2015
DOI: 10.1007/s11277-015-2288-3
|View full text |Cite
|
Sign up to set email alerts
|

A Secure and Efficient User Anonymity-Preserving Three-Factor Authentication Protocol for Large-Scale Distributed Wireless Sensor Networks

Abstract: Critical applications in wireless sensor network (WSN) are real-time based applications. Therefore, users are generally interested in accessing real-time information. This is possible, if the users (called the external parties) are allowed to access the real-time data directly from the sensor nodes inside WSN and not from the base station. The sensory information from nodes are gathered periodically by the base station and so, the gathered information may not be real-time. In order to get the real-time informa… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
84
0

Year Published

2015
2015
2024
2024

Publication Types

Select...
8

Relationship

4
4

Authors

Journals

citations
Cited by 92 publications
(84 citation statements)
references
References 31 publications
0
84
0
Order By: Relevance
“…Proof This proof is similar to that presented in [7,13,14,16,41,48]. In this proof, we plan to construct an adversary A who will have the ability to derive the identity I D i of a legal user U i and the secret key X j of a medical server MS j .…”
Section: Theorem 1 Under the Assumption That A One-way Hash Function mentioning
confidence: 92%
See 2 more Smart Citations
“…Proof This proof is similar to that presented in [7,13,14,16,41,48]. In this proof, we plan to construct an adversary A who will have the ability to derive the identity I D i of a legal user U i and the secret key X j of a medical server MS j .…”
Section: Theorem 1 Under the Assumption That A One-way Hash Function mentioning
confidence: 92%
“…Step R1: As in [13], U i first inputs his/her desired identity I D i , password P W i , and then imprints the personal biometrics B i at the sensor of a specific device. U i generates a 1024-bit random number K, which is kept secret to U i only.…”
Section: User Registration Phasementioning
confidence: 99%
See 1 more Smart Citation
“…The wireless itself is untrusted, where an anonymous nodes can also get connected. In [17] authors proposed a novel secured method called Three-factor user authentication scheme for distributed WSNs. To avoid the collisions in communication with privacy preserving data mining Larr et al [7] proposed an anonymous ID assignment where this ID number will iteratively assign to the nodes Drushina et al [18] proposed a network coding method for privacy in networks by removes the statistical dependence between incoming and outgoing messages, so that tracing is not possible.…”
Section: Related Workmentioning
confidence: 99%
“…In order to monitor the critical parameters of application environment, several sensor nodes are deployed in a specific area (called the target field or deployment area), such as forest or battlefield. Sensor nodes are batterylimited devices, and they have the ability to communicate with the nearby base station(s) via other neighbor nodes by short range of wireless radio transmission with low bandwidth and over small communication ranges [1][2][3][4][5].…”
Section: Introductionmentioning
confidence: 99%