553-564
    • Hancock, B.1
  • 37
    • 0032712929 scopus 로고    scopus 로고
    • PKI, elliptic curve cryptography and digital signatures
    • W.J. Caelli, E.P. Dawson, S.A. Rea, PKI, elliptic curve cryptography and digital signatures, Comput. Secur. 18 (1999) 47-66.
    • (1999) Comput. Secur. , vol.18 , pp. 47-66
    • Caelli, W.J.1    Dawson, E.P.2    Rea, S.A.3
  • 39
    • 33646227667 scopus 로고    scopus 로고
    • Automated security protocol analysis with the AVISPA tool
    • L. Vigano, Automated security protocol analysis with the AVISPA Tool, Electron. Notes Theor. Comput. Sci. 155 (2006) 61-86.
    • (2006) Electron. Notes Theor. Comput. Sci. , vol.155 , pp. 61-86
    • Vigano, L.1
  • 41
    • 54349110300 scopus 로고    scopus 로고
    • An analysis of conformance issues in implementations of standardized security protocol
    • A. Izquierdo, J.M. Sierra, J. Torres, An analysis of conformance issues in implementations of standardized security protocol, Comput. Stand. Interfaces 31 (2009) 249-251.
    • (2009) Comput. Stand. Interfaces , vol.31 , pp. 249-251
    • Izquierdo, A.1    Sierra, J.M.2    Torres, J.3
  • 42
    • 84951909718 scopus 로고    scopus 로고
    • A novel three-party authenticated key exchange protocol using one-time key
    • L. Chao, M. Maode, M. Jianfeng Ma, Z. Yaoyu, A novel three-party authenticated key exchange protocol using one-time key, J. Netw. Comput. Appl. 36 (2013) 298-503.
    • (2013) J. Netw. Comput. Appl. , vol.36 , pp. 298-503
    • Chao, L.1    Maode, M.2    Jianfeng Ma, M.3    Yaoyu, Z.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.