2015
DOI: 10.1371/journal.pone.0116709
|View full text |Cite
|
Sign up to set email alerts
|

Efficient and Anonymous Two-Factor User Authentication in Wireless Sensor Networks: Achieving User Anonymity with Lightweight Sensor Computation

Abstract: A smart-card-based user authentication scheme for wireless sensor networks (hereafter referred to as a SCA-WSN scheme) is designed to ensure that only users who possess both a smart card and the corresponding password are allowed to gain access to sensor data and their transmissions. Despite many research efforts in recent years, it remains a challenging task to design an efficient SCA-WSN scheme that achieves user anonymity. The majority of published SCA-WSN schemes use only lightweight cryptographic techniqu… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
28
0

Year Published

2015
2015
2017
2017

Publication Types

Select...
6
2
1

Relationship

3
6

Authors

Journals

citations
Cited by 56 publications
(28 citation statements)
references
References 31 publications
0
28
0
Order By: Relevance
“…Therefore, it is also necessary to keep the doctor's identity confidential in order to protect the privacy of the patient. In PriAuth, Elliptic Curve Cryptography (ECC) is adopted as the method used to protect the identities of the data transmission participants, which is similar to [15][16][17][18][19][20][21].…”
Section: Wireless Communications and Mobile Computingmentioning
confidence: 99%
See 1 more Smart Citation
“…Therefore, it is also necessary to keep the doctor's identity confidential in order to protect the privacy of the patient. In PriAuth, Elliptic Curve Cryptography (ECC) is adopted as the method used to protect the identities of the data transmission participants, which is similar to [15][16][17][18][19][20][21].…”
Section: Wireless Communications and Mobile Computingmentioning
confidence: 99%
“…Some of the schemes fail to enable the anonymity of the user or sensor, such as [37][38][39]. We adopt the ECC based method to enable the anonymity, which is similar to [15][16][17][18][19][20][21] because "ECC requires smaller keys compared to non-ECC cryptography (based on plain Galois fields) to provide equivalent security" [40]. The gateway has a public key that is known by every user; all the identities are encrypted by an XOR method with a new key which is generated from gateway's public key before the identities are sent to the gateway.…”
Section: Related Workmentioning
confidence: 99%
“…A user anonymous authentication scheme has been presented to handle remote medical services applying in WSN to resolve this issues. Nam et al [22] pointed out some flaws in [21] for user anonymity and smart card theft. By exploiting symmetric encryption and secure key management for message integrity, Xue et al [23] presented a temporary credential-based secure key using a one-way hash function and XOR operations.…”
Section: Literature Reviewmentioning
confidence: 99%
“…Especially in recent years, a lot of authentication and key exchange protocols have been proposed for various kinds of wireless networks to establish secure communication channels between their entities. For example, literature [26] presented a smart-card based user authentication scheme for Wireless Sensor Networks. Literature [27] presented an authenticated key exchange protocol for Wireless Body Area Network.…”
Section: Related Work and Comparisonmentioning
confidence: 99%