A three-factor anonymous authentication scheme for wireless sensor networks in internet of things environments

Journal of Network and Computer Applications - Tập 103 - Trang 194-204 - 2018
Xiong Li1,2, Jianwei Niu2, Saru Kumari3, Fan Wu4, Arun Kumar Sangaiah5, Kim‐Kwang Raymond Choo6
1School of Computer Science and Engineering, Hunan University of Science and Technology, Xiangtan, 411201, China
2State Key Laboratory of Virtual Reality Technology and Systems, School of Computer Science and Engineering, Beihang University, Beijing 100191, China
3Department of Mathematics, Ch. Charan Singh University, Meerut, Uttar Pradesh, India
4Department of Computer Science and Engineering, Xiamen Institute of Technology, Xiamen 361021, China
5School of Computing Science and Engineering, VIT University, Vellore, Tamilnadu 632014, India
6Department of Information Systems and Cyber Security, University of Texas at San Antonio, San Antonio, TX 78249, USA

Tóm tắt

Từ khóa


Tài liệu tham khảo

Akyildiz, 2002, Wireless sensor networks: a survey, Comput. Netw., 38, 393, 10.1016/S1389-1286(01)00302-4

Atzori, 2010, The internet of things: a survey, Comput. Netw., 54, 2787, 10.1016/j.comnet.2010.05.010

Burrows, M., Abadi, M., Needham, R.M., 1989. A logic of authentication. In: Proceedings of the Royal Society of London A: Mathematical, Physical and Engineering Sciences, volume 426, The Royal Society, pp. 233–271.

Choi, 2014, Security enhanced user authentication protocol for wireless sensor networks using elliptic curves cryptography, Sensors, 14, 10081, 10.3390/s140610081

Das, 2009, Two-factor user authentication in wireless sensor networks, IEEE Trans. Wirel. Commun., 8, 1086, 10.1109/TWC.2008.080128

Fu, 2017, Privacy-preserving smart semantic search based on conceptual graphs over encrypted outsourced data, IEEE Trans. Inf. Forensics Secur., 12, 1874, 10.1109/TIFS.2017.2692728

He, 2010, An enhanced two-factor user authentication scheme in wireless sensor networks, Ad hoc Sens. Wirel. Netw., 10, 361

He, 2015, A secure temporal-credential-based mutual authentication and key agreement scheme with pseudo identity for wireless sensor networks, Inf. Sci., 321, 263, 10.1016/j.ins.2015.02.010

Heinzelman, 2002, An application-specific protocol architecture for wireless microsensor networks, IEEE Trans. Wirel. Commun., 1, 660, 10.1109/TWC.2002.804190

Jiang, 2015, An efficient two-factor user authentication scheme with unlinkability for wireless sensor networks, Peer-to-Peer Netw. Appl., 8, 1070, 10.1007/s12083-014-0285-z

Jiang, 2016, An untraceable temporal-credential-based two-factor authentication scheme using ecc for wireless sensor networks, J. Netw. Comput. Appl., 76, 37, 10.1016/j.jnca.2016.10.001

Juels, A., Wattenberg, M., 1999. A fuzzy commitment scheme. In: Proceedings of the 6th ACM conference on Computer and communications security. ACM, pp. 28–36.

Khan, 2010, Cryptanalysis and security improvements of two-factor user authentication in wireless sensor networks, Sensors, 10, 2450, 10.3390/s100302450

Kocher, P., Jaffe, J., Jun, B., 1999. Differential power analysis. In: Annual International Cryptology Conference, Springer, pp. 388–397.

Kong, 2017, A belief propagation-based method for task allocation in open and dynamic cloud environments, Knowl.-Based Syst., 115, 123, 10.1016/j.knosys.2016.10.016

Li, 2013, An enhanced smart card based remote user password authentication scheme, J. Netw. Comput. Appl., 36, 1365, 10.1016/j.jnca.2013.02.034

Li, 2013, A novel smart card and dynamic id based remote user authentication scheme for multi-server environments, Math. Comput. Model., 58, 85, 10.1016/j.mcm.2012.06.033

Li, 2015, Cryptanalysis of a dynamic identity-based remote user authentication scheme with verifiable password update, Int. J. Commun. Syst., 28, 374, 10.1002/dac.2676

Li, 2015, An enhancement of a smart card authentication scheme for multi-server architecture, Wirel. Personal. Commun., 80, 175, 10.1007/s11277-014-2002-x

Messerges, 2002, Examining smart-card security under the threat of power analysis attacks, IEEE Trans. Comput., 51, 541, 10.1109/TC.2002.1004593

Shen, 2016, A lightweight multi-layer authentication protocol for wireless body area networks, Future Gener. Comput. Syst.

Shen, 2017, An efficient public auditing protocol with novel dynamic structure for cloud data, IEEE Trans. Inf. Forensics Secur., 10.1109/TIFS.2017.2705620

Shen, 2017, A secure cloud-assisted urban data sharing framework for ubiquitous-cities, Pervasive Mob. Comput., 10.1016/j.pmcj.2017.03.013

Shi, 2013, A new user authentication protocol for wireless sensor networks using elliptic curves cryptography, Int. J. Distrib. Sens. Netw., 10.1155/2013/730831

Wang, 2015, Anonymous two-factor authentication in distributed systems: certain goals are beyond attainment, IEEE Trans. Dependable Secur. Comput., 12, 428, 10.1109/TDSC.2014.2355850

Wang, 2015, Preserving privacy for free: efficient and provably secure two-factor authentication scheme with user anonymity, Inf. Sci., 321, 162, 10.1016/j.ins.2015.03.070

Wu, 2016, A novel and provably secure authentication and key agreement scheme with user anonymity for global mobility networks, Secur. Commun. Netw., 9, 3527, 10.1002/sec.1558

Xia, 2016, A privacy-preserving and copy-deterrence content-based image retrieval scheme in cloud computing, IEEE Trans. Inf. Forensics Secur., 11, 2594, 10.1109/TIFS.2016.2590944

Xia, 2016, A secure and dynamic multi-keyword ranked search scheme over encrypted cloud data, IEEE Trans. Parallel Distrib. Syst., 27, 340, 10.1109/TPDS.2015.2401003

Xue, 2013, A temporal-credential-based mutual authentication and key agreement scheme for wireless sensor networks, J. Netw. Comput. Appl., 36, 316, 10.1016/j.jnca.2012.05.010

Yeh, 2011, A secured authentication protocol for wireless sensor networks using elliptic curves cryptography, Sensors, 11, 4767, 10.3390/s110504767