메뉴 건너뛰기




Volumn 9, Issue 2, 2016, Pages 171-183

Two-factor mutual authentication with key agreement in wireless sensor networks

Author keywords

Key agreement; Password; Smart card; User authentication; Wireless sensor network

Indexed keywords

HASH FUNCTIONS; SENSOR NODES; SMART CARDS; WIRELESS SENSOR NETWORKS;

EID: 84961312004     PISSN: 19390114     EISSN: 19390122     Source Type: Journal    
DOI: 10.1002/sec.517     Document Type: Article
Times cited : (62)

References (20)
  • 1
    • 2942686425 scopus 로고    scopus 로고
    • Sensor networks: evolution, opportunities and challenges
    • Chong CY, Kumar S. Sensor networks: evolution, opportunities and challenges. Proceedings of the IEEE 2003; 91(8):1247-1256.
    • (2003) Proceedings of the IEEE , vol.91 , Issue.8 , pp. 1247-1256
    • Chong, C.Y.1    Kumar, S.2
  • 2
    • 84961327386 scopus 로고    scopus 로고
    • IEEE Std 802.15.4-2006. Part 15.4: Wireless Medium Access Control (MAC) and Physical Layer (PHY) Specifications for Low-Rate Wireless Personal Area Networks (LR-WPANs)
    • IEEE Std 802.15.4-2006. Part 15.4: Wireless Medium Access Control (MAC) and Physical Layer (PHY) Specifications for Low-Rate Wireless Personal Area Networks (LR-WPANs), 2006.
    • (2006)
  • 3
    • 84961332581 scopus 로고    scopus 로고
    • Communications Design Conference, Oct 2003; [June 2010].
    • Kinney P. ZigBee technology: wireless control that simply works. Communications Design Conference, Oct 2003; (http://www.zigbee.org/en/press_kits/latest/documents/white_papers/wp_zigbeetechwireless_final.pdf) [June 2010].
    • ZigBee technology: wireless control that simply works
    • Kinney, P.1
  • 4
    • 74049157270 scopus 로고    scopus 로고
    • A dynamic user authentication scheme for wireless sensor networks
    • June
    • Wong KH, Zheng Y, Cao J, Wang S. A dynamic user authentication scheme for wireless sensor networks. In Proc. of the IEEE SUTC'06, Vol. 1June. 2006; 318-327.
    • (2006) Proc. of the IEEE SUTC'06 , vol.1 , pp. 318-327
    • Wong, K.H.1    Zheng, Y.2    Cao, J.3    Wang, S.4
  • 6
    • 77956388579 scopus 로고    scopus 로고
    • User authentication schemes with pseudonymity for ubiquitous sensor network in NGN
    • Sept-Oct
    • Vaidya B, Rodrigues JJ, Park JH. User authentication schemes with pseudonymity for ubiquitous sensor network in NGN. International Journal of Communication Systems Sept-Oct2010; 23(9-10):1201-1222.
    • (2010) International Journal of Communication Systems , vol.23 , Issue.9-10 , pp. 1201-1222
    • Vaidya, B.1    Rodrigues, J.J.2    Park, J.H.3
  • 7
    • 62949130774 scopus 로고    scopus 로고
    • Two-factor user authentication in wireless sensor networks
    • Das ML. Two-factor user authentication in wireless sensor networks. IEEE Transactions on Wireless Communications 2009; 8:1086-1090.
    • (2009) IEEE Transactions on Wireless Communications , vol.8 , pp. 1086-1090
    • Das, M.L.1
  • 8
    • 77955495427 scopus 로고    scopus 로고
    • Cryptanalysis and security improvements of 'two-factor user authentication in wireless sensor networks'
    • Khan MK, Alghathbar K. Cryptanalysis and security improvements of 'two-factor user authentication in wireless sensor networks'. Sensors 2010; 10(3):2450-2459.
    • (2010) Sensors , vol.10 , Issue.3 , pp. 2450-2459
    • Khan, M.K.1    Alghathbar, K.2
  • 10
    • 78049334450 scopus 로고    scopus 로고
    • A robust mutual authentication protocol for wireless sensor networks
    • Oct.
    • Chen TH, Shih WK. A robust mutual authentication protocol for wireless sensor networks. ETRI Journal Oct.2010; 32(5):704-711.
    • (2010) ETRI Journal , vol.32 , Issue.5 , pp. 704-711
    • Chen, T.H.1    Shih, W.K.2
  • 11
    • 33744463927 scopus 로고    scopus 로고
    • An improved low communication cost user authentication scheme for mobile communication
    • March.
    • Lee CY, Lin CH, Chang CC. An improved low communication cost user authentication scheme for mobile communication. In Proc. of the IEEE AINA 2005, Vol. 2, March. 2005; 249-252.
    • (2005) Proc. of the IEEE AINA 2005 , vol.2 , pp. 249-252
    • Lee, C.Y.1    Lin, C.H.2    Chang, C.C.3
  • 12
    • 67650737028 scopus 로고    scopus 로고
    • Efficient and secure password authentication schemes for low-power devices
    • Kim KW, Jeon JC, Yoo KY. Efficient and secure password authentication schemes for low-power devices. International Journal on Sensor Networks 2007; 2(1/2):77-81.
    • (2007) International Journal on Sensor Networks , vol.2 , Issue.1-2 , pp. 77-81
    • Kim, K.W.1    Jeon, J.C.2    Yoo, K.Y.3
  • 14
    • 14844304757 scopus 로고    scopus 로고
    • TinyPK: securing sensor networks with public key technology. Proc of the ACM Workshop on Security of Ad Hoc and Sensor Networks, October
    • Watro R, Kong D, Cuti S, Gardiner C, Lyn C, Kruus P. TinyPK: securing sensor networks with public key technology. Proc of the ACM Workshop on Security of Ad Hoc and Sensor Networks, October 2004; 59-64.
    • (2004) , pp. 59-64
    • Watro, R.1    Kong, D.2    Cuti, S.3    Gardiner, C.4    Lyn, C.5    Kruus, P.6
  • 20
    • 33646834914 scopus 로고    scopus 로고
    • A new approach for random key pre-distribution in large-scale wireless sensor networks
    • Ren K, Zeng K, Lou W. A new approach for random key pre-distribution in large-scale wireless sensor networks. Journal on Wireless Communication and Mobile Computing 2006; 6(3):307-318.
    • (2006) Journal on Wireless Communication and Mobile Computing , vol.6 , Issue.3 , pp. 307-318
    • Ren, K.1    Zeng, K.2    Lou, W.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.