메뉴 건너뛰기




Volumn 16, Issue 6, 2016, Pages

An energy efficient mutual authentication and key agreement scheme preserving anonymity for wireless sensor networks

Author keywords

Anonymity; Mutual authentication; Smart card; Wireless sensor networks

Indexed keywords

AUTHENTICATION; ENERGY EFFICIENCY; INTERNET; INTERNET PROTOCOLS; NETWORK SECURITY; SMART CARDS; TRANSPORTATION;

EID: 84973478502     PISSN: 14248220     EISSN: None     Source Type: Journal    
DOI: 10.3390/s16060837     Document Type: Article
Times cited : (53)

References (35)
  • 1
    • 84939576175 scopus 로고    scopus 로고
    • An efficient two-factor user authentication scheme with unlinkability for wireless sensor networks
    • Jiang, Q.; Ma, J.F.; Lu, X.; Tian, Y.L. An efficient two-factor user authentication scheme with unlinkability for wireless sensor networks. Peer-to-Peer Netw. Appl. 2015, 8, 1070-1081.
    • (2015) Peer-to-Peer Netw. Appl. , vol.8 , pp. 1070-1081
    • Jiang, Q.1    Ma, J.F.2    Lu, X.3    Tian, Y.L.4
  • 2
    • 84906774949 scopus 로고    scopus 로고
    • On the anonymity of two-factor authentication schemes for wireless sensor networks: Attacks, principle and solutions
    • Wang, D.;Wang, P. On the anonymity of two-factor authentication schemes for wireless sensor networks: Attacks, principle and solutions. Comput. Netw. 2014, 73, 41-57.
    • (2014) Comput. Netw. , vol.73 , pp. 41-57
    • Wang, D.1    Wang, P.2
  • 3
    • 84944073824 scopus 로고    scopus 로고
    • An efficient identity-based conditional privacy-preserving authentication scheme for vehicular ad hoc networks
    • He, D.B.; Zeadally, S.; Xu, B.W.; Huang, X.Y. An efficient identity-based conditional privacy-preserving authentication scheme for vehicular ad hoc networks. IEEE Trans. Inf. Forensics Secur. 2015, 10, 2681-2691.
    • (2015) IEEE Trans. Inf. Forensics Secur. , vol.10 , pp. 2681-2691
    • He, D.B.1    Zeadally, S.2    Xu, B.W.3    Huang, X.Y.4
  • 4
    • 84919909125 scopus 로고    scopus 로고
    • An efficient and robust rsa-based remote user authentication for telecare medical information systems
    • Giri, D.; Maitra, T.; Amin, R; Srivastava, P.D. An efficient and robust rsa-based remote user authentication for telecare medical information systems. J. Med. Syst. 2015, 39, 1-9.
    • (2015) J. Med. Syst. , vol.39 , pp. 1-9
    • Giri, D.1    Maitra, T.2    Amin, R.3    Srivastava, P.D.4
  • 5
    • 79957702363 scopus 로고    scopus 로고
    • A secured authentication protocol for wireless sensor networks using elliptic curves cryptography
    • Yeh, H.-L.; Chen, T.H.; Liu, P.C.; Kim, T.-H.; Wei, H.W. A secured authentication protocol for wireless sensor networks using elliptic curves cryptography. Sensors 2011, 11, 4767-4779.
    • (2011) Sensors , vol.11 , pp. 4767-4779
    • Yeh, H.-L.1    Chen, T.H.2    Liu, P.C.3    Kim, T.-H.4    Wei, H.W.5
  • 6
    • 84902296026 scopus 로고    scopus 로고
    • Security enhanced user authentication protocol for wireless sensor networks using elliptic curves cryptography
    • Choi, Y.; Lee, D.; Kim, J.; Jung, J.; Nam, J.; Won, D. Security enhanced user authentication protocol for wireless sensor networks using elliptic curves cryptography. Sensors. 2014, 14, 10081-10106.
    • (2014) Sensors. , vol.14 , pp. 10081-10106
    • Choi, Y.1    Lee, D.2    Kim, J.3    Jung, J.4    Nam, J.5    Won, D.6
  • 9
    • 62949130774 scopus 로고    scopus 로고
    • Two-factor user authentication in wireless sensor networks
    • Das, M.L. Two-factor user authentication in wireless sensor networks. IEEE Trans. Wirel. Commun. 2009, 8, 1086-1090.
    • (2009) IEEE Trans. Wirel. Commun. , vol.8 , pp. 1086-1090
    • Das, M.L.1
  • 10
    • 84862773089 scopus 로고    scopus 로고
    • Improvement of Das's two-factor authentication protocol in wireless sensor networks
    • Nyang, D.; Lee, M.K. Improvement of Das's two-factor authentication protocol in wireless sensor networks. IACR Cryptol. ePrint Arch. 2009, 2009, 631.
    • (2009) IACR Cryptol. ePrint Arch. , vol.2009 , pp. 631
    • Nyang, D.1    Lee, M.K.2
  • 13
    • 77955495427 scopus 로고    scopus 로고
    • Cryptanalysis and security improvements of two-factor userauthentication in wireless sensor networks
    • Khan, M.K.; Alghathbar, K. Cryptanalysis and security improvements of two-factor userauthentication in wireless sensor networks. Sensors 2010, 10, 2450-2459.
    • (2010) Sensors , vol.10 , pp. 2450-2459
    • Khan, M.K.1    Alghathbar, K.2
  • 14
    • 78650459565 scopus 로고    scopus 로고
    • An enhanced two-factor user authentication scheme in wireless sensor networks
    • He, D.J.; Gao, Y.; Chan, S.; Chen, C.; Bu, J.J. An enhanced two-factor user authentication scheme in wireless sensor networks. Ad Hoc Sens. Wirel. Netw. 2010, 10, 361-371.
    • (2010) Ad Hoc Sens. Wirel. Netw. , vol.10 , pp. 361-371
    • He, D.J.1    Gao, Y.2    Chan, S.3    Chen, C.4    Bu, J.J.5
  • 15
    • 84862762845 scopus 로고    scopus 로고
    • A dynamic password-based user authentication scheme for hierarchical wireless sensor networks
    • Das, A.K.; Sharma, P.; Chatterjee, S.; Sing, J.K. A dynamic password-based user authentication scheme for hierarchical wireless sensor networks. J. Netw. Comput. Appl. 2012, 35, 1646-1656.
    • (2012) J. Netw. Comput. Appl. , vol.35 , pp. 1646-1656
    • Das, A.K.1    Sharma, P.2    Chatterjee, S.3    Sing, J.K.4
  • 16
    • 84903599015 scopus 로고    scopus 로고
    • Notes on "a temporal-credential-based mutual authentication and key agreement scheme for wireless sensor networks"
    • Turkanović, M.; Hölbl, M. Notes on "a temporal-credential-based mutual authentication and key agreement scheme for wireless sensor networks". Wirel. Pers. Commun. 2013, 77, 907-922.
    • (2013) Wirel. Pers. Commun. , vol.77 , pp. 907-922
    • Turkanović, M.1    Hölbl, M.2
  • 17
    • 84901198272 scopus 로고    scopus 로고
    • Understanding security failures of two-factor authentication schemes for real-time applications in hierarchical wireless sensor networks
    • Wang, D.; Wang, P. Understanding security failures of two-factor authentication schemes for real-time applications in hierarchical wireless sensor networks. Ad Hoc Netw. 2014, 20, 1-15.
    • (2014) Ad Hoc Netw. , vol.20 , pp. 1-15
    • Wang, D.1    Wang, P.2
  • 18
    • 84880828581 scopus 로고    scopus 로고
    • An advanced temporal credential-based security scheme with mutual authentication and key agreement for wireless sensor networks
    • Li, C.-T.; Weng, C.-Y.; Lee, C.C. An advanced temporal credential-based security scheme with mutual authentication and key agreement for wireless sensor networks. Sensors 2013, 13, 9589-9603.
    • (2013) Sensors , vol.13 , pp. 9589-9603
    • Li, C.-T.1    Weng, C.-Y.2    Lee, C.C.3
  • 19
    • 84870693016 scopus 로고    scopus 로고
    • A temporal-credential-based mutual authentication and key agreement scheme for wireless sensor networks
    • Xue, K.P.; Ma, C.S.; Hong, P.L.; Ding, R. A temporal-credential-based mutual authentication and key agreement scheme for wireless sensor networks. J. Netw. Comput. Appl. 2013, 36, 316-323.
    • (2013) J. Netw. Comput. Appl. , vol.36 , pp. 316-323
    • Xue, K.P.1    Ma, C.S.2    Hong, P.L.3    Ding, R.4
  • 20
    • 84935865949 scopus 로고    scopus 로고
    • A secure temporal-credential-based mutual authentication and key agreement scheme with pseudo identity for wireless sensor networks
    • He, D.B.; Kumar, N.; Chilamkurti, N. A secure temporal-credential-based mutual authentication and key agreement scheme with pseudo identity for wireless sensor networks. Inform. Sci. 2015, 321, 263-277.
    • (2015) Inform. Sci. , vol.321 , pp. 263-277
    • He, D.B.1    Kumar, N.2    Chilamkurti, N.3
  • 21
    • 84901188390 scopus 로고    scopus 로고
    • A novel user authentication and key agreement scheme for heterogeneous ad hoc wireless sensor networks, based on the Internet of Things notion
    • Turkanović, M.; Brumen, B.; Hölbl, M. A novel user authentication and key agreement scheme for heterogeneous ad hoc wireless sensor networks, based on the Internet of Things notion. Ad Hoc Netw. 2014, 20, 96-112.
    • (2014) Ad Hoc Netw. , vol.20 , pp. 96-112
    • Turkanović, M.1    Brumen, B.2    Hölbl, M.3
  • 22
    • 84962198336 scopus 로고    scopus 로고
    • A provably secure, efficient, and flexible authentication scheme for ad hoc wireless sensor networks
    • Chang, C.C.; Le, H.D. A provably secure, efficient, and flexible authentication scheme for ad hoc wireless sensor networks. IEEE Trans. Wirel. Commun. 2016, 15, 357-366.
    • (2016) IEEE Trans. Wirel. Commun. , vol.15 , pp. 357-366
    • Chang, C.C.1    Le, H.D.2
  • 23
    • 84948712087 scopus 로고    scopus 로고
    • An efficient user authentication and key agreement scheme for heterogeneous wireless sensor network tailored for the Internet of Things environment
    • Farash, M.S.; Turkanović, M.; Kumari, S.; Hölbl, M. An efficient user authentication and key agreement scheme for heterogeneous wireless sensor network tailored for the Internet of Things environment. Ad Hoc Netw. 2016, 36, 152-176.
    • (2016) Ad Hoc Netw. , vol.36 , pp. 152-176
    • Farash, M.S.1    Turkanović, M.2    Kumari, S.3    Hölbl, M.4
  • 24
    • 84941221766 scopus 로고    scopus 로고
    • A secure lightweight scheme for user authentication and key agreement in multi-gateway based wireless sensor networks
    • Amin, R.; Biswas, G.P. A secure lightweight scheme for user authentication and key agreement in multi-gateway based wireless sensor networks. Ad Hoc Netw. 2015, 20, 1-23.
    • (2015) Ad Hoc Netw. , vol.20 , pp. 1-23
    • Amin, R.1    Biswas, G.P.2
  • 25
    • 38149061118 scopus 로고    scopus 로고
    • On the in distinguishability-based security model of key agreement protocols-simple cases
    • Cheng, Z.; Nistazakis, M.; Comley, R.; Vasiu, L. On the in distinguishability-based security model of key agreement protocols-simple cases. IACR Cryptology ePrint Arch. 2005, 2005, 129.
    • (2005) IACR Cryptology ePrint Arch. , vol.2005 , pp. 129
    • Cheng, Z.1    Nistazakis, M.2    Comley, R.3    Vasiu, L.4
  • 27
    • 84878356177 scopus 로고    scopus 로고
    • The science of guessing: Analyzing an anonymized corpus of 70 million passwords
    • San Francisco, CA, USA, 20-23 May
    • Bonneau, J. The science of guessing: Analyzing an anonymized corpus of 70 million passwords. In Proceedings of the 33th IEEE Symposium on Security and Privacy (S&P 2012), San Francisco, CA, USA, 20-23 May 2012; pp. 538-552.
    • (2012) Proceedings of the 33th IEEE Symposium on Security and Privacy (S&P 2012) , pp. 538-552
    • Bonneau, J.1
  • 31
    • 84973475288 scopus 로고    scopus 로고
    • (accessed on 6 June 2016)
    • AVISPA, AVISPAWeb Tool. Available online: http://www.avispa-project.org/web-interface/expert.php/ (accessed on 6 June 2016).
    • AVISPAWeb Tool.
  • 32
    • 0020720357 scopus 로고
    • On the Security of Public Key Protocols
    • Dolev, D.; Yao, A.C. On the Security of Public Key Protocols. IEEE Trans. Inform. Theory 1983, 29, 198-208.
    • (1983) IEEE Trans. Inform. Theory , vol.29 , pp. 198-208
    • Dolev, D.1    Yao, A.C.2
  • 33
    • 0347227352 scopus 로고    scopus 로고
    • U.S. Department of Commerce (accessed on 6 June 2016)
    • Advanced Encryption Standard, FIPS PUB 197, National Institute of Standards and Technology (NIST), U.S. Department of Commerce. Available online: http://csrc.nist.gov/publications/fips/fips197/fips-197. pdf (accessed on 6 June 2016).
    • FIPS PUB 197, National Institute of Standards and Technology (NIST)
  • 34
    • 84973461429 scopus 로고    scopus 로고
    • NIST (accessed on 6 June 2016)
    • SHA-3 Standardization. NIST. Available online: http://csrc.nist.gov/groups/ST/hash/sha-3/ sha-3-standardization.html (accessed on 6 June 2016).
    • SHA-3 Standardization.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.