메뉴 건너뛰기




Volumn 15, Issue 1, 2016, Pages 357-366

A Provably Secure, Efficient, and Flexible Authentication Scheme for Ad hoc Wireless Sensor Networks

Author keywords

Authentication; elliptic curve cryptography; wireless sensor networks

Indexed keywords

AUTHENTICATION; CRYPTOGRAPHY; HASH FUNCTIONS; PUBLIC KEY CRYPTOGRAPHY; SENSOR NODES; SMART CARDS; TRANSPORTATION; WIRELESS AD HOC NETWORKS;

EID: 84962198336     PISSN: 15361276     EISSN: None     Source Type: Journal    
DOI: 10.1109/TWC.2015.2473165     Document Type: Article
Times cited : (327)

References (20)
  • 1
    • 84901188390 scopus 로고    scopus 로고
    • A novel user authentication and key agreement scheme for heterogeneous ad hoc wireless sensor networks, based on the Internet of Things notion
    • Sep
    • M. Turkanovic, B. Brumen, and M. Holbl, "A novel user authentication and key agreement scheme for heterogeneous ad hoc wireless sensor networks, based on the Internet of Things notion," Ad Hoc Netw., vol. 20, pp. 96-112, Sep. 2014
    • (2014) Ad Hoc Netw , vol.20 , pp. 96-112
    • Turkanovic, M.1    Brumen, B.2    Holbl, M.3
  • 3
    • 39349093196 scopus 로고    scopus 로고
    • An improved dynamic user authentication scheme for wireless sensor networks
    • Nov
    • H. R. Tseng, R. H. Jan, andW. Yang, "An improved dynamic user authentication scheme for wireless sensor networks," in Proc. IEEE Global Telecommun. Conf., Nov. 2007, pp. 986-990
    • (2007) Proc. IEEE Global Telecommun. Conf , pp. 986-990
    • Tseng, H.R.1    Jan, R.H.2    Yang, W.3
  • 4
    • 62949130774 scopus 로고    scopus 로고
    • Two-factor user authentication in wireless sensor networks
    • Mar
    • M. L. Das, "Two-factor user authentication in wireless sensor networks," IEEE Trans. Wireless Commun., vol. 8, no. 3, pp. 1086-1090, Mar. 2009
    • (2009) IEEE Trans. Wireless Commun , vol.8 , Issue.3 , pp. 1086-1090
    • Das, M.L.1
  • 5
    • 77955495427 scopus 로고    scopus 로고
    • Cryptanalysis and security improvements of two-factor user authentication in wireless sensor networks
    • Mar
    • M. K. Khan and K. Alghathbar, "Cryptanalysis and security improvements of two-factor user authentication in wireless sensor networks," Sensors, vol. 10, pp. 2450-2459, Mar. 2010
    • (2010) Sensors , vol.10 , pp. 2450-2459
    • Khan, M.K.1    Alghathbar, K.2
  • 6
    • 78049334450 scopus 로고    scopus 로고
    • A robust mutual authentication protocol for wireless sensor networks
    • Oct
    • T. H. Chen and W. K. Shih, "A robust mutual authentication protocol for wireless sensor networks," ETRI J., vol. 32, no. 5, pp. 704-712, Oct. 2010
    • (2010) ETRI J , vol.32 , Issue.5 , pp. 704-712
    • Chen, T.H.1    Shih, W.K.2
  • 7
    • 78650459565 scopus 로고    scopus 로고
    • An enhanced two-factor user authentication scheme in wireless sensor networks
    • D. He, Y. Gao, S. Chan, C. Chen, and J. Bu, "An enhanced two-factor user authentication scheme in wireless sensor networks," Ad Hoc Sens. Wireless Netw., vol. 10, no. 4, pp. 361-371, 2010
    • (2010) Ad Hoc Sens. Wireless Netw , vol.10 , Issue.4 , pp. 361-371
    • He, D.1    Gao, Y.2    Chan, S.3    Chen, C.4    Bu, J.5
  • 9
    • 84862762845 scopus 로고    scopus 로고
    • A dynamic password-based user authentication scheme for hierarchical wireless sensor networks
    • Sep
    • A. K. Das, P. Sharma, S. Chatterjee, and J. K. Sing, "A dynamic password-based user authentication scheme for hierarchical wireless sensor networks," J. Netw. Comput. Appl., vol. 35, no. 5, pp. 1646-1656, Sep. 2012
    • (2012) J. Netw. Comput. Appl , vol.35 , Issue.5 , pp. 1646-1656
    • Das, A.K.1    Sharma, P.2    Chatterjee, S.3    Sing, J.K.4
  • 10
    • 84870693016 scopus 로고    scopus 로고
    • A temporal-credential-based mutual authentication and key agreement scheme for wireless sensor networks
    • Jan
    • K. Xue, C. Ma, P. Hong, and R. Ding, "A temporal-credential-based mutual authentication and key agreement scheme for wireless sensor networks," J. Netw. Comput. Appl., vol. 36, no. 1, pp. 316-323, Jan. 2013
    • (2013) J. Netw. Comput. Appl , vol.36 , Issue.1 , pp. 316-323
    • Xue, K.1    Ma, C.2    Hong, P.3    Ding, R.4
  • 11
    • 84880828581 scopus 로고    scopus 로고
    • An advanced temporal credentialbased security scheme with mutual authentication and key agreement for wireless sensor networks
    • Jul
    • C. T. Li, C. Y. Weng, and C. C. Lee, "An advanced temporal credentialbased security scheme with mutual authentication and key agreement for wireless sensor networks," Sensors, vol. 13, pp. 9589-9603, Jul. 2013
    • (2013) Sensors , vol.13 , pp. 9589-9603
    • Li, C.T.1    Weng, C.Y.2    Lee, C.C.3
  • 12
    • 84879297926 scopus 로고    scopus 로고
    • An improved dynamic password-based user authentication scheme for hierarchical wireless sensor networks
    • M. Turkanovic and M. Holbl, "An improved dynamic password-based user authentication scheme for hierarchical wireless sensor networks," Electron. Elect. Eng., vol. 19, no. 6, pp. 109-116, 2013
    • (2013) Electron. Elect. Eng , vol.19 , Issue.6 , pp. 109-116
    • Turkanovic, M.1    Holbl, M.2
  • 13
    • 79957702363 scopus 로고    scopus 로고
    • A secured authentication protocol for wireless sensor networks using elliptic curves cryptography
    • May
    • H. L. Yeh, T. H Chen, P. C. Liu, T. H. Kim, and H. W. Wei, "A secured authentication protocol for wireless sensor networks using elliptic curves cryptography," Sensors, vol. 11, pp. 4767-4779, May 2011
    • (2011) Sensors , vol.11 , pp. 4767-4779
    • Yeh, H.L.1    Chen, T.H.2    Liu, P.C.3    Kim, T.H.4    Wei, H.W.5
  • 14
    • 84902128521 scopus 로고    scopus 로고
    • Privacy-preserving mobile roaming authentication with security proof in global mobility networks
    • Q. Xie, D. Hong, M. Bao, N. Dong, and D. S.Wong, "Privacy-preserving mobile roaming authentication with security proof in global mobility networks," Int. J. Distrib. Sens. Netw., vol. 2014, 7 pp., 2014, Article ID: 325734, doi: 10.1155/2014/325734
    • (2014) Int. J. Distrib. Sens. Netw , vol.2014 , pp. 7
    • Xie, Q.1    Hong, D.2    Bao, M.3    Dong, N.4    Wong, D.S.5
  • 15
    • 84877308219 scopus 로고    scopus 로고
    • A new user authentication protocol for wireless sensor networks using elliptic curves cryptography
    • W. Shi and P. Gong, "A new user authentication protocol for wireless sensor networks using elliptic curves cryptography," Int. J. Distrib. Sens. Netw., vol. 2013, 7 pp., 2013, Article ID: 730831, doi: 10.1155/2013/730831
    • (2013) Int. J. Distrib. Sens. Netw , vol.2013 , pp. 7
    • Shi, W.1    Gong, P.2
  • 16
    • 84902296026 scopus 로고    scopus 로고
    • Security enhanced user authentication protocol for wireless sensor networks using elliptic curves cryptography
    • Jun
    • Y. S. Choi, D. Lee, J. Kim, J. Jung, J. Nam, and D. Won, "Security enhanced user authentication protocol for wireless sensor networks using elliptic curves cryptography," Sensors, vol. 14, no. 6, pp. 10081-10106, Jun. 2014
    • (2014) Sensors , vol.14 , Issue.6 , pp. 10081-10106
    • Choi, Y.S.1    Lee, D.2    Kim, J.3    Jung, J.4    Nam, J.5    Won, D.6
  • 17
    • 24144491593 scopus 로고    scopus 로고
    • Password-based authenticated key exchange in the three-party setting
    • Jan
    • M. Abdalla, P. A. Fouque, and D. Pointcheval, "Password-based authenticated key exchange in the three-party setting," in Proc. Public Key Cryptogr., Jan. 2005, pp. 65-84
    • (2005) Proc. Public Key Cryptogr , pp. 65-84
    • Abdalla, M.1    Fouque, P.A.2    Pointcheval, D.3
  • 18
    • 35248878854 scopus 로고    scopus 로고
    • Scalable protocols for authenticated group key exchange
    • Aug
    • J. Katz and M. Yung, "Scalable protocols for authenticated group key exchange," in Proc. Crypto'03, Aug. 2003, pp. 110-125
    • (2003) Proc. Crypto'03 , pp. 110-125
    • Katz, J.1    Yung, M.2
  • 19
    • 0027726717 scopus 로고
    • Random oracles are practical: A paradigm for designing efficient protocols
    • M. Bellare and P. Rogaway, "Random oracles are practical: A paradigm for designing efficient protocols," in Proc. 1st ACM Annu. Conf. Comput. Commun. Secur., 1993, vol. 773, pp. 62-73
    • (1993) Proc. 1st ACM Annu. Conf. Comput. Commun. Secur , vol.773 , pp. 62-73
    • Bellare, M.1    Rogaway, P.2
  • 20
    • 70349791260 scopus 로고    scopus 로고
    • A simple user authentication scheme for grid computing
    • R. Lu, Z. Cao, Z. Chai, and X. Liang, "A simple user authentication scheme for grid computing," Int. J. Netw. Secur., vol. 7, no. 2, pp. 202-206, 2008
    • (2008) Int. J. Netw. Secur , vol.7 , Issue.2 , pp. 202-206
    • Lu, R.1    Cao, Z.2    Chai, Z.3    Liang, X.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.