Have a personal or library account? Click to login
A Novel Tri-Factor Mutual Authentication with Biometrics for Wireless Body Sensor Networks in Healthcare Applications Cover

A Novel Tri-Factor Mutual Authentication with Biometrics for Wireless Body Sensor Networks in Healthcare Applications

By:
Open Access
|Jun 2013

References

  1. M. L Das, “Two-Factor User Authentication in Wireless Sensor Networks”, IEEE Transaction on Wireless Communication, Vol.8, no.3, pp. 25-31, March 2009.<dgdoi:pub-id xmlns:dgdoi="http://degruyter.com/resources/doi-from-crossref" pub-id-type="doi"><a href="https://doi.org/10.1109/TWC.2008.080128" target="_blank" rel="noopener noreferrer" class="text-signal-blue hover:underline">10.1109/TWC.2008.080128</a></dgdoi:pub-id>
  2. M. L. Das, A. Saxena, and V. P. Gulati, “A Dynamic ID-based Remote User Authentication Scheme”, IEEE Transactions on Consumer Electronics, Vol. 50, no. 2, pp.629-631, May 2004.<dgdoi:pub-id xmlns:dgdoi="http://degruyter.com/resources/doi-from-crossref" pub-id-type="doi"><a href="https://doi.org/10.1109/TCE.2004.1309441" target="_blank" rel="noopener noreferrer" class="text-signal-blue hover:underline">10.1109/TCE.2004.1309441</a></dgdoi:pub-id>
  3. A. Tiwari, Sudip Sanyal, A. Abraham, S. J. Knapskog, and Sugata Sanyal, “A Multi-Factor Security Protocol for Wireless Payment Secure Web Authentication Using Mobile Devices”, Proceedings of the IADIS Int’l. Conference on Applied Computing, pp. 160-167, Salamanca, Spain, February 17-20, 2007.
  4. D. Glynos, P. Kotzanikolaou and C. Douligeris, “Preventing Impersonation Attacks in MANET with Multi-factor Authentication”, Proc. of <em>WiOpt’05</em><bold>,</bold> pp. 59-64, Trentino, Venezuela, 2005.
  5. C. C. Chang and T. C. Wu, “Remote Password Authentication with Smart Cards”, IEE Proceedings-E of Computers and Digital Techniques, Vol. 138, Iss. 3, pp. 165-168, May 1991,<dgdoi:pub-id xmlns:dgdoi="http://degruyter.com/resources/doi-from-crossref" pub-id-type="doi"><a href="https://doi.org/10.1049/ip-e.1991.0022" target="_blank" rel="noopener noreferrer" class="text-signal-blue hover:underline">10.1049/ip-e.1991.0022</a></dgdoi:pub-id>
  6. K. Wong, Y. Zheng, J. Cao, and S. Wang, “A Dynamic User Authentication Scheme for Wireless Sensor Networks”, Proceedings of IEEE Int’l. Conference. on Sensor Networks, Ubiquitous, and Trustworthy Computing (SUTC’06), Vol. 1, Taichung, Taiwan, Jun 5-7, 2006.
  7. [7]Z. Benenson, F. Gartner, and D. Kesdogan, “User Authentication in sensor network (extended abstract)”, Proc. of Informatics’04, Workshop on Sensor Networks, Ulm, German, September 2004. [8]. M. S. Hwang and L. H. Li, “A new remote user authentication scheme using smart cards”, IEEE Transactions. on Consumer Electron, Vol. 46, Iss. 1. pp.28-30, 2000.10.1109/30.826377
  8. C. K. Chan and L. M. Cheng, “Cryptanalysis of a remote user authentication scheme using smart cards”, IEEE Transactions. on Consumer Electron, Vol. 46, Iss. 4, pp. 992-993, 2000.<dgdoi:pub-id xmlns:dgdoi="http://degruyter.com/resources/doi-from-crossref" pub-id-type="doi"><a href="https://doi.org/10.1109/30.920451" target="_blank" rel="noopener noreferrer" class="text-signal-blue hover:underline">10.1109/30.920451</a></dgdoi:pub-id>
  9. A. K. Awasthi and S. Lal, “A Remote User Authntication Scheme Using Smart Cards with Forward Secrecy”, IEEE Transactions. on Consumer Electronics, Vol. 49, Iss. 4, pp. 1246-1248, 2003.
  10. S. W. Lee, H. S. Kim, and K. Y. Yoo, “Comment on ‘A Remote User Authentication Scheme using Smart Cards with Forward Secrecy’ “, IEEE Transactions. on Consumer Electronics, Vol. 50, Iss. 2, pp. 576-577, May 2004.<dgdoi:pub-id xmlns:dgdoi="http://degruyter.com/resources/doi-from-crossref" pub-id-type="doi"><a href="https://doi.org/10.1109/TCE.2004.1309427" target="_blank" rel="noopener noreferrer" class="text-signal-blue hover:underline">10.1109/TCE.2004.1309427</a></dgdoi:pub-id>
  11. A. K. Awasthi, “Comment on ‘A Dynamic ID-based Remote User Authentication Scheme’ “, Transc. on Cryptology Vol.1, Iss. 2, pp. 15-16, Aug. 2004.
  12. H. F. Huang, Y. F. Chang, and C. H. Liu, “Enhancement of Two-Factor User Authentication in Wireless Sensor Networks”, Proceedings. of the 6th IEEE Int’l. Conference. on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP), pp. 27-30, Darmstadt, German, October 15-17, 2010.<dgdoi:pub-id xmlns:dgdoi="http://degruyter.com/resources/doi-from-crossref" pub-id-type="doi"><a href="https://doi.org/10.1109/IIHMSP.2010.14" target="_blank" rel="noopener noreferrer" class="text-signal-blue hover:underline">10.1109/IIHMSP.2010.14</a></dgdoi:pub-id>
  13. . P. Kumar, M. Sain, and H. J. Lee, “An Efficient Two-Factor User Authentication Framework for Wireless Sensor Networks”, Proceedings. of the 13rd IEEE Int’l. Conference. on Advanced Communication Technology (ICACT), pp.574-578, Phoenix Park, R. Korea, 2011.
  14. M. K. Khan and K. Alghathbar, “Cryptanalysis and Security Improvement of ‘Two-Factor User Authentication in Wireless Sensor Networks’ “, Journal of Sensors, Vol.10, pp. 2450-2459, 2010.
  15. C. Adams and M. J. Wiener, Multi-Factor Biometric Authenticating Device and Method, U.S. Patent 6,363,485, Mar 26<bold>,</bold> 2002.
  16. A. Bhargav-Spantzel, A. C. Squicciarini, S. Modi, M. Young, E. Bertino, and S. J. Elliott, “Privacy Preserving Multi-Factor Authentication with Biometrics”, Journal of Computer Security Vol. 15, no. 5, pp. 529-560, 2007.<dgdoi:pub-id xmlns:dgdoi="http://degruyter.com/resources/doi-from-crossref" pub-id-type="doi"><a href="https://doi.org/10.3233/JCS-2007-15503" target="_blank" rel="noopener noreferrer" class="text-signal-blue hover:underline">10.3233/JCS-2007-15503</a></dgdoi:pub-id>
  17. R. B. Paranjape, J. Mahovsky, L. Benedicenti, and Z. Koles, “The Elechoencephalogram as a Biometric”, Proc. Canadian Conference on Electrical and Computer Engineering, pp. 13631366, Toronto, Canada, May 13-16, 2001.
  18. L. Biel, O. Pettersson, L. Philipson, and P. Wide, “ECG Analysis: A New Approach in Human Identification”, IEEE Transactions on Instrumentation and Measurement, Vol. 50, Iss.3, pp. 808-812, 2001.<dgdoi:pub-id xmlns:dgdoi="http://degruyter.com/resources/doi-from-crossref" pub-id-type="doi"><a href="https://doi.org/10.1109/19.930458" target="_blank" rel="noopener noreferrer" class="text-signal-blue hover:underline">10.1109/19.930458</a></dgdoi:pub-id>
  19. F. Sufi and I. Khalil, “Faster Person Identification Using Compressed ECG in Time Critical Wireless Telecardiology Applications”, Journal of Network and Computer Applications, Vol. 34, pp. 282-293, 2011.<dgdoi:pub-id xmlns:dgdoi="http://degruyter.com/resources/doi-from-crossref" pub-id-type="doi"><a href="https://doi.org/10.1016/j.jnca.2010.07.004" target="_blank" rel="noopener noreferrer" class="text-signal-blue hover:underline">10.1016/j.jnca.2010.07.004</a></dgdoi:pub-id>
  20. Y. Y. Gu, Y. Zhang, and Y. T. Zhang, “A Novel Biometric Approach in Human Verification by Photoplethysmographic Signals”, Proceedings of the 4th Annual IEEE Conference on Information Technology Applications in Biomedicine, pp. 13-14, Birmingham, U.K., April 24-26, 2003.
  21. C. C. Y. Poon, Y. T. Zhang and S. D. Bao, “A Novel Biometrics Method to Secure Wireless Body Area Sensor Networks for Telemedicine and m-Health”, IEEE Communications Magazine, Vol. 44, no.4, pp.73–81, 2006.<dgdoi:pub-id xmlns:dgdoi="http://degruyter.com/resources/doi-from-crossref" pub-id-type="doi"><a href="https://doi.org/10.1109/MCOM.2006.1632652" target="_blank" rel="noopener noreferrer" class="text-signal-blue hover:underline">10.1109/MCOM.2006.1632652</a></dgdoi:pub-id>
  22. S. D. Bao, C. C. Y. Poon, Y. T. Zhang, and L. F. Shen, “Using the Timing Information of Heartbeats as the Entity Identity to Secure Medical Body Sensor Networks”, IEEE Transactions on Information Technology in Biomedicine, Vol.12, Iss. 6, pp. 772-779, Nov. 2008.<dgdoi:pub-id xmlns:dgdoi="http://degruyter.com/resources/doi-from-crossref" pub-id-type="doi"><a href="https://doi.org/10.1109/TITB.2008.926434" target="_blank" rel="noopener noreferrer" class="text-signal-blue hover:underline">10.1109/TITB.2008.926434</a></dgdoi:pub-id><dgpm:pub-id xmlns:dgpm="http://degruyter.com/resources/fetched-pubmed-id" pub-id-type="pmid">19000958</dgpm:pub-id>
  23. F. Miao, S. D. Bao, and Y. Li, “A Modified Fuzzy Vault Scheme for Biometrics-Based Body Sensor Networks Security”, Proc. of the 53rd <em>IEEE GLOBECOM 2010</em>, pp.1-5, Miami, USA, Dec. 6-10, 2010.<dgdoi:pub-id xmlns:dgdoi="http://degruyter.com/resources/doi-from-crossref" pub-id-type="doi"><a href="https://doi.org/10.1109/GLOCOM.2010.5683998" target="_blank" rel="noopener noreferrer" class="text-signal-blue hover:underline">10.1109/GLOCOM.2010.5683998</a></dgdoi:pub-id>
  24. C. Z. Cao, C. G. He, S. D. Bao, and Ye Li, “Improvement of fuzzy vault scheme for securing key distribution in body sensor network”, Proceedings of 33rd IEEE Int’l Conference Engineering in Medicine and Biology Society (EMBC’11), pp. 3563-3567, Boston, USA, August 30–September 3, 2011.
  25. J. Shen, S. D. Bao, L. C. Yang, and Y. Li, “The PLR-DTW Method for ECG Based Biometric Identification”, Proceedings of 33rd IEEE Int’l Conference Engineering in Medicine and Biology Society (EMBC’11), pp. 5248-5251, Boston, USA, August 30–September 3, 2011
  26. K. Singh and V. Muthukkumarasamy, “Authenticated Key Establishment Protocols for a Home Health Care System”. Proceedings of the IEEE Int’l Conference on Intelligent Sensors, Sensor Networks and Information Processing (ISSNIP), pp. 353-358, Melbourne, Australia, Dec 3-6, 2007.<dgdoi:pub-id xmlns:dgdoi="http://degruyter.com/resources/doi-from-crossref" pub-id-type="doi"><a href="https://doi.org/10.1109/ISSNIP.2007.4496869" target="_blank" rel="noopener noreferrer" class="text-signal-blue hover:underline">10.1109/ISSNIP.2007.4496869</a></dgdoi:pub-id>
  27. C. G. He, S. D. Bao, “An Encryption Algorithm Based on Chaotic System for 3G Security Authentication”, Proc. 2nd IEEE Youth Conference on Information, Computing and Telecommunications, pp. 351–354, Beijing, China, Nov 28-20, 2010.
  28. Z. Li, X. Xu and Z. Fan, “Light Weight Trusted ID-Based Signcryption Scheme for Wireless Sensor Networks”, International Journal on Smart Sensing and Intelligent Systems, Vol. 5, no.4, pp.799-810, 2012.<dgdoi:pub-id xmlns:dgdoi="http://degruyter.com/resources/doi-from-crossref" pub-id-type="doi"><a href="https://doi.org/10.21307/ijssis-2017-507" target="_blank" rel="noopener noreferrer" class="text-signal-blue hover:underline">10.21307/ijssis-2017-507</a></dgdoi:pub-id>
  29. T. Hong, S. D. Bao, Y. T. Zhang, Y. Li and P. Yang. “An Improved Scheme of IPI-based Entity Identifier Generation for Securing Body Sensor Networks”, Proceedings of 33rd IEEE Int’l Conference Engineering in Medicine and Biology Society (EMBC’11), pp. 1519-1522, Boston, USA, August 30–September 3, 2011.
Language: English
Page range: 910 - 931
Submitted on: Sep 29, 2012
Accepted on: May 16, 2013
Published on: Jun 5, 2013
Published by: Professor Subhas Chandra Mukhopadhyay
In partnership with: Paradigm Publishing Services
Publication frequency: 1 times per year

© 2013 Chen-Guang He, Shu-Di Bao, Ye Li, published by Professor Subhas Chandra Mukhopadhyay
This work is licensed under the Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 License.