Have a personal or library account? Click to login
A Novel Tri-Factor Mutual Authentication with Biometrics for Wireless Body Sensor Networks in Healthcare Applications Cover

A Novel Tri-Factor Mutual Authentication with Biometrics for Wireless Body Sensor Networks in Healthcare Applications

By: Chen-Guang He,  Shu-Di Bao and  Ye Li  
Open Access
|Jun 2013

References

  1. M. L Das, “Two-Factor User Authentication in Wireless Sensor Networks”, IEEE Transaction on Wireless Communication, Vol.8, no.3, pp. 25-31, March 2009.10.1109/TWC.2008.080128
  2. M. L. Das, A. Saxena, and V. P. Gulati, “A Dynamic ID-based Remote User Authentication Scheme”, IEEE Transactions on Consumer Electronics, Vol. 50, no. 2, pp.629-631, May 2004.10.1109/TCE.2004.1309441
  3. A. Tiwari, Sudip Sanyal, A. Abraham, S. J. Knapskog, and Sugata Sanyal, “A Multi-Factor Security Protocol for Wireless Payment Secure Web Authentication Using Mobile Devices”, Proceedings of the IADIS Int’l. Conference on Applied Computing, pp. 160-167, Salamanca, Spain, February 17-20, 2007.
  4. D. Glynos, P. Kotzanikolaou and C. Douligeris, “Preventing Impersonation Attacks in MANET with Multi-factor Authentication”, Proc. of WiOpt’05, pp. 59-64, Trentino, Venezuela, 2005.
  5. C. C. Chang and T. C. Wu, “Remote Password Authentication with Smart Cards”, IEE Proceedings-E of Computers and Digital Techniques, Vol. 138, Iss. 3, pp. 165-168, May 1991,10.1049/ip-e.1991.0022
  6. K. Wong, Y. Zheng, J. Cao, and S. Wang, “A Dynamic User Authentication Scheme for Wireless Sensor Networks”, Proceedings of IEEE Int’l. Conference. on Sensor Networks, Ubiquitous, and Trustworthy Computing (SUTC’06), Vol. 1, Taichung, Taiwan, Jun 5-7, 2006.
  7. [7]Z. Benenson, F. Gartner, and D. Kesdogan, “User Authentication in sensor network (extended abstract)”, Proc. of Informatics’04, Workshop on Sensor Networks, Ulm, German, September 2004. [8]. M. S. Hwang and L. H. Li, “A new remote user authentication scheme using smart cards”, IEEE Transactions. on Consumer Electron, Vol. 46, Iss. 1. pp.28-30, 2000.10.1109/30.826377
  8. C. K. Chan and L. M. Cheng, “Cryptanalysis of a remote user authentication scheme using smart cards”, IEEE Transactions. on Consumer Electron, Vol. 46, Iss. 4, pp. 992-993, 2000.10.1109/30.920451
  9. A. K. Awasthi and S. Lal, “A Remote User Authntication Scheme Using Smart Cards with Forward Secrecy”, IEEE Transactions. on Consumer Electronics, Vol. 49, Iss. 4, pp. 1246-1248, 2003.
  10. S. W. Lee, H. S. Kim, and K. Y. Yoo, “Comment on ‘A Remote User Authentication Scheme using Smart Cards with Forward Secrecy’ “, IEEE Transactions. on Consumer Electronics, Vol. 50, Iss. 2, pp. 576-577, May 2004.10.1109/TCE.2004.1309427
  11. A. K. Awasthi, “Comment on ‘A Dynamic ID-based Remote User Authentication Scheme’ “, Transc. on Cryptology Vol.1, Iss. 2, pp. 15-16, Aug. 2004.
  12. H. F. Huang, Y. F. Chang, and C. H. Liu, “Enhancement of Two-Factor User Authentication in Wireless Sensor Networks”, Proceedings. of the 6th IEEE Int’l. Conference. on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP), pp. 27-30, Darmstadt, German, October 15-17, 2010.10.1109/IIHMSP.2010.14
  13. . P. Kumar, M. Sain, and H. J. Lee, “An Efficient Two-Factor User Authentication Framework for Wireless Sensor Networks”, Proceedings. of the 13rd IEEE Int’l. Conference. on Advanced Communication Technology (ICACT), pp.574-578, Phoenix Park, R. Korea, 2011.
  14. M. K. Khan and K. Alghathbar, “Cryptanalysis and Security Improvement of ‘Two-Factor User Authentication in Wireless Sensor Networks’ “, Journal of Sensors, Vol.10, pp. 2450-2459, 2010.
  15. C. Adams and M. J. Wiener, Multi-Factor Biometric Authenticating Device and Method, U.S. Patent 6,363,485, Mar 26, 2002.
  16. A. Bhargav-Spantzel, A. C. Squicciarini, S. Modi, M. Young, E. Bertino, and S. J. Elliott, “Privacy Preserving Multi-Factor Authentication with Biometrics”, Journal of Computer Security Vol. 15, no. 5, pp. 529-560, 2007.10.3233/JCS-2007-15503
  17. R. B. Paranjape, J. Mahovsky, L. Benedicenti, and Z. Koles, “The Elechoencephalogram as a Biometric”, Proc. Canadian Conference on Electrical and Computer Engineering, pp. 13631366, Toronto, Canada, May 13-16, 2001.
  18. L. Biel, O. Pettersson, L. Philipson, and P. Wide, “ECG Analysis: A New Approach in Human Identification”, IEEE Transactions on Instrumentation and Measurement, Vol. 50, Iss.3, pp. 808-812, 2001.10.1109/19.930458
  19. F. Sufi and I. Khalil, “Faster Person Identification Using Compressed ECG in Time Critical Wireless Telecardiology Applications”, Journal of Network and Computer Applications, Vol. 34, pp. 282-293, 2011.10.1016/j.jnca.2010.07.004
  20. Y. Y. Gu, Y. Zhang, and Y. T. Zhang, “A Novel Biometric Approach in Human Verification by Photoplethysmographic Signals”, Proceedings of the 4th Annual IEEE Conference on Information Technology Applications in Biomedicine, pp. 13-14, Birmingham, U.K., April 24-26, 2003.
  21. C. C. Y. Poon, Y. T. Zhang and S. D. Bao, “A Novel Biometrics Method to Secure Wireless Body Area Sensor Networks for Telemedicine and m-Health”, IEEE Communications Magazine, Vol. 44, no.4, pp.73–81, 2006.10.1109/MCOM.2006.1632652
  22. S. D. Bao, C. C. Y. Poon, Y. T. Zhang, and L. F. Shen, “Using the Timing Information of Heartbeats as the Entity Identity to Secure Medical Body Sensor Networks”, IEEE Transactions on Information Technology in Biomedicine, Vol.12, Iss. 6, pp. 772-779, Nov. 2008.10.1109/TITB.2008.92643419000958
  23. F. Miao, S. D. Bao, and Y. Li, “A Modified Fuzzy Vault Scheme for Biometrics-Based Body Sensor Networks Security”, Proc. of the 53rd IEEE GLOBECOM 2010, pp.1-5, Miami, USA, Dec. 6-10, 2010.10.1109/GLOCOM.2010.5683998
  24. C. Z. Cao, C. G. He, S. D. Bao, and Ye Li, “Improvement of fuzzy vault scheme for securing key distribution in body sensor network”, Proceedings of 33rd IEEE Int’l Conference Engineering in Medicine and Biology Society (EMBC’11), pp. 3563-3567, Boston, USA, August 30–September 3, 2011.
  25. J. Shen, S. D. Bao, L. C. Yang, and Y. Li, “The PLR-DTW Method for ECG Based Biometric Identification”, Proceedings of 33rd IEEE Int’l Conference Engineering in Medicine and Biology Society (EMBC’11), pp. 5248-5251, Boston, USA, August 30–September 3, 2011
  26. K. Singh and V. Muthukkumarasamy, “Authenticated Key Establishment Protocols for a Home Health Care System”. Proceedings of the IEEE Int’l Conference on Intelligent Sensors, Sensor Networks and Information Processing (ISSNIP), pp. 353-358, Melbourne, Australia, Dec 3-6, 2007.10.1109/ISSNIP.2007.4496869
  27. C. G. He, S. D. Bao, “An Encryption Algorithm Based on Chaotic System for 3G Security Authentication”, Proc. 2nd IEEE Youth Conference on Information, Computing and Telecommunications, pp. 351–354, Beijing, China, Nov 28-20, 2010.
  28. Z. Li, X. Xu and Z. Fan, “Light Weight Trusted ID-Based Signcryption Scheme for Wireless Sensor Networks”, International Journal on Smart Sensing and Intelligent Systems, Vol. 5, no.4, pp.799-810, 2012.10.21307/ijssis-2017-507
  29. T. Hong, S. D. Bao, Y. T. Zhang, Y. Li and P. Yang. “An Improved Scheme of IPI-based Entity Identifier Generation for Securing Body Sensor Networks”, Proceedings of 33rd IEEE Int’l Conference Engineering in Medicine and Biology Society (EMBC’11), pp. 1519-1522, Boston, USA, August 30–September 3, 2011.
Language: English
Page range: 910 - 931
Submitted on: Sep 29, 2012
|
Accepted on: May 16, 2013
|
Published on: Jun 5, 2013
In partnership with: Paradigm Publishing Services
Publication frequency: 1 issue per year

© 2013 Chen-Guang He, Shu-Di Bao, Ye Li, published by Professor Subhas Chandra Mukhopadhyay
This work is licensed under the Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 License.