메뉴 건너뛰기




Volumn 9, Issue 16, 2016, Pages 3670-3687

Provably secure user authentication and key agreement scheme for wireless sensor networks

Author keywords

authentication; AVISPA; elliptic curve cryptography; formal security; key agreement; wireless sensor networks

Indexed keywords

AUTHENTICATION; COPYRIGHTS; GEOMETRY; HASH FUNCTIONS; PUBLIC KEY CRYPTOGRAPHY; SMART CARDS; WIRELESS SENSOR NETWORKS;

EID: 84983380948     PISSN: 19390114     EISSN: 19390122     Source Type: Journal    
DOI: 10.1002/sec.1573     Document Type: Article
Times cited : (90)

References (47)
  • 1
    • 84962198336 scopus 로고    scopus 로고
    • A provably secure, efficient and flexible authentication scheme for ad hoc wireless sensor networks
    • Chang CC, Le HD. A provably secure, efficient and flexible authentication scheme for ad hoc wireless sensor networks. IEEE Transactions on Wireless Communications 2016; 15(1): 357–366.
    • (2016) IEEE Transactions on Wireless Communications , vol.15 , Issue.1 , pp. 357-366
    • Chang, C.C.1    Le, H.D.2
  • 2
    • 84964246143 scopus 로고    scopus 로고
    • Anonymous Authentication for Wireless Body Area Networks With Provable Security
    • He D, Zeadally S, Kumar N, Lee JH. Anonymous Authentication for Wireless Body Area Networks With Provable Security. IEEE Systems Journal 2016. DOI: 10.1109/JSYST.2016.2544805.
    • (2016) IEEE Systems Journal
    • He, D.1    Zeadally, S.2    Kumar, N.3    Lee, J.H.4
  • 3
    • 84963682665 scopus 로고    scopus 로고
    • One-to-many Authentication for Access Control in Mobile Pay-TV Systems
    • He D, Kumar N, Shen H, Lee JH. One-to-many Authentication for Access Control in Mobile Pay-TV Systems. Science China-Information Sciences 2016; 59(5): 1–14.
    • (2016) Science China-Information Sciences , vol.59 , Issue.5 , pp. 1-14
    • He, D.1    Kumar, N.2    Shen, H.3    Lee, J.H.4
  • 4
    • 84975275069 scopus 로고    scopus 로고
    • Anonymous two-factor authentication in distributed systems: certain goals are beyond attainment
    • Wang D, He D, Wang P, Chu CH. Anonymous two-factor authentication in distributed systems: certain goals are beyond attainment. IEEE Transactions on Dependable and Secure Computing 2015; 12(4): 428–442.
    • (2015) IEEE Transactions on Dependable and Secure Computing , vol.12 , Issue.4 , pp. 428-442
    • Wang, D.1    He, D.2    Wang, P.3    Chu, C.H.4
  • 5
    • 84859896093 scopus 로고    scopus 로고
    • A beneficial analysis of deployment knowledge for key distribution in wireless sensor networks
    • Huyen NTT, Jo M, Nguyen TD, Huh EN. A beneficial analysis of deployment knowledge for key distribution in wireless sensor networks. Security and Communication Networks 2012; 5(5): 485–495.
    • (2012) Security and Communication Networks , vol.5 , Issue.5 , pp. 485-495
    • Huyen, N.T.T.1    Jo, M.2    Nguyen, T.D.3    Huh, E.N.4
  • 6
    • 66449127121 scopus 로고    scopus 로고
    • An efficient signal-range-based probabilistic key pre-distribution scheme in a wireless sensor network
    • Huyen NTT, Jo M, Guizani M, Huh EN. An efficient signal-range-based probabilistic key pre-distribution scheme in a wireless sensor network. IEEE Transactions on Vehicular Technology 2009; 58(5): 2482–2497.
    • (2009) IEEE Transactions on Vehicular Technology , vol.58 , Issue.5 , pp. 2482-2497
    • Huyen, N.T.T.1    Jo, M.2    Guizani, M.3    Huh, E.N.4
  • 7
    • 84929837704 scopus 로고    scopus 로고
    • A secure and efficient user anonymity-preserving three-factor authentication protocol for large-scale distributed wireless sensor networks
    • Das AK. A secure and efficient user anonymity-preserving three-factor authentication protocol for large-scale distributed wireless sensor networks. Wireless Personal Communications 2015; 82(3): 1377–1404.
    • (2015) Wireless Personal Communications , vol.82 , Issue.3 , pp. 1377-1404
    • Das, A.K.1
  • 8
    • 84921852751 scopus 로고    scopus 로고
    • A secure and effective biometric-based user authentication scheme for wireless sensor net works using smart card and fuzzy extractor
    • Das AK. A secure and effective biometric-based user authentication scheme for wireless sensor net works using smart card and fuzzy extractor. International Journal of Communication Systems 2015. DOI: 10.1002/dac.2933.
    • (2015) International Journal of Communication Systems
    • Das, A.K.1
  • 9
    • 84964350666 scopus 로고    scopus 로고
    • SEAP: Secure and efficient authentication protocol for NFC applications using pseudonyms
    • Odelu V, Das AK, Goswami A. SEAP: Secure and efficient authentication protocol for NFC applications using pseudonyms. IEEE Transactions on Consumer Electronics 2016; 62(1): 30–38.
    • (2016) IEEE Transactions on Consumer Electronics , vol.62 , Issue.1 , pp. 30-38
    • Odelu, V.1    Das, A.K.2    Goswami, A.3
  • 10
    • 84959386693 scopus 로고    scopus 로고
    • An efficient multi-gateway based three-factor user authentication and key agreement scheme in hierarchical wireless sensor networks
    • Das AK, Sutrala AK, Kumari S, Odelu V, Wazid M, Li X. An efficient multi-gateway based three-factor user authentication and key agreement scheme in hierarchical wireless sensor networks. Security and Communication Networks 2016; 9(13): 2070–2092.
    • (2016) Security and Communication Networks , vol.9 , Issue.13 , pp. 2070-2092
    • Das, A.K.1    Sutrala, A.K.2    Kumari, S.3    Odelu, V.4    Wazid, M.5    Li, X.6
  • 11
    • 84938898177 scopus 로고    scopus 로고
    • An efficient and novel three-factor user authentication scheme for large-scale heterogeneous wireless sensor networks
    • Das AK. An efficient and novel three-factor user authentication scheme for large-scale heterogeneous wireless sensor networks. International Journal of Communication Networks and Distributed Systems 2015; 15(1): 22–60.
    • (2015) International Journal of Communication Networks and Distributed Systems , vol.15 , Issue.1 , pp. 22-60
    • Das, A.K.1
  • 12
    • 84948712087 scopus 로고    scopus 로고
    • An efficient user authentication and key agreement scheme for heterogeneous wireless sensor network tailored for the internet of things environment
    • Farash MS, Turkanovic M, Kumari S, Holbl M. An efficient user authentication and key agreement scheme for heterogeneous wireless sensor network tailored for the internet of things environment. Ad Hoc Networks 2016; 36, Part 1: 152–176.
    • (2016) Ad Hoc Networks , vol.36, Part 1 , pp. 152-176
    • Farash, M.S.1    Turkanovic, M.2    Kumari, S.3    Holbl, M.4
  • 13
    • 84939576175 scopus 로고    scopus 로고
    • An efficient two-factor user authentication scheme with unlinkability for wireless sensor networks
    • Jiang Q, Ma J, Lu X, Tian Y. An efficient two-factor user authentication scheme with unlinkability for wireless sensor networks. Peer-to-peer Networking and Applications 2014; 8(6): 1070–1081.
    • (2014) Peer-to-peer Networking and Applications , vol.8 , Issue.6 , pp. 1070-1081
    • Jiang, Q.1    Ma, J.2    Lu, X.3    Tian, Y.4
  • 14
    • 84903610217 scopus 로고    scopus 로고
    • An efficient ticket based authentication protocol with unlinkability for wireless access networks
    • Jiang Q, Ma J, Li G, Yang L. An efficient ticket based authentication protocol with unlinkability for wireless access networks. Wireless Personal Communications 2014; 77(2): 1489–1506.
    • (2014) Wireless Personal Communications , vol.77 , Issue.2 , pp. 1489-1506
    • Jiang, Q.1    Ma, J.2    Li, G.3    Yang, L.4
  • 15
    • 84954436216 scopus 로고    scopus 로고
    • A privacy preserving three-factor authentication protocol for e-health clouds
    • Jiang Q, Khan MK, Lu X, Ma J, He D. A privacy preserving three-factor authentication protocol for e-health clouds. The Journal of Supercomputing 2016. 10.1007/s11227-015-1610-x.
    • (2016) The Journal of Supercomputing
    • Jiang, Q.1    Khan, M.K.2    Lu, X.3    Ma, J.4    He, D.5
  • 16
    • 84958124876 scopus 로고    scopus 로고
    • Robust extended chaotic maps-based three-factor authentication scheme preserving biometric template privacy
    • Jiang Q, Wei F, Fu S, Ma J, Li G, Alelaiwi A. Robust extended chaotic maps-based three-factor authentication scheme preserving biometric template privacy. Nonlinear Dynamics 2015; 83(4): 2085–2101.
    • (2015) Nonlinear Dynamics , vol.83 , Issue.4 , pp. 2085-2101
    • Jiang, Q.1    Wei, F.2    Fu, S.3    Ma, J.4    Li, G.5    Alelaiwi, A.6
  • 17
    • 84921608595 scopus 로고    scopus 로고
    • User authentication schemes for wireless sensor networks: a review
    • Kumari S, Khan MK, Atiquzzaman M. User authentication schemes for wireless sensor networks: a review. Ad Hoc Networks 2015; 27: 159–194.
    • (2015) Ad Hoc Networks , vol.27 , pp. 159-194
    • Kumari, S.1    Khan, M.K.2    Atiquzzaman, M.3
  • 18
    • 62949130774 scopus 로고    scopus 로고
    • Two-factor user authentication in wireless sensor networks
    • Das ML. Two-factor user authentication in wireless sensor networks. IEEE Transactions on Wireless Communications 2009; 8(3): 1086–1090.
    • (2009) IEEE Transactions on Wireless Communications , vol.8 , Issue.3 , pp. 1086-1090
    • Das, M.L.1
  • 19
    • 84862762845 scopus 로고    scopus 로고
    • A dynamic password-based user authentication scheme for hierarchical wireless sensor networks
    • Das AK, Sharma P, Chatterjee S, Sing JK. A dynamic password-based user authentication scheme for hierarchical wireless sensor networks. Journal of Network and Computer Applications 2012; 35(5): 1646–1656.
    • (2012) Journal of Network and Computer Applications , vol.35 , Issue.5 , pp. 1646-1656
    • Das, A.K.1    Sharma, P.2    Chatterjee, S.3    Sing, J.K.4
  • 20
    • 78049334450 scopus 로고    scopus 로고
    • A robust mutual authentication protocol for wireless sensor networks
    • Chen TH, Shih WK. A robust mutual authentication protocol for wireless sensor networks. ETRI Journal 2010; 32(5): 704–712.
    • (2010) ETRI Journal , vol.32 , Issue.5 , pp. 704-712
    • Chen, T.H.1    Shih, W.K.2
  • 21
    • 78650459565 scopus 로고    scopus 로고
    • An enhanced two-factor user authentication scheme in wireless sensor networks
    • He D, Gao Y, Chan S, Chen C, Bu J. An enhanced two-factor user authentication scheme in wireless sensor networks. Ad Hoc and Sensor Wireless Networks 2010; 10(4): 361–371.
    • (2010) Ad Hoc and Sensor Wireless Networks , vol.10 , Issue.4 , pp. 361-371
    • He, D.1    Gao, Y.2    Chan, S.3    Chen, C.4    Bu, J.5
  • 22
    • 77955495427 scopus 로고    scopus 로고
    • Cryptanalysis and security improvements of two-factor user authentication in wireless sensor networks
    • Khan MK, Alghathbar K. Cryptanalysis and security improvements of two-factor user authentication in wireless sensor networks. Sensors 2010; 10(3): 2450–2459.
    • (2010) Sensors , vol.10 , Issue.3 , pp. 2450-2459
    • Khan, M.K.1    Alghathbar, K.2
  • 23
    • 84879297926 scopus 로고    scopus 로고
    • An improved dynamic password-based user authentication scheme for hierarchical wireless sensor networks
    • Turkanovic M, Holbl M. An improved dynamic password-based user authentication scheme for hierarchical wireless sensor networks. Electronic and Electrical Engineering 2013; 19(6): 109–116.
    • (2013) Electronic and Electrical Engineering , vol.19 , Issue.6 , pp. 109-116
    • Turkanovic, M.1    Holbl, M.2
  • 24
    • 84880828581 scopus 로고    scopus 로고
    • An advanced temporal credential-based security scheme with mutual authentication and key agreement for wireless sensor networks
    • Li CT, Weng CY, Lee CC. An advanced temporal credential-based security scheme with mutual authentication and key agreement for wireless sensor networks. Sensors 2013; 13(8): 9589–9603.
    • (2013) Sensors , vol.13 , Issue.8 , pp. 9589-9603
    • Li, C.T.1    Weng, C.Y.2    Lee, C.C.3
  • 25
    • 84870693016 scopus 로고    scopus 로고
    • A temporal-credential-based mutual authentication and key agreement scheme for wireless sensor networks
    • Xue K, Ma C, Hong P, Ding R. A temporal-credential-based mutual authentication and key agreement scheme for wireless sensor networks. Journal of Network and Computer Applications 2013; 36(1): 316–323.
    • (2013) Journal of Network and Computer Applications , vol.36 , Issue.1 , pp. 316-323
    • Xue, K.1    Ma, C.2    Hong, P.3    Ding, R.4
  • 26
    • 84953352636 scopus 로고    scopus 로고
    • A secure and robust temporal credential-based three-factor user authentication scheme for wireless sensor networks
    • Das AK. A secure and robust temporal credential-based three-factor user authentication scheme for wireless sensor networks. Peer-to-peer Networking and Applications 2016; 9(1): 223–244.
    • (2016) Peer-to-peer Networking and Applications , vol.9 , Issue.1 , pp. 223-244
    • Das, A.K.1
  • 27
    • 84939576175 scopus 로고    scopus 로고
    • An efficient two-factor user authentication scheme with unlinkability for wireless sensor networks
    • Jiang Q, Ma J, Lu X, Tian Y. An efficient two-factor user authentication scheme with unlinkability for wireless sensor networks. Peer-to-peer Networking and Applications 2015; 8(6): 1070–1081.
    • (2015) Peer-to-peer Networking and Applications , vol.8 , Issue.6 , pp. 1070-1081
    • Jiang, Q.1    Ma, J.2    Lu, X.3    Tian, Y.4
  • 28
    • 84901188390 scopus 로고    scopus 로고
    • A novel user authentication and key agreement scheme for heterogeneous ad hoc wireless sensor networks, based on the internet of things notion
    • Turkanovic M, Brumen B, Holbl M. A novel user authentication and key agreement scheme for heterogeneous ad hoc wireless sensor networks, based on the internet of things notion. Ad Hoc Networks 2014; 20: 96–112.
    • (2014) Ad Hoc Networks , vol.20 , pp. 96-112
    • Turkanovic, M.1    Brumen, B.2    Holbl, M.3
  • 30
    • 35048865463 scopus 로고    scopus 로고
    • Fuzzy extractors: how to generate strong keys from biometrics and other noisy data
    • In, Springer, Interlaken, Switzerland
    • Dodis Y, Reyzin L, Smith A. 2004. Fuzzy extractors: how to generate strong keys from biometrics and other noisy data. In Advances in Cryptology-Eurocrypt 2004Springer: Interlaken, Switzerland; 523–540.
    • (2004) Advances in Cryptology-Eurocrypt 2004 , pp. 523-540
    • Dodis, Y.1    Reyzin, L.2    Smith, A.3
  • 33
    • 70349792182 scopus 로고    scopus 로고
    • An efficient biometric-based remote authentication scheme using smart cards
    • Li CT, Hwang MS. An efficient biometric-based remote authentication scheme using smart cards. Journal of Network and Computer Applications 2010; 33: 1–5.
    • (2010) Journal of Network and Computer Applications , vol.33 , pp. 1-5
    • Li, C.T.1    Hwang, M.S.2
  • 35
    • 0036566408 scopus 로고    scopus 로고
    • Examining smart-card security under the threat of power analysis attacks
    • Messerges TS, Dabbish EA, Sloan RH. Examining smart-card security under the threat of power analysis attacks. IEEE Transactions on Computers 2002; 51(5): 541–552.
    • (2002) IEEE Transactions on Computers , vol.51 , Issue.5 , pp. 541-552
    • Messerges, T.S.1    Dabbish, E.A.2    Sloan, R.H.3
  • 36
    • 84959036273 scopus 로고    scopus 로고
    • Enhancing side-channel analysis of binary-field multiplication with bit reliability
    • In, Springer International Publishing, San Francisco, CA, USA
    • Pessl P, Mangard S. 2016. Enhancing side-channel analysis of binary-field multiplication with bit reliability. In Topics in Cryptology - CT-RSA 2016: The Cryptographers' Track at the RSA Conference 2016Springer International Publishing: San Francisco, CA, USA; 255–270.
    • (2016) Topics in Cryptology - CT-RSA 2016: The Cryptographers' Track at the RSA Conference 2016 , pp. 255-270
    • Pessl, P.1    Mangard, S.2
  • 37
    • 0038629682 scopus 로고    scopus 로고
    • Analysis of key exchange schemes and their use for building secure channels
    • In, Springer, Innsbruck, Austria
    • Canetti R, Krawczyk H. 2001. Analysis of key exchange schemes and their use for building secure channels. In Advances in Cryptology–Eurocrypt 2001 Springer: Innsbruck, Austria; 451–472.
    • (2001) Advances in Cryptology–Eurocrypt 2001 , pp. 451-472
    • Canetti, R.1    Krawczyk, H.2
  • 38
    • 81855227196 scopus 로고    scopus 로고
    • Analysis and improvement on an efficient biometric-based remote user authentication scheme using smart cards
    • Das AK. Analysis and improvement on an efficient biometric-based remote user authentication scheme using smart cards. IET Information Security 2011; 5(3): 145–151.
    • (2011) IET Information Security , vol.5 , Issue.3 , pp. 145-151
    • Das, A.K.1
  • 43
    • 84877723487 scopus 로고    scopus 로고
    • [Accessed on September 2015]
    • AVISPA. AVISPA Web Tool, 2015. Http://www.avispa-project.org/web-interface/expert.php/. [Accessed on September 2015].
    • (2015) AVISPA Web Tool
  • 46
    • 26444497860 scopus 로고    scopus 로고
    • In, 17th International Conference on Computer Aided Verification (CAV'05), Lecture Notes in Computer Science (LNCS), Springer-Verlag, University of Edinburgh, Scotland, UK
    • Armando A, Basin D, Boichut Y, et al. The AVISPA tool for the automated validation of internet security protocols and applications. In 17th International Conference on Computer Aided Verification (CAV'05), Lecture Notes in Computer Science (LNCS), vol. 3576. Springer-Verlag: University of Edinburgh, Scotland, UK, 2005; 281–285.
    • (2005) The AVISPA tool for the automated validation of internet security protocols and applications , vol.3576 , pp. 281-285
    • Armando, A.1    Basin, D.2    Boichut, Y.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.