메뉴 건너뛰기




Volumn 16, Issue 5, 2016, Pages

1-RAAP: An efficient 1-round anonymous authentication protocol for wireless body area networks

Author keywords

1 RAAP; Anonymity; Authentication protocol; Security; Sensors; Wireless body area networks

Indexed keywords

AUTHENTICATION; BODY SENSOR NETWORKS; COMPUTATIONAL EFFICIENCY; DISTRIBUTED COMPUTER SYSTEMS; INTERNET; NETWORK PROTOCOLS; NETWORKS (CIRCUITS); SENSORS; UBIQUITOUS COMPUTING; WIRELESS LOCAL AREA NETWORKS (WLAN); WIRELESS NETWORKS; WIRELESS TELECOMMUNICATION SYSTEMS;

EID: 84982171473     PISSN: 14248220     EISSN: None     Source Type: Journal    
DOI: 10.3390/s16050728     Document Type: Article
Times cited : (59)

References (39)
  • 2
    • 0017930809 scopus 로고
    • A method for obtaining digital signatures and public-key cryptosystems
    • Rivest, R.; Shamir, A.; Adleman, L. A method for obtaining digital signatures and public-key cryptosystems. Commun. ACM 1978, 21, 120-126.
    • (1978) Commun. ACM , vol.21 , pp. 120-126
    • Rivest, R.1    Shamir, A.2    Adleman, L.3
  • 3
    • 1942487780 scopus 로고    scopus 로고
    • New Authentication Scheme with Anonymity for Wireless Environments
    • Zhu, J.; Ma, J. A New Authentication Scheme with Anonymity for Wireless Environments. IEEE Trans. Consum. Electron. 2004, 50, 231-235.
    • (2004) IEEE Trans. Consum. Electron , vol.50 , pp. 231-235
    • Zhu, J.1    Ma, J.A.2
  • 4
    • 54349089114 scopus 로고    scopus 로고
    • An improved bilinear pairing based remote user authentication scheme
    • Goriparthi, T.; Das, M.L.; Saxena, A. An improved bilinear pairing based remote user authentication scheme. Comput. Stand. Interfaces 2009, 31, 181-185.
    • (2009) Comput. Stand. Interfaces , vol.31 , pp. 181-185
    • Goriparthi, T.1    Das, M.L.2    Saxena, A.3
  • 5
    • 84958043300 scopus 로고    scopus 로고
    • A secure and efficient authenticated encryption for electronic payment systems using elliptic curve cryptography
    • Chaudhry Shehzad, A.; Sabzinejad Farash, M.; Naqvi, H.; Sher, M. A secure and efficient authenticated encryption for electronic payment systems using elliptic curve cryptography. Electron. Commer. Res. 2016, 16, 113-139.
    • (2016) Electron. Commer. Res , vol.16 , pp. 113-139
    • Chaudhry Shehzad, A.1    Sabzinejad Farash, M.2    Naqvi, H.3    Sher, M.4
  • 6
    • 37349011768 scopus 로고    scopus 로고
    • A mutual authentication and key exchange scheme from bilinear pairings for low power computing devices
    • Beijing, China, 23-2
    • Tseng, Y.M.; Wu, T.Y.; Wu, J.D. A mutual authentication and key exchange scheme from bilinear pairings for low power computing devices. In Proceedings of the Computer Software and Applications Conference, Beijing, China, 23-27 July 2007.
    • (2007) Proceedings of the Computer Software and Applications Conference
    • Tseng, Y.M.1    Wu, T.Y.2    Wu, J.D.3
  • 7
    • 84953639516 scopus 로고    scopus 로고
    • A provably secure and efficient authentication scheme for access control in mobile pay-TV systems
    • Sabzinejad Farash, M.; Ahmadian Attari, M. A provably secure and efficient authentication scheme for access control in mobile pay-TV systems. Multimed. Tools Appl. 2016, 75, 405-424.
    • (2016) Multimed. Tools Appl , vol.75 , pp. 405-424
    • Sabzinejad Farash, M.1    Ahmadian Attari, M.2
  • 10
    • 69549116775 scopus 로고    scopus 로고
    • Identity-Based Anonymous Remote Authentication for Value-Added Services in Mobile Network
    • Cao, X.F.; Zeng, X.W.; Kou, W.D.; Hu, L.B. Identity-Based Anonymous Remote Authentication for Value-Added Services in Mobile Network. IEEE Trans. Veh. Technol. 2009, 58, 3508-3517.
    • (2009) IEEE Trans. Veh. Technol , vol.58 , pp. 3508-3517
    • Cao, X.F.1    Zeng, X.W.2    Kou, W.D.3    Hu, L.B.4
  • 11
    • 26444474509 scopus 로고    scopus 로고
    • ID-Based Authenticated Key Agreement for Low-Power Mobile Devices
    • LNCS, 1st ed.; Boyd, C., Juan, M.G.N., Eds.; Springer-Verlag: Berlin, German
    • Choi, K.Y.; Hwang, J.Y.; Lee, D.H.; Seo, I.S. ID-Based Authenticated Key Agreement for Low-Power Mobile Devices. In Information Security and Privacy, LNCS, 1st ed.; Boyd, C., Juan, M.G.N., Eds.; Springer-Verlag: Berlin, Germany, 2005; Volume 3574, pp. 494-505.
    • (2005) Information Security and Privacy , vol.3574 , pp. 494-505
    • Choi, K.Y.1    Hwang, J.Y.2    Lee, D.H.3
  • 12
    • 77955659710 scopus 로고    scopus 로고
    • An efficient user authentication and key exchange protocol for mobile client-server environment
    • Wu, T.Y.; Tseng, Y.M. An efficient user authentication and key exchange protocol for mobile client-server environment. Comput. Netw. 2010, 54, 1520-1530.
    • (2010) Comput. Netw , vol.54 , pp. 1520-1530
    • Wu, T.Y.1    Tseng, Y.M.2
  • 13
    • 84949316817 scopus 로고    scopus 로고
    • An Efficient Authentication Scheme to Protect User Privacy in Seamless Big Data Services
    • Jeong, Y.S.; Shin, S.S. An Efficient Authentication Scheme to Protect User Privacy in Seamless Big Data Services. Wirel. Pers. Commun. 2016, 86, 7-19.
    • (2016) Wirel. Pers. Commun , vol.86 , pp. 7-19
    • Jeong, Y.S.1    Shin, S.S.2
  • 15
    • 84958824518 scopus 로고    scopus 로고
    • On the security of two identity-based signature schemes based on pairings
    • Zhen, Q.; Chen, Y.A.; Wang, Y.L.; Hu, X. On the security of two identity-based signature schemes based on pairings. Inf. Process. Lett. 2016, 116, 416-418.
    • (2016) Inf. Process. Lett , vol.116 , pp. 416-418
    • Zhen, Q.1    Chen, Y.A.2    Wang, Y.L.3    Hu, X.4
  • 16
    • 84932632711 scopus 로고    scopus 로고
    • Efficient ID-Based Key-Insulated Signature Scheme with Batch Verifications Using Bilinear Pairings over Elliptic Curves
    • Gopal, P.V.S.S.N.; Vasudeva Reddy, P. Efficient ID-Based Key-Insulated Signature Scheme with Batch Verifications Using Bilinear Pairings over Elliptic Curves. J. Discret. Math. Sci. Cryptogr. 2015, 8, 385-402.
    • (2015) J. Discret. Math. Sci. Cryptogr , vol.8 , pp. 385-402
    • Gopal, P.1    Vasudeva Reddy, P.2
  • 17
    • 84949663448 scopus 로고    scopus 로고
    • A new scheme for proactive out of band signaling solution for IP traceback in Wireless Mesh Network
    • nformation and Telecommunication Systems (CITS), Gijon, Spain, 15-17 Jul
    • Gassara, M.; Zarai, F.; Daly, I.; Obaidat, M.S.; Hsiao, K.F. A new scheme for proactive out of band signaling solution for IP traceback in Wireless Mesh Network. In Proceedings of the 2015 International Conference on Computer, Information and Telecommunication Systems (CITS), Gijon, Spain, 15-17 July 2015; pp. 1-6.
    • (2015) Proceedings of the 2015 International Conference on Computer , pp. 1-6
    • Gassara, M.1    Zarai, F.2    Daly, I.3    Obaidat, M.S.4    Hsiao, K.F.5
  • 18
    • 33744776672 scopus 로고    scopus 로고
    • A novel remote user authentication scheme using bilinear pairings
    • Das, M.L.; Saxena, A.; Gulati, V.P.; Phatak, D.B. A novel remote user authentication scheme using bilinear pairings. Comput. Secur. 2006, 25, 184-189.
    • (2006) Comput. Secur , vol.25 , pp. 184-189
    • Das, M.L.1    Saxena, A.2    Gulati, V.P.3    Phatak, D.B.4
  • 19
    • 84859767453 scopus 로고    scopus 로고
    • An efficient remote user authentication and key agreement protocol for mobile client-server environment from pairings
    • He, D.B. An efficient remote user authentication and key agreement protocol for mobile client-server environment from pairings. Ad. Hoc. Netw. 2012, 10, 1009-1016.
    • (2012) Ad. Hoc. Netw , vol.10 , pp. 1009-1016
    • He, D.B.1
  • 20
    • 84945552541 scopus 로고    scopus 로고
    • Identity-based encryption with outsourced equality test in cloud computing
    • Sha, M. Identity-based encryption with outsourced equality test in cloud computing. Inf. Sci. 2016, 328, 389-402.
    • (2016) Inf. Sci , vol.328 , pp. 389-402
    • Sha, M.1
  • 21
    • 0345490607 scopus 로고    scopus 로고
    • Certificateless Public Key Cryptography
    • LNCS, 1st ed.; Laih, C.-S., Ed.; Springer-Verlag: Berlin, German
    • Al-Riyami, S.S.; Paterson, K.G. Certificateless Public Key Cryptography. In Advances in Cryptology Asiacrypt 03, LNCS, 1st ed.; Laih, C.-S., Ed.; Springer-Verlag: Berlin, Germany, 2003; pp. 452-473.
    • (2003) Advances in Cryptology Asiacrypt 03 , pp. 452-473
    • Al-Riyami, S.S.1    Paterson, K.G.2
  • 24
    • 56149108570 scopus 로고    scopus 로고
    • Breaking the short certificateless signature scheme
    • Shim, K. Breaking the short certificateless signature scheme. Inf. Sci. 2009, 179, 303-306.
    • (2009) Inf. Sci , vol.179 , pp. 303-306
    • Shim, K.1
  • 25
    • 64149092115 scopus 로고    scopus 로고
    • Robust and Efficient Authenticated Key Agreement in Mobile Communications
    • Juang, W.S.; Wu, J.L. Robust and Efficient Authenticated Key Agreement in Mobile Communications. Inter. J. Mob. Commun. 2009, 7, 562-579.
    • (2009) Inter. J. Mob. Commun , vol.7 , pp. 562-579
    • Juang, W.S.1    Wu, J.L.2
  • 26
    • 55749090987 scopus 로고    scopus 로고
    • Efficient and provably-secure certificateless short signature scheme from bilinear pairings
    • Du, H.Z.; Wen, Q.Y. Efficient and provably-secure certificateless short signature scheme from bilinear pairings. Comput. Stand. Interfaces 2009, 31, 390-394.
    • (2009) Comput. Stand. Interfaces , vol.31 , pp. 390-394
    • Du, H.Z.1    Wen, Q.Y.2
  • 27
    • 84927701388 scopus 로고    scopus 로고
    • Certificateless and certificate-based signatures from lattices
    • Tian, M.M.; Huang, L.S. Certificateless and certificate-based signatures from lattices. Secur. Commun. Netw. 2015, 8, 1575-1586.
    • (2015) Secur. Commun. Netw. , vol.8 , pp. 1575-1586
    • Tian, M.M.1    Huang, L.S.2
  • 28
    • 79951510781 scopus 로고    scopus 로고
    • Efficient and short certificateless signature secure against realistic adversaries
    • Tso, R.; Yi, X.; Huang, X.Y. Efficient and short certificateless signature secure against realistic adversaries. J. Supercomput. 2011, 55, 173-191.
    • (2011) J. Supercomput , vol.55 , pp. 173-191
    • Tso, R.1    Yi, X.2    Huang, X.Y.3
  • 29
    • 77949864345 scopus 로고    scopus 로고
    • Lightweight Authentication Protocol for Mobile RFID Networks
    • Yang, M.H.; Zhang, F.T. Lightweight Authentication Protocol for Mobile RFID Networks. Inter. J. Secur. Netw. 2010, 5, 53-62.
    • (2010) Inter. J. Secur. Netw , vol.5 , pp. 53-62
    • Yang, M.H.1    Zhang, F.T.2
  • 30
    • 84891804845 scopus 로고    scopus 로고
    • Certificateless Remote Anonymous Authentication Schemes forWireless Body Area Networks
    • Liu, J.W.; Zhang, Z.H.; Chen, X.F.; Kwak, K.S. Certificateless Remote Anonymous Authentication Schemes forWireless Body Area Networks. IEEE Trans. Parallel Distrib. Syst. 2014, 25, 332-342.
    • (2014) IEEE Trans. Parallel Distrib. Syst , vol.25 , pp. 332-342
    • Liu, J.W.1    Zhang, Z.H.2    Chen, X.F.3    Kwak, K.S.4
  • 31
    • 84930216224 scopus 로고    scopus 로고
    • Revocable and Scalable Certificateless Remote Authentication Protocal with Anonymity for Wireless Body Area Networks
    • Xiong, H.; Qin, Z.G. Revocable and Scalable Certificateless Remote Authentication Protocal with Anonymity for Wireless Body Area Networks. IEEE Trans. Inf. Forensice Secur. 2015, 10, 1442-1455.
    • (2015) IEEE Trans. Inf. Forensice Secur , vol.10 , pp. 1442-1455
    • Xiong, H.1    Qin, Z.G.2
  • 32
    • 84947253270 scopus 로고    scopus 로고
    • Mutual Authentication Protocol to Enhance Patient Medication Safety
    • Jin, C.H.; Xu, C.X.; Zhang, X.J.; Li, F.G. A Secure ECC-Based RFID Mutual Authentication Protocol to Enhance Patient Medication Safety. J. Med. Syst. 2016, 40, 12.
    • (2016) J. Med. Syst , vol.40 , pp. 12
    • Jin, C.H.1    Xu, C.X.2    Zhang, X.J.3    Li, F.4    Secure Ecc-Based, R.5
  • 36
    • 49949100301 scopus 로고    scopus 로고
    • Nano ECC: Testing the Limits of Elliptic Curve Cryptography in Sensor Networks
    • 1st ed.; Roberto, V., Ed.; Springer-Verlag: Berlin, German
    • Szczechowiak, P.; Oliveira, L.B.; Scott, M.; Collier, M.; Dahab, R. Nano ECC: Testing the Limits of Elliptic Curve Cryptography in Sensor Networks. In Wireless Sensor Networks, 1st ed.; Roberto, V., Ed.; Springer-Verlag: Berlin, Germany, 2008; Volume 4913, pp. 305-320.
    • (2008) Wireless Sensor Networks , vol.4913 , pp. 305-320
    • Szczechowiak, P.1    Oliveira, L.B.2    Scott, M.3    Collier, M.4    Dahab, R.5
  • 37
    • 36248988077 scopus 로고    scopus 로고
    • On broadcast authentication in wireless sensor networks
    • Ren, K.; Lou, W.; Zeng, K.; Moran, P.J. On broadcast authentication in wireless sensor networks. IEEE Trans. Wirel. Commun. 2007, 6, 4136-4144.
    • (2007) IEEE Trans. Wirel. Commun , vol.6 , pp. 4136-4144
    • Ren, K.1    Lou, W.2    Zeng, K.3    Moran, P.J.4
  • 38
    • 84982110434 scopus 로고    scopus 로고
    • Intell®PXA270 Processor Electrical, accessed on 12 May 201
    • Intell®PXA270 Processor Electrical, Mechanical, and Thermal Specification. Available online: http://pdf. dzsc.com/CXX/NHPXA270Cxxx.pdf (accessed on 12 May 2016).
    • Mechanical, and Thermal Specification.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.