A Biometric-based User Authentication and Key Agreement Scheme for Heterogeneous Wireless Sensor Networks |
Chen, Ying
(School of Software, Nanchang Hangkong University)
Ge, Yangming (School of Software, Nanchang Hangkong University) Wang, Wenyuan (School of Software, Nanchang Hangkong University) Yang, Fengyu (School of Software, Nanchang Hangkong University) |
1 | X. Li, M. H. Ibrahim and S. Kumari, "Anonymous mutual authentication and key agreement scheme for wearable sensors in wireless body area networks," Computer Networks, 2017. |
2 | X. Li, J. Niu and S. Kumari, "A Three-factor Anonymous Authentication Scheme for Wireless Sensor Networks in Internet of Things Environments," Journal of Network & Computer Applications, article in press. |
3 | J. Srinivas, S. M. D. Mukhopadhyay, "Secure and efficient user authentication scheme for multi-gateway wireless sensor networks," Ad Hoc Networks, vol.54, pp.147-169, 2017. DOI |
4 | W. H. Wong, Y. Zheng and J. Cao, "A Dynamic User Authentication Scheme for Wireless Sensor Networks," in Proc. of IEEE Conf. on Sensor Networks, Ubiquitous, and Trustworthy Computing,vol.1,pp.244-151, 2006. |
5 | M. L. Das,"Two-factor user authentication in wireless sensor networks," IEEE Transactions on Wireless Communications, vol.8, no.3, pp.1086-1090,2009. DOI |
6 | T.H. Chen and W. K. Shih,"A Robust Mutual Authentication Protocol for Wireless Sensor Networks," Etri Journal, vol.32, no.5, pp.704-712, 2010. DOI |
7 | C. T. Li, M. S. Hwang, "An efficient biometrics-based remote user authentication scheme using smart cards," Journal of Network & Computer Applications, vol.33, no.1, pp.1-5,2010. DOI |
8 | J.J Yuan and J. Jiang,"A Biometric-Based User Authentication for Wireless Sensor Networks," Wuhan University Journal of Natural Sciences, vol.15, no.3, pp.272-276, 2010. DOI |
9 | C. Wang, X, Zhang and Z. Zheng, "Cryptanalysis and Improvement of a Biometric-Based Multi-Server Authentication and Key Agreement Scheme," Plos One, vol.11, no.2, 2016. |
10 | A. K. Das, "A secure and effective biometric-based user authentication scheme for wireless sensor networks using smart card and fuzzy extractor," International Journal of Communication Systems, pp.1-15, 2015. |
11 | Y. Dodis, B. Kanukurthi and J. Katz, "Robust Fuzzy Extractors and Authenticated Key Agreement From Close Secrets," IEEE Transactions on Information Theory, vol.58, no.9, pp.6207-6222, 2012. DOI |
12 | J. H. Yoon and J. H. Kim,"A closed-form analytic correction to the Black-Scholes-Merton price for perpetual American options," Applied Mathematics Letters, vol.26, no.12, pp.1146-1150, 2013. DOI |
13 | H. J. Mahanta, A. K. Azad and A. K. Khan, "Power analysis attack: A vulnerability to smart card security," in Proc. of International Conf. on Signal Processing and Communication Engineering Systems, pp.506-510, 2015. |
14 | T. Hasegawa, J. Nakajima and M. Matsui, "A practical implementation of elliptic curve cryptosystems over GF(p) on a 16-bit microcomputer," in Proc. of International Workshop on Public Key Cryptography.Spring Berlin Heidelberg, pp.182-194, 1998. |
15 | P. Mohit, R. Amin, A. Karati, et al. "A standard mutual authentication protocol for cloud comput- ing based health care system," vol.41, no.4, pp.1-13, 2017. DOI |
16 | Advanced Encryption Standard (AES). Retrieved on June 26, 2017 |
17 | E. J. Yoon and K. Y. Yoo, "Cryptanalysis of robust mutual authentication protocol for wireless sensor networks," in Proc. of IEEE International Conf. on Cognitive Informatics and Cognitive Computing, pp.392-369, 2011. |
18 | K. Neal, M Alfred, V. Scott., "The State of Elliptic Curve Cryptography," Designs Codes & Cryptography, vol.19, no.2, pp.173-193, 2000. DOI |
19 | Secure hash standard. Retrieved on June 26, 2017 from Article (CrossRef Link) |
20 | H. L. Yeh, T. H. Chen and P.C. Liu, "A Secured Authentication Protocol for Wireless Sensor Networks Using Elliptic Curves Cryptography," Sensors, vol.11, no.5, pp.4767-4779, 2011. DOI |
21 | X. Li, J. W. Niu, J. Ma, et al. "Cryptanalysis and improvement of a biometrics-based remote user authentication scheme using smart cards," Journal of Network & Computer Applications, vol. 34, no. 1, pp.73-79, 2011. DOI |
22 | D. He,"Robust biometric-based user authentication scheme for wireless sensor networks," Ad hoc & Sensor Wireless Networks, vol.25, no.3, pp.309-321, 2012. |
23 | E. J. Yoon and C. Kim, "Advanced Biometric-Based User Authentication Scheme for Wireless Sensor Networks," Sensor Letters, vol.11, no.9, pp.1836-1843, 2013. DOI |
24 | W. Shi and P. Gong, "A New User Authentication Protocol for Wireless Sensor Networks Using Elliptic Curves Cryptography," International Journal of Distributed Sensor Networks, no.730831, pp.51-59, 2013. |
25 | K. Xue, C. Ma and P. Hong, "A temporal-credential-based mutual authentication and key agreement scheme for wireless sensor networks," Journal of Network & Computer Applications, vol.36, no.1, pp.316-323, 2013. DOI |
26 | I. P. Chang, T. F. Lee, T. H. Lin, et al. "Enhanced Two-Factor Authentication and Key Agreement Using Dynamic Identities in Wireless Sensor Networks," Sensors, vol.15, no.12, pp.29841-29854, 2015. DOI |
27 | Y. Choi, D. Lee, J. Kim, et al. "Security Enhanced User Authentication Protocol for Wireless Sensor Networks Using Elliptic Curves Cryptography," Sensors, vol.14, no.6, pp. 10081, 2014. DOI |
28 | D. Wang and P. Wang,"On the anonymity of two-factor authentication schemes for wireless sensor networks: Attacks, principle and solutions," Computer Networks, vol.73, pp.41-57, 2014. DOI |
29 | K. Sheetal and K. S. Sandeep,"Advanced password based authentication scheme for wireless sensor networks," Journal of Information Security and Applications, vol.20, pp.37-46, 2015. DOI |
30 | Y. Choi, Y. Lee and D. Won, "Security improvement on biometric based authentication scheme for wireless sensor networks using fuzzy extraction," International Journal of Distributed Sensor Networks, vol.2016, no.4, pp.1-16, 2016. |
31 | Y. H. Park, S. Y. Lee and C. K. Kim,"Secure biometric-based authentication scheme with smart card revocation/reissue for wireless sensor networks," International Journal of Distributed Sensor Networks, vol.12, no.7, 2016. |
32 | C. C. Chang, W. Y. Hsueh and T. F. Cheng, "A Dynamic User Authentication and Key Agreement Scheme for Heterogeneous Wireless Sensor Networks," Wireless Personal Communications, vol.89, no.2, pp.447-465, 2016. DOI |
33 | J. Moon, D. Lee and Y. Lee, "Improving Biometric-Based Authentication Schemes with Smart Card Revocation/Reissue for Wireless Sensor Networks," Sensors, vol.17, no.5, pp.1-24, 2017. DOI |
34 | S. Kumari, M. K. Khan and M. Atiquzzaman,"User authentication schemes for wireless sensor networks: A review," Ad Hoc Networks, vol.27, pp.159-194, 2015. DOI |
35 | M. S. Farash, M. Turkanovic and S. Kumari, "An efficient user authentication and key agreement scheme for heterogeneous wireless sensor network tailored for the Internet of Things environment," Ad Hoc Networks,vol.36,pp.152-176, 2016. DOI |
36 | Y. T. Tsou, C. S. Lu and S. Y. Kuo,"SER: Secure and efficient retrieval for anonymous range query in wireless sensor networks," Computer Communications, vol.108, pp.1-16, 2017. DOI |