Accesso libero

A Novel Tri-Factor Mutual Authentication with Biometrics for Wireless Body Sensor Networks in Healthcare Applications

INFORMAZIONI SU QUESTO ARTICOLO

Cita

M. L Das, “Two-Factor User Authentication in Wireless Sensor Networks”, IEEE Transaction on Wireless Communication, Vol.8, no.3, pp. 25-31, March 2009.10.1109/TWC.2008.080128 Search in Google Scholar

M. L. Das, A. Saxena, and V. P. Gulati, “A Dynamic ID-based Remote User Authentication Scheme”, IEEE Transactions on Consumer Electronics, Vol. 50, no. 2, pp.629-631, May 2004.10.1109/TCE.2004.1309441 Search in Google Scholar

A. Tiwari, Sudip Sanyal, A. Abraham, S. J. Knapskog, and Sugata Sanyal, “A Multi-Factor Security Protocol for Wireless Payment Secure Web Authentication Using Mobile Devices”, Proceedings of the IADIS Int’l. Conference on Applied Computing, pp. 160-167, Salamanca, Spain, February 17-20, 2007. Search in Google Scholar

D. Glynos, P. Kotzanikolaou and C. Douligeris, “Preventing Impersonation Attacks in MANET with Multi-factor Authentication”, Proc. of WiOpt’05, pp. 59-64, Trentino, Venezuela, 2005. Search in Google Scholar

C. C. Chang and T. C. Wu, “Remote Password Authentication with Smart Cards”, IEE Proceedings-E of Computers and Digital Techniques, Vol. 138, Iss. 3, pp. 165-168, May 1991,10.1049/ip-e.1991.0022 Search in Google Scholar

K. Wong, Y. Zheng, J. Cao, and S. Wang, “A Dynamic User Authentication Scheme for Wireless Sensor Networks”, Proceedings of IEEE Int’l. Conference. on Sensor Networks, Ubiquitous, and Trustworthy Computing (SUTC’06), Vol. 1, Taichung, Taiwan, Jun 5-7, 2006. Search in Google Scholar

Z. Benenson, F. Gartner, and D. Kesdogan, “User Authentication in sensor network (extended abstract)”, Proc. of Informatics’04, Workshop on Sensor Networks, Ulm, German, September 2004. [8]. M. S. Hwang and L. H. Li, “A new remote user authentication scheme using smart cards”, IEEE Transactions. on Consumer Electron, Vol. 46, Iss. 1. pp.28-30, 2000.10.1109/30.826377 Search in Google Scholar

C. K. Chan and L. M. Cheng, “Cryptanalysis of a remote user authentication scheme using smart cards”, IEEE Transactions. on Consumer Electron, Vol. 46, Iss. 4, pp. 992-993, 2000.10.1109/30.920451 Search in Google Scholar

A. K. Awasthi and S. Lal, “A Remote User Authntication Scheme Using Smart Cards with Forward Secrecy”, IEEE Transactions. on Consumer Electronics, Vol. 49, Iss. 4, pp. 1246-1248, 2003. Search in Google Scholar

S. W. Lee, H. S. Kim, and K. Y. Yoo, “Comment on ‘A Remote User Authentication Scheme using Smart Cards with Forward Secrecy’ “, IEEE Transactions. on Consumer Electronics, Vol. 50, Iss. 2, pp. 576-577, May 2004.10.1109/TCE.2004.1309427 Search in Google Scholar

A. K. Awasthi, “Comment on ‘A Dynamic ID-based Remote User Authentication Scheme’ “, Transc. on Cryptology Vol.1, Iss. 2, pp. 15-16, Aug. 2004. Search in Google Scholar

H. F. Huang, Y. F. Chang, and C. H. Liu, “Enhancement of Two-Factor User Authentication in Wireless Sensor Networks”, Proceedings. of the 6th IEEE Int’l. Conference. on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP), pp. 27-30, Darmstadt, German, October 15-17, 2010.10.1109/IIHMSP.2010.14 Search in Google Scholar

. P. Kumar, M. Sain, and H. J. Lee, “An Efficient Two-Factor User Authentication Framework for Wireless Sensor Networks”, Proceedings. of the 13rd IEEE Int’l. Conference. on Advanced Communication Technology (ICACT), pp.574-578, Phoenix Park, R. Korea, 2011. Search in Google Scholar

M. K. Khan and K. Alghathbar, “Cryptanalysis and Security Improvement of ‘Two-Factor User Authentication in Wireless Sensor Networks’ “, Journal of Sensors, Vol.10, pp. 2450-2459, 2010. Search in Google Scholar

C. Adams and M. J. Wiener, Multi-Factor Biometric Authenticating Device and Method, U.S. Patent 6,363,485, Mar 26, 2002. Search in Google Scholar

A. Bhargav-Spantzel, A. C. Squicciarini, S. Modi, M. Young, E. Bertino, and S. J. Elliott, “Privacy Preserving Multi-Factor Authentication with Biometrics”, Journal of Computer Security Vol. 15, no. 5, pp. 529-560, 2007.10.3233/JCS-2007-15503 Search in Google Scholar

R. B. Paranjape, J. Mahovsky, L. Benedicenti, and Z. Koles, “The Elechoencephalogram as a Biometric”, Proc. Canadian Conference on Electrical and Computer Engineering, pp. 13631366, Toronto, Canada, May 13-16, 2001. Search in Google Scholar

L. Biel, O. Pettersson, L. Philipson, and P. Wide, “ECG Analysis: A New Approach in Human Identification”, IEEE Transactions on Instrumentation and Measurement, Vol. 50, Iss.3, pp. 808-812, 2001.10.1109/19.930458 Search in Google Scholar

F. Sufi and I. Khalil, “Faster Person Identification Using Compressed ECG in Time Critical Wireless Telecardiology Applications”, Journal of Network and Computer Applications, Vol. 34, pp. 282-293, 2011.10.1016/j.jnca.2010.07.004 Search in Google Scholar

Y. Y. Gu, Y. Zhang, and Y. T. Zhang, “A Novel Biometric Approach in Human Verification by Photoplethysmographic Signals”, Proceedings of the 4th Annual IEEE Conference on Information Technology Applications in Biomedicine, pp. 13-14, Birmingham, U.K., April 24-26, 2003. Search in Google Scholar

C. C. Y. Poon, Y. T. Zhang and S. D. Bao, “A Novel Biometrics Method to Secure Wireless Body Area Sensor Networks for Telemedicine and m-Health”, IEEE Communications Magazine, Vol. 44, no.4, pp.73–81, 2006.10.1109/MCOM.2006.1632652 Search in Google Scholar

S. D. Bao, C. C. Y. Poon, Y. T. Zhang, and L. F. Shen, “Using the Timing Information of Heartbeats as the Entity Identity to Secure Medical Body Sensor Networks”, IEEE Transactions on Information Technology in Biomedicine, Vol.12, Iss. 6, pp. 772-779, Nov. 2008.10.1109/TITB.2008.92643419000958 Search in Google Scholar

F. Miao, S. D. Bao, and Y. Li, “A Modified Fuzzy Vault Scheme for Biometrics-Based Body Sensor Networks Security”, Proc. of the 53rd IEEE GLOBECOM 2010, pp.1-5, Miami, USA, Dec. 6-10, 2010.10.1109/GLOCOM.2010.5683998 Search in Google Scholar

C. Z. Cao, C. G. He, S. D. Bao, and Ye Li, “Improvement of fuzzy vault scheme for securing key distribution in body sensor network”, Proceedings of 33rd IEEE Int’l Conference Engineering in Medicine and Biology Society (EMBC’11), pp. 3563-3567, Boston, USA, August 30–September 3, 2011. Search in Google Scholar

J. Shen, S. D. Bao, L. C. Yang, and Y. Li, “The PLR-DTW Method for ECG Based Biometric Identification”, Proceedings of 33rd IEEE Int’l Conference Engineering in Medicine and Biology Society (EMBC’11), pp. 5248-5251, Boston, USA, August 30–September 3, 2011 Search in Google Scholar

K. Singh and V. Muthukkumarasamy, “Authenticated Key Establishment Protocols for a Home Health Care System”. Proceedings of the IEEE Int’l Conference on Intelligent Sensors, Sensor Networks and Information Processing (ISSNIP), pp. 353-358, Melbourne, Australia, Dec 3-6, 2007.10.1109/ISSNIP.2007.4496869 Search in Google Scholar

C. G. He, S. D. Bao, “An Encryption Algorithm Based on Chaotic System for 3G Security Authentication”, Proc. 2nd IEEE Youth Conference on Information, Computing and Telecommunications, pp. 351–354, Beijing, China, Nov 28-20, 2010. Search in Google Scholar

Z. Li, X. Xu and Z. Fan, “Light Weight Trusted ID-Based Signcryption Scheme for Wireless Sensor Networks”, International Journal on Smart Sensing and Intelligent Systems, Vol. 5, no.4, pp.799-810, 2012.10.21307/ijssis-2017-507 Search in Google Scholar

T. Hong, S. D. Bao, Y. T. Zhang, Y. Li and P. Yang. “An Improved Scheme of IPI-based Entity Identifier Generation for Securing Body Sensor Networks”, Proceedings of 33rd IEEE Int’l Conference Engineering in Medicine and Biology Society (EMBC’11), pp. 1519-1522, Boston, USA, August 30–September 3, 2011.Search in Google Scholar

eISSN:
1178-5608
Lingua:
Inglese
Frequenza di pubblicazione:
Volume Open
Argomenti della rivista:
Engineering, Introductions and Overviews, other