메뉴 건너뛰기




Volumn 40, Issue 6, 2016, Pages

Efficient and Anonymous Authentication Scheme for Wireless Body Area Networks

Author keywords

Authentication; Security; Wireless body area network

Indexed keywords

ARTICLE; COMPUTER SECURITY; MODEL; SENSOR; WIRELESS BODY AREA NETWORK; ALGORITHM; AMBULATORY MONITORING; CONFIDENTIALITY; DEVICES; HUMAN; ORGANIZATION AND MANAGEMENT; PROCEDURES; TELEMETRY; WIRELESS COMMUNICATION;

EID: 84964194112     PISSN: 01485598     EISSN: 1573689X     Source Type: Journal    
DOI: 10.1007/s10916-016-0491-8     Document Type: Article
Times cited : (66)

References (37)
  • 2
    • 84871878680 scopus 로고    scopus 로고
    • China’s rapidly aging population creates policy challenges in shaping a viable long-term care system
    • Feng, Z., Liu, C., Guan, X., and Mor, V., China’s rapidly aging population creates policy challenges in shaping a viable long-term care system. Health Aff. 31(12):2764–2773, 2012.
    • (2012) Health Aff. , vol.31 , Issue.12 , pp. 2764-2773
    • Feng, Z.1    Liu, C.2    Guan, X.3    Mor, V.4
  • 3
    • 0030380805 scopus 로고    scopus 로고
    • Personal area networks: near-field intrabody communication
    • Zimmerman, T. G., Personal area networks: near-field intrabody communication. IBM Syst. J. 35(3.4):609–617, 1996.
    • (1996) IBM Syst. J. , vol.35 , Issue.3 , pp. 609-617
    • Zimmerman, T.G.1
  • 4
    • 84964232726 scopus 로고    scopus 로고
    • Part 15.6:Wireless body area networks
    • IEEE standard for local and metropolitan area networks: Part 15.6:Wireless body area networks. IEEE, 2012.
    • (2012) IEEE
  • 5
    • 84940848791 scopus 로고    scopus 로고
    • New authentication scheme for wireless body area networks using the bilinear pairing
    • Wang, C., and Zhang, Y., New authentication scheme for wireless body area networks using the bilinear pairing. J. Med. Syst. 39(11):1–8, 2015.
    • (2015) J. Med. Syst. , vol.39 , Issue.11 , pp. 1-8
    • Wang, C.1    Zhang, Y.2
  • 6
    • 84878597719 scopus 로고    scopus 로고
    • A novel smart card and dynamic ID based remote user authentication scheme for multi-server environments
    • Li, X., Ma, J., Wang, W., Xiong, Y., and Zhang, J., A novel smart card and dynamic ID based remote user authentication scheme for multi-server environments. Math. Comput. Model. 58(1):85–95, 2013.
    • (2013) Math. Comput. Model. , vol.58 , Issue.1 , pp. 85-95
    • Li, X.1    Ma, J.2    Wang, W.3    Xiong, Y.4    Zhang, J.5
  • 7
    • 84883653668 scopus 로고    scopus 로고
    • An enhanced smart card based remote user password authentication scheme
    • Li, X., Niu, J., Khan, M. K., and Liao, J., An enhanced smart card based remote user password authentication scheme. J. Netw. Comput. Appl. 36(5):1365–1371, 2013.
    • (2013) J. Netw. Comput. Appl. , vol.36 , Issue.5 , pp. 1365-1371
    • Li, X.1    Niu, J.2    Khan, M.K.3    Liao, J.4
  • 8
    • 84923405290 scopus 로고    scopus 로고
    • A new authentication protocol for healthcare applications using wireless medical sensor networks with user anonymity
    • Li, X., Niu, J., Kumari, S., Liao, J., Liang, W., and Khan, M. K., A new authentication protocol for healthcare applications using wireless medical sensor networks with user anonymity. Secur. Commun. Netw. 2014. doi:10.1002/sec.1214.
    • (2014) Secur. Commun. Netw.
    • Li, X.1    Niu, J.2    Kumari, S.3    Liao, J.4    Liang, W.5    Khan, M.K.6
  • 9
    • 84908157951 scopus 로고    scopus 로고
    • Applying biometrics to design three‐factor remote user authentication scheme with key agreement
    • Li, X., Niu, J., Wang, Z., and Chen, C., Applying biometrics to design three‐factor remote user authentication scheme with key agreement. Secur. Commun. Netw. 7(10):1488–1497, 2014.
    • (2014) Secur. Commun. Netw. , vol.7 , Issue.10 , pp. 1488-1497
    • Li, X.1    Niu, J.2    Wang, Z.3    Chen, C.4
  • 10
    • 0017930809 scopus 로고
    • A method for obtaining digital signatures and public-key cryptosystems
    • Rivest, R. L., Shamir, A., and Adleman, L., A method for obtaining digital signatures and public-key cryptosystems. Commun. ACM 21(2):120–126, 1978.
    • (1978) Commun. ACM , vol.21 , Issue.2 , pp. 120-126
    • Rivest, R.L.1    Shamir, A.2    Adleman, L.3
  • 11
    • 0000534667 scopus 로고
    • A public key cryptosystem and a signature scheme based on discrete logarithms
    • ElGamal, T., A public key cryptosystem and a signature scheme based on discrete logarithms. Crypto 84:10–18, 1984.
    • (1984) Crypto , vol.84 , pp. 10-18
    • ElGamal, T.1
  • 12
    • 84963682665 scopus 로고    scopus 로고
    • One-to-many authentication for access control in mobile pay-TV systems
    • He, D., Kumar, N., Shen, H., and Lee, J., One-to-many authentication for access control in mobile pay-TV systems. Sci. China Inf. Sci. 2015. doi:10.1007/s11432-015-5469-5.
    • (2015) Sci. China Inf. Sci.
    • He, D.1    Kumar, N.2    Shen, H.3    Lee, J.4
  • 16
    • 47849093580 scopus 로고    scopus 로고
    • International Conference on (pp. 235–240)
    • Abi-char, P. E., Mhamed, A., and El-Hassan, B., A fast and secure elliptic curve based authenticated key agreement protocol for low power mobile communications. In Next Generation Mobile Applications, Services and Technologies, 2007. NGMAST’07. The 2007 International Conference on (pp. 235–240). IEEE, 2007.
    • (2007) IEEE , pp. 2007
    • Abi-char, P.E.1    Mhamed, A.2    El-Hassan, B.3
  • 18
    • 85015402934 scopus 로고
    • S., Use of elliptic curves in cryptography
    • Miller, V. S., Use of elliptic curves in cryptography. In: Proceedings of CRYPTO’85. pp. 417–426, 1985.
    • (1985) Proceedings of CRYPTO’85 , pp. 417-426
    • Miller, V.1
  • 19
    • 84968503742 scopus 로고
    • Elliptic curve cryptosystems
    • Koblitz, N., Elliptic curve cryptosystems. Math. Comput. 48(177):203–209, 1987.
    • (1987) Math. Comput. , vol.48 , Issue.177 , pp. 203-209
    • Koblitz, N.1
  • 20
    • 63049116480 scopus 로고    scopus 로고
    • An ID-based remote mutual authentication with key agreement scheme for mobile devices on elliptic curve cryptosystem
    • Yang, J. H., and Chang, C. C., An ID-based remote mutual authentication with key agreement scheme for mobile devices on elliptic curve cryptosystem. Comput. Secur. 28(3):138–143, 2009.
    • (2009) Comput. Secur. , vol.28 , Issue.3 , pp. 138-143
    • Yang, J.H.1    Chang, C.C.2
  • 21
    • 69549116775 scopus 로고    scopus 로고
    • Identity-based anonymous remote authentication for value-added services in mobile networks
    • Cao, X., Zeng, X., Kou, W., and Hu, L., Identity-based anonymous remote authentication for value-added services in mobile networks. IEEE Trans. Veh. Technol. 58(7):3508–3517, 2009.
    • (2009) IEEE Trans. Veh. Technol. , vol.58 , Issue.7 , pp. 3508-3517
    • Cao, X.1    Zeng, X.2    Kou, W.3    Hu, L.4
  • 23
    • 79959689122 scopus 로고    scopus 로고
    • A generic framework for three-factor authentication: Preserving security and privacy in distributed systems
    • Huang, X., Xiang, Y., Chonka, A., Zhou, J., and Deng, R., A generic framework for three-factor authentication: Preserving security and privacy in distributed systems. IEEE Trans. Parallel Distrib. Syst. 22(8):1390–1397, 2011.
    • (2011) IEEE Trans. Parallel Distrib. Syst. , vol.22 , Issue.8 , pp. 1390-1397
    • Huang, X.1    Xiang, Y.2    Chonka, A.3    Zhou, J.4    Deng, R.5
  • 24
    • 80052774690 scopus 로고    scopus 로고
    • A more efficient and secure ID-based remote mutual authentication with key agreement scheme for mobile devices on elliptic curve cryptosystem
    • Islam, S. H., and Biswas, G. P., A more efficient and secure ID-based remote mutual authentication with key agreement scheme for mobile devices on elliptic curve cryptosystem. J. Syst. Softw. 84(11):1892–1898, 2011.
    • (2011) J. Syst. Softw. , vol.84 , Issue.11 , pp. 1892-1898
    • Islam, S.H.1    Biswas, G.P.2
  • 25
    • 84964246143 scopus 로고    scopus 로고
    • Anonymous authentication for wireless body area networks with provable security
    • He, D., Zeadally, S., Kumar, N., and Lee, J., Anonymous authentication for wireless body area networks with provable security. IEEE Syst. J. 2016. doi:10.1109/JSYST.2016.2544805.
    • (2016) IEEE Syst. J.
    • He, D.1    Zeadally, S.2    Kumar, N.3    Lee, J.4
  • 26
    • 85020598353 scopus 로고
    • Identity-based cryptosystems and signature schemes
    • Shamir, A., Identity-based cryptosystems and signature schemes. Crypto 84:47–53, 1984.
    • (1984) Crypto , vol.84 , pp. 47-53
    • Shamir, A.1
  • 27
    • 84891804845 scopus 로고    scopus 로고
    • Certificateless remote anonymous authentication schemes for wireless body area networks
    • Liu, J., Zhang, Z., Chen, X., and Kwak, K. S., Certificateless remote anonymous authentication schemes for wireless body area networks. IEEE Trans. Parallel Distrib. Syst. 25(2):332–342, 2014.
    • (2014) IEEE Trans. Parallel Distrib. Syst. , vol.25 , Issue.2 , pp. 332-342
    • Liu, J.1    Zhang, Z.2    Chen, X.3    Kwak, K.S.4
  • 28
    • 84893021026 scopus 로고    scopus 로고
    • An efficient anonymous authentication scheme for wireless body area networks using elliptic curve cryptosystem
    • COI: 1:CAS:528:DC%2BC2cXitV2jsLbM
    • Zhao, Z., An efficient anonymous authentication scheme for wireless body area networks using elliptic curve cryptosystem. J. Med. Syst. 38(2):1–7, 2014.
    • (2014) J. Med. Syst. , vol.38 , Issue.2 , pp. 1-7
    • Zhao, Z.1
  • 29
    • 84944073824 scopus 로고    scopus 로고
    • An efficient identity-based conditional privacy-preserving authentication scheme for vehicular ad-hoc networks
    • He, D., Zeadally, S., Xu, B., and Huang, X., An efficient identity-based conditional privacy-preserving authentication scheme for vehicular ad-hoc networks. IEEE Trans. Inf. Forensics Secur. 10(12):1681–2691, 2015.
    • (2015) IEEE Trans. Inf. Forensics Secur. , vol.10 , Issue.12 , pp. 1681-2691
    • He, D.1    Zeadally, S.2    Xu, B.3    Huang, X.4
  • 30
    • 85027942960 scopus 로고    scopus 로고
    • A privacy-aware authentication scheme for distributed mobile cloud computing services
    • Tsai, J. L., and Lo, N. W., A privacy-aware authentication scheme for distributed mobile cloud computing services. IEEE Syst. J. 9(3):805–815, 2015.
    • (2015) IEEE Syst. J. , vol.9 , Issue.3 , pp. 805-815
    • Tsai, J.L.1    Lo, N.W.2
  • 31
    • 84927152538 scopus 로고    scopus 로고
    • Secure and efficient smart-card-based remote user authentication scheme for multiserver environment
    • Shunmuganathan, S., Saravanan, R. D., and Palanichamy, Y., Secure and efficient smart-card-based remote user authentication scheme for multiserver environment. Can. J. Electr. Comput. Eng. 38(1):20–30, 2015.
    • (2015) Can. J. Electr. Comput. Eng. , vol.38 , Issue.1 , pp. 20-30
    • Shunmuganathan, S.1    Saravanan, R.D.2    Palanichamy, Y.3
  • 32
    • 84938960924 scopus 로고    scopus 로고
    • An enhancement of a smart card authentication scheme for multi-server architecture
    • Li, X., Niu, J., Kumari, S., Liao, J., and Liang, W., An enhancement of a smart card authentication scheme for multi-server architecture. Wirel. Pers. Commun. 80(1):175–192, 2015.
    • (2015) Wirel. Pers. Commun. , vol.80 , Issue.1 , pp. 175-192
    • Li, X.1    Niu, J.2    Kumari, S.3    Liao, J.4    Liang, W.5
  • 34
    • 84873466407 scopus 로고    scopus 로고
    • Authenticated key exchange secure against dictionary attacks
    • Berlin: Springer
    • Bellare, M., Pointcheval, D., and Rogaway, P., Authenticated key exchange secure against dictionary attacks. In: Advances in cryptology—EUROCRYPT 2000 (pp. 139–155). Berlin: Springer, 2000.
    • (2000) Advances in cryptology—EUROCRYPT 2000 , pp. 139-155
    • Bellare, M.1    Pointcheval, D.2    Rogaway, P.3
  • 35
    • 35248844436 scopus 로고    scopus 로고
    • H., An identity-based signature from gap Diffie-Hellman groups
    • Berlin: Springer
    • Choon, J. C., and Cheon, J. H., An identity-based signature from gap Diffie-Hellman groups. In: Public key cryptography—PKC 2003 (pp. 18–30). Berlin: Springer, 2003.
    • (2003) Public key cryptography—PKC 2003 , pp. 18-30
    • Choon, J.C.1    Cheon, J.2
  • 36
    • 0000901529 scopus 로고    scopus 로고
    • Security arguments for digital signatures and blind signatures
    • Pointcheval, D., and Stern, J., Security arguments for digital signatures and blind signatures. J. Cryptol. 13(3):361–396, 2000.
    • (2000) J. Cryptol. , vol.13 , Issue.3 , pp. 361-396
    • Pointcheval, D.1    Stern, J.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.