Security Considerations on Three-Factor Anonymous Authentication Scheme for WSNs
نویسندگان
چکیده
منابع مشابه
Anonymous Authentication: For Privacy and Security
Fundamental Security Technologies Anonymous Authentication: For Privacy and Security By Kazue SAKO,* Shoko YONEZAWA* and Isamu TERANISHI* *Internet Systems Research Laboratories This paper presents NEC’s activities on anonymous authentication. Anonymous authentication is a means of authorizing a user without identification. The technology serves as a breakthrough to enhance the privacy of the u...
متن کاملAnonymous Client Authentication for Transport Layer Security
Nowadays, anonymity and privacy protecting mechanisms are becoming more and more important. The anonymity of platforms and the privacy of users operating in the Internet are major concerns of current research activities. Although different techniques for protecting anonymity exist, standard protocols like Transport Layer Security are still missing adequate support for these technologies. In thi...
متن کاملOn the Security of a Two-Factor Authentication Scheme
In this paper we evaluate the security of a two-factor Graphical Password scheme proposed in [1]. As in the original paper, we model the attack of a passive adversary as a boolean formula whose truth assignment corresponds to the user secret. We show that there exist a small number of secrets that a passive adversary cannot extract, independently from the amount information she manages to eaves...
متن کاملRemote three-factor authentication scheme based on Fuzzy extractors
In order to provide high-security remote authentication, the three-factor authentication scheme combining biometric with smart card and password has been proposed. With a careful review of the recently proposed Lee–Hsu’s scheme, this paper points out some design flaws in it. In order to withstand them, a new scheme based on Fuzzy extractors is proposed. With a detail analysis, this paper demons...
متن کاملAn authentication scheme for locating compromised sensor nodes in WSNs
Wireless sensor networks have recently emerged as a promising computing model for many civilian and military applications. Sensor nodes in such a network are subject to varying forms of attacks since they are left unattended after deployment. Compromised nodes can, for example, tamper with legitimate reports or inject false reports in order to either distract the user from reaching the right de...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Journal of Computer and Communications
سال: 2021
ISSN: 2327-5219,2327-5227
DOI: 10.4236/jcc.2021.93001