무선 센서 네트워크 환경을 위한 보안성이 향상된 프라이버시 보호형 two-factor 인증 프로토콜
Various researchers conducted the research on two-factor authentication suitable for wireless sensor networks (WSNs) after Das first proposed two-factor authentication combining the smart card and password. After then, To improve the security of user authentication, elliptic curve cryptography(ECC)-...
Saved in:
Published in | (사)디지털산업정보학회 논문지, 15(4) Vol. 15; no. 4; pp. 71 - 84 |
---|---|
Main Authors | , , , |
Format | Journal Article |
Language | Korean |
Published |
(사)디지털산업정보학회
01.12.2019
|
Subjects | |
Online Access | Get full text |
ISSN | 1738-6667 2713-9018 |
Cover
Abstract | Various researchers conducted the research on two-factor authentication suitable for wireless sensor networks (WSNs) after Das first proposed two-factor authentication combining the smart card and password. After then, To improve the security of user authentication, elliptic curve cryptography(ECC)-based authentication protocols have been proposed. Jiang et al. proposed a privacy-aware two-factor authentication protocol based on ECC for WSM for resolving various problems of ECC-based authentication protocols. However, Jiang et al.'s protocol has the vulnerabilities on a lack of mutual authentication, a risk of SID modification and a lack of sensor anonymity, and user's ID exposed on sensor node Therefore, this paper proposed security enhanced privacy-aware two-factor authentication protocol for wireless sensor networks to solve the problem of Jiang et al.'s protocol, and security analysis was conducted for the proposed protocol. |
---|---|
AbstractList | Various researchers conducted the research on two-factor authentication suitable for wireless sensor networks (WSNs) after Das first proposed two-factor authentication combining the smart card and password. After then, To improve the security of user authentication, elliptic curve cryptography(ECC)-based authentication protocols have been proposed. Jiang et al. proposed a privacy-aware two-factor authentication protocol based on ECC for WSM for resolving various problems of ECC-based authentication protocols. However, Jiang et al.'s protocol has the vulnerabilities on a lack of mutual authentication, a risk of SID modification and a lack of sensor anonymity, and user's ID exposed on sensor node Therefore, this paper proposed security enhanced privacy-aware two-factor authentication protocol for wireless sensor networks to solve the problem of Jiang et al.'s protocol, and security analysis was conducted for the proposed protocol. Various researchers conducted the research on two-factor authentication suitable for wireless sensor networks (WSNs) after Das first proposed two-factor authentication combining the smart card and password. After then, To improve the security of user authentication, elliptic curve cryptography(ECC)-based authentication protocols have been proposed. Jiang et al. proposed a privacy-aware two-factor authentication protocol based on ECC for WSM for resolving various problems of ECC-based authentication protocols. However, Jiang et al.‘s protocol has the vulnerabilities on a lack of mutual authentication, a risk of SID modification and a lack of sensor anonymity, and user’s ID exposed on sensor node Therefore, this paper proposed security enhanced privacy-aware two-factor authentication protocol for wireless sensor networks to solve the problem of Jiang et al.‘s protocol, and security analysis was conducted for the proposed protocol. KCI Citation Count: 0 |
Author | 최윤성 Choi, Younsung 장범환 Chang, Beom-Hwan |
Author_xml | – sequence: 1 fullname: 최윤성 – sequence: 2 fullname: 장범환 – sequence: 3 fullname: Choi, Younsung – sequence: 4 fullname: Chang, Beom-Hwan |
BackLink | https://www.kci.go.kr/kciportal/ci/sereArticleSearch/ciSereArtiView.kci?sereArticleSearchBean.artiId=ART002536011$$DAccess content in National Research Foundation of Korea (NRF) |
BookMark | eNotjD1Lw0AAhoMoWGv_wy0ODoHLXe4jYyl-VAsF6R6SNJGQkkBTcHAqHiLq4GClYgIV1KmLtUOH9g-Zu_9gaJ0e3vd9ePe07TiJ_S2tgpiBdQsafFurGAxznVLKdrVamoYuxBQxTjipaNfFdC7FBEixlCIDhfhQ9wv59qiGU6Bex7-zlcwFkJlQo3L9mcvRnRTfMp8D9fIpb4bFUwbUsyjyZdkVMyEf1poaL9R4BAZXiR443iDpA5kv5Fe-dt8zdTuRq2xf2wmcXurX_lnVOsdHncap3mqfNBv1lh5R09Sx04Ue8x0XYzdAftD1AuJzigmjHDIflRGb1KPQ8lzIDUSCruWYhDHqI84YwVXtcHMb9wM78kI7ccI1LxM76tv1i07TptjEFjRL92DjRmE6CO24m_bss_p5G0HDgpxSRBiGlon_APPBi-Y |
ContentType | Journal Article |
DBID | JDI ACYCR |
DEWEY | 621.382 |
DatabaseName | KoreaScience Korean Citation Index |
DatabaseTitleList | |
DeliveryMethod | fulltext_linktorsrc |
Discipline | Engineering |
DocumentTitleAlternate | Security enhanced privacy-aware two-factor authentication protocol for wireless sensor networks |
EISSN | 2713-9018 |
EndPage | 84 |
ExternalDocumentID | oai_kci_go_kr_ARTI_6343904 JAKO201908662573094 |
GroupedDBID | .UV JDI ACYCR M~E |
ID | FETCH-LOGICAL-k644-3ad0c7eab33bf2efdcf5e863576807e2cf5346c609cb08125fd9a45776e287753 |
ISSN | 1738-6667 |
IngestDate | Tue Nov 21 21:42:25 EST 2023 Fri Dec 22 12:02:13 EST 2023 |
IsOpenAccess | true |
IsPeerReviewed | false |
IsScholarly | false |
Issue | 4 |
Keywords | Security Analysis Wireless Sensor Networks Two-Factor Authentication |
Language | Korean |
LinkModel | OpenURL |
MergedId | FETCHMERGED-LOGICAL-k644-3ad0c7eab33bf2efdcf5e863576807e2cf5346c609cb08125fd9a45776e287753 |
Notes | KISTI1.1003/JNL.JAKO201908662573094 |
OpenAccessLink | http://click.ndsl.kr/servlet/LinkingDetailView?cn=JAKO201908662573094&dbt=JAKO&org_code=O481&site_code=SS1481&service_code=01 |
PageCount | 14 |
ParticipantIDs | nrf_kci_oai_kci_go_kr_ARTI_6343904 kisti_ndsl_JAKO201908662573094 |
PublicationCentury | 2000 |
PublicationDate | 2019-12 |
PublicationDateYYYYMMDD | 2019-12-01 |
PublicationDate_xml | – month: 12 year: 2019 text: 2019-12 |
PublicationDecade | 2010 |
PublicationTitle | (사)디지털산업정보학회 논문지, 15(4) |
PublicationTitleAlternate | Journal of the Korea Society of Digital Industry and Information Management |
PublicationYear | 2019 |
Publisher | (사)디지털산업정보학회 |
Publisher_xml | – name: (사)디지털산업정보학회 |
SSID | ssib036278585 ssib044734564 ssib008451690 ssib053377100 ssib026777133 |
Score | 1.7201998 |
Snippet | Various researchers conducted the research on two-factor authentication suitable for wireless sensor networks (WSNs) after Das first proposed two-factor... |
SourceID | nrf kisti |
SourceType | Open Website Open Access Repository |
StartPage | 71 |
SubjectTerms | 컴퓨터학 |
Title | 무선 센서 네트워크 환경을 위한 보안성이 향상된 프라이버시 보호형 two-factor 인증 프로토콜 |
URI | http://click.ndsl.kr/servlet/LinkingDetailView?cn=JAKO201908662573094&dbt=JAKO&org_code=O481&site_code=SS1481&service_code=01 https://www.kci.go.kr/kciportal/ci/sereArticleSearch/ciSereArtiView.kci?sereArticleSearchBean.artiId=ART002536011 |
Volume | 15 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
ispartofPNX | (사)디지털산업정보학회 논문지, 2019, 15(4), , pp.71-84 |
journalDatabaseRights | – providerCode: PRVHPJ databaseName: ROAD: Directory of Open Access Scholarly Resources customDbUrl: eissn: 2713-9018 dateEnd: 99991231 omitProxy: true ssIdentifier: ssib044734564 issn: 1738-6667 databaseCode: M~E dateStart: 20050101 isFulltext: true titleUrlDefault: https://road.issn.org providerName: ISSN International Centre |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtV3Na9RAFA9tT15EUbF-lCDmtESSyWQmc0zSlVpRLxV6W7LZRMrKLtQtgoJQDCLqwYOVirtQQT31Yu2hh_Yfcicn_wHfm2R3s0WhCsKyzL735jfvY8K8yc6Hpl23SIsRkhKTJKxp0qhpm1EUeyYXqYuXoqQsxY3Cd-6ypft0edVdnZn9WVm1tNFr3oif_HZfyb9EFWgQV9wl-xeRHYMCAcoQX_iGCMP3iWJs1APDD42AGvXQ8KjhW7WyFIRlQYQ1lEImSC0anm8EHvIEEENFsQGjhiUhDAE8kCBGsKiEgE0VplBoKOSOMAOnbBlInjdq2C7rBbTAZIbvKp6DLUE1YRUAwKMKM1Di4biewiaKBdWCY80too5ogioIt9Z73DWLW4NqIwiljM-gPN2Ob6MdaDNoZaEQmCnCaoIOCbdqlqBjiVDaUfwgIsd1IVidlm2AWKBwBLCUmQAL7phS10XHYsEHjxfRcJW9RfC8CTR0dzyEA-An72eUlq7SW0XBp2NPV0VEXflZeU7QcTSrL3VscWyBzP-2tTLgcRjwYApbJD2JohFuO7hsx6sMbMU9OaMUiU6yh9GKiWNJxdTx5e14rfGg22ivN2CSdqvBHMiC8QzfWRhscLXts_p4CPDo1B-3hHHO7cmMBNItXr0wgVLu4IFIattzaQlMM3HutQbZYmc9rWSLK2e00-U0T_eLZ_asNtPuntOeDnf3Zbajy-xQZn19mH3OXx3Ij2_yzV09_7D9Y-9IDjJd9rN8C7jf9-XWS5l9k4N9PX__RT7fHL7t6_m7bDg4BNpwL5OvlVi-fZBvb-mT50CXgwP5daBkP_XzFzvyqH9eW7lZXwmXzPLyE7MNUxTTiVpWzJOo6TjNlCRpK07dxMPDI5ln8YTAT4eymFkibkJWT9y0JSLqcs4S4nHuOhe0uU63k1zU9DRm3HGtWCTCpYSyyCOCUstOooSnEW3NawvKX41O69HDxrJ_-x72SMtjDIZzxxJ0XrsGjlRR_HM0L51E6LJ2atLbr2hzvfWN5Cok9b3mguoGvwAGBsnw |
linkProvider | ISSN International Centre |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=%EB%AC%B4%EC%84%A0+%EC%84%BC%EC%84%9C+%EB%84%A4%ED%8A%B8%EC%9B%8C%ED%81%AC+%ED%99%98%EA%B2%BD%EC%9D%84+%EC%9C%84%ED%95%9C+%EB%B3%B4%EC%95%88%EC%84%B1%EC%9D%B4+%ED%96%A5%EC%83%81%EB%90%9C+%ED%94%84%EB%9D%BC%EC%9D%B4%EB%B2%84%EC%8B%9C+%EB%B3%B4%ED%98%B8%ED%98%95+two-factor+%EC%9D%B8%EC%A6%9D+%ED%94%84%EB%A1%9C%ED%86%A0%EC%BD%9C&rft.jtitle=%28%EC%82%AC%29%EB%94%94%EC%A7%80%ED%84%B8%EC%82%B0%EC%97%85%EC%A0%95%EB%B3%B4%ED%95%99%ED%9A%8C+%EB%85%BC%EB%AC%B8%EC%A7%80%2C+15%284%29&rft.au=%EC%B5%9C%EC%9C%A4%EC%84%B1&rft.au=%EC%9E%A5%EB%B2%94%ED%99%98&rft.date=2019-12-01&rft.pub=%28%EC%82%AC%29%EB%94%94%EC%A7%80%ED%84%B8%EC%82%B0%EC%97%85%EC%A0%95%EB%B3%B4%ED%95%99%ED%9A%8C&rft.issn=1738-6667&rft.eissn=2713-9018&rft.spage=71&rft.epage=84&rft.externalDBID=n%2Fa&rft.externalDocID=oai_kci_go_kr_ARTI_6343904 |
thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1738-6667&client=summon |
thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1738-6667&client=summon |
thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1738-6667&client=summon |