메뉴 건너뛰기




Volumn 45, Issue 1, 2016, Pages 62-70

Cryptanalysis and improvement of an enhanced two-factor user authentication scheme in wireless sensor networks

Author keywords

Bio metrics; Smart card; Two factor authentication; Wireless sensor networks

Indexed keywords


EID: 84997014499     PISSN: 1392124X     EISSN: 2335884X     Source Type: Journal    
DOI: 10.5755/j01.itc.45.1.11949     Document Type: Article
Times cited : (12)

References (20)
  • 1
    • 84906330795 scopus 로고    scopus 로고
    • Construction of tree network with limited delivery latency in homogeneous wireless sensor networks
    • S. Xie, Y. Wang. Construction of tree network with limited delivery latency in homogeneous wireless sensor networks. Wireless Personal Communications, 2014, Vol. 78, No. 1, 231-246.
    • (2014) Wireless Personal Communications , vol.78 , Issue.1 , pp. 231-246
    • Xie, S.1    Wang, Y.2
  • 2
    • 84935865949 scopus 로고    scopus 로고
    • A secure tempo-ral-credential-based mutual authentication and key agreement scheme with pseudo identity for wireless sensor networks
    • D. He, N. Kumar, N. Chilamkurti. A secure tempo-ral-credential-based mutual authentication and key agreement scheme with pseudo identity for wireless sensor networks. Information Sciences, 2015, Vol. 321, 263-277.
    • (2015) Information Sciences , vol.321 , pp. 263-277
    • He, D.1    Kumar, N.2    Chilamkurti, N.3
  • 3
    • 84921481484 scopus 로고    scopus 로고
    • Authentication protocol for ambient assisted living system
    • D. He, S. Zeadally. Authentication protocol for ambient assisted living system. IEEE Communications Magazine, 2015, Vol. 53, No. 1, 71-77.
    • (2015) IEEE Communications Magazine , vol.53 , Issue.1 , pp. 71-77
    • He, D.1    Zeadally, S.2
  • 4
    • 84916883747 scopus 로고    scopus 로고
    • A variable threshold-value authentication architecture for wireless mesh networks
    • P. Guo, J. Wang, B. Li, S. Lee. A variable threshold-value authentication architecture for wireless mesh networks. Journal of Internet Technology, 2014, Vol. 15, No. 6, 929-936.
    • (2014) Journal of Internet Technology , vol.15 , Issue.6 , pp. 929-936
    • Guo, P.1    Wang, J.2    Li, B.3    Lee, S.4
  • 5
    • 62949130774 scopus 로고    scopus 로고
    • Two-factor user authentication in wireless sensor networks
    • M. L. Das. Two-factor user authentication in wireless sensor networks. IEEE Transactions on Wireless Communications, 2009, Vol. 8, No. 3, 1086-1090.
    • (2009) IEEE Transactions on Wireless Communications , vol.8 , Issue.3 , pp. 1086-1090
    • Das, M. L.1
  • 6
    • 85027949488 scopus 로고    scopus 로고
    • Robust biometrics-based authentication scheme for multi-server environment
    • D. He, D. Wang. Robust biometrics-based authentication scheme for multi-server environment. IEEE Systems Journal, 2015, Vol. 9, No. 3, 816-823.
    • (2015) IEEE Systems Journal , vol.9 , Issue.3 , pp. 816-823
    • He, D.1    Wang, D.2
  • 8
    • 84862773089 scopus 로고    scopus 로고
    • Improvement of Das’s two-factor authentication protocol in wireless sensor networks
    • Accessed 28 February 2010
    • D. H. Nyang, M. K. Lee. Improvement of Das’s two-factor authentication protocol in wireless sensor networks. Cryptology, ePrint archive, 2009. http://eprint.iacr.org/2009/631.pdf. Accessed 28 February 2010.
    • (2009) Cryptology, ePrint archive
    • Nyang, D. H.1    Lee, M. K.2
  • 9
    • 78049334450 scopus 로고    scopus 로고
    • A robust mutual authentication protocol for wireless sensor networks
    • T. H. Chen, W. K. Shih. A robust mutual authentication protocol for wireless sensor networks. ETRI Journal, 2010, Vol. 32, No. 5, 704-712.
    • (2010) ETRI Journal , vol.32 , Issue.5 , pp. 704-712
    • Chen, T. H.1    Shih, W. K.2
  • 10
    • 78650459565 scopus 로고    scopus 로고
    • An enhanced two-factor user authentication scheme in wireless sensor networks
    • D. J. He, Y. Gao, S. Chan, C. Chen, J. Bu. An enhanced two-factor user authentication scheme in wireless sensor networks. Ad Hoc & Sensor Wireless Networks, 2010, Vol. 10, No. 4, 361-371.
    • (2010) Ad Hoc & Sensor Wireless Networks , vol.10 , Issue.4 , pp. 361-371
    • He, D. J.1    Gao, Y.2    Chan, S.3    Chen, C.4    Bu, J.5
  • 11
    • 77955495427 scopus 로고    scopus 로고
    • Cryptanalysis and security improvements of two-factor user authentication in wireless sensor networks
    • M. K. Khan, K. Alghathbar. Cryptanalysis and security improvements of two-factor user authentication in wireless sensor networks. Sensors, 2010, Vol. 10, No. 3, 2450-2459.
    • (2010) Sensors , vol.10 , Issue.3 , pp. 2450-2459
    • Khan, M. K.1    Alghathbar, K.2
  • 12
    • 84883446358 scopus 로고    scopus 로고
    • On the security and improvement of a two-factor user authentication scheme in wireless sensor networks
    • D. Z. Sun, J. X. Li, Z. Y. Feng, Z. F. Cao, G. Q. Xu. On the security and improvement of a two-factor user authentication scheme in wireless sensor networks. Personal and Ubiquitous Computing, 2013, Vol. 17, No. 5, 895-905.
    • (2013) Personal and Ubiquitous Computing , vol.17 , Issue.5 , pp. 895-905
    • Sun, D. Z.1    Li, J. X.2    Feng, Z. Y.3    Cao, Z. F.4    Xu, G. Q.5
  • 14
    • 84901234489 scopus 로고    scopus 로고
    • An enhanced two-factor user authentication in wireless sensor networks
    • J. J. Yuan. An enhanced two-factor user authentication in wireless sensor networks. Telecommunication Systems, 2014, Vol. 55, No. 1, 105-113.
    • (2014) Telecommunication Systems , vol.55 , Issue.1 , pp. 105-113
    • Yuan, J. J.1
  • 18
    • 0036566408 scopus 로고    scopus 로고
    • Examining smart-card security under the threat of power analysis attacks
    • T. S. Messerges, E. A. Dabbish, R. H. Sloan. Examining smart-card security under the threat of power analysis attacks. IEEE Transactions on Computers, 2002, Vol. 51, No. 5, 541-552.
    • (2002) IEEE Transactions on Computers , vol.51 , Issue.5 , pp. 541-552
    • Messerges, T. S.1    Dabbish, E. A.2    Sloan, R. H.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.