$\require{mediawiki-texvc}$

연합인증

연합인증 가입 기관의 연구자들은 소속기관의 인증정보(ID와 암호)를 이용해 다른 대학, 연구기관, 서비스 공급자의 다양한 온라인 자원과 연구 데이터를 이용할 수 있습니다.

이는 여행자가 자국에서 발행 받은 여권으로 세계 각국을 자유롭게 여행할 수 있는 것과 같습니다.

연합인증으로 이용이 가능한 서비스는 NTIS, DataON, Edison, Kafe, Webinar 등이 있습니다.

한번의 인증절차만으로 연합인증 가입 서비스에 추가 로그인 없이 이용이 가능합니다.

다만, 연합인증을 위해서는 최초 1회만 인증 절차가 필요합니다. (회원이 아닐 경우 회원 가입이 필요합니다.)

연합인증 절차는 다음과 같습니다.

최초이용시에는
ScienceON에 로그인 → 연합인증 서비스 접속 → 로그인 (본인 확인 또는 회원가입) → 서비스 이용

그 이후에는
ScienceON 로그인 → 연합인증 서비스 접속 → 서비스 이용

연합인증을 활용하시면 KISTI가 제공하는 다양한 서비스를 편리하게 이용하실 수 있습니다.

[해외논문] LAKS-NVT: Provably Secure and Lightweight Authentication and Key Agreement Scheme Without Verification Table in Medical Internet of Things 원문보기

IEEE access : practical research, open solutions, v.8, 2020년, pp.119387 - 119404  

Park, Kisung (Electronics and Telecommunications Research Institute, Blockchain Technology Research Center, Daejeon, South Korea) ,  Noh, Sungkee (Electronics and Telecommunications Research Institute, Blockchain Technology Research Center, Daejeon, South Korea) ,  Lee, Hyunjin (Electronics and Telecommunications Research Institute, Blockchain Technology Research Center, Daejeon, South Korea) ,  Das, Ashok Kumar (International Institute of Information Technology, Center for Security, Theory, and Algorithmic Research, Hyderabad, India) ,  Kim, Myeonghyun (Kyungpook National University, School of Electronics Engineering, Daegu, South Korea) ,  Park, Youngho (Kyungpook National University, School of Electronics Engineering, Daegu, South Korea) ,  Wazid, Mohammad (Graphic Era Deemed to be University, Dehradun, India)

Abstract AI-Helper 아이콘AI-Helper

Wireless body area networks (WBANs) and wireless sensor networks (WSNs) are important concepts for the Internet of Things (IoT). They have been applied to various healthcare services to ensure that users can access convenient medical services by exchanging physiological data between user and medical...

참고문헌 (56)

  1. Chin-Chen Chang, Hai-Duong Le. A Provably Secure, Efficient, and Flexible Authentication Scheme for Ad hoc Wireless Sensor Networks. IEEE transactions on wireless communications, vol.15, no.1, 357-366.

  2. Turkanovic, M., Brumen, B., Holbl, M.. A novel user authentication and key agreement scheme for heterogeneous ad hoc wireless sensor networks, based on the Internet of Things notion. Ad hoc networks, vol.20, 96-112.

  3. Barman, Subhas, Das, Ashok Kumar, Samanta, Debasis, Chattopadhyay, Samiran, Rodrigues, Joel J. P. C., Park, Youngho. Provably Secure Multi-Server Authentication Protocol Using Fuzzy Commitment. IEEE access : practical research, open solutions, vol.6, 38578-38594.

  4. Abdalla, M., Fouque, P.-A., Pointcheval, D.. Password-Based Authenticated Key Exchange in the Three-Party Setting. Lecture notes in computer science, vol.3386, 65-84.

  5. Dolev, D., Yao, A.. On the security of public key protocols. IEEE transactions on information theory, vol.29, no.2, 198-208.

  6. Xu, Zisang, Xu, Cheng, Liang, Wei, Xu, Jianbo, Chen, Haixian. A Lightweight Mutual Authentication and Key Agreement Scheme for Medical Internet of Things. IEEE access : practical research, open solutions, vol.7, 53922-53931.

  7. Automated Validation of Internet Security Protocols and Applications 2019 

  8. Burrows, Michael, Abadi, Martin, Needham, Roger. A logic of authentication. ACM transactions on computer systems, vol.8, no.1, 18-36.

  9. Das, Ashok Kumar, Wazid, Mohammad, Kumar, Neeraj, Khan, Muhammad Khurram, Choo, Kim-Kwang Raymond, Park, YoungHo. Design of Secure and Lightweight Authentication Protocol for Wearable Devices Environment. IEEE journal of biomedical and health informatics, vol.22, no.4, 1310-1322.

  10. Park, Kisung, Park, Youngho, Das, Ashok Kumar, Yu, Sungjin, Lee, Joonyoung, Park, Yohan. A Dynamic Privacy-Preserving Key Management Protocol for V2G in Social Internet of Things. IEEE access : practical research, open solutions, vol.7, 76812-76832.

  11. Li, Xiong, Ibrahim, Maged Hamada, Kumari, Saru, Sangaiah, Arun Kumar, Gupta, Vidushi, Choo, Kim-Kwang Raymond. Anonymous mutual authentication and key agreement scheme for wearable sensors in wireless body area networks. Computer networks, vol.129, no.2, 429-443.

  12. Ibrahim, M.H., Kumari, S., Das, A.K., Wazid, M., Odelu, V.. Secure anonymous mutual authentication for star two-tier wireless body area networks. Computer methods and programs in biomedicine, vol.135, 37-50.

  13. Li, Xiong, Niu, Jianwei, Kumari, Saru, Wu, Fan, Choo, Kim-Kwang Raymond. A robust biometrics based three-factor authentication scheme for Global Mobility Networks in smart city. Future generation computer systems : FGCS, vol.83, 607-618.

  14. Zimmerman, T. G.. Personal Area Networks: Near-field intrabody communication. IBM systems journal, vol.35, no.3, 609-617.

  15. More Than Half of Major New Business Processes and Systems Will Incorporate Some Element of the Internet of Things van der meulen 2016 

  16. Ad Hoc Sensor Wireless Netw An enhanced access control scheme in wireless sensor networks chatterjee 2014 21 121 

  17. Srinivas, Jangirala, Das, Ashok Kumar, Kumar, Neeraj, Rodrigues, Joel J. P. C.. Cloud Centric Authentication for Wearable Healthcare Monitoring System. IEEE transactions on dependable and secure computing, vol.17, no.5, 942-956.

  18. Wazid, Mohammad, Das, Ashok Kumar, Kumari, Saru, Li, Xiong, Wu, Fan. Design of an efficient and provably secure anonymity preserving three‐factor user authentication and key agreement scheme for TMIS. Security and communication networks, vol.9, no.13, 1983-2001.

  19. Jingwei Liu, Zonghua Zhang, Xiaofeng Chen, Kyung Sup Kwak. Certificateless Remote Anonymous Authentication Schemes for WirelessBody Area Networks. IEEE transactions on parallel and distributed systems : a publication of the IEEE Computer Society, vol.25, no.2, 332-342.

  20. Odelu, Vanga, Das, Ashok Kumar, Goswami, Adrijit. SEAP: Secure and efficient authentication protocol for NFC applications using pseudonyms. IEEE transactions on consumer electronics, vol.62, no.1, 30-38.

  21. Xu, Zisang, Xu, Cheng, Chen, Haixian, Yang, Fang. A lightweight anonymous mutual authentication and key agreement scheme for WBAN. Concurrency and computation : practice & experience, vol.31, no.14, e5295-.

  22. Zhao, Zhenguo. An Efficient Anonymous Authentication Scheme for Wireless Body Area Networks Using Elliptic Curve Cryptosystem. Journal of medical systems, vol.38, no.2, 13-.

  23. The Network Simulator-ns-2 2020 

  24. Wazid, Mohammad, Das, Ashok Kumar, Kumar, Neeraj, Vasilakos, Athanasios V.. Design of secure key management and user authentication scheme for fog computing services. Future generation computer systems : FGCS, vol.91, 475-492.

  25. Chen, Chien-Ming, Wang, King-Hang, Yeh, Kuo-Hui, Xiang, Bin, Wu, Tsu-Yang. Attacks and solutions on a three-party password-based authenticated key exchange protocol for wireless communications. Journal of ambient intelligence and humanized computing, vol.10, no.8, 3133-3142.

  26. 10.1109/MCSA.1999.749281 

  27. Li, C.T., Hwang, M.S., Chu, Y.P.. A secure and efficient communication scheme with authenticated key establishment and privacy preserving for vehicular ad hoc networks. Computer communications, vol.31, no.12, 2803-2814.

  28. Chandrakar, P., Om, H.. A secure and robust anonymous three-factor remote user authentication scheme for multi-server environment using ECC. Computer communications, vol.110, 26-34.

  29. Wazid, Mohammad, Bagga, Palak, Das, Ashok Kumar, Shetty, Sachin, Rodrigues, Joel J. P. C., Park, Youngho. AKM-IoV: Authenticated Key Management Protocol in Fog Computing-Based Internet of Vehicles Deployment. IEEE Internet of things journal : a joint publication of the IEEE Sensors Council, the IEEE Communications Society, the IEEE Computer Society, the IEEE Signal Processing Society, vol.6, no.5, 8804-8817.

  30. Das, Ashok Kumar. A secure and effective biometric‐based user authentication scheme for wireless sensor networks using smart card and fuzzy extractor. International journal of communication systems, vol.30, no.1, e2933-.

  31. Chen, Ying, Ge, Yangming, Wang, Yerong, Zeng, Zhuang. An Improved Three-Factor User Authentication and Key Agreement Scheme for Wireless Medical Sensor Networks. IEEE access : practical research, open solutions, vol.7, 85440-85451.

  32. Li, Xiong, Peng, Jieyao, Niu, Jianwei, Wu, Fan, Liao, Junguo, Choo, Kim-Kwang Raymond. A Robust and Energy Efficient Authentication Protocol for Industrial Internet of Things. IEEE Internet of things journal : a joint publication of the IEEE Sensors Council, the IEEE Communications Society, the IEEE Computer Society, the IEEE Signal Processing Society, vol.5, no.3, 1606-1615.

  33. Lee, JoonYoung, Yu, SungJin, Park, KiSung, Park, YoHan, Park, YoungHo. Secure Three-Factor Authentication Protocol for Multi-Gateway IoT Environments. Sensors, vol.19, no.10, 2358-.

  34. Challa, Sravani, Wazid, Mohammad, Das, Ashok Kumar, Kumar, Neeraj, Goutham Reddy, Alavalapati, Yoon, Eun-Jun, Yoo, Kee-Young. Secure Signature-Based Authenticated Key Establishment Scheme for Future IoT Applications. IEEE access : practical research, open solutions, vol.5, 3028-3043.

  35. Wazid, Mohammad, Das, Ashok Kumar, Hussain, Rasheed, Succi, Giancarlo, Rodrigues, Joel J.P.C.. Authentication in cloud-driven IoT-based big data environment: Survey and outlook. Journal of systems architecture : JSA : the Euromicro journal, vol.97, 185-196.

  36. Das, Ashok Kumar, Wazid, Mohammad, Kumar, Neeraj, Vasilakos, Athanasios V., Rodrigues, Joel J. P. C.. Biometrics-Based Privacy-Preserving User Authentication Scheme for Cloud-Based Industrial Internet of Things Deployment. IEEE Internet of things journal : a joint publication of the IEEE Sensors Council, the IEEE Communications Society, the IEEE Computer Society, the IEEE Signal Processing Society, vol.5, no.6, 4900-4913.

  37. Odelu, Vanga, Das, Ashok Kumar, Khurram Khan, Muhammad, Choo, Kim-Kwang Raymond, Jo, Minho. Expressive CP-ABE Scheme for Mobile Devices in IoT Satisfying Constant-Size Keys and Ciphertexts. IEEE access : practical research, open solutions, vol.5, 3273-3283.

  38. Das, Ashok Kumar, Wazid, Mohammad, Yannam, Animi Reddy, Rodrigues, Joel J. P. C., Park, Youngho. Provably Secure ECC-Based Device Access Control and Key Agreement Protocol for IoT Environment. IEEE access : practical research, open solutions, vol.7, 55382-55397.

  39. Wazid, Mohammad, Das, Ashok Kumar, Odelu, Vanga, Kumar, Neeraj, Susilo, Willy. Secure Remote User Authenticated Key Establishment Protocol for Smart Home Environment. IEEE transactions on dependable and secure computing, vol.17, no.2, 391-406.

  40. Wazid, Mohammad, Das, Ashok Kumar, Kumar, Neeraj, Odelu, Vanga, Goutham Reddy, Alavalapati, Park, Kisung, Park, Youngho. Design of Lightweight Authentication and Key Agreement Protocol for Vehicular Ad Hoc Networks. IEEE access : practical research, open solutions, vol.5, 14966-14980.

  41. Das, M.L., Saxena, A., Gulati, V.P.. A dynamic ID-based remote user authentication scheme. IEEE transactions on consumer electronics, vol.50, no.2, 629-631.

  42. Lamport, Leslie. Password authentication with insecure communication. Communications of the ACM, vol.24, no.11, 770-772.

  43. Amin, Ruhul, Islam, SK Hafizul, Biswas, G.P., Khan, Muhammad Khurram, Kumar, Neeraj. A robust and anonymous patient monitoring system using wireless medical sensor networks. Future generation computer systems : FGCS, vol.80, 483-495.

  44. Park, Kisung, Park, Youngho, Park, Yohan, Goutham Reddy, Alavalapati, Das, Ashok Kumar. Provably Secure and Efficient Authentication Protocol for Roaming Service in Global Mobility Networks. IEEE access : practical research, open solutions, vol.5, 25110-25125.

  45. Wang, Chenyu, Wang, Ding, Xu, Guoai, Guo, Yanhui. A lightweight password‐based authentication protocol using smart card. International journal of communication systems, vol.30, no.16, e3336-.

  46. Kumari, Saru, Khan, Muhammad Khurram, Li, Xiong. A more secure digital rights management authentication scheme based on smart card. Multimedia tools and applications, vol.75, no.2, 1135-1158.

  47. AVISPA SPAN the Security Protocol Animator for AVISPA 2020 

  48. Chen, Chien-Ming, Xiang, Bin, Liu, Yining, Wang, King-Hang. A Secure Authentication Protocol for Internet of Vehicles. IEEE access : practical research, open solutions, vol.7, 12047-12057.

  49. Ding Wang, Haibo Cheng, Ping Wang, Xinyi Huang, Gaopeng Jian. Zipf’s Law in Passwords. IEEE transactions on information forensics and security, vol.12, no.11, 2776-2791.

  50. 10.1007/3-540-48405-1_25 

  51. Automated Validation of Internet Security Protocols and Applications 2006 

  52. Ding Wang, Debiao He, Ping Wang, Chao-Hsien Chu. Anonymous Two-Factor Authentication in Distributed Systems: Certain Goals Are Beyond Attainment. IEEE transactions on dependable and secure computing, vol.12, no.4, 428-442.

  53. 10.1109/ISTEL.2016.7881802 

  54. Gope, P., Hwang, T.. An efficient mutual authentication and key agreement scheme preserving strong anonymity of the mobile user in global mobility networks. Journal of network and computer applications, vol.62, 1-8.

  55. Messerges, T.S., Dabbish, E.A., Sloan, R.H.. Examining smart-card security under the threat of power analysis attacks. IEEE transactions on computers, vol.51, no.5, 541-552.

  56. 10.1109/ICUFN.2018.8436650 

LOADING...

활용도 분석정보

상세보기
다운로드
내보내기

활용도 Top5 논문

해당 논문의 주제분야에서 활용도가 높은 상위 5개 콘텐츠를 보여줍니다.
더보기 버튼을 클릭하시면 더 많은 관련자료를 살펴볼 수 있습니다.

관련 콘텐츠

오픈액세스(OA) 유형

GOLD

오픈액세스 학술지에 출판된 논문

유발과제정보 저작권 관리 안내
섹션별 컨텐츠 바로가기

AI-Helper ※ AI-Helper는 오픈소스 모델을 사용합니다.

AI-Helper 아이콘
AI-Helper
안녕하세요, AI-Helper입니다. 좌측 "선택된 텍스트"에서 텍스트를 선택하여 요약, 번역, 용어설명을 실행하세요.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.

선택된 텍스트

맨위로