RISS 학술연구정보서비스

검색
다국어 입력

http://chineseinput.net/에서 pinyin(병음)방식으로 중국어를 변환할 수 있습니다.

변환된 중국어를 복사하여 사용하시면 됩니다.

예시)
  • 中文 을 입력하시려면 zhongwen을 입력하시고 space를누르시면됩니다.
  • 北京 을 입력하시려면 beijing을 입력하시고 space를 누르시면 됩니다.
닫기
    인기검색어 순위 펼치기

    RISS 인기검색어

      KCI등재후보

      Security Analysis to an Biometric Authentication Protocol for Wireless Sensor Networks

      한글로보기

      https://www.riss.kr/link?id=A104312411

      • 0

        상세조회
      • 0

        다운로드
      서지정보 열기
      • 내보내기
      • 내책장담기
      • 공유하기
      • 오류접수

      부가정보

      다국어 초록 (Multilingual Abstract)

      A novel authentication mechanism is biometric authentication where users are identified by their measurable human characteristics, such as fingerprint, voiceprint, and iris scan. The technology of biometrics is becoming a popular method for engineers ...

      A novel authentication mechanism is biometric authentication where users are identified by their measurable human characteristics, such as fingerprint, voiceprint, and iris scan. The technology of biometrics is becoming a popular method for engineers to design a more secure user authentication scheme. In terms of physiological and behavioral human characteristics, biometrics is used as a form of identity access management and access control, and it services to identity individuals in groups that are under surveillance. In this article, we review the biometric-based authentication protocol by Althobati et al. and provide a security analysis on the scheme. Our analysis shows that Althobati et al.’s scheme does not guarantee server-to-user authentication. The contribution of the current work is to demonstrate this by mounting threat of data integrity and bypassing the gateway node on Althobati et al.’s scheme. In addition, we analysis the security vulnerabilities of Althobati et al.’s protocol.

      더보기

      참고문헌 (Reference)

      1 Z. Cheng, "novel biometric-based remote user authentication scheme using Quadratic Residues" 3 (3): 419-422, 2013

      2 Ku, W. -C, "Weaknesses of a remote user authentication scheme using smart cards for multi-server architecture" E88-B (E88-B): 3451-3454, 2005

      3 Youngsook Lee, "Weakness of Tan’s Two-Factor User Authentication Scheme in Wireless Sensor Networks" 203 : 707-714, 2012

      4 Das, M. L, "Two-factor user authentication in wireless sensor networks" 8 : 1086-1090, 2009

      5 Rathod, V, "Security in wireless sensor network: a survey" 1 (1): 35-44, 2011

      6 이영숙, "Security Improvement to a Remote User Authentication Scheme for Multi-Server Environment" (사)디지털산업정보학회 7 (7): 23-30, 2011

      7 이영숙, "Security Analysis of a Biometric-Based User Authentication Scheme" (사)디지털산업정보학회 10 (10): 81-87, 2014

      8 T. S. Messergers, "Examining smart card security under the threat of power analysis attacks" 51 (51): 541-552, 2002

      9 Tsai, J. -L, "Efficient multi-server authentication scheme based on one-way hash function without verification table" 27 : 115-121, 2008

      10 P. Kocher, "Differential power analysis" 388-397, 1999

      1 Z. Cheng, "novel biometric-based remote user authentication scheme using Quadratic Residues" 3 (3): 419-422, 2013

      2 Ku, W. -C, "Weaknesses of a remote user authentication scheme using smart cards for multi-server architecture" E88-B (E88-B): 3451-3454, 2005

      3 Youngsook Lee, "Weakness of Tan’s Two-Factor User Authentication Scheme in Wireless Sensor Networks" 203 : 707-714, 2012

      4 Das, M. L, "Two-factor user authentication in wireless sensor networks" 8 : 1086-1090, 2009

      5 Rathod, V, "Security in wireless sensor network: a survey" 1 (1): 35-44, 2011

      6 이영숙, "Security Improvement to a Remote User Authentication Scheme for Multi-Server Environment" (사)디지털산업정보학회 7 (7): 23-30, 2011

      7 이영숙, "Security Analysis of a Biometric-Based User Authentication Scheme" (사)디지털산업정보학회 10 (10): 81-87, 2014

      8 T. S. Messergers, "Examining smart card security under the threat of power analysis attacks" 51 (51): 541-552, 2002

      9 Tsai, J. -L, "Efficient multi-server authentication scheme based on one-way hash function without verification table" 27 : 115-121, 2008

      10 P. Kocher, "Differential power analysis" 388-397, 1999

      11 Tsuar, W. -J, "An enhanced user authentication scheme for multi-server internet services" 170 : 258-266, 2005

      12 O. Althobaiti, "An Efficient Biometric Authentication Protocol for Wireless Sensor Networks" 2013 : 13-, 2013

      13 A. Al-Hussain, "Abiometric-based authentication system for web services mobile user" 447-452, 2010

      14 Akyildiz, I. F, "A survey on sensor networks" 40 (40): 102-114,

      15 Li, L. -H, "A remote password authentication scheme for multiserver architecture using neural networks" 12 (12): 1498-1504, 2001

      16 E. -J. Yoon, "A new biometric-based user authentication scheme without using password for wireless sensor networks" 279-284, 2011

      17 Tsuar, W. -J, "A flexible user authentication for multi-server internet services" LNCS 2093 : 174-183, 2001

      18 J. Yuan, "A biometric-based User Authentication for wireless Sensor Networks" 5 (5): 272-276, 2010

      더보기

      동일학술지(권/호) 다른 논문

      분석정보

      View

      상세정보조회

      0

      Usage

      원문다운로드

      0

      대출신청

      0

      복사신청

      0

      EDDS신청

      0

      동일 주제 내 활용도 TOP

      더보기

      주제

      연도별 연구동향

      연도별 활용동향

      연관논문

      연구자 네트워크맵

      공동연구자 (7)

      유사연구자 (20) 활용도상위20명

      인용정보 인용지수 설명보기

      학술지 이력

      학술지 이력
      연월일 이력구분 이력상세 등재구분
      2027 평가예정 재인증평가 신청대상 (재인증)
      2021-01-01 평가 등재학술지 유지 (재인증) KCI등재
      2018-01-01 평가 등재학술지 선정 (계속평가) KCI등재
      2016-01-01 평가 등재후보학술지 선정 (신규평가) KCI등재후보
      2015-12-01 평가 등재후보 탈락 (기타)
      2014-01-01 평가 등재후보학술지 유지 (계속평가) KCI등재후보
      2013-01-01 평가 등재후보 1차 PASS (등재후보1차) KCI등재후보
      2012-01-01 평가 등재후보 1차 FAIL (기타) KCI등재후보
      2011-01-01 평가 등재후보학술지 유지 (등재후보2차) KCI등재후보
      2010-01-01 평가 등재후보 1차 PASS (등재후보1차) KCI등재후보
      2008-06-30 학회명변경 한글명 : 디지털산업정보학회 -> (사)디지털산업정보학회
      영문명 : 미등록 -> The Korea Society of Digital Industry and Information Management
      KCI등재후보
      2008-01-01 평가 등재후보학술지 선정 (신규평가) KCI등재후보
      더보기

      학술지 인용정보

      학술지 인용정보
      기준연도 WOS-KCI 통합IF(2년) KCIF(2년) KCIF(3년)
      2016 0.46 0.46 0.37
      KCIF(4년) KCIF(5년) 중심성지수(3년) 즉시성지수
      0.29 0.26 0.301 0.24
      더보기

      이 자료와 함께 이용한 RISS 자료

      나만을 위한 추천자료

      해외이동버튼