{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T12:43:29Z","timestamp":1740141809253,"version":"3.37.3"},"reference-count":29,"publisher":"SAGE Publications","issue":"5","license":[{"start":{"date-parts":[[2013,5,1]],"date-time":"2013-05-01T00:00:00Z","timestamp":1367366400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/journals.sagepub.com\/page\/policies\/text-and-data-mining-license"}],"funder":[{"DOI":"10.13039\/501100002646","name":"Sogang University","doi-asserted-by":"publisher","award":["201110026"],"award-info":[{"award-number":["201110026"]}],"id":[{"id":"10.13039\/501100002646","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["journals.sagepub.com"],"crossmark-restriction":true},"short-container-title":["International Journal of Distributed Sensor Networks"],"published-print":{"date-parts":[[2013,5,1]]},"abstract":"<jats:p> Recently, several user authentication schemes for wireless sensor networks based on two-factor concept using the smart card technology were proposed. However, they have serious limitations in terms of security and usability. First, even though they are enhancements of other works, they still have several security flaws, such as vulnerability against parallel session, privileged-insider, and gateway-node bypassing attacks and lack of mutual authentication between user station and gateway node. On the other hand, they also present a usability constraint, in a sense that they do not consider the use case when sensor nodes cannot communicate with gateway node. In this case, data collected by isolated sensor nodes could not be accessed until they recover such communication, which is in many times not recoverable rapidly or forever (e.g., military applications, natural disaster monitoring). Due to all these reasons, this paper proposes a robust user authentication scheme which fixes the security weaknesses of previous solutions and provides wider usability considering the use case when the sensor nodes cannot communicate with the gateway node. Once the solution is described, its security is ensured by formal proof and analysis against attacks. Additionally, performance and cost analysis are executed to determine its level of feasibility for real implementation. <\/jats:p>","DOI":"10.1155\/2013\/543950","type":"journal-article","created":{"date-parts":[[2013,5,13]],"date-time":"2013-05-13T21:03:44Z","timestamp":1368479024000},"page":"543950","update-policy":"https:\/\/doi.org\/10.1177\/sage-journals-update-policy","source":"Crossref","is-referenced-by-count":9,"title":["A Performance and Usability Aware Secure Two-Factor User Authentication Scheme for Wireless Sensor Networks"],"prefix":"10.1177","volume":"9","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-1376-3843","authenticated-orcid":false,"given":"Sang Guun","family":"Yoo","sequence":"first","affiliation":[{"name":"Department of Computer Science and Engineering, Sogang University, Seoul 121-712, Republic of Korea"}]},{"given":"Hyukjun","family":"Lee","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Engineering, Sogang University, Seoul 121-712, Republic of Korea"}]},{"given":"Juho","family":"Kim","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Engineering, Sogang University, Seoul 121-712, Republic of Korea"}]}],"member":"179","published-online":{"date-parts":[[2013,5,13]]},"reference":[{"key":"B1-2013-543950","doi-asserted-by":"publisher","DOI":"10.3390\/s100908683"},{"key":"B2-2013-543950","doi-asserted-by":"publisher","DOI":"10.1109\/IPSN.2008.9"},{"key":"B3-2013-543950","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2008.080128"},{"key":"B5-2013-543950","doi-asserted-by":"publisher","DOI":"10.1109\/IIHMSP.2010.14"},{"key":"B6-2013-543950","doi-asserted-by":"publisher","DOI":"10.4218\/etrij.10.1510.0134"},{"key":"B7-2013-543950","doi-asserted-by":"publisher","DOI":"10.3390\/s100302450"},{"key":"B8-2013-543950","doi-asserted-by":"publisher","DOI":"10.1155\/2012\/382810"},{"key":"B9-2013-543950","doi-asserted-by":"publisher","DOI":"10.1109\/MIC.2006.26"},{"key":"B10-2013-543950","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1983.1056650"},{"first-page":"388","volume-title":"Proceedings of the 19th International Advances in Cryptography Conference (CRYPTO \u203299)","author":"Kocher P.","key":"B11-2013-543950"},{"key":"B12-2013-543950","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2002.1004593"},{"key":"B14-2013-543950","doi-asserted-by":"publisher","DOI":"10.1109\/SAHCN.2008.44"},{"key":"B17-2013-543950","doi-asserted-by":"publisher","DOI":"10.1109\/PERCOMW.2006.110"},{"first-page":"71","volume-title":"Proceedings of the 1st Annual IEEE Communications Society Conference on Sensor and Ad Hoc Communications and Networks (IEEE SECON \u203204)","author":"Malan D. J.","key":"B18-2013-543950"},{"key":"B19-2013-543950","doi-asserted-by":"publisher","DOI":"10.1145\/1180345.1180366"},{"first-page":"324","volume-title":"Proceedings of the Annual IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops \u203205)","author":"Wander A.","key":"B20-2013-543950"},{"key":"B21-2013-543950","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-77024-4_43"},{"key":"B22-2013-543950","doi-asserted-by":"publisher","DOI":"10.1007\/11807964_38"},{"key":"B23-2013-543950","doi-asserted-by":"publisher","DOI":"10.1145\/77648.77649"},{"key":"B24-2013-543950","doi-asserted-by":"publisher","DOI":"10.1142\/S0218194006002793"},{"key":"B25-2013-543950","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2011.10.049"},{"key":"B26-2013-543950","doi-asserted-by":"publisher","DOI":"10.4304\/jnw.6.3.446-453"},{"key":"B27-2013-543950","doi-asserted-by":"publisher","DOI":"10.1002\/dac.1118"},{"volume-title":"Timestamps for Network Authentication Protocols Revisited","year":"1999","author":"Gamage C.","key":"B28-2013-543950"},{"issue":"1","key":"B29-2013-543950","volume":"9","author":"Ying R.","year":"2006","journal-title":"Journal of Software Technology"},{"key":"B30-2013-543950","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2006.116"},{"key":"B31-2013-543950","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2002.804190"},{"key":"B32-2013-543950","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2004.41"},{"key":"B33-2013-543950","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-011-0735-z"}],"container-title":["International Journal of Distributed Sensor Networks"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/journals.sagepub.com\/doi\/pdf\/10.1155\/2013\/543950","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/journals.sagepub.com\/doi\/full-xml\/10.1155\/2013\/543950","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/journals.sagepub.com\/doi\/pdf\/10.1155\/2013\/543950","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,16]],"date-time":"2021-05-16T22:27:02Z","timestamp":1621204022000},"score":1,"resource":{"primary":{"URL":"http:\/\/journals.sagepub.com\/doi\/10.1155\/2013\/543950"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,5,1]]},"references-count":29,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2013,5,1]]}},"alternative-id":["10.1155\/2013\/543950"],"URL":"https:\/\/doi.org\/10.1155\/2013\/543950","relation":{},"ISSN":["1550-1477","1550-1477"],"issn-type":[{"type":"print","value":"1550-1477"},{"type":"electronic","value":"1550-1477"}],"subject":[],"published":{"date-parts":[[2013,5,1]]}}}