메뉴 건너뛰기




Volumn 76, Issue , 2016, Pages 37-48

An untraceable temporal-credential-based two-factor authentication scheme using ECC for wireless sensor networks

Author keywords

Authentication; Elliptic curve cryptography; Key agreement; Privacy; Smart card; Untraceability; Wireless sensor network

Indexed keywords

AUTHENTICATION; CRYPTOGRAPHY; DATA PRIVACY; ELECTRONIC DOCUMENT IDENTIFICATION SYSTEMS; GEOMETRY; NETWORK SECURITY; PUBLIC KEY CRYPTOGRAPHY; SECURITY SYSTEMS; SMART CARDS; TRANSPORTATION;

EID: 85008263167     PISSN: 10848045     EISSN: 10958592     Source Type: Journal    
DOI: 10.1016/j.jnca.2016.10.001     Document Type: Article
Times cited : (172)

References (47)
  • 1
    • 81455139721 scopus 로고    scopus 로고
    • Revisiting defenses against large-scale online password guessing attacks
    • Alsaleh, M., Mannan, M., Van Oorschot, P., Revisiting defenses against large-scale online password guessing attacks. IEEE Trans. Depend. Secur. Comput 9:1 (2012), 128–141.
    • (2012) IEEE Trans. Depend. Secur. Comput , vol.9 , Issue.1 , pp. 128-141
    • Alsaleh, M.1    Mannan, M.2    Van Oorschot, P.3
  • 3
    • 78049334450 scopus 로고    scopus 로고
    • A robust mutual authentication protocol for wireless sensor networks
    • Chen, T.-H., Shih, W.-K., A robust mutual authentication protocol for wireless sensor networks. ETRI J. 32:5 (2010), 704–712.
    • (2010) ETRI J. , vol.32 , Issue.5 , pp. 704-712
    • Chen, T.-H.1    Shih, W.-K.2
  • 4
    • 84902296026 scopus 로고    scopus 로고
    • Security enhanced user authentication protocol for wireless sensor networks using elliptic curves cryptography
    • Choi, Y., Lee, D., Kim, J., et al. Security enhanced user authentication protocol for wireless sensor networks using elliptic curves cryptography. Sensors 14:6 (2014), 10081–10106.
    • (2014) Sensors , vol.14 , Issue.6 , pp. 10081-10106
    • Choi, Y.1    Lee, D.2    Kim, J.3
  • 5
    • 85041450527 scopus 로고    scopus 로고
    • Who are you? A statistical approach to measuring user authenticity
    • D¨urmuth, M., Freeman, D., Biggio, B., Who are you? A statistical approach to measuring user authenticity. NDSS, 2016, 1–15.
    • (2016) NDSS , pp. 1-15
    • D¨urmuth, M.1    Freeman, D.2    Biggio, B.3
  • 6
    • 84862762845 scopus 로고    scopus 로고
    • A dynamic password-based user authentication scheme for hierarchical wireless sensor networks
    • Das, A.K., Sharma, P., Chatterjee, S., Sing, J.K., A dynamic password-based user authentication scheme for hierarchical wireless sensor networks. J. Netw. Comput. Appl. 35:5 (2012), 1646–1656.
    • (2012) J. Netw. Comput. Appl. , vol.35 , Issue.5 , pp. 1646-1656
    • Das, A.K.1    Sharma, P.2    Chatterjee, S.3    Sing, J.K.4
  • 7
    • 62949130774 scopus 로고    scopus 로고
    • Two-factor user authentication in wireless sensor networks
    • Das, M.L., Two-factor user authentication in wireless sensor networks. IEEE Trans. Wirel. Commun. 8:3 (2009), 1086–1090.
    • (2009) IEEE Trans. Wirel. Commun. , vol.8 , Issue.3 , pp. 1086-1090
    • Das, M.L.1
  • 8
    • 79960062320 scopus 로고    scopus 로고
    • An efficient and dos-resistant user authentication scheme for two-tiered wireless sensor networks
    • Fan, R., He, D., Pan, X., Ping, L., An efficient and dos-resistant user authentication scheme for two-tiered wireless sensor networks. J. Zhejinag Univ. Sci. C 12:7 (2011), 550–560.
    • (2011) J. Zhejinag Univ. Sci. C , vol.12 , Issue.7 , pp. 550-560
    • Fan, R.1    He, D.2    Pan, X.3    Ping, L.4
  • 9
    • 84922280033 scopus 로고    scopus 로고
    • Achieving efficient cloud search services: multi-keyword ranked search over encrypted cloud data supporting psarallel computing
    • Fu, Z., Sun, X., Liu, Q., Zhou, L., Shu, J., Achieving efficient cloud search services: multi-keyword ranked search over encrypted cloud data supporting psarallel computing. IEICE Trans. Commun. E98-B:1 (2015), 190–200.
    • (2015) IEICE Trans. Commun. , vol.E98-B , Issue.1 , pp. 190-200
    • Fu, Z.1    Sun, X.2    Liu, Q.3    Zhou, L.4    Shu, J.5
  • 10
    • 84916883747 scopus 로고    scopus 로고
    • Threshold-value authentication architecture for wireless mesh networks
    • [Variable]
    • Guo, P., Wang, J., Li, B., Lee, S.A., Threshold-value authentication architecture for wireless mesh networks. [Variable] J. Internet Technol. 15:6 (2014), 929–936.
    • (2014) J. Internet Technol. , vol.15 , Issue.6 , pp. 929-936
    • Guo, P.1    Wang, J.2    Li, B.3    Lee, S.A.4
  • 11
    • 78650459565 scopus 로고    scopus 로고
    • An enhanced two-factor user authentication scheme in wireless sensor networks
    • He, D., et al. An enhanced two-factor user authentication scheme in wireless sensor networks. Ad Hoc Sens. Wirel. Netw. 0 (2010), 1–11.
    • (2010) Ad Hoc Sens. Wirel. Netw. , pp. 1-11
    • He, D.1
  • 12
    • 84921481484 scopus 로고    scopus 로고
    • Authentication protocol for an ambient assisted living system
    • He, D., Zeadally, S., Authentication protocol for an ambient assisted living system. Commun. Mag. IEEE 53:1 (2015), 71–77.
    • (2015) Commun. Mag. IEEE , vol.53 , Issue.1 , pp. 71-77
    • He, D.1    Zeadally, S.2
  • 13
    • 84898048082 scopus 로고    scopus 로고
    • Enhanced three-factor security protocol for USB consumer storage devices
    • He, D., Kumar, N., Lee, J.-H., Enhanced three-factor security protocol for USB consumer storage devices. IEEE Trans. Consum. Electron. 60:1 (2014), 30–37.
    • (2014) IEEE Trans. Consum. Electron. , vol.60 , Issue.1 , pp. 30-37
    • He, D.1    Kumar, N.2    Lee, J.-H.3
  • 14
    • 84935865949 scopus 로고    scopus 로고
    • A secure temporal-credential-based mutual authentication and key agreement scheme with pseudo identity for wireless sensor networks
    • He, D., Kumar, N., Chilamkurti, N., A secure temporal-credential-based mutual authentication and key agreement scheme with pseudo identity for wireless sensor networks. Inf. Sci. 321 (2015), 236–277.
    • (2015) Inf. Sci. , vol.321 , pp. 236-277
    • He, D.1    Kumar, N.2    Chilamkurti, N.3
  • 15
    • 85043268105 scopus 로고    scopus 로고
    • Certificateless public auditing scheme for cloud-assisted wireless body area networks
    • He, D., Zeadally, S., Wu, L., Certificateless public auditing scheme for cloud-assisted wireless body area networks. IEEE Syst. J., 2015, 10.1109/JSYST.2015.2428620.
    • (2015) IEEE Syst. J.
    • He, D.1    Zeadally, S.2    Wu, L.3
  • 16
    • 85027949488 scopus 로고    scopus 로고
    • Robust biometrics-based authentication scheme for multi-server environment
    • He, D., Wang, D., Robust biometrics-based authentication scheme for multi-server environment. IEEE Syst. J. 9:3 (2015), 816–823.
    • (2015) IEEE Syst. J. , vol.9 , Issue.3 , pp. 816-823
    • He, D.1    Wang, D.2
  • 17
    • 84903511156 scopus 로고    scopus 로고
    • Anonymous authentication protocol based on elliptic curve Diffie–Hellman for wireless access networks
    • Hsieh, W.-B., Leu, J.-S., Anonymous authentication protocol based on elliptic curve Diffie–Hellman for wireless access networks. Wirel. Commun. Mob. Comput. 14:10 (2014), 995–1006.
    • (2014) Wirel. Commun. Mob. Comput. , vol.14 , Issue.10 , pp. 995-1006
    • Hsieh, W.-B.1    Leu, J.-S.2
  • 18
    • 84872473654 scopus 로고    scopus 로고
    • Security enhancement of robust user authentication framework for wireless sensor networks
    • Jiang, Q., Ma, Z., Ma, J., Li, G., Security enhancement of robust user authentication framework for wireless sensor networks. China Commun. 9:10 (2012), 103–111.
    • (2012) China Commun. , vol.9 , Issue.10 , pp. 103-111
    • Jiang, Q.1    Ma, Z.2    Ma, J.3    Li, G.4
  • 19
    • 84939576175 scopus 로고    scopus 로고
    • An efficient two-factor user authentication scheme with unlinkability for wireless sensor networks
    • Jiang, Q., Ma, J., Lu, X., Tian, Y., An efficient two-factor user authentication scheme with unlinkability for wireless sensor networks. Peer-to-Peer Netw. Appl. 8:6 (2015), 1070–1081.
    • (2015) Peer-to-Peer Netw. Appl. , vol.8 , Issue.6 , pp. 1070-1081
    • Jiang, Q.1    Ma, J.2    Lu, X.3    Tian, Y.4
  • 20
    • 84954436216 scopus 로고    scopus 로고
    • A privacy preserving three-actor authentication protocol for e-health clouds
    • Jiang, Q., Khan, M.K., Lu, X., Ma, J., He, D., A privacy preserving three-actor authentication protocol for e-health clouds. J. Supercomput., 2016, 10.1007/s11227-015-1610-x.
    • (2016) J. Supercomput.
    • Jiang, Q.1    Khan, M.K.2    Lu, X.3    Ma, J.4    He, D.5
  • 21
    • 84958124876 scopus 로고    scopus 로고
    • Robust extended chaotic maps-based three-factor authentication scheme preserving biometric template privacy
    • Jiang, Q., Wei, F., Fu, S., Ma, J., Li, G., Alelaiwi, A., Robust extended chaotic maps-based three-factor authentication scheme preserving biometric template privacy. Nonlinear Dyn. 83:4 (2016), 2085–2101.
    • (2016) Nonlinear Dyn. , vol.83 , Issue.4 , pp. 2085-2101
    • Jiang, Q.1    Wei, F.2    Fu, S.3    Ma, J.4    Li, G.5    Alelaiwi, A.6
  • 22
    • 84976285479 scopus 로고    scopus 로고
    • On the security of a privacy-aware authentication scheme for distributed mobile cloud computing services
    • Jiang, Q., Ma, J., Wei, F., On the security of a privacy-aware authentication scheme for distributed mobile cloud computing services. IEEE Syst. J., 2016, 10.1109/JSYST.2016.2574719.
    • (2016) IEEE Syst. J.
    • Jiang, Q.1    Ma, J.2    Wei, F.3
  • 23
    • 84988227377 scopus 로고    scopus 로고
    • Improvement of robust smart-card-based password authentication scheme
    • Jiang, Qi, Ma, Jianfeng, Li, Guangsong, Li, Xinghua, Improvement of robust smart-card-based password authentication scheme. Int. J. Commun. Syst. 28:2 (2015), 383–393.
    • (2015) Int. J. Commun. Syst. , vol.28 , Issue.2 , pp. 383-393
    • Jiang, Q.1    Ma, J.2    Li, G.3    Li, X.4
  • 24
    • 77955495427 scopus 로고    scopus 로고
    • Cryptanalysis and security improvement of two-factor user authentication in wireless sensor networks
    • Khan, M.K., Alghathbar, K., Cryptanalysis and security improvement of two-factor user authentication in wireless sensor networks. Sensors, 2010, 2450–2459.
    • (2010) Sensors , pp. 2450-2459
    • Khan, M.K.1    Alghathbar, K.2
  • 25
    • 84939573910 scopus 로고    scopus 로고
    • Differential power analysis
    • Santa Barbara CA, USA
    • Kocher, P., Jaffe, J., Jun, B., Differential power analysis. Proc. Adv. Cryptology, 1999, Santa Barbara, CA, USA, 388–397.
    • (1999) Proc. Adv. Cryptology , pp. 388-397
    • Kocher, P.1    Jaffe, J.2    Jun, B.3
  • 26
    • 79957718973 scopus 로고    scopus 로고
    • RUASN: a robust user authentication framework for wireless sensor networks
    • Kumar, P., et al. RUASN: a robust user authentication framework for wireless sensor networks. Sensors 11:5 (2011), 5020–5046.
    • (2011) Sensors , vol.11 , Issue.5 , pp. 5020-5046
    • Kumar, P.1
  • 27
    • 84885231928 scopus 로고    scopus 로고
    • A strong authentication scheme with user privacy for wireless sensor networks
    • Kumar, P., et al. A strong authentication scheme with user privacy for wireless sensor networks. ETRI J. 35:5 (2013), 889–899.
    • (2013) ETRI J. , vol.35 , Issue.5 , pp. 889-899
    • Kumar, P.1
  • 28
    • 84921608595 scopus 로고    scopus 로고
    • User authentication schemes for wireless sensor networks: a review
    • Kumari, S., Khan, M.K., Atiquzzaman, M., User authentication schemes for wireless sensor networks: a review. Ad Hoc Netw. 27 (2015), 159–194.
    • (2015) Ad Hoc Netw. , vol.27 , pp. 159-194
    • Kumari, S.1    Khan, M.K.2    Atiquzzaman, M.3
  • 29
    • 84904608123 scopus 로고    scopus 로고
    • EPPDR: an efficient privacy-preserving demand response scheme with adaptive key evolution in smart grid
    • Li, H., Lin, X., Yang, H., Liang, X., Lu, R., Shen, X., EPPDR: an efficient privacy-preserving demand response scheme with adaptive key evolution in smart grid. IEEE Trans. Parallel Distrib. Syst. 25:8 (2014), 2053–2064.
    • (2014) IEEE Trans. Parallel Distrib. Syst. , vol.25 , Issue.8 , pp. 2053-2064
    • Li, H.1    Lin, X.2    Yang, H.3    Liang, X.4    Lu, R.5    Shen, X.6
  • 30
    • 84973579525 scopus 로고    scopus 로고
    • Enabling fine-grained multi-keyword search supporting classified sub-dictionaries over encrypted cloud data
    • Li, H., Yang, Y., Luan, T., Liang, X., Zhou, L., Shen, X., Enabling fine-grained multi-keyword search supporting classified sub-dictionaries over encrypted cloud data. IEEE Trans. Dependable Secur. Comput., 2015, 10.1109/TDSC.2015.2406704.
    • (2015) IEEE Trans. Dependable Secur. Comput.
    • Li, H.1    Yang, Y.2    Luan, T.3    Liang, X.4    Zhou, L.5    Shen, X.6
  • 31
    • 0036566408 scopus 로고    scopus 로고
    • Examining smart-card security under the threat of power analysis attack
    • Messerges, T.S., Dabbish, E.A., Sloan, R.H., Examining smart-card security under the threat of power analysis attack. IEEE Trans. Comput. 51:5 (2002), 541–552.
    • (2002) IEEE Trans. Comput. , vol.51 , Issue.5 , pp. 541-552
    • Messerges, T.S.1    Dabbish, E.A.2    Sloan, R.H.3
  • 32
    • 84908621929 scopus 로고    scopus 로고
    • A provably-secure ECC-based authentication scheme for wireless sensor networks
    • Nam, J., Kim, M., Paik, J., et al. A provably-secure ECC-based authentication scheme for wireless sensor networks. Sensors 14:11 (2014), 21023–21044.
    • (2014) Sensors , vol.14 , Issue.11 , pp. 21023-21044
    • Nam, J.1    Kim, M.2    Paik, J.3
  • 33
    • 84928677388 scopus 로고    scopus 로고
    • Efficient data integrity auditing for storage security in mobile health cloud
    • Ren, Y., Shen, J., Zheng, Y., Wang, J., Chao, H.-C., Efficient data integrity auditing for storage security in mobile health cloud. Peer-to-Peer Netw. Appl., 2015, 10.1007/s12083-015-0346-y.
    • (2015) Peer-to-Peer Netw. Appl.
    • Ren, Y.1    Shen, J.2    Zheng, Y.3    Wang, J.4    Chao, H.-C.5
  • 34
    • 84928106743 scopus 로고    scopus 로고
    • Mutual verifiable provable data auditing in public cloud storage
    • Ren, Y., Shen, J., Wang, J., Han, J., Lee, S., Mutual verifiable provable data auditing in public cloud storage. J. Internet Technol. 16:2 (2015), 317–323.
    • (2015) J. Internet Technol. , vol.16 , Issue.2 , pp. 317-323
    • Ren, Y.1    Shen, J.2    Wang, J.3    Han, J.4    Lee, S.5
  • 35
    • 84922323888 scopus 로고    scopus 로고
    • A novel routing protocol providing good transmission reliability in underwater sensor networks
    • Shen, J., Tan, H., Wang, J., Wang, J., Lee, S., A novel routing protocol providing good transmission reliability in underwater sensor networks. J. Internet Technol. 16:1 (2015), 171–178.
    • (2015) J. Internet Technol. , vol.16 , Issue.1 , pp. 171-178
    • Shen, J.1    Tan, H.2    Wang, J.3    Wang, J.4    Lee, S.5
  • 36
    • 84877308219 scopus 로고    scopus 로고
    • A new user authentication protocol for wireless sensor networks using elliptic curves cryptography
    • Shi, W., Gong, P., A new user authentication protocol for wireless sensor networks using elliptic curves cryptography. Int. J. Distrib. Sens. Netw., 2013.
    • (2013) Int. J. Distrib. Sens. Netw.
    • Shi, W.1    Gong, P.2
  • 37
    • 84883446358 scopus 로고    scopus 로고
    • On the security and improvement of a two-factor user authentication scheme in wireless sensor networks
    • Sun, D., Li, J., Feng, Z., Cao, Z., Xu, G., On the security and improvement of a two-factor user authentication scheme in wireless sensor networks. Pers. Ubiquitous Comput. 17:5 (2013), 895–905.
    • (2013) Pers. Ubiquitous Comput. , vol.17 , Issue.5 , pp. 895-905
    • Sun, D.1    Li, J.2    Feng, Z.3    Cao, Z.4    Xu, G.5
  • 38
    • 84961312004 scopus 로고    scopus 로고
    • Two-factor mutual authentication with key agreement in wireless sensor networks
    • Vaidya, B., Makrakis, D., Mouftah, H., Two-factor mutual authentication with key agreement in wireless sensor networks. Secur. Commun. Netw., 2012, 10.1002/sec.517.
    • (2012) Secur. Commun. Netw.
    • Vaidya, B.1    Makrakis, D.2    Mouftah, H.3
  • 39
    • 84901198272 scopus 로고    scopus 로고
    • Understanding security failures of two-factor authentication schemes for real-time applications in hierarchical wireless sensor networks
    • Wang, D., Wang, P., Understanding security failures of two-factor authentication schemes for real-time applications in hierarchical wireless sensor networks. Ad Hoc Netw. 20 (2014), 1–15.
    • (2014) Ad Hoc Netw. , vol.20 , pp. 1-15
    • Wang, D.1    Wang, P.2
  • 40
    • 84906774949 scopus 로고    scopus 로고
    • On the anonymity of two-factor authentication schemes for wireless sensor networks: attacks, principle and solutions
    • Wang, D., Wang, P., On the anonymity of two-factor authentication schemes for wireless sensor networks: attacks, principle and solutions. Comput. Netw. 73 (2014), 41–57.
    • (2014) Comput. Netw. , vol.73 , pp. 41-57
    • Wang, D.1    Wang, P.2
  • 41
    • 84975275069 scopus 로고    scopus 로고
    • Anonymous two-factor authentication in distributed systems: certain goals are beyond attainment
    • Wang, D., He, D., Wang, P., Chu, C.-H., Anonymous two-factor authentication in distributed systems: certain goals are beyond attainment. IEEE Trans. Dependable Secur. Comput. 12:4 (2015), 428–442, 10.1109/TDSC.2014.2355850.
    • (2015) IEEE Trans. Dependable Secur. Comput. , vol.12 , Issue.4 , pp. 428-442
    • Wang, D.1    He, D.2    Wang, P.3    Chu, C.-H.4
  • 42
    • 84938203681 scopus 로고    scopus 로고
    • Preserving privacy for free: efficient and provably secure two-factor authentication scheme with user anonymity
    • Wang, D., Wang, N., Wang, P., Qing, S., Preserving privacy for free: efficient and provably secure two-factor authentication scheme with user anonymity. Inf. Sci. 321 (2015), 162–178.
    • (2015) Inf. Sci. , vol.321 , pp. 162-178
    • Wang, D.1    Wang, N.2    Wang, P.3    Qing, S.4
  • 43
    • 84962448916 scopus 로고    scopus 로고
    • A secure and dynamic multi-keyword ranked search scheme over encrypted cloud data
    • Xia, Z., Wang, X., Sun, X., Wang, Q., A secure and dynamic multi-keyword ranked search scheme over encrypted cloud data. IEEE Trans. Parallel Distrib. Syst., 2015, 10.1109/TPDS.2015.2401003.
    • (2015) IEEE Trans. Parallel Distrib. Syst.
    • Xia, Z.1    Wang, X.2    Sun, X.3    Wang, Q.4
  • 44
    • 84906330795 scopus 로고    scopus 로고
    • Construction of tree network with limited delivery latency in homogeneous wireless sensor networks
    • Xie, S., Wang, Y., Construction of tree network with limited delivery latency in homogeneous wireless sensor networks. Wirel. Pers. Commun. 78:1 (2014), 231–246.
    • (2014) Wirel. Pers. Commun. , vol.78 , Issue.1 , pp. 231-246
    • Xie, S.1    Wang, Y.2
  • 45
    • 84870693016 scopus 로고    scopus 로고
    • A temporal-credential-based mutual authentication and key agreement scheme for wireless sensor networks
    • Xue, K., Ma, C., Hong, P., Ding, R., A temporal-credential-based mutual authentication and key agreement scheme for wireless sensor networks. J. Netw. Comput. Appl. 36:1 (2013), 316–323.
    • (2013) J. Netw. Comput. Appl. , vol.36 , Issue.1 , pp. 316-323
    • Xue, K.1    Ma, C.2    Hong, P.3    Ding, R.4
  • 46
    • 79957702363 scopus 로고    scopus 로고
    • A secured authentication protocol for wireless sensor networks using elliptic curves cryptography
    • Yeh, H.-L., Chen, T.H., Liu, P.C., Kim, T.H., Wei, H.W., A secured authentication protocol for wireless sensor networks using elliptic curves cryptography. Sensors 11:5 (2011), 4767–4779.
    • (2011) Sensors , vol.11 , Issue.5 , pp. 4767-4779
    • Yeh, H.-L.1    Chen, T.H.2    Liu, P.C.3    Kim, T.H.4    Wei, H.W.5
  • 47
    • 84863637154 scopus 로고    scopus 로고
    • A security-performance-balanced user authentication scheme for wireless sensor networks
    • (Article ID 382810. 11 pages)
    • Yoo, S.-G., Park, K.-Y., Kim, J., A security-performance-balanced user authentication scheme for wireless sensor networks. Int. J. Distrib. Sens. Netw., 2012, 2012 (Article ID 382810. 11 pages).
    • (2012) Int. J. Distrib. Sens. Netw. , vol.2012
    • Yoo, S.-G.1    Park, K.-Y.2    Kim, J.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.