Privacy Vulnerability Analysis on Shuai et al.'s Anonymous Authentication Scheme for Smart Home Environment |
Choi, Hae-Won
(Department of Innovation Management, DGIST)
Kim, Sangjin (Department of Aeronautical Computer Engineering, Kyungwoon University) Jung, Young-Seok (Department of Aeronautical Computer Engineering, Kyungwoon University) Ryoo, Myungchun (Department of Aeronautical Computer Engineering, Kyungwoon University) |
1 | H. Kim. (2017). Data Centric Security and Privacy Research Issues for Intelligent Internet of Things. ICSES Interdisciplinary Transactions on Cloud Computing, IoT, and Big Data, 1(1), 1-2. |
2 | Y. Kim. (2019). A Study on Smart Contract for Personal Information Protection. Journal of Digital Convergence, 17(3), 215-220. DOI |
3 | H. Kim. (2019). Research Issues on Data Centric Security and Privacy Model for Intelligent Internet of Things based Healthcare. ICSES Transactions on Computer Networks and Communications, 5(2), 1-3. |
4 | B. Vaidya, J. H. Park, S. S. Yeo & J. Rodrigues. (2011). Robust one-time password authentication scheme using smart card for home network environment. Computer Communications, 34, 326-336. DOI |
5 | H. J. Kim & H. S. Kim. (2011). Auth hotp-hotp based authentication scheme over home network environment. Lecture Notes in Computer Science, 6784, 622-637. |
6 | B. Vaidya, D. Makrakis & H. T. Mouftah. (2011). Device authentication mechanism for smart energy home area networks. Proc. of IEEE International Conference on Consumer Electronics, 787-788. |
7 | I. H. Cho & K. H. Lee. (2019). A Scheme of User Face Recognition using a Moire Phenomenon in IoT Environment. Journal of Digital Convergence, 17(2), 171-176. DOI |
8 | F. K. Santoso & N. C. H. Vun. (2015). Securing IoT for smart home system, Proc. of IEEE International Symposium on Consumer Electronics, 1-2. |
9 | H. W. Choi, S. Kim & M. Ryoo. (2019). Cryptanalysis and Solution on Secure Communication Scheme for Healthcare System using Wearable Devices, Journal of Digital Convergence, 17(2), 187-194. DOI |
10 | W. J. Lee, K. W. Kim & H. Kim. (2012). Ticket-Based Authentication Protocol Using Attribute Information over Home Network. IEMEK Journal of Embedded Systems Applications, 7(1), 53-59. DOI |
11 | M. Shuai, N. Yu, H. Wang & L. Xiong. (2019). Anonymous authentication scheme for smart home environment with provable security. Computers & Security, 86, 132-146. DOI |
12 | T. M. Song & S. H. Jang, (2011), u-Healthcare : Issue and Research Trends, Korea Institute for Health and Social Affairs, pp. 119-129. |
13 | H. Kim, E. K. Ryu & S. W. Lee, (2011), Security Considerations on Cognitive Radio based on Body Area Networks for u-Healthcare, Journal of Security Engineering, Vol. 10, No. 1, pp. 9-20. |
14 | S. Y. Mun, Y. M. Yun, T. H. Han, S. E. Lee, H. J. Chang, S. Y. Song&H. C. Kim, (2017),Public Awareness of Digital Healthcare Services, Journal of Digital Convergence, Vol. 18, No. 4, pp. 621-629. |
15 | J. E. Song, S. H. Kim, M. A. Chung & K. I, Chung, (2007), Security issues and its technology trends in u-Healthcare, Electronics and Telecommunications Trends, Vol. 22, No. 1, pp. 119-129. |