메뉴 건너뛰기




Volumn 8, Issue 1, 2017, Pages 101-116

A privacy-preserving and provable user authentication scheme for wireless sensor networks based on Internet of Things security

Author keywords

Formal proof; Internet of Things; Mutual authentication; Smart card; Wireless sensor network

Indexed keywords

AUTHENTICATION; CRYPTOGRAPHY; DATA PRIVACY; INTERNET OF THINGS; NETWORK SECURITY; SMART CARDS;

EID: 85010842165     PISSN: 18685137     EISSN: 18685145     Source Type: Journal    
DOI: 10.1007/s12652-016-0345-8     Document Type: Article
Times cited : (128)

References (37)
  • 1
    • 18744393738 scopus 로고    scopus 로고
    • Security proofs for an efficient password-based key exchange. In: Proceedings of the 10th ACM conference on Computer and communications security, ACM
    • Bresson E, Chevassut O, Pointcheval D (2003) Security proofs for an efficient password-based key exchange. In: Proceedings of the 10th ACM conference on Computer and communications security, ACM, p 241–250
    • (2003) p 241–250
    • Bresson, E.1    Chevassut, O.2    Pointcheval, D.3
  • 2
    • 84962198336 scopus 로고    scopus 로고
    • A provably secure, efficient and flexible authentication scheme for ad hoc wireless sensor networks, IEEE Trans Wirel Commun
    • Chang CC, Le HD (2015) A provably secure, efficient and flexible authentication scheme for ad hoc wireless sensor networks. IEEE Trans Wirel Commun. doi:10.1109/TWC.2015.2473165
    • (2015) Le HD
    • Chang, C.C.1
  • 3
    • 78049334450 scopus 로고    scopus 로고
    • A robust mutual authentication protocol for wireless sensor networks
    • Chen TH, Shih WK (2010) A robust mutual authentication protocol for wireless sensor networks. Etri J 32(5):704–712
    • (2010) Etri J , vol.32 , Issue.5 , pp. 704-712
    • Chen, T.H.1    Shih, W.K.2
  • 4
    • 84902296026 scopus 로고    scopus 로고
    • ecurity enhanced user authentication protocol for wireless sensor networks using elliptic curves cryptography
    • Choi Y, Lee D, Kim J, Jung J, Nam J, Won D (2014) ecurity enhanced user authentication protocol for wireless sensor networks using elliptic curves cryptography. Sensors 14(6):10,081–10,106
    • (2014) Sensors , vol.14 , Issue.6 , pp. 10,081-10,106
    • Choi, Y.1    Lee, D.2    Kim, J.3    Jung, J.4    Nam, J.5    Won, D.6
  • 5
    • 62949130774 scopus 로고    scopus 로고
    • Two-factor user authentication in wireless sensor networks
    • Das ML (2009) Two-factor user authentication in wireless sensor networks. Wirel Commun IEEE Trans 8(3):1086–1090
    • (2009) Wirel Commun IEEE Trans , vol.8 , Issue.3 , pp. 1086-1090
    • Das, M.L.1
  • 6
    • 79960062320 scopus 로고    scopus 로고
    • An efficient and dos-resistant user authentication scheme for two-tiered wireless sensor networks
    • Fan R, Dj He, Xz Pan (2011) An efficient and dos-resistant user authentication scheme for two-tiered wireless sensor networks. J Zhejiang Univ Sci C 12(7):550–560
    • (2011) J Zhejiang Univ Sci C , vol.12 , Issue.7 , pp. 550-560
    • Fan, R.1    Dj, H.2    Xz, P.3
  • 7
    • 84906812799 scopus 로고    scopus 로고
    • A network architecture solution for efficient iot wsn backhauling: challenges and opportunities
    • Fantacci R, Pecorella T, Viti R, Carlini C (2014) A network architecture solution for efficient iot wsn backhauling: challenges and opportunities. IEEE Trans Wirel Commun 21(4):113–119
    • (2014) IEEE Trans Wirel Commun , vol.21 , Issue.4 , pp. 113-119
    • Fantacci, R.1    Pecorella, T.2    Viti, R.3    Carlini, C.4
  • 8
    • 84948712087 scopus 로고    scopus 로고
    • An efficient user authentication and key agreement scheme for heterogeneous wireless sensor network tailored for the internet of things environment. Ad Hoc Netw
    • Farash MS, Turkanović M, Kumari S, Hölbl M (2015) An efficient user authentication and key agreement scheme for heterogeneous wireless sensor network tailored for the internet of things environment. Ad Hoc Netw. doi:10.1016/j.adhoc.2015.05.014
    • (2015) doi:10.1016/j.adhoc.2015.05.014
    • Farash, M.S.1    Turkanović, M.2    Kumari, S.3    Hölbl, M.4
  • 9
    • 84916883747 scopus 로고    scopus 로고
    • A variable threshold-value authentication architecture for wireless mesh networks
    • Guo P, Wang J, Geng XH, Kim CS, Kim JU (2014) A variable threshold-value authentication architecture for wireless mesh networks. J Internet Technol 15(6):929–935
    • (2014) J Internet Technol , vol.15 , Issue.6 , pp. 929-935
    • Guo, P.1    Wang, J.2    Geng, X.H.3    Kim, C.S.4    Kim, J.U.5
  • 10
    • 84922002292 scopus 로고    scopus 로고
    • Weakness of a secured authentication protocol for wireless sensor networks using elliptic curves cryptography
    • Han W (2011) Weakness of a secured authentication protocol for wireless sensor networks using elliptic curves cryptography. IACR Cryptol ePrint Arch 2011:293
    • (2011) IACR Cryptol ePrint Arch , vol.2011 , pp. 293
    • Han, W.1
  • 12
    • 84988269687 scopus 로고    scopus 로고
    • A survey on encryption schemes in wireless sensor networks. In: Advanced Software Engineering and Its Applications (ASEA), 2014 7th International Conference on
    • Hayouni H, Hamdi M, Kim TH (2014) A survey on encryption schemes in wireless sensor networks. In: Advanced Software Engineering and Its Applications (ASEA), 2014 7th International Conference on, p 39–43
    • (2014) p 39–43
    • Hayouni, H.1    Hamdi, M.2    Kim, T.H.3
  • 13
    • 78650459565 scopus 로고    scopus 로고
    • An enhanced two-factor user authentication scheme in wireless sensor networks
    • He D, Gao Y, Chan S, Chen C, Bu J (2010) An enhanced two-factor user authentication scheme in wireless sensor networks. Ad Hoc Sens Wirel Netw 10(4):361–371
    • (2010) Ad Hoc Sens Wirel Netw , vol.10 , Issue.4 , pp. 361-371
    • He, D.1    Gao, Y.2    Chan, S.3    Chen, C.4    Bu, J.5
  • 14
    • 84922001116 scopus 로고    scopus 로고
    • Robust anonymous authentication protocol for health-care applications using wireless medical sensor networks
    • He D, Kumar N, Chen J, Lee CC, Chilamkurti N, Yeo SS (2015) Robust anonymous authentication protocol for health-care applications using wireless medical sensor networks. Multimed Syst 21(1):49–60. doi:10.1007/s00530-013-0346-9
    • (2015) Multimed Syst , vol.21 , Issue.1 , pp. 49-60
    • He, D.1    Kumar, N.2    Chen, J.3    Lee, C.C.4    Chilamkurti, N.5    Yeo, S.S.6
  • 15
    • 84903591701 scopus 로고    scopus 로고
    • A robust user authentication scheme using dynamic identity in wireless sensor networks
    • Hsieh WB, Leu JS (2014) A robust user authentication scheme using dynamic identity in wireless sensor networks. Wirel Pers Commun 77(2):979–989
    • (2014) Wirel Pers Commun , vol.77 , Issue.2 , pp. 979-989
    • Hsieh, W.B.1    Leu, J.S.2
  • 16
    • 77955495427 scopus 로고    scopus 로고
    • Cryptanalysis and security improvements of two-factor user authentication in wireless sensor networks
    • Khan MK, Alghathbar K (2010) Cryptanalysis and security improvements of two-factor user authentication in wireless sensor networks. Sensors 10(3):2450–2459
    • (2010) Sensors , vol.10 , Issue.3 , pp. 2450-2459
    • Khan, M.K.1    Alghathbar, K.2
  • 17
    • 84939573910 scopus 로고    scopus 로고
    • Differential power analysis. In: Advances in Cryptology-CRYPTO 99, Springer
    • Kocher P, Jaffe J, Jun B (1999) Differential power analysis. In: Advances in Cryptology-CRYPTO 99, Springer, p 388–397
    • (1999) p 388–397
    • Kocher, P.1    Jaffe, J.2    Jun, B.3
  • 18
    • 80052427734 scopus 로고    scopus 로고
    • Lee HJ (2011) Cryptanalysis on two user authentication protocols using smart card for wireless sensor networks
    • WiAd: IEEE
    • Kumar P, Lee HJ (2011) Cryptanalysis on two user authentication protocols using smart card for wireless sensor networks. In: Wireless Advanced (WiAd), IEEE, p 241–245
    • Wireless Advanced , pp. 241-245
    • Kumar, P.1
  • 19
    • 84878597719 scopus 로고    scopus 로고
    • A novel smart card and dynamic id based remote user authentication scheme for multi-server environments
    • Li X, Ma J, Wang W, Xiong Y, Zhang J (2013a) A novel smart card and dynamic id based remote user authentication scheme for multi-server environments. Math Comput Model 58(1):85–95
    • (2013) Math Comput Model , vol.58 , Issue.1 , pp. 85-95
    • Li, X.1    Ma, J.2    Wang, W.3    Xiong, Y.4    Zhang, J.5
  • 20
    • 84883653668 scopus 로고    scopus 로고
    • An enhanced smart card based remote user password authentication scheme
    • Li X, Niu J, Khan MK, Liao J (2013b) An enhanced smart card based remote user password authentication scheme. J Netw Comput Appl 36(5):1365–1371
    • (2013) J Netw Comput Appl , vol.36 , Issue.5 , pp. 1365-1371
    • Li, X.1    Niu, J.2    Khan, M.K.3    Liao, J.4
  • 21
    • 84903637006 scopus 로고    scopus 로고
    • Liu Z, Wenger E, Gro β schä dl J (2014) Mote-ecc: energy-scalable elliptic curve cryptography for wireless-sensor-networks. In: Boureanu I, Owesarski P, Vaudenay S (eds) Applied Cryptography and Network Security, Lecture Notes in Computer Science, vol 8479, Springer International Publishing, p 361–379,10.1007/978-3-319-07536-5\_22
    • Liu Z, Wenger E, Gro β schä dl J (2014) Mote-ecc: energy-scalable elliptic curve cryptography for wireless-sensor-networks. In: Boureanu I, Owesarski P, Vaudenay S (eds) Applied Cryptography and Network Security, Lecture Notes in Computer Science, vol 8479, Springer International Publishing, p 361–379, DOI 10.1007/978-3-319-07536-5\_22
  • 22
    • 84930763799 scopus 로고    scopus 로고
    • Survey on secure communication protocols for the internet of things
    • Nguyen KT, Laurent M, Oualha N (2015) Survey on secure communication protocols for the internet of things. Ad Hoc Netw 32:17–31
    • (2015) Ad Hoc Netw , vol.32 , pp. 17-31
    • Nguyen, K.T.1    Laurent, M.2    Oualha, N.3
  • 23
    • 84928106743 scopus 로고    scopus 로고
    • Mutual verifiable provable data auditing in public cloud storage
    • Ren Y, Shen J, Wang J, Han J, Lee S (2015) Mutual verifiable provable data auditing in public cloud storage. J Internet Technol 16(2):317–323
    • (2015) J Internet Technol , vol.16 , Issue.2 , pp. 317-323
    • Ren, Y.1    Shen, J.2    Wang, J.3    Han, J.4    Lee, S.5
  • 24
    • 84877308219 scopus 로고    scopus 로고
    • A new user authentication protocol for wireless sensor networks using elliptic curves cryptography
    • Shi W, Gong P (2013) A new user authentication protocol for wireless sensor networks using elliptic curves cryptography. Int J Distrib Sens Netw 2013:730831. doi:10.1155/2013/730831
    • (2013) Int J Distrib Sens Netw , vol.2013
    • Shi, W.1    Gong, P.2
  • 25
    • 84901188390 scopus 로고    scopus 로고
    • A novel user authentication and key agreement scheme for heterogeneous ad hoc wireless sensor networks, based on the internet of things notion
    • Turkanović M, Brumen B, Hölbl M (2014) A novel user authentication and key agreement scheme for heterogeneous ad hoc wireless sensor networks, based on the internet of things notion. Ad Hoc Netw 20:96–112
    • (2014) Ad Hoc Netw , vol.20 , pp. 96-112
    • Turkanović, M.1    Brumen, B.2    Hölbl, M.3
  • 26
    • 78650750082 scopus 로고    scopus 로고
    • Improved two-factor user authentication in wireless sensor networks. In: Wireless and Mobile Computing, Networking and Communications (WiMob), 2010 IEEE 6th International Conference on, IEEE
    • Vaidya B, Makrakis D, Mouftah HT (2010) Improved two-factor user authentication in wireless sensor networks. In: Wireless and Mobile Computing, Networking and Communications (WiMob), 2010 IEEE 6th International Conference on, IEEE, p 600–606
    • (2010) p 600–606
    • Vaidya, B.1    Makrakis, D.2    Mouftah, H.T.3
  • 27
    • 84901198272 scopus 로고    scopus 로고
    • Understanding security failures of two-factor authentication schemes for real-time applications in hierarchical wireless sensor networks
    • Wang D, Wang P (2014) Understanding security failures of two-factor authentication schemes for real-time applications in hierarchical wireless sensor networks. Ad Hoc Netw 20:1–15
    • (2014) Ad Hoc Netw , vol.20 , pp. 1-15
    • Wang, D.1    Wang, P.2
  • 28
    • 14844304757 scopus 로고    scopus 로고
    • Tinypk: securing sensor networks with public key technology. In: Proceedings of the 2nd ACM workshop on Security of ad hoc and sensor networks, ACM
    • Watro R, Kong D, Cuti Sf, Gardiner C, Lynn C, Kruus P (2004) Tinypk: securing sensor networks with public key technology. In: Proceedings of the 2nd ACM workshop on Security of ad hoc and sensor networks, ACM, p 59–64
    • (2004) p 59–64
    • Watro, R.1    Kong, D.2    Sf, C.3    Gardiner, C.4    Lynn, C.5    Kruus, P.6
  • 29
    • 84923216048 scopus 로고    scopus 로고
    • An improved and provable self-certified digital signature scheme with message recovery
    • Wu F, Xu L (2015) An improved and provable self-certified digital signature scheme with message recovery. Int J Commun Syst 28(2):344–357
    • (2015) Int J Commun Syst , vol.28 , Issue.2 , pp. 344-357
    • Wu, F.1    Xu, L.2
  • 30
    • 84940853317 scopus 로고    scopus 로고
    • A new and secure authentication scheme for wireless sensor networks with formal proof. Peer-to-Peer Netw Appl
    • Wu F, Xu L, Kumari S, Li X (2015a) A new and secure authentication scheme for wireless sensor networks with formal proof. Peer-to-Peer Netw Appl. doi:10.1007/s12083-015-0404-5
    • (2015) doi:10.1007/s12083-015-0404-5
    • Wu, F.1    Xu, L.2    Kumari, S.3    Li, X.4
  • 31
    • 84942364844 scopus 로고    scopus 로고
    • A novel and provably secure biometrics-based three-factor remote authentication scheme for mobile client-server networks
    • Wu F, Xu L, Kumari S, Li X (2015b) A novel and provably secure biometrics-based three-factor remote authentication scheme for mobile client-server networks. Comput Electr Eng 45:274–285
    • (2015) Comput Electr Eng , vol.45 , pp. 274-285
    • Wu, F.1    Xu, L.2    Kumari, S.3    Li, X.4
  • 32
    • 84936129205 scopus 로고    scopus 로고
    • A new authenticated key agreement scheme based on smart cards providing user anonymity with formal proof
    • Wu F, Xu L, Kumari S, Li X, Alelaiwi A (2015c) A new authenticated key agreement scheme based on smart cards providing user anonymity with formal proof. Secur Commun Netw 8(18):3847–3863
    • (2015) Secur Commun Netw , vol.8 , Issue.18 , pp. 3847-3863
    • Wu, F.1    Xu, L.2    Kumari, S.3    Li, X.4    Alelaiwi, A.5
  • 33
    • 84963958402 scopus 로고    scopus 로고
    • Cryptanalysis and improvement of a user authentication scheme preserving uniqueness and anonymity for connected health care
    • Xu L, Wu F (2015a) Cryptanalysis and improvement of a user authentication scheme preserving uniqueness and anonymity for connected health care. J Med Syst 39(2):1–9
    • (2015) J Med Syst , vol.39 , Issue.2 , pp. 1-9
    • Xu, L.1    Wu, F.2
  • 34
    • 84919348312 scopus 로고    scopus 로고
    • An improved and provable remote user authentication scheme based on elliptic curve cryptosystem with user anonymity
    • Xu L, Wu F (2015b) An improved and provable remote user authentication scheme based on elliptic curve cryptosystem with user anonymity. Secur Commun Netw 8(2):245–260
    • (2015) Secur Commun Netw , vol.8 , Issue.2 , pp. 245-260
    • Xu, L.1    Wu, F.2
  • 35
    • 84870693016 scopus 로고    scopus 로고
    • A temporal-credential-based mutual authentication and key agreement scheme for wireless sensor networks
    • Xue K, Ma C, Hong P, Ding R (2013) A temporal-credential-based mutual authentication and key agreement scheme for wireless sensor networks. J Netw Comput Appl 36(1):316–323
    • (2013) J Netw Comput Appl , vol.36 , Issue.1 , pp. 316-323
    • Xue, K.1    Ma, C.2    Hong, P.3    Ding, R.4
  • 36
    • 79957702363 scopus 로고    scopus 로고
    • A secured authentication protocol for wireless sensor networks using elliptic curves cryptography
    • Yeh HL, Chen TH, Liu PC, Kim TH, Wei HW (2011) A secured authentication protocol for wireless sensor networks using elliptic curves cryptography. Sensors 11(5):4767–4779
    • (2011) Sensors , vol.11 , Issue.5 , pp. 4767-4779
    • Yeh, H.L.1    Chen, T.H.2    Liu, P.C.3    Kim, T.H.4    Wei, H.W.5
  • 37
    • 84863637154 scopus 로고    scopus 로고
    • A security-performance-balanced user authentication scheme for wireless sensor networks
    • Yoo SG, Park KY, Kim J (2012) A security-performance-balanced user authentication scheme for wireless sensor networks. Int J Distrib Sens Netw 2012:382810. doi:10.1155/2012/382810
    • (2012) Int J Distrib Sens Netw , vol.2012
    • Yoo, S.G.1    Park, K.Y.2    Kim, J.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.