| 研究生: |
普杉達 Gope, Prosanta |
|---|---|
| 論文名稱: |
使用輕量級密碼原件之安全無線網路通訊 Implication of Lightweight Cryptographic Primitives for Secure Communication in Various Wireless Networks |
| 指導教授: |
黃宗立
Hwang, Tzonelih |
| 學位類別: |
博士 Doctor |
| 系所名稱: |
電機資訊學院 - 資訊工程學系 Department of Computer Science and Information Engineering |
| 論文出版年: | 2016 |
| 畢業學年度: | 104 |
| 語文別: | 英文 |
| 論文頁數: | 228 |
| 中文關鍵詞: | 匿名性 、不可追蹤性 、完美前推保密 、無線通訊 、手機網際網路 、無線射頻辨識系統 、無線感測器網路 、物聯網 、人體感測器網路 、機器與機器間的通訊 |
| 外文關鍵詞: | Anonymity, Untraceability, Perfect forward secrecy, Wireless communication, GLOMONET, RFID, WSN, IoT, BSN, M2M |
| 相關次數: | 點閱:133 下載:5 |
| 分享至: |
| 查詢本校圖書館目錄 查詢臺灣博碩士論文知識加值系統 勘誤回報 |
本博士論文旨在探討如何使用一些輕負擔的技術,以提供各種無線通訊的不同安全需求,以保障人類無所不在的通訊隱私的安全。
我們說明何謂「輕負擔」?何謂「無線通訊」?與何謂「安全」?並嚐試用正規方法去證明安全性。
我們避開使用會被量子電腦破解的密碼技術,與高計算複雜度的密碼技術。
我們嚐試追求「簡單即是美」的自然、藝術境界。
Wireless technology releases us from copper wires. A user can have a notebook computer, PDA, Pocket PC, Tablet PC, or just a cell phone and stay online anywhere a wireless signal is available. The basic theory behind wireless technology is that signals can be carried by electromagnetic waves that are then transmitted to a signal receiver. Because of the nature of transmission, the communication in the air via various wireless technologies is easier than the traditional wired communication environments. However, due to the broadcast nature of the wireless channel, wireless communication suffers more security threats than the wired one. In this regard, the attacker may intercept the transmitted message by eavesdropping the wireless channel even the encrypted wireless communication provided. Moreover, since the communication in every session may be associated with the fixed identity and the static security credentials of the same individual. Therefore, the attackers may track any individual with wireless devices such as mobile phone, RFID tag, bio-sensor, etc. by intercepting its wireless communication. In addition to that, mobility of the wireless devices such as mobile phones, RFID tags incurs possible threat to the past encrypted transmitted data, where the past session keys for the encryption of wireless communications may be derived by the long-term secret key of the wireless devices if it was lost or broken. On the other hand, security (privacy and integrity) of the transmitted data is another imperative concern in wireless communication, where an attacker may intercept and try to alter the transmitted data communicated between the wireless devices and that eventually can bring about various security issues. By providing the features of anonymity, untraceability, perfect forward secrecy in the authentication protocols and with the help of an efficient data security mechanism, the aforesaid security threats can be dealt in wireless communication.
Although, impressive efforts have been made for accomplishing the security feature such as, anonymity, however, this thesis shows that existing approaches to ensure the property like anonymity are impractical. Besides, even though, some public key crypto-systems such as Differ-Hellman can provide the solution of perfect forward secrecy. However, most of the existing standards of wireless communication, e.g. global system for mobile communications (GSM), universal mobile telecommunications systems (UMTS), WiFi protected access, and etc., are based on symmetric-key crypto-system, where an asymmetric operation such modular exponential operation causes significantly higher communication overhead and execution time than the symmetric key operations, which is greatly imperative for any battery powered wireless devices such as mobile devices, RFID tags, sensors etc.
In this thesis, at first we show some ways to design the lightweight anonymous authentication framework, which can efficiently accomplish the features like anonymity, untraceability, perfect forward secrecy, etc. In this regard, we use the lightweight cryptographic primitives such as symmetric key encryption/decryption, one-way non-collision hash functions and Exclusive-OR operations, which are more suitable for battery powered wireless devices. In addition to that, this thesis also focuses on the data security, i.e. privacy, and integrity of the transmitted data communicated between the wireless devices. In this context, we design some data security frameworks in the form of single-pass authenticated encryption modes (Authencryption) by using the encryption modes such as counter mode, cipher feedback mode, etc., where these conventional modes cannot ensure privacy and integrity of the transmitted data in a single pass. Subsequently, we enforce our designed lightweight anonymous authentication frameworks and data security frameworks for ensuring security in various wireless networks, such as mobile network, wireless sensor network, etc. Furthermore, security analyses show that our proposed solutions are secure and hence can be useful for wireless communication.
[1] A. Herzberg, H. Krawczyk, and G. Tsudik, “On travelling incognito,” IEEE Workshop on Mobile systems and Applications, pp. 205-211, 1994.
[2] S. Hirani, “Energy Consumption of Encryption Schemes in Wireless Devices,” M.S. thesis, School of Information Science, University of Pittsburgh, United States, 2003.
[3] J. Zhu and J. Ma, “A new authentication scheme with anonymity for wireless environments,” IEEE Transactions on Consumer Electronics, vol. 50, no.1, pp. 50, 230-234, 2004.
[4] C. C Lee, M. S Hwang, and I. E. Liao, “Security enhancement on a new authentication scheme with anonymity for wireless environments,” IEEE Transactions on Industrial Electronics, vol. 53, no. 5, pp. 1683-1687, 2006.
[5] C. C. Wu, W. B. Lee, and W. J. Tsaur, “A secure authentication scheme with anonymity for wireless communications,” IEEE Communication Letters, vol. 12, no.10, pp. 722-723, 2008.
[6] C. C. Chang, C.Y. Lee and Y. C. Chiu, “Enhance authentication scheme with anonymity for roaming service in global mobility networks,” Computer Communications, vol. 32, pp. 611-618, 2009.
[7] T. Y. Youn, T. H. Park, and Lim, “Weaknesses in an anonymous authentication scheme for roaming service in global mobile networks,” IEEE Communication Letters, vol.13, no.7, pp. 471-473, 2009.
[8] C. Tang and D. O. Wu, “Mobile privacy in wireless networks revisited,” IEEE Transactions on Wireless Communication, vol.7, pp. 1035-1042, 2008.
[9] J. Lu and J. Zhou, “On the security of an efficient mobile authentication scheme for wireless networks,” WICOM2010, 6th International Conference on Wireless Communications Networking and Mobile Computing, IEEE Press, pp. 23-25, Sept. 2010.
[10] T. Zhou and J. Xu, “Provable secure authentication protocol with anonymity for roaming service in global mobility networks,” Computer Networks, vol. 55, pp. 205-213, 2011.
[11] G. Yang, Q. Huang, W. S. Duncan, X. Deng, “Universal authentication protocols for anonymous wireless communications,” IEEE Transactions on Wireless Communications, vol. 9, no. 1, pp. 168 - 174, 2010.
[12] D. He, C. Chen, S. Chan, and J. Bu, “Secure and Efficient Handover Authentication Based on Bilinear Pairing Functions,” IEEE Transactions on Wireless Communication, vol. 11, no. 1, pp. 48-53, 2012.
[13] D He, C Chen, S Chan, J Bu, “Analysis and improvement of a secure and efficient handover authentication for wireless networks,” IEEE Communications Letters, pp. 1270-1273, 2012.
[14] J.L. Tsai, N.W. Lo, T.C. Wu, “Secure Handover Authentication Protocol Based on Bilinear Pairings,” Wireless Personal Communications, December 2013, Volume 73, Issue 3, pp 1037-1047, 2012.
[15] H. Mun, K. Han, Y. Lee, C. Yeun, and H. Choi, “Enhanced secure anonymous authentication scheme for roaming service in global mobile network,” Mathematical and computer Modeling, vol. 55, pp. 214-222, 2012.
[16] J. Kim, and J. Kwak, “Improved secure anonymous authentication scheme for roaming service in global mobile network,” International Journal of Security and its Applications, vol.6(3), pp. 45-54, 2012.
[17] Q. Jiang, J. Ma, G. Li, L. Yang, “An enhanced authentication scheme with privacy preservation for roaming services in global mobility networks,” Wireless Personal Communications, vol. 68, pp. 1477-1491, 2013.
[18] F. Wen, W. Susilo, and G. Yang, “A secure and effective user authentication scheme for roaming service in global mobility networks,” Wireless Personal Communications, DOI. 10.1007/s11277-013-1243-4, 2013.
[19] D. He, Y. Zhang, J. Chen, “Cryptanalysis and Improvement of an Anonymous Authentication Protocol for Wireless Access Networks,” Wireless Personal Communications, vol. 74, pp. 229–243, 2014.
[20] T. Hwang, P. Gope, “Provably secure mutual authentication and key exchange scheme for expeditious mobile communication through synchronously one-time Secrets,” Wireless Personal Communications, DOI. 10.1007/s11277-013-1501-5, 2013.
[21] J. Yang, J. Park, H. Lee, K. Ren, K. Kim, “Mutual authentication protocol for low-cost RFID,” Proceedings of the Workshop on RFID and Lightweight Cryptography, pp. 17–24, 2005.
[22] C. Qingling, Z. Yiju, W. Yonghua, “A minimalist mutual authentication protocol for RFID system and BAN logic analysis,” ISECS International Colloquium on Computing, Communication, Control, and Management pp. 449–453, 2008.
[23] Z. Luo, T. Chan, J.S. Li, “A lightweight mutual authentication protocol for RFID networks,” Proceedings of the IEEE International Conference on e-Business Engineering (ICEBE '05), pp. 620–625, 2005,
[24] C.C. Tan, B. Sheng, Q. Li, “Secure and server-less RFID authentication and search protocols,” IEEE Transactions on Wireless Communications, vol. 7 (4) pp. 1400–1407, (April 2008).
[25] S. Cai, Y. Li, T. Li, R. Deng, “Attacks and improvements to an RFID mutual authentication protocol,” 2nd ACM Conference on Wireless Network Security (WiSec '09), pp. 51–58, 2009.
[26] J-S Cho, Y-S Jeong, S. Park, “Consideration on the Brute-force Attack Cost and Retrieval Cost: a Hash-based radio-frequency identification (RFID) Tag Mutual Authentication Protocol,” Computers & Mathematics with Applications (2012).
[27] K. H. M. Wong, Z. Yuan, C. Jiannong, and W. Sheng wei, “A dynamic user authentication scheme for wireless sensor networks,” in Proceedings of the IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing, pp. 244-251, Taiwan, June, 2006.
[28] M.L. Das, “Two-factor user authentication in wireless sensor networks,” IEEE Transaction on Wireless Communications. vol. 8 no. 3, pp. 1086–1090, 2009.
[29] D. He, Y. Gao, S. Chan, C. Chen, J. Bu. “A n enhanced two-factor user authentication scheme in wireless sensor networks,” AdHoc & Sensor Wireless Networks vol. 10 no. 4, 2010.
[30] H. Yeh, T. Chen, P. Liu, T. Kim, H. Wei, “A secured authentication protocol for wireless sensor networks using elliptic curves cryptography,” Sensors vol. 11, no. 5 pp. 4767–4779. 2011.
[31] R. Fan, D. He, X. Pan, L. Ping, “An efficient and dos-resistant user authentication scheme for two-tiered wireless sensor networks,” Journal of Zhejinag Univ.-Sci C vol. 12 no.7 pp. 550–560, 2011.
[32] D. Wang, P. Wang, “On the anonymity of two-factor authentication schemes for wireless sensor networks: attacks, principle, and solutions,” Computer Networks, vol. 73, pp. 41-57, 2014.
[33] P. Kumar, A.J. Choudhury, M. Sain, S.M. Lee, H.J. Lee, “Ruasn: a robust user authentication framework for wireless sensor networks,” Sensors vol. 11 no. 5, pp.5020–5046, 2011.
[34] Q. Jiang, Z. Ma, J.F. Ma, G. Li, “Security enhancement of robust user authentication framework for wireless sensor networks,” China Communication, vol. 9, no. 10, pp. 103–111, 2012.
[35] TH Chen, WK. Shih, “A robust authentication protocol for wireless sensor networks,” ETRI Journal, vol. 32, no. 5, pp. 704-712, 2010.
[36] K. Xue, C. Ma, P. Hong, R. Ding, “A temporal-credential-based mutual authentication and key agreement scheme for wireless sensor networks,” Journal of Network Computer Applications, vol. 36 no. 1, pp.316–323, 2013.
[37] C. T. Li, C. Y. Weng, C. C. Lee, “An advanced temporal credential-based security scheme with mutual authentication and key agreement for wireless sensor networks,” Sensors, vol. 13, pp. 9589–9603, 2013.
[38] A. K. Das, “A Secure and Efficient User Anonymity-Preserving Three-Factor Authentication Protocol for Large-Scale Distributed Wireless Sensor Networks,” Wireless Personal Communications, vol. 82 no. 3: pp. 1377-1404, 2015.
[39] A. K. Das, “A secure and effective biometric-based user authentication scheme for wireless sensor networks using smart card and fuzzy extractor,” International Journal of Communication Systems DOI: 10.1002/dac.2933, 2015.
[40] Q. Jiang, J. Ma, X. Lu, Y. Tian: “An efficient two-factor user authentication scheme with unlinkability for wireless sensor networks,” Peer-to-Peer Networking and Applications, 2014.
[41] A. K. Das, “A secure and robust temporal credential-based three-factor user authentication scheme for wireless sensor networks,” Peer-to-Peer Networking and Applications DOI: 10.1007/s12083-014-0324-9, 2014.
[42] C. H. Meyer, S. M. Matyas, “Cryptography: A New Dimension in Computer Data Security,” John Wiley and Sons, New York, 1982.
[43] National Bureau of Standards. 1980. “NBS FIPS PUB 81: DES modes of operation,” U.S. Department of Commerce.
[44] M. Bellare, A. Desai, E. Jokipii, P. Rogaway, “A Concrete Security Treatment of Symmetric Encryption: Analysis of the DES Modes of Operation,” 38th Symposium on Foundations of Computer Science (FOCS), IEEE Computer Society, 1997, 394-403.
[45] S. Goldwasser and S. Micali, “Probabilistic Encryption,” J. Com-put. Syst. Sci., 28(2):270299, 1984.
[46] P. Gope, T. Hwang, “Lightweight and Energy Efficient Mutual Authentication and Key Agreement Scheme with User Anonymity for Secure Communication in Global Mobility Networks,” IEEE Systems Journal, DOI: 10.1109/JSYST.2015.2416396, 2015.
[47] C. Jutla, “Encryption modes with almost free message integrity,” In Advances in Cryptology–EUROCRYPT 2001, B. Pfitzmann, Ed., vol. 2045, LNCS, Springer–Verlag, pp. 529–544.
[48] S. Halevi, “An observation regarding Jutla’s modes of operation,” submitted Feb 22, 2001, and revised. Apr 2, 2001, Cryptology ePrint archive, reference number 2001/015.
[49] V. Gligor, and P. Donescu, “Fast encryption and authentication: XCBC encryption and XECB authentication modes,” In Fast Software Encryption, 8th International Workshop, FSE 2001, M. Matsui, Ed., vol. 2355 of LNCS, Springer–Verlag, pp. 92–108.
[50] P. Rogaway, “Efficient instantiations of tweakable block–ciphers and refinements to modes OCB and PMAC,” Proceeding of the ASIACRYPT 2004, LNCS, vol. 3329 pp. 16–31, Springer, Heidelberg.
[51] T. Krovetz, and P. Rogaway, “The software performance of authenticated–encryption modes,” 18th international workshop, FSE 2011, LNCS 6733, pp. 306–327, Springer, Lyngby, Denmark.
[52] N. Ferguson, “Collision attacks on OCB,” NIST CSRC website, 2002.
[53] Z. Sun, P. Wang, L. Zhang, “Collision Attacks on Variant of OCB Mode and Its Series,” Information Security and Cryptology, Lecture Notes in Computer Science vol. 7763, 216-224, (2013).
[54] R. Struik, “Formal specification of the CCM* mode of operation,” IEEE P802. 15 Working Group for Wireless Personal Area Networks (WPANS), 2005.
[55] D. A McGrew, and J. Viega, “The security and performance of the galois/counter mode (GCM) of operation,” Progress in Cryptology–INDOCRYPT, 2004, Springer–Verlag.
[56] T. Kohno, J. Viega, and D. Whiting, CWC: A high–performance conventional authenticated encryption mode, Proceedings of Fast Software Encryption 2004, LNCS vol. 3017, Springer–Verlag.
[57] Saarinen, O. Markku-Juhani, “Cycling Attacks on GCM, GHASH and Other Polynomial MACs and Hashes,” FSE 2012 – Washington D.C. LNCS vol. 7549, Springer–Verlag, pp. 216-225, 2012.
[58] P. Fouque, G. Martinet, F. Valette, and S. Zimmer, On the Security of the CCM Encryption Mode and of a Slight Variant. In ACNS, pp. 411–428, 2008.
[59] T. Hwang, P. Gope, “IAR-CTR and IAR-CFB: Integrity Aware Real-time Based Counter and Cipher Feedback Modes,” Security and Communication Networks, DOI: 10.1002/sec.1312, 2015.
[60] T. Hwang, P. Gope, “RT-OCFB: Real-Time Based Optimized Cipher Feedback Mode,” Cryptologia, DOI:10.1080/01611194.2014.988366, 2015.
[61] M. Bellare, A. Desai, E. JokiPii, and P. Rogaway, “A Concrete Security Treatment of Symmetric Encryption: Analysis of the DES Modes of Operation,” Proceedings of the 38th Symposium on Foundations of Computer Science, IEEE, 1997; A revised version is available online at http://www-cse.ucsd.edu/users/mihir
[62] D. Dolev, C. Dwork, and M. Naor, “Non-malleable cryptography,” Proc. 23rd Annual Symposium on the Theory of Computing.
[63] Crypto++ Library.[Online] Available: http://www.cryptopp.com.
[64] I. F. Akyildiz, W. Su , Y. S. Subramaniam , E. Cayirci, “Survey on sensor network,”, IEEE Communication Magazine, vol.40, pp. 112-114, 2002.
[65] O. Gnawali, K.-Y. Jang, J. Paek, M. Vieira, R. Govindan, B. Greenstein, A. Joki, D. Estrin, E. Kohler, “The tenet architecture for tiered sensor networks,” in: Proc. SenSys 2006, ACM, 2006, pp. 153–166.
[66] D. Yang, S. Misra, X. Fang, G. Xue, J. Zhang, “Two-tiered constrained relay node placement in wireless sensor networks: computational complexity and efficient approximations,” IEEE Trans. Mobile Computing. vol. 11 no. 8 pp. 1399–1411, 2012.
[67] T. Nguyen, A. Al-Saffar, and E-N Huh, “A dynamic ID-based authentication scheme,” Proceedings of the Sixth International Conference on Networked Computing and Advanced Information Management (NCM), pp. 248-253, August 2010.
[68] S. Chen and M. Ma, “A Dynamic-Encryption Authentication Scheme for M2M Security in Cyber-Physical Systems,” Globecom 2013 - Symposium on Selected Areas in Communications, pp.2897-2901, 2013.
[69] D. Dovel, A Yao, On the security of public key .protocols, IEEE Transaction on Information Theory, vol. 29 no. 2, pp. 198-208, 1983.
[70] P. Kocher, J. Jaffe, and B. Jun, “Differential power analysis”, in Proc. CRYPTO’99, LNCS 1666, pp. 388-397, Springer-Verlag, 1999.
[71] W. Diffie, P. C. van Oorshot, and M. J. Wiener, “Authentication and Authenticated Key Exchanges”, Designs, Codes and Cryptography, vol. 2, Kluwer Academic Publishers, pp. 107-125, 1992.
[72] D. R. Stinson, “Universal Hashing and Authentication Codes,” Design Codes and Cryptography, vol. 4 no. 4, pp. 369-380, 1994.
[73] A. Armando, The AVISPA tool for the automated validation of internet security protocols and applications. In: 17th International conference on computer aided verification (CAV’05). (Lecture Notes in Computer Science), vol 3576. Springer, Berlin, pp 281–285, 2005.
[74] AVISPA Automated Validation of Internet Security Protocols and Applications. http://www.avispa-project.org/.
[75] L. Wang, X. Yi, C. Lv and Y. Guo, “Security improvement in authentication protocol for Gen-2 based RFID system”, Journal of Convergence Information Technology, AICIT, vol. 6(1), pp. 157-169, 2011.
[76] K. Finkenzeller, RFID Handbook. Second ed. Wiley & Sons, 2002.
[77] EPC Radio-Frequency Identity Protocols Class-1 Generation-2 UHF RFID Protocol for Communications at 860 MHz-960 MHz Version 1.2.0, EPC global Inc., October 2008.
[78] A. Juels, RFID security and privacy: A research survey, IEEE Journal on Selected Areas in Communications, 24 (2), pp. 381-394. doi: 10.1109/JSAC.2005.861395, 2006.
[79] P. Gope, T. Hwang, “A Realistic Lightweight Authentication Protocol Preserving Strong Anonymity for Securing RFID System,” Computers & Security, DOI: 10.1016/j.cose.2015.05.004, 2015.
[80] M. Burmester, B. Medeiros, R. Motta, Robust, “Anonymous RFID Authentication with Constant Key-lookup,” Cryptology ePrint Archive: Listing for 2007 (2007/402), 2007.
[81] G. Gaubatz, J.P. Kaps, E. Ozturk, B. Sunar, “State of the art in ultra-low power public key cryptography for wireless sensor networks,” in Proc. in the Third IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOMW’05), 2005.
[82] S.V. Kaya, E. Savaş, A. Levi, Ö. Erçetin, “Public key cryptography based privacy preserving multi-context RFID infrastructure,” Ad Hoc Netw., 7 (2009), pp. 136–152
[83] N. Koblitz, “Elliptic curve cryptosystems,” Math. Comput., vol 48 (1987), pp. 203–209.
[84] Y. K. Lee, K. Sakiyama, I. Verbauwhede, “Elliptic-curve-based security processor for RFID,” IEEE Trans. Computer, vol. 57 (11) (2008)
[85] Y-P Liao, C. Hsiao, “A secure ECC-based RFID authentication scheme integrated with ID-verifier transfer protocol,” Ad Hoc Networks, vol 18, pp. 133-146, 2014.
[86] S. Piramuthu, RFID mutual authentication protocols, Decision Support Systems, vol. 50, pp.387-393 , 2011 http://dx.doi.org/10.1016/j.dss.2010.09.005.
[87] M. Safkhani, P. Peris-Lopez, J. C. Hernandez-Castro, N. Bagheri, and Cryptanalysis of the Cho et al. protocol: A hash-based RFID tag mutual authentication protocol, Journal of Computational and Applied Mathematics, vol 259, Part B, pp. 571-577, 15 March 2014.
[88] T. Dimitriou, A Lightweight RFID Protocol to Protect against Traceability and Cloning Attacks, in: Proceedings of SecureComm’05, pp. 59–66, 2005.
[89] S.-Y. Kang, I.-Y. Lee, A Study on low-cost RFID system management with mutual authentication scheme in ubiquitous, Proceedings of APNOMS, 4773, LNCS, pp. 492–502, 2007.
[90] http://www.cisco.com/c/en/us/td/docs/solutions/Enterprise/Mobility/WiFiLBS-DG/wifich6.pdf.
[91] R. Roman, J. Zhou, and J. Lopez, “On the features and challenges of security and privacy in distributed internet of things,” Computer Networks, vol. 57, no. 10, pp. 2266–2279, 2013.
[92] F. Zhu, M. W. Mutka, and L. M. Ni, “Private entity authentication for pervasive computing environments,” International Journal of Network Security, vol. 14, no. 2, pp. 86–100, 2012.
[93] S. Shin, T. Shon, H. Yeh, and K. Kim, “An effective authentication mechanism for ubiquitous collaboration in heterogeneous computing environment,” Peer-to-Peer Networking and Applications, 2013.
[94] Y. Liu, J. Li, and M. Guizani, “PKC based broadcast authentication using signature amortization for WSNs,” IEEE Transactions on Wireless Communications, vol. 11, no. 6, pp. 2106–2115, 2012.
[95] T. Kwon and J. Hong, “Secure and efficient broadcast authentication in wireless sensor networks,” IEEE Transactions on Computers, vol. 59, no. 8, pp. 1120–1133, 2010.
[96] E. Rescorla and N. Modadugu, “Datagram Transport Layer Security,” IETF RFC 4347, April 2006, http://tools.ietf.org/html/rfc4347.
[97] Z. Shelby, K. Hartke, and C. Bormann, “Constrained Application Protocol (CoAP),” IETF draft, R FC editor, 2013, http://tools.ietf.org/pdf/draft-ietf-core-coap-18.pdf.
[98] T. Kothmayr, C. Schmitt, W. Hu, M. Brünig, and G. Carle, “DTLS based security and two-way authentication for the Internet of Things,” Ad Hoc Networks, vol. 11, no. 8, pp. 2710–2723, 2013.
[99] X. H. Le, S. Lee, I. Butun et al., “An energy-efficient access control scheme for wireless sensor networks based on elliptic curve cryptography,” Journal of Communications and Networks, vol. 11, no. 6, pp. 599–606, 2009.
[100] C. T. Li, M. S. Hwang, and Y. P. Chu, “An efficient sensor-to-sensor authenticated path-key establishment scheme for secure communications in wireless sensor networks,” International Journal of Innovative Computing, Information and Control, vol. 5, no. 8, pp. 2107–2124, 2009.
[101] P. Kotzanikolaou and E. Magkos, “Hybrid key establishment for multiphase self-organized sensor networks,” in Proceedings of the 6th IEEE International Symposium on a World of Wireless Mobile and Multimedia Networks (WoWMoM '05), pp. 581–587, June 2005.
[102] P. Porambage, C. Schmitt, P. Kumar, A. Gurtov, and M. Ylianttila, “PAuthKey: A Pervasive Authentication Protocol and Key Establishment Scheme for Wireless Sensor Networks in Distributed IoT Applications,” International Journal of Distributed Sensor Networks, vol. 2014.
[103] C. H. Wang and C. Y. Lin, “An efficient delegation-based roaming payment, protocol against denial of service attacks,” in Proc. 2011 International Conference on Electronics, Communications and Control, pp. 4136–4140, 2011.
[104] UN, “World Population Aging 2013,” pp. 8–10, 2013.
[105] R. Weinstein, “RFID: A technical overview and its application to the enterprise,” IEEE IT Prof., vol. 7, no. 3, pp. 27–33, May/Jun. 2005.
[106] L. Atzori, A. Iera, and G. Morabito, “The Internet of Things: A survey,” Comput. Netw., vol. 54, no. 15, pp. 2787–2805, 2010.
[107] P. Najera, J. Lopez, and R. Roman, “Real-time location and inpatient care systems based on passive RFID,” J. Netw. Comput. Appl., vol. 34, no. 3, pp. 980–989, 2011.
[108] P. Kumar, and H. Lee, “Security Issues in Healthcare Applications Using Wireless Medical Sensor Networks: A Survey,” Sensors (Basel, Switzerland) 12.1 pp. 55–91, 2012.
[109] D. Malan, T. F. Jones, M. Welsh, S. Moulton, “CodeBlue: An AdHoc Sensor Network Infrastructure for Emergency Medical Care,” Proceedings of the MobiSys 2004 Workshop on Applications of Mobile Embedded Systems (WAMES 2004); Boston, MA, USA. 6–9 June 2004.
[110] K. Lorincz, D. J. Malan, T. R. F. Fulford-Jones, A. Nawoj, A. Clavel, V. Shayder, G. Mainland, M. Welsh, “Sensor Networks for Emergency Response: Challenges and Opportunities”, Pervas. Comput. vol.3, pp.16–23, 2004.
[111] A. Wood, G. Virone, T. Doan, Q. Cao, L. Selavo, Y. Wu, L. Fang, Z. He , S. Lin, J. Stankovic, “ALARM-NET: Wireless Sensor Networks for Assisted-Living and Residential Monitoring,” Department of Computer Science, University of Virginia; Charlottesville, VA, USA: Technical Report CS-2006-01, 2006.
[112] S. Pai, M. Meingast, T. Roosta, S. Bermudez, S. Wicker, D. K. Mulligan , S. Sastry, "Confidentiality in Sensor Networks: Transactional Information," IEEE Security and Privacy Magazine. 2008.
[113] J.W.P. Ng, B.P.L Lo, O. Wells, M. Sloman, N. Peters, A. Darzi, C. Toumazou, G. Yang, "Ubiquitous Monitoring Environment for Wearable and Implantable Sensors (UbiMon)," Proceedings of 6th International Conference on Ubiquitous Computing (UbiComp’04); Nottingham, UK. 7–14 September 2004.
[114] Office for Civil Rights, United State Department of Health and Human Services Medical Privacy. National Standards of Protect the Privacy of Personal-Health-Information. Available online: http://www.hhs.gov/ocr/privacy/hipaa/administrative/privacyrule/index.html (accessed on 15 June 2011).
[115] R. Chakravorty, “A Programmable Service Architecture for Mobile Medical Care,” Proceedings of 4th Annual IEEE International Conference on Pervasive Computing and Communication Workshop (PERSOMW’06); Pisa, Italy. 13–17 March 2006.
[116] J. Ko, J. H. Lim, Y. Chen, R. Musaloiu-E, A. Terzis, G. M. Masson, “MEDiSN: Medical Emergency Detection in Sensor Networks,” ACM Trans. Embed. Comput. Syst. vol. 10, pp. 1–29, 2010.
[117] A. Kumar et al., “Caveat eptor: A comparative study of secure device pairing methods,” IEEE International Conference on Pervasive Computing and Communications, 2009. PerCom 2009.
[118] YK Lee, H. Ju, DW. Kim, et al. Home network modelling and home network user authentication mechanism using biometric information. IEEE Tenth International Symposium on Consumer Electronics, St. Petersburg; pp. 1–5, 2006.
[119] J. Jeong, MY. Chung. Integrated OTP-based user authentication scheme using smart cards in home networks. Proceedings of the 41st Hawaii International Conference on System Sciences, Waikoloa;294–294, 2008.
[120] X. Sun, S. Men, C. Zhao, and Z. Zhou. A security authentication scheme in machine-to-machine home network service. Security Comm. Networks. doi: 10.1002/sec.551, 2012.
[121] Y. Lai, J. Kang, and R. Yu, “Efficient and Secure Resource Management in Home M2M Networks,” International Journal of Distributed Sensor Networks, vol. 2013, Article ID 849572, 12 pages, doi:10.1155/2013/849572, 2013.
[122] T. Hwang, P. Gope, “IA-CTR: Integrity Aware Conventional Counter Mode for Secure and Efficient Communication in Wireless Sensor Networks,” Wireless Personal Communications, (Springer Journal), DOI: 10.1007/s11277-015-3096-5, 2015.
[123] T. Hwang, P. Gope, “Robust Stream-Cipher Mode of Authenticated Encryption for Secure Communication in Wireless Sensor Network,” Security and Communication Networks (Wiley Journal), DOI: 10.1002/sec.1388, 2015.
[124] T. Hwang, P. Gope, “IAR-CTR and IAR-CFB: Integrity Aware Real-time Based Counter and Cipher Feedback Modes,” Security and Communication Networks (Wiley Journal), DOI: 10.1002/sec.1312, 2015
[125] H-Y Chien, C-S Laih, “ECC-based lightweight authentication protocol with untracbility for low-cost RFID,” Joural of Parallel and Distributed Computing”, Vol. 69, pp. 848-853, 2009.
[126] H-Y Chien, “Combining Rabin cryptosystem and error correction codes to facilitate anonymous authentication with un-tracbility for low-end devices,” Joural of Parallel and Distributed Computing”, Vol. 57, pp. 2705-2717, 2013