메뉴 건너뛰기




Volumn 16, Issue 12, 2016, Pages

Lightweight sensor authentication scheme for energy efficiency in ubiquitous computing environments

Author keywords

IoT; IoT authentication; Lightweight authentication; Sensor authentication; Sensor network

Indexed keywords

AUTHENTICATION; DIGITAL STORAGE; DUST; HASH FUNCTIONS; INTERNET OF THINGS; SENSOR NETWORKS; SENSOR NODES; UBIQUITOUS COMPUTING; WIRELESS SENSOR NETWORKS;

EID: 85003874908     PISSN: 14248220     EISSN: None     Source Type: Journal    
DOI: 10.3390/s16122044     Document Type: Article
Times cited : (21)

References (40)
  • 1
    • 84876943063 scopus 로고    scopus 로고
    • Internet of Things (IoT): A vision, architectural elements, and future directions
    • [CrossRef]
    • Gubbi, J., Buyya, R., Marusic, S., Palaniswami, M. Internet of Things (IoT): A vision, architectural elements, and future directions. Future Gener. Comput. Syst. 2013, 29, 1645-1660. [CrossRef]
    • (2013) Future Gener. Comput. Syst , vol.29 , pp. 1645-1660
    • Gubbi, J.1    Buyya, R.2    Marusic, S.3    Palaniswami, M.4
  • 3
    • 84863579460 scopus 로고    scopus 로고
    • IoT technology and application
    • Qian, Z., Wang, Y. IoT technology and application. Acta Electron. Sin. 2012, 40, 1023-1028.
    • (2012) Acta Electron. Sin , vol.40 , pp. 1023-1028
    • Qian, Z.1    Wang, Y.2
  • 4
    • 84883040938 scopus 로고    scopus 로고
    • A secure network for mobile wireless service
    • [CrossRef]
    • Peng, K. A secure network for mobile wireless service. J. Inf. Process. Syst. 2013, 9, 247-258. [CrossRef]
    • (2013) J. Inf. Process. Syst , vol.9 , pp. 247-258
    • Peng, K.1
  • 6
    • 84962198336 scopus 로고    scopus 로고
    • A provably secure, efficient, and flexible authentication scheme for ad hoc wireless sensor networks
    • [CrossRef]
    • Chang, C.C., Le, H.D. A provably secure, efficient, and flexible authentication scheme for ad hoc wireless sensor networks. IEEE Trans. Wirel. Commun. 2016, 15, 357-366. [CrossRef]
    • (2016) IEEE Trans. Wirel. Commun , vol.15 , pp. 357-366
    • Chang, C.C.1    Le, H.D.2
  • 7
    • 84924940631 scopus 로고    scopus 로고
    • A survey on communication technologies and requirements for internet of electric vehicles
    • [CrossRef]
    • Bayram, I.S., Papapanagiotou, I. A survey on communication technologies and requirements for internet of electric vehicles. EURASIP J. Wirel. Commun. Netw. 2014, 2014, 223. [CrossRef]
    • (2014) EURASIP J. Wirel. Commun. Netw. , vol.2014 , pp. 223
    • Bayram, I.S.1    Papapanagiotou, I.2
  • 8
    • 84949667967 scopus 로고    scopus 로고
    • Energy-efficient node scheduling algorithms for wireless sensor networks using Markov Random Field model
    • [CrossRef]
    • Cheng, H., Su, Z., Xiong, N., Xiao, Y. Energy-efficient node scheduling algorithms for wireless sensor networks using Markov Random Field model. Inf. Sci. 2016, 329, 461-477. [CrossRef]
    • (2016) Inf. Sci , vol.329 , pp. 461-477
    • Cheng, H.1    Su, Z.2    Xiong, N.3    Xiao, Y.4
  • 10
  • 13
    • 84858171962 scopus 로고    scopus 로고
    • Coap: An application protocol for billions of tiny internet nodes
    • [CrossRef]
    • Bormann, C., Castellani, A.P., Shelby, Z. Coap: An application protocol for billions of tiny internet nodes. IEEE Internet Comput. 2012, 16, 62. [CrossRef]
    • (2012) IEEE Internet Comput , vol.16 , pp. 62
    • Bormann, C.1    Castellani, A.P.2    Shelby, Z.3
  • 20
    • 0035121216 scopus 로고    scopus 로고
    • Smart dust: Communicatingwith a cubic-millimeter computer
    • [CrossRef]
    • Warneke, B., Last, M., Liebowitz, B., Pister, K.S. Smart dust: Communicatingwith a cubic-millimeter computer. Computer 2011, 34, 44-51. [CrossRef]
    • (2011) Computer , vol.34 , pp. 44-51
    • Warneke, B.1    Last, M.2    Liebowitz, B.3    Pister, K.S.4
  • 21
    • 85002906203 scopus 로고    scopus 로고
    • Internet of Things: Smart Things
    • [CrossRef]
    • Madakam, S. Internet of Things: Smart Things. Int. J. Future Comput. Commun. 2015, 4, 250. [CrossRef]
    • (2015) Int. J. Future Comput. Commun. , vol.4 , pp. 250
    • Madakam, S.1
  • 22
    • 84900808158 scopus 로고    scopus 로고
    • A reconfigurable smart sensor interface for industrial WSN in IoT environment
    • Chi, Q., Yan, H., Zhang, C., Pang, Z., Da Xu, L. A reconfigurable smart sensor interface for industrial WSN in IoT environment. IEEE Trans. Ind. Inf. 2014, 10, 1417-1425.
    • (2014) IEEE Trans. Ind. Inf , vol.10 , pp. 1417-1425
    • Chi, Q.1    Yan, H.2    Zhang, C.3    Pang, Z.4    Da Xu, L.5
  • 25
    • 0000893265 scopus 로고
    • An optimal class of symmetric key generation systems
    • Springer: Berlin/Heidelberg, Germany
    • Blom, R. An optimal class of symmetric key generation systems. In Workshop on the Theory and Application of Cryptographic Techniques, Springer: Berlin/Heidelberg, Germany, 1984, pp. 335-338.
    • (1984) Workshop on the Theory and Application of Cryptographic Techniques , pp. 335-338
    • Blom, R.1
  • 26
    • 64049117542 scopus 로고    scopus 로고
    • Predistribution and local collaboration-based group rekeying for wireless sensor networks
    • [CrossRef]
    • Zhang, W., Zhu, S., Cao, G. Predistribution and local collaboration-based group rekeying for wireless sensor networks. Ad Hoc Netw. 2009, 7, 1229-1242. [CrossRef]
    • (2009) Ad Hoc Netw , vol.7 , pp. 1229-1242
    • Zhang, W.1    Zhu, S.2    Cao, G.3
  • 28
    • 0005328993 scopus 로고
    • Implementing the Rivest Shamir and Adleman public key encryption algorithm on a standard digital signal processor
    • Springer: Berlin/Heidelberg, Germany
    • Barrett, P. Implementing the Rivest Shamir and Adleman public key encryption algorithm on a standard digital signal processor. In Conference on the Theory and Application of Cryptographic Techniques, Springer: Berlin/Heidelberg, Germany, 1986, pp. 311-323.
    • (1986) Conference on the Theory and Application of Cryptographic Techniques , pp. 311-323
    • Barrett, P.1
  • 29
    • 84968503742 scopus 로고
    • Elliptic curve cryptosystems
    • [CrossRef]
    • Koblitz, N. Elliptic curve cryptosystems. Math. Comput. 1987, 48, 203-209. [CrossRef]
    • (1987) Math. Comput , vol.48 , pp. 203-209
    • Koblitz, N.1
  • 30
    • 85003797853 scopus 로고    scopus 로고
    • (accessed on 1 September 2016)
    • Liang, X.Q., Da Xing, L.I. Elliptic Curve Cryptosystems. Available online: http://en.cnki.com.cn/Article_en/CJFDTOTAL-JFYZ199911000.htm (accessed on 1 September 2016).
    • Elliptic Curve Cryptosystems
    • Liang, X.Q.1    Da Xing, L.I.2
  • 31
    • 70450229249 scopus 로고    scopus 로고
    • Ph.D. Thesis, McGill University, Montreal, QC, Canada
    • Saeki, M. Elliptic Curve Cryptosystems. Ph.D. Thesis, McGill University, Montreal, QC, Canada, 1997.
    • (1997) Elliptic Curve Cryptosystems
    • Saeki, M.1
  • 32
    • 0028514601 scopus 로고
    • Kerberos: An authentication service for computer networks
    • [CrossRef]
    • Neuman, B.C., Ts’o, T. Kerberos: An authentication service for computer networks. IEEE Commun. Mag. 1994, 32, 33-38. [CrossRef]
    • (1994) IEEE Commun. Mag , vol.32 , pp. 33-38
    • Neuman, B.C.1    Ts’O, T.2
  • 33
    • 33747064900 scopus 로고    scopus 로고
    • Public-key cryptography extensions into Kerberos
    • [CrossRef]
    • Downnard, I. Public-key cryptography extensions into Kerberos. IEEE Potentials 2002, 21, 30-34. [CrossRef]
    • (2002) IEEE Potentials , vol.21 , pp. 30-34
    • Downnard, I.1
  • 35
    • 84947778144 scopus 로고    scopus 로고
    • The decision diffie-hellman problem
    • Springer: Berlin/Heidelberg, Germany
    • Boneh, D. The decision diffie-hellman problem. In International Algorithmic Number Theory Symposium, Springer: Berlin/Heidelberg, Germany, 1998, pp. 48-63.
    • (1998) International Algorithmic Number Theory Symposium , pp. 48-63
    • Boneh, D.1
  • 36
    • 84943632039 scopus 로고    scopus 로고
    • Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems
    • Springer: Berlin/Heidelberg, Germany
    • Kocher, P.C. Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems. In Annual International Cryptology Conference, Springer: Berlin/Heidelberg, Germany, 1996, pp. 104-113.
    • (1996) Annual International Cryptology Conference , pp. 104-113
    • Kocher, P.C.1
  • 39
    • 84994229624 scopus 로고    scopus 로고
    • A Lightweight Authentication and Key Management Scheme for Wireless Sensor Networks
    • [CrossRef]
    • Qin, D., Jia, S., Yang, S., Wang, E., Ding, Q. A Lightweight Authentication and Key Management Scheme for Wireless Sensor Networks. J. Sens. 2016. [CrossRef]
    • (2016) J. Sens
    • Qin, D.1    Jia, S.2    Yang, S.3    Wang, E.4    Ding, Q.5
  • 40
    • 84961627565 scopus 로고    scopus 로고
    • Secure Authentication for Remote Patient Monitoring with Wireless Medical Sensor Networks
    • [CrossRef][PubMed]
    • Hayajneh, T., Mohd, B.J., Imran, M., Almashaqbeh, G., Vasilakos, A.V. Secure Authentication for Remote Patient Monitoring with Wireless Medical Sensor Networks. Sensors 2016, 16, 424. [CrossRef] [PubMed]
    • (2016) Sensors , vol.16 , pp. 424
    • Hayajneh, T.1    Mohd, B.J.2    Imran, M.3    Almashaqbeh, G.4    Vasilakos, A.V.5


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.