메뉴 건너뛰기




Volumn 18, Issue 5, 2016, Pages 816-831

Composable secure roaming authentication protocol for cloud-assisted body sensor networks

Author keywords

Authentication protocol; Body sensor networks; Composable security; Internet of things

Indexed keywords

AUTHENTICATION; BODY SENSOR NETWORKS; COMPUTATION THEORY; CRYPTOGRAPHY; INTERNET OF THINGS; INTERNET PROTOCOLS; NETWORK PROTOCOLS; WEARABLE SENSORS; WIRELESS SENSOR NETWORKS;

EID: 84991821286     PISSN: 1816353X     EISSN: 18163548     Source Type: Journal    
DOI: None     Document Type: Article
Times cited : (8)

References (41)
  • 2
    • 78449298894 scopus 로고    scopus 로고
    • An anonymous and self-verified mobile authentication with authenticated key agreement for large-scale wireless networks
    • C. C. Chang and H. C. Tsai, "An anonymous and self-verified mobile authentication with authenticated key agreement for large-scale wireless networks," IEEE Transactions on Wireless Communication, vol. 9, no. 11, pp. 3346-3353, 2010
    • (2010) IEEE Transactions on Wireless Communication , vol.9 , Issue.11 , pp. 3346-3353
    • Chang, C.C.1    Tsai, H.C.2
  • 3
  • 10
    • 0037076868 scopus 로고    scopus 로고
    • Authentication tests and the structure of bundles
    • J. D. Guttman and F. J. Thayer, "Authentication tests and the structure of bundles," Theoretical Computer Science, vol. 283, no, 2, pp. 333-380, 2002
    • (2002) Theoretical Computer Science , vol.283 , Issue.2 , pp. 333-380
    • Guttman, J.D.1    Thayer, F.J.2
  • 11
    • 77953486931 scopus 로고    scopus 로고
    • Untraceable mobile node authentication in WSN
    • K. Han, K. Kim, and T. Shon, "Untraceable mobile node authentication in WSN," Sensors, vol. 10, no. 5, pp.4410-4429, 2010
    • (2010) Sensors , vol.10 , Issue.5 , pp. 4410-4429
    • Han, K.1    Kim, K.2    Shon, T.3
  • 12
    • 79951676054 scopus 로고    scopus 로고
    • Privacy-preserving universal authentication protocol for wireless communications
    • D. He, J. Bu, S. Chan, C. Chen, and M. Yin, "Privacy-preserving universal authentication protocol for wireless communications," IEEE Transactions on Wireless Communications, vol.10, no.2, pp.431-436, 2011
    • (2011) IEEE Transactions on Wireless Communications , vol.10 , Issue.2 , pp. 431-436
    • He, D.1    Bu, J.2    Chan, S.3    Chen, C.4    Yin, M.5
  • 13
    • 84881388540 scopus 로고    scopus 로고
    • Strong roaming authentication technique for wireless and mobile networks
    • D. He, C. Chen, S. Chan, and J. Bu, "Strong roaming authentication technique for wireless and mobile networks," International Journal of Communication Systems, vol. 26, no. 8, pp. 1028-1037, 2013
    • (2013) International Journal of Communication Systems , vol.26 , Issue.8 , pp. 1028-1037
    • He, D.1    Chen, C.2    Chan, S.3    Bu, J.4
  • 14
    • 67349219359 scopus 로고    scopus 로고
    • Pervasive, secure access to a hierarchical sensor-based healthcare monitoring architecture in wireless heterogeneous networks
    • Y. M. Huang, M. Y. Hsieh, H. C. Chao, S. H. Hung, and J. H. Park, "Pervasive, secure access to a hierarchical sensor-based healthcare monitoring architecture in wireless heterogeneous networks," IEEE Journal on Selected Areas in Communications, vol. 27, no. 4, pp. 400-411, 2009
    • (2009) IEEE Journal on Selected Areas in Communications , vol.27 , Issue.4 , pp. 400-411
    • Huang, Y.M.1    Hsieh, M.Y.2    Chao, H.C.3    Hung, S.H.4    Park, J.H.5
  • 17
    • 84879299002 scopus 로고    scopus 로고
    • A privacy-preserving reauthentication scheme for mobile wireless sensor networks
    • S. Jiang, J. Zhang, J. Miao, and C. Zhou, "A privacy-preserving reauthentication scheme for mobile wireless sensor networks," International Journal of Distributed Sensor Networks, vol. 2013, Article ID 913782, pp. 1-8, 2013
    • (2013) International Journal of Distributed Sensor Networks , vol.2013 , pp. 1-8
    • Jiang, S.1    Zhang, J.2    Miao, J.3    Zhou, C.4
  • 18
    • 84881487384 scopus 로고    scopus 로고
    • MHIP: Effective key management for mobile heterogeneous sensor networks
    • D. Kar, R. Tatum, and K. Zejdlik, "MHIP: Effective key management for mobile heterogeneous sensor networks," International Journal of Network Security, vol. 15, no. 4, pp. 280-290, 2013
    • (2013) International Journal of Network Security , vol.15 , Issue.4 , pp. 280-290
    • Kar, D.1    Tatum, R.2    Zejdlik, K.3
  • 20
    • 46849100481 scopus 로고    scopus 로고
    • A scalable key management and clustering scheme for wireless ad-hoc and sensor networks
    • J. Li, B. Bhattacharjee, M. Yu, and R. Levy, "A scalable key management and clustering scheme for wireless ad-hoc and sensor networks," Future Generation Computer Systems, vol.24, no. 8, pp. 860-869, 2008
    • (2008) Future Generation Computer Systems , vol.24 , Issue.8 , pp. 860-869
    • Li, J.1    Bhattacharjee, B.2    Yu, M.3    Levy, R.4
  • 21
    • 77649094379 scopus 로고    scopus 로고
    • Data security and privacy in wireless body area networks
    • M. Li, W. Lou, and K. Ren, "Data security and privacy in wireless body area networks," IEEE Wireless Communications, vol. 17, no. 1, pp. 51-58, 2010
    • (2010) IEEE Wireless Communications , vol.17 , Issue.1 , pp. 51-58
    • Li, M.1    Lou, W.2    Ren, K.3
  • 22
    • 79956062825 scopus 로고    scopus 로고
    • Authentication and key management in 3G-WLAN interworking
    • X. Li, X. Lu, J. Ma, Z. Zhu, L. Xu, and Y. Park, "Authentication and key management in 3G-WLAN interworking," Mobile Networks and Applications, vol. 16, no. 3, pp. 394-407, 2011
    • (2011) Mobile Networks and Applications , vol.16 , Issue.3 , pp. 394-407
    • Li, X.1    Lu, X.2    Ma, J.3    Zhu, Z.4    Xu, L.5    Park, Y.6
  • 23
    • 84877667727 scopus 로고    scopus 로고
    • A lightweight roaming authentication protocol for anonymous wireless communication
    • Anaheim, CA
    • X. Li, Y. Zhang, X. Liu, J. Cao, and Q. Zhao, "A lightweight roaming authentication protocol for anonymous wireless communication," in 2012 Global Communications Conference (GLOBECOM), pp.1029-1034, Anaheim, CA, 2012
    • (2012) 2012 Global Communications Conference (GLOBECOM) , pp. 1029-1034
    • Li, X.1    Zhang, Y.2    Liu, X.3    Cao, J.4    Zhao, Q.5
  • 24
    • 80054815214 scopus 로고    scopus 로고
    • An integrated stimulation and punishment mechanism for thwarting packet drop in multihop wireless networks
    • M. E. Mahmoud and X. Shen, "An integrated stimulation and punishment mechanism for thwarting packet drop in multihop wireless networks," IEEE Transactions on Vehicular Technology, vol. 60, no.8, pp.3947-3962, 2011
    • (2011) IEEE Transactions on Vehicular Technology , vol.60 , Issue.8 , pp. 3947-3962
    • Mahmoud, M.E.1    Shen, X.2
  • 25
    • 84859190329 scopus 로고    scopus 로고
    • FESCIM: Fair, efficient, and secure cooperation incentive mechanism for multi-hop cellular networks
    • M. E.Mahmoud and X. Shen, "FESCIM: Fair, efficient, and secure cooperation incentive mechanism for multi-hop cellular networks," IEEE Transactions on Mobile Computing, vol. 11, no.5, pp.753-766, 2012
    • (2012) IEEE Transactions on Mobile Computing , vol.11 , Issue.5 , pp. 753-766
    • Mahmoud, M.E.1    Shen, X.2
  • 27
    • 41849094781 scopus 로고    scopus 로고
    • Mitigating DoS attacks against broadcast authentication in wireless sensor networks
    • P. Ning, A. Liu, and W. Du, "Mitigating DoS attacks against broadcast authentication in wireless sensor networks," ACM Transactions on Sensor Networks, vol. 4, no. 1, pp. 1-35, 2008
    • (2008) ACM Transactions on Sensor Networks , vol.4 , Issue.1 , pp. 1-35
    • Ning, P.1    Liu, A.2    Du, W.3
  • 29
    • 77951758784 scopus 로고    scopus 로고
    • Authentication and key establishment in dynamic wireless sensor networks
    • Y. Qiu, J. Zhou, J. Baek, and J. Lopez, "Authentication and key establishment in dynamic wireless sensor networks," Sensor, vol. 10, no. 4, pp. 3718-3731, 2010
    • (2010) Sensor , vol.10 , Issue.4 , pp. 3718-3731
    • Qiu, Y.1    Zhou, J.2    Baek, J.3    Lopez, J.4
  • 31
    • 84991812412 scopus 로고    scopus 로고
    • 'Universally composable security: A new paradigm for cryptographic protocols,'
    • C. Ran, "Universally composable security: A new paradigm for cryptographic protocols," Cryptology ePrint Archive, Report 2000/067, 2005
    • (2005) Cryptology ePrint Archive, Report 2000/067
    • Ran, C.1
  • 32
    • 70349103341 scopus 로고    scopus 로고
    • A confidential and DoS-resistant multi-hop code dissemination protocol for wireless sensor networks
    • Zurich, Switzerland
    • H. Tan, D. Ostry, J. Zic, and S. Jha, "A confidential and DoS-resistant multi-hop code dissemination protocol for wireless sensor networks," in The Second ACM Conference on Wireless Network Security, pp. 245-252, Zurich, Switzerland, 2009
    • (2009) The Second ACM Conference on Wireless Network Security , pp. 245-252
    • Tan, H.1    Ostry, D.2    Zic, J.3    Jha, S.4
  • 33
    • 56749160373 scopus 로고    scopus 로고
    • A secure privacypreserving roaming protocol based on hierarchical identity-based encryption for mobile networks
    • Alexandria, VA
    • Z. Wan, K. Ren, and B. Preneel, "A secure privacypreserving roaming protocol based on hierarchical identity-based encryption for mobile networks," in The First ACM Conference on Wireless Network Security (ACM WiSec'08), pp. 62-67, Alexandria, VA, 2008
    • (2008) The First ACM Conference on Wireless Network Security (ACM WiSec'08) , pp. 62-67
    • Wan, Z.1    Ren, K.2    Preneel, B.3
  • 34
    • 84903885385 scopus 로고    scopus 로고
    • A regular expression matching approach to distributed wireless network security system
    • J. Wang, Y. Yu, and K. Zhou, "A regular expression matching approach to distributed wireless network security system," International Journal of Network Security, vol. 16, no. 5, pp. 382-388, 2014
    • (2014) International Journal of Network Security , vol.16 , Issue.5 , pp. 382-388
    • Wang, J.1    Yu, Y.2    Zhou, K.3
  • 35
    • 79953330601 scopus 로고    scopus 로고
    • Patrol detection for replica attacks on wireless sensor networks
    • L. Wang and Y. Shi, "Patrol detection for replica attacks on wireless sensor networks," Sensors, vol.11, no.3, pp. 2496-2504, 2011
    • (2011) Sensors , vol.11 , Issue.3 , pp. 2496-2504
    • Wang, L.1    Shi, Y.2
  • 36
    • 84893691459 scopus 로고    scopus 로고
    • One-pass key establishment protocol for wireless roaming with user anonymity
    • Y. Wang, D. S. Wong, and L. Huang, "One-pass key establishment protocol for wireless roaming with user anonymity," International Journal of Network Security, vol. 16, no. 2, pp. 129-142, 2014
    • (2014) International Journal of Network Security , vol.16 , Issue.2 , pp. 129-142
    • Wang, Y.1    Wong, D.S.2    Huang, L.3
  • 38
    • 79959537385 scopus 로고    scopus 로고
    • Comments on an anonymous and selfverified mobile authentication with authenticated key agreement for large-scale wireless networks
    • G. Yang, "Comments on an anonymous and selfverified mobile authentication with authenticated key agreement for large-scale wireless networks," IEEE Transactions on Wireless Communication, vol. 10, no. 6, pp. 2015-2016, 2011
    • (2011) IEEE Transactions on Wireless Communication , vol.10 , Issue.6 , pp. 2015-2016
    • Yang, G.1
  • 39
    • 74549210063 scopus 로고    scopus 로고
    • Universal authenticated protocols for anonymous wireless communications
    • G. Yang, Q. Huang, D. Wong, and X. Deng, "Universal authenticated protocols for anonymous wireless communications," IEEE Transactions on Wireless Communications, vol.9, no.1, pp.168-174, 2010
    • (2010) IEEE Transactions on Wireless Communications , vol.9 , Issue.1 , pp. 168-174
    • Yang, G.1    Huang, Q.2    Wong, D.3    Deng, X.4
  • 41
    • 84859883917 scopus 로고    scopus 로고
    • Detecting node replication attacks in mobile sensor networks: theory and approaches
    • W. Zhu, J. Zhou, R. H. Deng, and F. Bao, "Detecting node replication attacks in mobile sensor networks: theory and approaches," Security and Communication Networks, vol. 5, no. 5, pp. 496-507, 2012
    • (2012) Security and Communication Networks , vol.5 , Issue.5 , pp. 496-507
    • Zhu, W.1    Zhou, J.2    Deng, R.H.3    Bao, F.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.