메뉴 건너뛰기




Volumn 5, Issue , 2017, Pages 3376-3392

Lightweight three-factor authentication and key agreement protocol for internet-integrated wireless sensor networks

Author keywords

Authentication; biometrics; key management; privacy; Rabin cryptosystem; smart card; wireless sensor networks

Indexed keywords

AUTHENTICATION; BIOMETRICS; CRYPTOGRAPHY; DATA PRIVACY; INTERNET; INTERNET PROTOCOLS; MOBILE TELECOMMUNICATION SYSTEMS; NETWORK SECURITY; SECURITY SYSTEMS; SENSOR NODES; SMART CARDS; TRANSPORTATION;

EID: 85018460561     PISSN: None     EISSN: 21693536     Source Type: Journal    
DOI: 10.1109/ACCESS.2017.2673239     Document Type: Article
Times cited : (278)

References (71)
  • 1
    • 78650891113 scopus 로고    scopus 로고
    • SNAIL: An IP-based wireless sensor network approach to the Internet of Things
    • Dec
    • S. Hong, et al., SNAIL: An IP-based wireless sensor network approach to the Internet of Things, '' IEEEWireless Commun, vol. 17, no. 6, pp. 34-42, Dec. 2010.
    • (2010) IEEEWireless Commun , vol.17 , Issue.6 , pp. 34-42
    • Hong, S.1
  • 2
    • 79955712919 scopus 로고    scopus 로고
    • Key management systems for sensor networks in the context of the Internet of Things
    • Mar
    • R. Roman, C. Alcaraz, J. Lopez, and N. Sklavos, Key management systems for sensor networks in the context of the Internet of Things, '? Comput. Elect. Eng, vol. 37, no. 2, pp. 147-159, Mar. 2011.
    • (2011) Comput. Elect. Eng , vol.37 , Issue.2 , pp. 147-159
    • Roman, R.1    Alcaraz, C.2    Lopez, J.3    Sklavos, N.4
  • 3
    • 85027927161 scopus 로고    scopus 로고
    • Security in the integration of lowpower wireless sensor networks with the internet: A survey
    • Jan
    • J. Granjal, E. Monteiro, and J. S. Silva, Security in the integration of lowpower Wireless Sensor Networks with the Internet: A survey, '' Ad Hoc Netw, vol. 24, pp. 264-287, Jan. 2015.
    • (2015) Ad Hoc Netw , vol.24 , pp. 264-287
    • Granjal, J.1    Monteiro, E.2    Silva, J.S.3
  • 4
    • 84892614267 scopus 로고    scopus 로고
    • A survey on the ietf protocol suite for the internet of things: Standards, challenges, and opportunities
    • Dec
    • Z. Sheng, S. Yang, Y. Yu, A. Vasilakos, J. McCann, and K. Leung, A survey on the IETF protocol suite for the Internet of Things: Standards, challenges, and opportunities, '' IEEE Wireless Commun, vol. 20, no. 6, pp. 91-98, Dec. 2013.
    • (2013) IEEE Wireless Commun , vol.20 , Issue.6 , pp. 91-98
    • Sheng, Z.1    Yang, S.2    Yu, Y.3    Vasilakos, A.4    McCann, J.5    Leung, K.6
  • 5
    • 85018471598 scopus 로고    scopus 로고
    • Group. Accessed on Jan. Online].Available
    • 6LoWPANWorking Group. Accessed on Jan. 15, 2017. [Online].Available: http://tools.ietf.org/wg/6lowpan/
    • 6LoWPANWorking , vol.15 , pp. 2017
  • 6
    • 85018503573 scopus 로고    scopus 로고
    • Accessed on Jan. Online]. Available
    • ROLL Working Group. Accessed on Jan. 15, 2017. [Online]. Available: http://tools.ietf.org/wg/roll/
    • (2017) ROLL Working Group , vol.15
  • 7
    • 67649560482 scopus 로고    scopus 로고
    • Integrating wireless sensor networks and the Internet: A security analysis
    • R. Roman and J. Lopez, Integrating wireless sensor networks and the Internet: A security analysis, '' Internet Res, vol. 19, no. 2, pp. 246-259, 2009.
    • (2009) Internet Res , vol.19 , Issue.2 , pp. 246-259
    • Roman, R.1    Lopez, J.2
  • 8
    • 84897727549 scopus 로고    scopus 로고
    • Enhancing secure access to sensor data with user privacy support
    • May
    • J. Astorga, E. Jacob, N. Toledo, and J. Unzilla, Enhancing secure access to sensor data with user privacy support, '' Comput. Netw, vol. 64, pp. 159-179, May 2014.
    • (2014) Comput. Netw , vol.64 , pp. 159-179
    • Astorga, J.1    Jacob, E.2    Toledo, N.3    Unzilla, J.4
  • 9
    • 84959857578 scopus 로고    scopus 로고
    • A hybrid security and compressive sensing-based sensor data gathering scheme
    • J. Qi, X. Hu, Y. Ma, and Y. Sun, A hybrid security and compressive sensing-based sensor data gathering scheme, '' IEEE Access, vol. 3, pp. 718-724, 2015.
    • (2015) IEEE Access , vol.3 , pp. 718-724
    • Qi, J.1    Hu, X.2    Ma, Y.3    Sun, Y.4
  • 10
    • 84922280033 scopus 로고    scopus 로고
    • Achieving efficient cloud search services: Multi-keyword ranked search over encrypted cloud data supporting parallel computing
    • Z. Fu, X. Sun, Q. Liu, L. Zhou, and J. Shu, Achieving efficient cloud search services: Multi-keyword ranked search over encrypted cloud data supporting parallel computing, '' IEICE Trans. Commun, vol. E98-B, no. 1, pp. 190-200, 2015.
    • (2015) IEICE Trans. Commun, Vol. E98-B , Issue.1 , pp. 190-200
    • Fu, Z.1    Sun, X.2    Liu, Q.3    Zhou, L.4    Shu, J.5
  • 11
    • 85077359111 scopus 로고    scopus 로고
    • Enabling semantic search based on conceptual graphs over encrypted outsourced data
    • to be published
    • Z. Fu, F. Huang, X. Sun, A. V. Vasilakos, and C.-N. Yang, Enabling semantic search based on conceptual graphs over encrypted outsourced data, '' IEEE Trans. Serv. Comput., to be published, doi: 10.1109/TSC.2016.2622697.
    • IEEE Trans. Serv. Comput
    • Fu, Z.1    Huang, F.2    Sun, X.3    Vasilakos, A.V.4    Yang, C.-N.5
  • 12
    • 84940510005 scopus 로고    scopus 로고
    • Engineering searchable encryption of mobile cloud networks: When QoE meets qop
    • Aug
    • H. Li, D. Liu, Y. Dai, and T. H. Luan, Engineering searchable encryption of mobile cloud networks: When QoE meets QoP, '' IEEE Wireless Commun, vol. 22, no. 4, pp. 74-80, Aug. 2015.
    • (2015) IEEE Wireless Commun , vol.22 , Issue.4 , pp. 74-80
    • Li, H.1    Liu, D.2    Dai, Y.3    Luan, T.H.4
  • 13
    • 84964246143 scopus 로고    scopus 로고
    • Anonymous authentication for wireless body area networks with provable security
    • to be published
    • D. He, S. Zeadally, N. Kumar, and J.-H. Lee, Anonymous authentication for wireless body area networks with provable security, '' IEEE Syst. J., to be published, doi: 10.1109/JSYST.2016.2544805.
    • IEEE Syst. J
    • He, D.1    Zeadally, S.2    Kumar, N.3    Lee, J.-H.4
  • 14
    • 84921481484 scopus 로고    scopus 로고
    • Authentication protocol for an ambient assisted living system
    • Jan
    • D. He and S. Zeadally, Authentication protocol for an ambient assisted living system, '' IEEE Commun. Mag, vol. 35, no. 1, pp. 71-77, Jan. 2015.
    • (2015) IEEE Commun. Mag , vol.35 , Issue.1 , pp. 71-77
    • He, D.1    Zeadally, S.2
  • 15
    • 84930763799 scopus 로고    scopus 로고
    • Survey on secure communication protocols for the Internet of Things
    • Sep
    • K. T. Nguyen, M. Laurent, and N. Oualha, Survey on secure communication protocols for the Internet of Things, '' Ad Hoc Netw, vol. 32, pp. 17-31, Sep. 2015.
    • (2015) Ad Hoc Netw , vol.32 , pp. 17-31
    • Nguyen, K.T.1    Laurent, M.2    Oualha, N.3
  • 17
    • 84930753105 scopus 로고    scopus 로고
    • Establishment of ECC-based initial secrecy usable for IKE implementation
    • London, U.K. Jul
    • S. Ray and G. Biswas, Establishment of ECC-based initial secrecy usable for IKE implementation, '' in Proc. World Congr. Eng. (WCE), vol. 1. London, U.K., Jul. 2012, pp. 1-6.
    • (2012) Proc. World Congr. Eng. (WCE , vol.1 , pp. 1-6
    • Ray, S.1    Biswas, G.2
  • 18
    • 84921608595 scopus 로고    scopus 로고
    • User authentication schemes for wireless sensor networks: A review
    • Apr
    • S. Kumari, M. K. Khan, and M. Atiquzzaman, User authentication schemes for wireless sensor networks: A review, '' Ad Hoc Netw, vol. 27, pp. 159-194, Apr. 2015.
    • (2015) Ad Hoc Netw , vol.27 , pp. 159-194
    • Kumari, S.1    Khan, M.K.2    Atiquzzaman, M.3
  • 19
    • 84939576175 scopus 로고    scopus 로고
    • An efficient two-factor user authentication scheme with unlinkability for wireless sensor networks
    • Nov
    • Q. Jiang, J. Ma, X. Lu, and Y. Tian, An efficient two-factor user authentication scheme with unlinkability for wireless sensor networks, '' Peer-Peer Netw. Appl, vol. 8, no. 6, pp. 1070-1081, Nov. 2014.
    • (2014) Peer-Peer Netw. Appl , vol.8 , Issue.6 , pp. 1070-1081
    • Jiang, Q.1    Ma, J.2    Lu, X.3    Tian, Y.4
  • 20
    • 84935865949 scopus 로고    scopus 로고
    • A secure temporal-credentialbased mutual authentication and key agreement scheme with pseudo identity for wireless sensor networks
    • Nov
    • D. He, N. Kumar, and N. Chilamkurti, A secure temporal-credentialbased mutual authentication and key agreement scheme with pseudo identity for wireless sensor networks, '' Inf. Sci, vol. 321, pp. 263-277, Nov. 2015.
    • (2015) Inf. Sci , vol.321 , pp. 263-277
    • He, D.1    Kumar, N.2    Chilamkurti, N.3
  • 21
    • 84930202100 scopus 로고    scopus 로고
    • Cost-effective scalable and anonymous certificateless remote authentication protocol
    • Dec
    • H. Xiong, Cost-effective scalable and anonymous certificateless remote authentication protocol, '' IEEE Trans. Inf. Forensics Security, vol. 9, no. 12, pp. 2327-2339, Dec. 2014.
    • (2014) IEEE Trans. Inf. Forensics Security , vol.9 , Issue.12 , pp. 2327-2339
    • Xiong, H.1
  • 22
    • 84930216224 scopus 로고    scopus 로고
    • Revocable and scalable certificateless remote authentication protocol with anonymity for wireless body area networks
    • Jul
    • H. Xiong and Z. Qin, Revocable and scalable certificateless remote authentication protocol with anonymity for wireless body area networks, '? IEEE Trans. Inf. Forensics Security, vol. 10, no. 7, pp. 1442-1455, Jul. 2015.
    • (2015) IEEE Trans. Inf. Forensics Security , vol.10 , Issue.7 , pp. 1442-1455
    • Xiong, H.1    Qin, Z.2
  • 23
    • 84947804555 scopus 로고    scopus 로고
    • Enhanced secure sensor association and key management in wireless body area networks
    • Oct
    • J. Shen, H. Tan, S. Moh, I. Chung, Q. Liu, and X. Sun, Enhanced secure sensor association and key management in wireless body area networks, '? J. Commun. Netw, vol. 17, no. 5, pp. 453-462, Oct. 2015.
    • (2015) J. Commun. Netw , vol.17 , Issue.5 , pp. 453-462
    • Shen, J.1    Tan, H.2    Moh, S.3    Chung, I.4    Liu, Q.5    Sun, X.6
  • 24
    • 84883394343 scopus 로고    scopus 로고
    • Practical secure communication for integrating wireless sensor networks into the Internet of Things
    • Oct
    • F. Li and P. Xiong, Practical secure communication for integrating wireless sensor networks into the Internet of Things, '' IEEE Sensors J, vol. 13, no. 10, pp. 3677-3684, Oct. 2013.
    • (2013) IEEE Sensors J , vol.13 , Issue.10 , pp. 3677-3684
    • Li, F.1    Xiong, P.2
  • 25
    • 84863560791 scopus 로고    scopus 로고
    • Ladon1: End-To-end authorisation support for resource-deprived environments
    • Jun
    • J. Astorga, E. Jacob, M. Huarte, and M. Higuero, Ladon1: End-To-end authorisation support for resource-deprived environments, '' IET Inf. Secur, vol. 6, no. 2, pp. 93-101, Jun. 2012.
    • (2012) IET Inf. Secur , vol.6 , Issue.2 , pp. 93-101
    • Astorga, J.1    Jacob, E.2    Huarte, M.3    Higuero, M.4
  • 26
    • 84988227377 scopus 로고    scopus 로고
    • Improvement of robust smart-cardbased password authentication scheme
    • Jan
    • Q. Jiang, J. Ma, G. Li, and X. Li, Improvement of robust smart-cardbased password authentication scheme, '' Int. J. Commun. Syst, vol. 28, no. 2, pp. 383-393, Jan. 2015.
    • (2015) Int. J. Commun. Syst , vol.28 , Issue.2 , pp. 383-393
    • Jiang, Q.1    Ma, J.2    Li, G.3    Li, X.4
  • 27
    • 62949130774 scopus 로고    scopus 로고
    • Two-factor user authentication in wireless sensor networks
    • Mar
    • M. L. Das, Two-factor user authentication in wireless sensor networks, '? IEEE Trans. Wireless Commun, vol. 8, no. 3, pp. 1086-1090, Mar. 2009.
    • (2009) IEEE Trans. Wireless Commun , vol.8 , Issue.3 , pp. 1086-1090
    • Das, M.L.1
  • 28
    • 84971016485 scopus 로고    scopus 로고
    • A user friendly mutual authentication and key agreement scheme for wireless sensor networks using chaotic maps
    • Oct
    • S. Kumari, et al., A user friendly mutual authentication and key agreement scheme for wireless sensor networks using chaotic maps, '' Future Generat. Comput. Syst, vol. 63, pp. 56-75, Oct. 2016.
    • (2016) Future Generat. Comput. Syst , vol.63 , pp. 56-75
    • Kumari, S.1
  • 29
    • 85008263167 scopus 로고    scopus 로고
    • An untraceable temporal-credential-based two-factor authentication scheme using ECC for wireless sensor networks
    • Dec
    • Q. Jiang, J. Ma, F. Wei, Y. Tian, J. Shen, and Y. Yang, An untraceable temporal-credential-based two-factor authentication scheme using ECC for wireless sensor networks, '' J. Netw. Comput. Appl, vol. 76, pp. 37-48, Dec. 2016.
    • (2016) J. Netw. Comput. Appl , vol.76 , pp. 37-48
    • Jiang, Q.1    Ma, J.2    Wei, F.3    Tian, Y.4    Shen, J.5    Yang, Y.6
  • 30
    • 84992451663 scopus 로고    scopus 로고
    • A privacyaware two-factor authentication protocol based on elliptic curve cryptography for wireless sensor networks
    • Q. Jiang, N. Kumar, J. Ma, J. Shen, D. He, and N. Chilamkurti, A privacyaware two-factor authentication protocol based on elliptic curve cryptography for wireless sensor networks, '' Int. J. Netw. Manage., 2016, doi: 10.1002/nem.1937.
    • (2016) Int. J. Netw. Manage
    • Jiang, Q.1    Kumar, N.2    Ma, J.3    Shen, J.4    He, D.5    Chilamkurti, N.6
  • 31
    • 84997014499 scopus 로고    scopus 로고
    • Cryptanalysis and improvement of an enhanced two-factor user authentication scheme in wireless sensor networks
    • F. Wei, J. Ma, Q. Jiang, J. Shen, and C. Ma, Cryptanalysis and improvement of an enhanced two-factor user authentication scheme in wireless sensor networks, '' Inf. Technol. Control, vol. 45, no. 1, pp. 62-70, 2016.
    • (2016) Inf. Technol. Control , vol.45 , Issue.1 , pp. 62-70
    • Wei, F.1    Ma, J.2    Jiang, Q.3    Shen, J.4    Ma, C.5
  • 32
    • 84901188390 scopus 로고    scopus 로고
    • Anovel user authentication and key agreement scheme for heterogeneous ad hoc wireless sensor networks, based on the Internet of Things notion
    • Sep
    • M. Turkanovic, B. Brumen, and M. Hölbl, Anovel user authentication and key agreement scheme for heterogeneous ad hoc wireless sensor networks, based on the Internet of Things notion, '' Ad Hoc Netw, vol. 20, pp. 96-112, Sep. 2014.
    • (2014) Ad Hoc Netw , vol.20 , pp. 96-112
    • Turkanovic, M.1    Brumen, B.2    Hölbl, M.3
  • 33
    • 84948714609 scopus 로고    scopus 로고
    • A secure light weight scheme for user authentication and key agreement in multi-gateway based wireless sensor networks
    • Jan
    • R. Amin and G. P. Biswas, A secure light weight scheme for user authentication and key agreement in multi-gateway based wireless sensor networks, '' Ad Hoc Netw, vol. 36, pp. 58-80, Jan. 2016.
    • (2016) Ad Hoc Netw , vol.36 , pp. 58-80
    • Amin, R.1    Biswas, G.P.2
  • 34
    • 84948712087 scopus 로고    scopus 로고
    • An efficient user authentication and key agreement scheme for heterogeneous wireless sensor network tailored for the Internet of Things environment
    • Jan
    • M. S. Farash, M. Turkanovic, M. Kumari, and S. Hölb, An efficient user authentication and key agreement scheme for heterogeneous wireless sensor network tailored for the Internet of Things environment, '' Ad Hoc Netw, vol. 36, pp. 152-176, Jan. 2016.
    • (2016) Ad Hoc Netw , vol.36 , pp. 152-176
    • Farash, M.S.1    Turkanovic, M.2    Kumari, M.3    Hölb, S.4
  • 35
    • 84962198336 scopus 로고    scopus 로고
    • A provably secure efficient and fiexible authentication scheme for ad hoc wireless sensor networks
    • Jan
    • C.-C. Chang and H. D. Le, A provably secure, efficient, and fiexible authentication scheme for ad hoc wireless sensor networks, '' IEEE Trans. Wireless Commun, vol. 15, no. 1, pp. 357-366, Jan. 2016.
    • (2016) IEEE Trans. Wireless Commun , vol.15 , Issue.1 , pp. 357-366
    • Chang, C.-C.1    Le, H.D.2
  • 36
    • 84973478502 scopus 로고    scopus 로고
    • An energy efficient mutual authentication and key agreement scheme preserving anonymity for wireless sensor networks
    • Art. no. 837
    • Y. Lu, L. Li, H. Peng, and Y. Yang, An energy efficient mutual authentication and key agreement scheme preserving anonymity for wireless sensor networks, '' Sensors, vol. 16, no. 6, 2016, Art. no. 837.
    • (2016) Sensors , vol.16 , Issue.6
    • Lu, Y.1    Li, L.2    Peng, H.3    Yang, Y.4
  • 37
    • 85009936481 scopus 로고    scopus 로고
    • An efficient authentication and key agreement scheme for multi-gateway wireless sensor networks in IoT deployment
    • Online]. Available
    • F. Wu, et al., An efficient authentication and key agreement scheme for multi-gateway wireless sensor networks in IoT deployment, '? J. Netw. Comput. Appl., 2016. [Online]. Available: http://dx.doi.org/10.1016/j.jnca.2016.12.008
    • (2016) J. Netw. Comput. Appl
    • Wu, F.1
  • 38
    • 84983380948 scopus 로고    scopus 로고
    • Provably secure user authentication and key agreement scheme for wireless sensor networks
    • Nov
    • A. K. Das, et al., Provably secure user authentication and key agreement scheme for wireless sensor networks, '' Secur. Commun. Netw, vol. 9, no. 16, pp. 3670-3687, Nov. 2016.
    • (2016) Secur. Commun. Netw , vol.9 , Issue.16 , pp. 3670-3687
    • Das, A.K.1
  • 39
    • 84979462212 scopus 로고    scopus 로고
    • Design of an anonymity-preserving three-factor authenticated key exchange protocol for wireless sensor networks
    • Jun
    • R. Amin, S. H. Islam, G. P. Biswas, M. K. Khan, L. Leng, and N. Kumar, Design of an anonymity-preserving three-factor authenticated key exchange protocol for wireless sensor networks, '' Comput. Netw, vol. 101, pp. 42-62, Jun. 2016.
    • (2016) Comput. Netw , vol.101 , pp. 42-62
    • Amin, R.1    Islam, S.H.2    Biswas, G.P.3    Khan, M.K.4    Leng, L.5    Kumar, N.6
  • 40
    • 85027949488 scopus 로고    scopus 로고
    • Robust biometrics-based authentication scheme for multiserver environment
    • Sep
    • D. He and D. Wang, Robust biometrics-based authentication scheme for multiserver environment, '' IEEE Syst. J, vol. 9, no. 3, pp. 816-823, Sep. 2015.
    • (2015) IEEE Syst. J , vol.9 , Issue.3 , pp. 816-823
    • He, D.1    Wang, D.2
  • 41
    • 84908157951 scopus 로고    scopus 로고
    • Applying biometrics to design threefactor remote user authentication scheme with key agreement
    • Oct
    • X. Li, J. Niu, Z. Wang, and C. Chen, Applying biometrics to design threefactor remote user authentication scheme with key agreement, '' Secur. Commun. Netw, vol. 7, no. 10, pp. 1488-1497, Oct. 2014.
    • (2014) Secur. Commun. Netw , vol.7 , Issue.10 , pp. 1488-1497
    • Li, X.1    Niu, J.2    Wang, Z.3    Chen, C.4
  • 42
    • 84958124876 scopus 로고    scopus 로고
    • Robust extended chaotic maps-based three-factor authentication scheme preserving biometric template privacy
    • Mar
    • Q. Jiang, F. Wei, S. Fu, J. Ma, G. Li, and A. Alelaiwi, Robust extended chaotic maps-based three-factor authentication scheme preserving biometric template privacy, '' Nonlinear Dyn, vol. 83, no. 4, pp. 2085-2101, Mar. 2016.
    • (2016) Nonlinear Dyn , vol.83 , Issue.4 , pp. 2085-2101
    • Jiang, Q.1    Wei, F.2    Fu, S.3    Ma, J.4    Li, G.5    Alelaiwi, A.6
  • 43
    • 84954436216 scopus 로고    scopus 로고
    • A privacy preserving three-factor authentication protocol for e-health clouds
    • Oct
    • Q. Jiang, M. K. Khan, X. Lu, J. Ma, and D. He, A privacy preserving three-factor authentication protocol for e-health clouds, '' J. Supercomput, vol. 72, no. 10, pp. 3826-3849, Oct. 2016.
    • (2016) J. Supercomput , vol.72 , Issue.10 , pp. 3826-3849
    • Jiang, Q.1    Khan, M.K.2    Lu, X.3    Ma, J.4    He, D.5
  • 44
    • 84976285479 scopus 로고    scopus 로고
    • On the security of a privacy-Aware authentication scheme for distributed mobile cloud computing services
    • to be published
    • Q. Jiang, J. Ma, and F. Wei, On the security of a privacy-Aware authentication scheme for distributed mobile cloud computing services, '' IEEE Syst. J., to be published, doi: 10.1109/JSYST.2016.2574719.
    • IEEE Syst. J
    • Jiang, Q.1    Ma, J.2    Wei, F.3
  • 45
    • 84953352636 scopus 로고    scopus 로고
    • A secure and robust temporal credential-based three-factor user authentication scheme for wireless sensor networks
    • Jan
    • A. K. Das, A secure and robust temporal credential-based three-factor user authentication scheme for wireless sensor networks, '' Peer-Peer Netw. Appl, vol. 9, no. 1, pp. 223-244, Jan. 2014.
    • (2014) Peer-Peer Netw. Appl , vol.9 , Issue.1 , pp. 223-244
    • Das, A.K.1
  • 46
    • 84921852751 scopus 로고    scopus 로고
    • A secure and effective biometric-based user authentication scheme for wireless sensor networks using smart card and fuzzy extractor
    • Jan
    • A. K. Das, A secure and effective biometric-based user authentication scheme for wireless sensor networks using smart card and fuzzy extractor, '? Int. J. Commun. Syst, vol. 30, no. 1, p. e2933, Jan. 2017, doi: 10.1002/dac.2933.
    • (2017) Int. J. Commun. Syst , vol.30 , Issue.1 , pp. e2933
    • Das, A.K.1
  • 47
    • 84929837704 scopus 로고    scopus 로고
    • A secure and efficient user anonymity-preserving three-factor authentication protocol for large-scale distributed wireless sensor networks
    • Jun
    • A. K. Das, A secure and efficient user anonymity-preserving three-factor authentication protocol for large-scale distributed wireless sensor networks, '? Wireless Pers. Commun, vol. 82, no. 3, pp. 1377-1404, Jun. 2015.
    • (2015) Wireless Pers. Commun , vol.82 , Issue.3 , pp. 1377-1404
    • Das, A.K.1
  • 48
    • 84982796257 scopus 로고    scopus 로고
    • An improved and provably secure three-factor user authentication scheme for wireless sensor networks
    • F. Wu, L. Xu, S. Kumari, and X. Li, An improved and provably secure three-factor user authentication scheme for wireless sensor networks, '? Peer-Peer Netw. Appl., 2016, doi: 10.1007/s12083-016-0485-9.
    • (2016) Peer-Peer Netw. Appl
    • Wu, F.1    Xu, L.2    Kumari, S.3    Li, X.4
  • 49
    • 84923405290 scopus 로고    scopus 로고
    • A new authentication protocol for healthcare applications using wireless medical sensor networks with user anonymity
    • Oct
    • X. Li, J. Niu, S. Kumari, J. Liao, W. Liang, and M. K. Khan, A new authentication protocol for healthcare applications using wireless medical sensor networks with user anonymity, '' Secur. Commun. Netw, vol. 9, no. 15, pp. 2643-2655, Oct. 2016.
    • (2016) Secur. Commun. Netw , vol.9 , Issue.15 , pp. 2643-2655
    • Li, X.1    Niu, J.2    Kumari, S.3    Liao, J.4    Liang, W.5    Khan, M.K.6
  • 50
    • 84988660486 scopus 로고    scopus 로고
    • A secure smartcardbased anonymous user authentication scheme for healthcare applications using wireless medical sensor networks
    • A. K. Das, A. K. Sutrala, V. Odelu, and A. Goswami, A secure smartcardbased anonymous user authentication scheme for healthcare applications using wireless medical sensor networks, '' Wireless Pers. Commun., 2016, doi: 10.1007/s11277-016-3718-6.
    • (2016) Wireless Pers. Commun
    • Das, A.K.1    Sutrala, A.K.2    Odelu, V.3    Goswami, A.4
  • 51
    • 0034822279 scopus 로고    scopus 로고
    • An efficient cryptographic protocol verifier based on prolog rules
    • Jun
    • B. Blanchet, An efficient cryptographic protocol verifier based on prolog rules, '' in Proc. IEEE Comput. Soc. Found. (CSFW), Jun. 2001, pp. 82-96.
    • (2001) Proc. IEEE Comput. Soc. Found. (CSFW , pp. 82-96
    • Blanchet, B.1
  • 53
    • 35048865463 scopus 로고    scopus 로고
    • Fuzzy extractors: How to generate strong keys from biometrics and other noisy data
    • Y. Dodis, L. Reyzin, and A. Smith, Fuzzy extractors: How to generate strong keys from biometrics and other noisy data, '' in Proc. EUROCRYPT, 2004, pp. 523-540.
    • (2004) Proc. EUROCRYPT , pp. 523-540
    • Dodis, Y.1    Reyzin, L.2    Smith, A.3
  • 55
    • 12344259813 scopus 로고    scopus 로고
    • BioHashing: Two factor authentication featuring fingerprint data and tokenised random number
    • Apr
    • A. T. B. Jin, D. N. C. Ling, and A. Goh, BioHashing: Two factor authentication featuring fingerprint data and tokenised random number, '? Pattern Recognit, vol. 37, no. 11, pp. 2245-2255, Apr. 2004.
    • (2004) Pattern Recognit , vol.37 , Issue.11 , pp. 2245-2255
    • Jin, A.T.B.1    Ling, D.N.C.2    Goh, A.3
  • 56
    • 33750533142 scopus 로고    scopus 로고
    • An improved BioHashing for human authentication
    • Mar
    • R. Lumini and L. Nanni, An improved BioHashing for human authentication, '? Pattern Recognit, vol. 40, no. 3, pp. 1057-1065, Mar. 2007.
    • (2007) Pattern Recognit , vol.40 , Issue.3 , pp. 1057-1065
    • Lumini, R.1    Nanni, L.2
  • 57
    • 0003614758 scopus 로고
    • Digitalized signatures and public-key functions as intractable as factorization
    • Cambridge, MA, USA, Tech. Rep
    • M. O. Rabin, Digitalized signatures and public-key functions as intractable as factorization, '' MIT Lab. Comput. Sci., Cambridge, MA, USA, Tech. Rep., 1979.
    • (1979) MIT Lab. Comput. Sci
    • Rabin, M.O.1
  • 58
    • 84883234825 scopus 로고    scopus 로고
    • Combining Rabin cryptosystem and error correction codes to facilitate anonymous authentication with un-Traceability for low-end devices
    • Oct
    • H.-Y. Chien, Combining Rabin cryptosystem and error correction codes to facilitate anonymous authentication with un-Traceability for low-end devices, '' Comput. Netw, vol. 57, no. 14, pp. 2705-2717, Oct. 2013.
    • (2013) Comput. Netw , vol.57 , Issue.14 , pp. 2705-2717
    • Chien, H.-Y.1
  • 59
    • 84975275069 scopus 로고    scopus 로고
    • Anonymous two-factor authentication in distributed systems: Certain goals are beyond attainment
    • Jul./Aug
    • D. Wang, D. He, P. Wang, and C.-H. Chu, Anonymous two-factor authentication in distributed systems: Certain goals are beyond attainment, '' IEEE Trans. Depend. Sec. Comput, vol. 12, no. 4, pp. 428-442, Jul./Aug. 2015.
    • (2015) IEEE Trans. Depend. Sec. Comput , vol.12 , Issue.4 , pp. 428-442
    • Wang, D.1    He, D.2    Wang, P.3    Chu, C.-H.4
  • 60
    • 85038117533 scopus 로고    scopus 로고
    • Two birds with one stone: Two-factor authentication with security beyond conventional bound
    • to be published
    • D. Wang and P. Wang, Two birds with one stone: Two-factor authentication with security beyond conventional bound, '' IEEE Trans. Depend. Sec. Comput., to be published, doi: 10.1109/TDSC.2016.2605087.
    • IEEE Trans. Depend. Sec. Comput
    • Wang, D.1    Wang, P.2
  • 61
    • 84979688615 scopus 로고    scopus 로고
    • The request for better measurement: A comparative evaluation of two-factor authentication schemes
    • May
    • D. Wang, Q. Gu, H. Cheng, and P. Wang, The request for better measurement: A comparative evaluation of two-factor authentication schemes, '? in Proc. 11th ACM Asia Conf. Comput. Commun. Secur., May 2016, pp. 475-486.
    • (2016) Proc. 11th ACM Asia Conf. Comput. Commun. Secur , pp. 475-486
    • Wang, D.1    Gu, Q.2    Cheng, H.3    Wang, P.4
  • 62
    • 84939573910 scopus 로고    scopus 로고
    • Differential power analysis
    • Santa Barbara, CA, USA Aug
    • P. C. Kocher, J. Jaffe, and B. Jun, Differential power analysis, '' in Proc. Adv. Cryptol., Santa Barbara, CA, USA, Aug. 1999, pp. 388-397.
    • (1999) Proc. Adv. Cryptol , pp. 388-397
    • Kocher, P.C.1    Jaffe, J.2    Jun, B.3
  • 63
    • 0036566408 scopus 로고    scopus 로고
    • Examining smart-card security under the threat of power analysis attacks
    • May
    • T. S. Messerges, E. A. Dabbish, and R. H. Sloan, Examining smart-card security under the threat of power analysis attacks, '' IEEE Trans. Comput, vol. 51, no. 5, pp. 541-552, May 2002.
    • (2002) IEEE Trans. Comput , vol.51 , Issue.5 , pp. 541-552
    • Messerges, T.S.1    Dabbish, E.A.2    Sloan, R.H.3
  • 64
    • 84945181077 scopus 로고    scopus 로고
    • Security of the J-PAKE password-Authenticated key exchange protocol
    • May
    • M. Abdalla, F. Benhamouda, and P. MacKenzie, Security of the J-PAKE password-Authenticated key exchange protocol, '' in Proc. IEEE S&P, May 2015, pp. 571-587.
    • (2015) Proc. IEEE S&P , pp. 571-587
    • Abdalla, M.1    Benhamouda, F.2    MacKenzie, P.3
  • 65
    • 85000869991 scopus 로고    scopus 로고
    • A secure anonymous authentication protocol for mobile services on elliptic curve cryptography
    • A. G. Reddy, A. K. Das, E. J. Yoon, and K.-Y. Yoo, A secure anonymous authentication protocol for mobile services on elliptic curve cryptography, '? IEEE Access, vol. 4, pp. 4394-4407, 2016.
    • (2016) IEEE Access , vol.4 , pp. 4394-4407
    • Reddy, A.G.1    Das, A.K.2    Yoon, E.J.3    Yoo, K.-Y.4
  • 66
    • 84983268338 scopus 로고    scopus 로고
    • Towards efficient content-Aware search over encrypted outsourced data in cloud
    • San Francisco, CA, USA, Apr
    • Z. Fu, X. Sun, S. Ji, and G. Xie, Towards efficient content-Aware search over encrypted outsourced data in cloud, '' in Proc. 35th Annu. IEEE Int. Conf. Comput. Commun. (IEEE INFOCOM), San Francisco, CA, USA, Apr. 2016, pp. 1-9, doi: 10.1109/INFOCOM.2016.7524606.
    • (2016) Proc. 35th Annu. IEEE Int. Conf. Comput. Commun. (IEEE INFOCOM , pp. 1-9
    • Fu, Z.1    Sun, X.2    Ji, S.3    Xie, G.4
  • 67
    • 84991088919 scopus 로고    scopus 로고
    • Toward efficient multikeyword fuzzy search over encrypted outsourced data with accuracy improvement
    • Dec
    • Z. Fu, X. Wu, C. Guan, X. Sun, and K. Ren, Toward efficient multikeyword fuzzy search over encrypted outsourced data with accuracy improvement, '' IEEE Trans. Inf. Forensics Security, vol. 11, no. 12, pp. 2706-2716, Dec. 2016.
    • (2016) IEEE Trans. Inf. Forensics Security , vol.11 , Issue.12 , pp. 2706-2716
    • Fu, Z.1    Wu, X.2    Guan, C.3    Sun, X.4    Ren, K.5
  • 68
    • 84962448916 scopus 로고    scopus 로고
    • A secure and dynamic multikeyword ranked search scheme over encrypted cloud data
    • Jan
    • Z. Xia, X. Wang, X. Sun, and Q. Wang, A secure and dynamic multikeyword ranked search scheme over encrypted cloud data, '' IEEE Trans. Parallel Distrib. Syst, vol. 27, no. 2, pp. 340-352, Jan. 2016.
    • (2016) IEEE Trans. Parallel Distrib. Syst , vol.27 , Issue.2 , pp. 340-352
    • Xia, Z.1    Wang, X.2    Sun, X.3    Wang, Q.4
  • 69
    • 84986631527 scopus 로고    scopus 로고
    • A privacypreserving and copy-deterrence content-based image retrieval scheme in cloud computing
    • Nov
    • Z. Xia, X. Wang, L. Zhang, Z. Qin, X. Sun, and K. Ren, A privacypreserving and copy-deterrence content-based image retrieval scheme in cloud computing, '' IEEE Trans. Inf. Forensics Security, vol. 11, no. 11, pp. 2594-2608, Nov. 2016.
    • (2016) IEEE Trans. Inf. Forensics Security , vol.11 , Issue.11 , pp. 2594-2608
    • Xia, Z.1    Wang, X.2    Zhang, L.3    Qin, Z.4    Sun, X.5    Ren, K.6
  • 71
    • 84963856290 scopus 로고    scopus 로고
    • Efficient implementation of NIST-compliant elliptic curve cryptography for 8-bit AVR-based sensor nodes
    • Jul
    • Z. Liu, H. Seo, J. Groÿschädl, and H. Kim, Efficient implementation of NIST-compliant elliptic curve cryptography for 8-bit AVR-based sensor nodes, '' IEEE Trans. Inf. Forensics Security, vol. 11, no. 7, pp. 1385-1397, Jul. 2016.
    • (2016) IEEE Trans. Inf. Forensics Security , vol.11 , Issue.7 , pp. 1385-1397
    • Liu, Z.1    Seo, H.2    Groÿschädl, J.3    Kim, H.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.