This page has only limited features, please log in for full access.

Prof. Muhamed Turkanović
University of Maribor, Faculty of Electrical Engineering and Computer Science, Institute of informatics, Blockchain Lab:UM, Koroška cesta 46, 2000 Maribor, Slovenia

Basic Info


Research Keywords & Expertise

0 Big Data
0 Cryptography
0 Databases
0 Quantum cryptography
0 Blockchain Technology

Fingerprints

Blockchain Technology
Databases
Cryptography
Quantum cryptography

Honors and Awards

The user has no records in this section


Career Timeline

The user has no records in this section.


Short Biography

The user biography is not available.
Following
Followers
Co Authors
The list of users this user is following is empty.
Following: 0 users

Feed

Journal article
Published: 02 October 2020 in Future Generation Computer Systems
Reads 0
Downloads 0

As with any other database solution, graph databases also need to be able to implement business rules related to a given application domain. At the moment, aside from integrity constraints, there is a limited number of mechanisms for business rules implementation in Graph Database Management Systems (GDBMSs). The underlying property graph data model does not include any formal notation on how to represent different constraints. Specifically, this paper discusses the problem of representing cardinality constraints in graph databases. We introduce the novel concept of k-vertex cardinality constraints, which enable us to specify the minimum and maximum number of edges between a vertex and a subgraph. We also propose an approach, which includes the representation of cardinality constraints through the property graph data model, and demonstrate its implementation through a series of stored procedures in Neo4j GDBMS. The proposed approach is then evaluated by performing experiments on synthetic and real datasets to test the influence of checking cardinality constraints on query execution times (QETs) when adding new edges. Additionally, a comparison is performed on synthetic datasets with varying outgoing vertex degrees in order to gain an insight into how increasing the vertex degree affects QETs. In general, the results obtained for each test scenario show that the implemented k-vertex cardinality constraints model does not significantly affect QETs. Also, the results indicate that the model is dependent on the order of the underlying k-vertex cardinality constraints and outgoing vertex degree in the dataset.

ACS Style

Martina Šestak; Marjan Heričko; Tatjana Welzer Družovec; Muhamed Turkanović. Applying k-vertex cardinality constraints on a Neo4j graph database. Future Generation Computer Systems 2020, 115, 459 -474.

AMA Style

Martina Šestak, Marjan Heričko, Tatjana Welzer Družovec, Muhamed Turkanović. Applying k-vertex cardinality constraints on a Neo4j graph database. Future Generation Computer Systems. 2020; 115 ():459-474.

Chicago/Turabian Style

Martina Šestak; Marjan Heričko; Tatjana Welzer Družovec; Muhamed Turkanović. 2020. "Applying k-vertex cardinality constraints on a Neo4j graph database." Future Generation Computer Systems 115, no. : 459-474.

Journal article
Published: 30 March 2020 in IEEE Access
Reads 0
Downloads 0

Currently, developers and researchers are dedicated to finding better ways to achieve greater scalability of various blockchain platforms. Focused on the Ethereum blockchain platform, the state channels are currently the only maturely researched and implemented a solution for achieving scalability. However, there are still several problems, such as transparency of state channel networks, transaction traceability, and the incapability that the off-chain state is transferred back on the blockchain network in an ad-hoc manner. To solve the aforementioned problems, we propose a novel state channel solution in the form of a State Channel as a Service, which, although off-chain, still incorporates a secure distributed and decentralized network. This solves the challenge of transparency and traceability while giving users the confidence that only the valid last off-chain state is transferred back on the blockchain network. With the proposed solution, there is no need for users to monitor state channel activities for possible malicious actions. Implementation was performed in the form of a payment channel system, presenting a potential use case for the SCaaS. Furthermore, we performed a security and performance analysis, which shows that the solution is secure and by a factor of 12 more efficient than the classical on-chain payment systems. To evaluate and prove the contributions of the proposed solution, quantitative, and qualitative comparisons with selected related works (i.e., Raiden and Celer) were also performed.

ACS Style

Blaz Podgorelec; Marjan Herieko; Muhamed Turkanovic. State Channel as a Service Based on a Distributed and Decentralized Web. IEEE Access 2020, 8, 64678 -64691.

AMA Style

Blaz Podgorelec, Marjan Herieko, Muhamed Turkanovic. State Channel as a Service Based on a Distributed and Decentralized Web. IEEE Access. 2020; 8 (99):64678-64691.

Chicago/Turabian Style

Blaz Podgorelec; Marjan Herieko; Muhamed Turkanovic. 2020. "State Channel as a Service Based on a Distributed and Decentralized Web." IEEE Access 8, no. 99: 64678-64691.

Journal article
Published: 25 December 2019 in Sensors
Reads 0
Downloads 0

The basis of blockchain-related data, stored in distributed ledgers, are digitally signed transactions. Data can be stored on the blockchain ledger only after a digital signing process is performed by a user with a blockchain-based digital identity. However, this process is time-consuming and not user-friendly, which is one of the reasons blockchain technology is not fully accepted. In this paper, we propose a machine learning-based method, which introduces automated signing of blockchain transactions, while including also a personalized identification of anomalous transactions. In order to evaluate the proposed method, an experiment and analysis were performed on data from the Ethereum public main network. The analysis shows promising results and paves the road for a possible future integration of such a method in dedicated digital signing software for blockchain transactions.

ACS Style

Blaž Podgorelec; Muhamed Turkanović; Sašo Karakatič. A Machine Learning-Based Method for Automated Blockchain Transaction Signing Including Personalized Anomaly Detection. Sensors 2019, 20, 147 .

AMA Style

Blaž Podgorelec, Muhamed Turkanović, Sašo Karakatič. A Machine Learning-Based Method for Automated Blockchain Transaction Signing Including Personalized Anomaly Detection. Sensors. 2019; 20 (1):147.

Chicago/Turabian Style

Blaž Podgorelec; Muhamed Turkanović; Sašo Karakatič. 2019. "A Machine Learning-Based Method for Automated Blockchain Transaction Signing Including Personalized Anomaly Detection." Sensors 20, no. 1: 147.

Conference paper
Published: 01 September 2019 in Communications in Computer and Information Science
Reads 0
Downloads 0

Students taking a Databases Course have different pre-knowledge of Conceptual Database Modelling. At the beginning of the course, they were asked to self-evaluate their knowledge of database design concepts. We have compared the results of self-evaluation of students with Technical and General High School education, as well as the results they achieved at the final exam. All together 132 students have collaborated in both parts of the survey. The results show that the students with a technical background have a better pre-knowledge of database design constructs, but, on the other hand, received lower results in the exam where the knowledge on Database Modelling was tested.

ACS Style

Lili Nemec Zlatolas; Aida Kamišalić; Muhamed Turkanović. Correlation Between Students’ Background and the Knowledge on Conceptual Database Modelling. Communications in Computer and Information Science 2019, 45 -51.

AMA Style

Lili Nemec Zlatolas, Aida Kamišalić, Muhamed Turkanović. Correlation Between Students’ Background and the Knowledge on Conceptual Database Modelling. Communications in Computer and Information Science. 2019; ():45-51.

Chicago/Turabian Style

Lili Nemec Zlatolas; Aida Kamišalić; Muhamed Turkanović. 2019. "Correlation Between Students’ Background and the Knowledge on Conceptual Database Modelling." Communications in Computer and Information Science , no. : 45-51.

Proceedings article
Published: 13 June 2019 in OTS 2019 Sodobne informacijske tehnologije in storitve: Zbornik štiriindvajsete konference, Maribor, 18. in 19. junij 2019
Reads 0
Downloads 0
ACS Style

Vid Keršič; Muhamed Turkanović. Uporaba platforme IOTA za zbiranje IOT podatkov. OTS 2019 Sodobne informacijske tehnologije in storitve: Zbornik štiriindvajsete konference, Maribor, 18. in 19. junij 2019 2019, 1 .

AMA Style

Vid Keršič, Muhamed Turkanović. Uporaba platforme IOTA za zbiranje IOT podatkov. OTS 2019 Sodobne informacijske tehnologije in storitve: Zbornik štiriindvajsete konference, Maribor, 18. in 19. junij 2019. 2019; ():1.

Chicago/Turabian Style

Vid Keršič; Muhamed Turkanović. 2019. "Uporaba platforme IOTA za zbiranje IOT podatkov." OTS 2019 Sodobne informacijske tehnologije in storitve: Zbornik štiriindvajsete konference, Maribor, 18. in 19. junij 2019 , no. : 1.

Proceedings article
Published: 13 June 2019 in OTS 2019 Sodobne informacijske tehnologije in storitve: Zbornik štiriindvajsete konference, Maribor, 18. in 19. junij 2019
Reads 0
Downloads 0
ACS Style

Blaž Podgorelec; Muhamed Turkanović. ZKP (Zero‐Knowledge Proof) pod drobnogledom. OTS 2019 Sodobne informacijske tehnologije in storitve: Zbornik štiriindvajsete konference, Maribor, 18. in 19. junij 2019 2019, 1 .

AMA Style

Blaž Podgorelec, Muhamed Turkanović. ZKP (Zero‐Knowledge Proof) pod drobnogledom. OTS 2019 Sodobne informacijske tehnologije in storitve: Zbornik štiriindvajsete konference, Maribor, 18. in 19. junij 2019. 2019; ():1.

Chicago/Turabian Style

Blaž Podgorelec; Muhamed Turkanović. 2019. "ZKP (Zero‐Knowledge Proof) pod drobnogledom." OTS 2019 Sodobne informacijske tehnologije in storitve: Zbornik štiriindvajsete konference, Maribor, 18. in 19. junij 2019 , no. : 1.

Proceedings article
Published: 13 June 2019 in OTS 2019 Sodobne informacijske tehnologije in storitve: Zbornik štiriindvajsete konference, Maribor, 18. in 19. junij 2019
Reads 0
Downloads 0
ACS Style

Patrik Rek; Muhamed Turkanović. Orodja za podporo celovitemu razvoju decentraliziranih aplikacij. OTS 2019 Sodobne informacijske tehnologije in storitve: Zbornik štiriindvajsete konference, Maribor, 18. in 19. junij 2019 2019, 1 .

AMA Style

Patrik Rek, Muhamed Turkanović. Orodja za podporo celovitemu razvoju decentraliziranih aplikacij. OTS 2019 Sodobne informacijske tehnologije in storitve: Zbornik štiriindvajsete konference, Maribor, 18. in 19. junij 2019. 2019; ():1.

Chicago/Turabian Style

Patrik Rek; Muhamed Turkanović. 2019. "Orodja za podporo celovitemu razvoju decentraliziranih aplikacij." OTS 2019 Sodobne informacijske tehnologije in storitve: Zbornik štiriindvajsete konference, Maribor, 18. in 19. junij 2019 , no. : 1.

Proceedings article
Published: 13 June 2019 in OTS 2019 Sodobne informacijske tehnologije in storitve: Zbornik štiriindvajsete konference, Maribor, 18. in 19. junij 2019
Reads 0
Downloads 0
ACS Style

Blaž Podgorelec; Patrik Rek; Miha Strehar; Muhamed Turkanović. Vzpostavitev konzorcijskega omrežja Ethereum. OTS 2019 Sodobne informacijske tehnologije in storitve: Zbornik štiriindvajsete konference, Maribor, 18. in 19. junij 2019 2019, 1 .

AMA Style

Blaž Podgorelec, Patrik Rek, Miha Strehar, Muhamed Turkanović. Vzpostavitev konzorcijskega omrežja Ethereum. OTS 2019 Sodobne informacijske tehnologije in storitve: Zbornik štiriindvajsete konference, Maribor, 18. in 19. junij 2019. 2019; ():1.

Chicago/Turabian Style

Blaž Podgorelec; Patrik Rek; Miha Strehar; Muhamed Turkanović. 2019. "Vzpostavitev konzorcijskega omrežja Ethereum." OTS 2019 Sodobne informacijske tehnologije in storitve: Zbornik štiriindvajsete konference, Maribor, 18. in 19. junij 2019 , no. : 1.

Proceedings article
Published: 13 June 2019 in OTS 2019 Sodobne informacijske tehnologije in storitve: Zbornik štiriindvajsete konference, Maribor, 18. in 19. junij 2019
Reads 0
Downloads 0
ACS Style

Aida Kamišalić; Muhamed Turkanović. Možnosti in izzivi uporabe protokola IPFS. OTS 2019 Sodobne informacijske tehnologije in storitve: Zbornik štiriindvajsete konference, Maribor, 18. in 19. junij 2019 2019, 1 .

AMA Style

Aida Kamišalić, Muhamed Turkanović. Možnosti in izzivi uporabe protokola IPFS. OTS 2019 Sodobne informacijske tehnologije in storitve: Zbornik štiriindvajsete konference, Maribor, 18. in 19. junij 2019. 2019; ():1.

Chicago/Turabian Style

Aida Kamišalić; Muhamed Turkanović. 2019. "Možnosti in izzivi uporabe protokola IPFS." OTS 2019 Sodobne informacijske tehnologije in storitve: Zbornik štiriindvajsete konference, Maribor, 18. in 19. junij 2019 , no. : 1.

Conference paper
Published: 28 May 2019 in Information and Communication Technologies in Education, Research, and Industrial Applications
Reads 0
Downloads 0

Blockchain technology is showing its potential to disrupt established business processes. Four types of blockchain initiatives have been identified: Record keeper, efficiency play, digital asset market, and blockchain disruptor. Many different applications have also been emerging within the educational domain, following a student or institution-centric approach. Student-centric solutions simplify the validation process of received credentials, while institution-centric solutions facilitate mainly operational activities of educational institutions. In this paper, we present several use cases addressing different aspects within the educational domain, such as streamlining the process of diploma verification, virtual lifetime learning passport, securing the issued certificates permanently, verifying the accreditation process, automatic recognition of credits, etc. A preliminary review and analysis of identified projects and initiatives show that most of them follow a student-centric approach while facilitating record-keeping.

ACS Style

Aida Kamišalić; Muhamed Turkanović; Saša Mrdović; Marjan Heričko. A Preliminary Review of Blockchain-Based Solutions in Higher Education. Information and Communication Technologies in Education, Research, and Industrial Applications 2019, 114 -124.

AMA Style

Aida Kamišalić, Muhamed Turkanović, Saša Mrdović, Marjan Heričko. A Preliminary Review of Blockchain-Based Solutions in Higher Education. Information and Communication Technologies in Education, Research, and Industrial Applications. 2019; ():114-124.

Chicago/Turabian Style

Aida Kamišalić; Muhamed Turkanović; Saša Mrdović; Marjan Heričko. 2019. "A Preliminary Review of Blockchain-Based Solutions in Higher Education." Information and Communication Technologies in Education, Research, and Industrial Applications , no. : 114-124.

Conference paper
Published: 01 September 2018 in 2018 28th EAEEIE Annual Conference (EAEEIE)
Reads 0
Downloads 0

Blockchain technology enables the creation of a decentralized and distributed environment in which transactions and data are not controlled by a central authority. Simultaneously transactions are secure, ubiquitous and trustworthy due to the used cryptographic principles. In this paper, we present a global decentralized blockchain-based platform and ecosystem called EduCTX. The platform enables managing, assigning and presenting credentials for individuals and educational institutions as well as other potential stakeholders such as companies, institutions and organizations. Further it enables the development of own digital services, which offers organizations the opportunity to automate the evaluation of individuals' skills and knowledge. The EduCTX platform is implemented on the blockchain platform Ethereum on a consortium-based network of Ethereum run nodes. The platform enables a globally efficient, simplified and ubiquitous environment to avoid language and administrative barriers.

ACS Style

Marko Holbl; Aida Kamisalic; Muhamed Turkanovic; Marko Kompara; Blaz Podgorelec; Marjan Hericko. EduCTX: An Ecosystem for Managing Digital Micro-Credentials. 2018 28th EAEEIE Annual Conference (EAEEIE) 2018, 1 -9.

AMA Style

Marko Holbl, Aida Kamisalic, Muhamed Turkanovic, Marko Kompara, Blaz Podgorelec, Marjan Hericko. EduCTX: An Ecosystem for Managing Digital Micro-Credentials. 2018 28th EAEEIE Annual Conference (EAEEIE). 2018; ():1-9.

Chicago/Turabian Style

Marko Holbl; Aida Kamisalic; Muhamed Turkanovic; Marko Kompara; Blaz Podgorelec; Marjan Hericko. 2018. "EduCTX: An Ecosystem for Managing Digital Micro-Credentials." 2018 28th EAEEIE Annual Conference (EAEEIE) , no. : 1-9.

Review
Published: 25 May 2018 in Sensors
Reads 0
Downloads 0

Wearable devices have recently received considerable interest due to their great promise for a plethora of applications. Increased research efforts are oriented towards a non-invasive monitoring of human health as well as activity parameters. A wide range of wearable sensors are being developed for real-time non-invasive monitoring. This paper provides a comprehensive review of sensors used in wrist-wearable devices, methods used for the visualization of parameters measured as well as methods used for intelligent analysis of data obtained from wrist-wearable devices. In line with this, the main features of commercial wrist-wearable devices are presented. As a result of this review, a taxonomy of sensors, functionalities, and methods used in non-invasive wrist-wearable devices was assembled.

ACS Style

Aida Kamišalić; Iztok Fister; Muhamed Turkanović; Sašo Karakatič. Sensors and Functionalities of Non-Invasive Wrist-Wearable Devices: A Review. Sensors 2018, 18, 1714 .

AMA Style

Aida Kamišalić, Iztok Fister, Muhamed Turkanović, Sašo Karakatič. Sensors and Functionalities of Non-Invasive Wrist-Wearable Devices: A Review. Sensors. 2018; 18 (6):1714.

Chicago/Turabian Style

Aida Kamišalić; Iztok Fister; Muhamed Turkanović; Sašo Karakatič. 2018. "Sensors and Functionalities of Non-Invasive Wrist-Wearable Devices: A Review." Sensors 18, no. 6: 1714.

Journal article
Published: 05 January 2018 in IEEE Access
Reads 0
Downloads 0

Blockchain technology enables the creation of a decentralized environment where transactions and data are not under the control of any third party organization. Any transaction ever completed is recorded in a public ledger in a verifiable and permanent way. Based on blockchain technology, we propose a global higher education credit platform, named EduCTX. This platform is based on the concept of the European Credit Transfer and Accumulation System (ECTS). It constitutes a globally trusted, decentralized higher education credit and grading system that can offer a globally unified viewpoint for students and higher education institutions (HEIs), as well as for other potential stakeholders such as companies, institutions and organizations. As a proof of concept, we present a prototype implementation of the environment, based on the open-source Ark Blockchain Platform. Based on a globally distributed peer-topeer network, EduCTX will process, manage and control ECTX tokens, which represent credits that students gain for completed courses such as ECTS. HEIs are the peers of the blockchain network. The platform is a first step towards a more transparent and technologically advanced form of higher education systems. The EduCTX platform represents the basis of the EduCTX initiative which anticipates that various HEIs would join forces in order to create a globally efficient, simplified and ubiquitous environment in order to avoid language and administrative barriers. Therefore we invite and encourage HEIs to join the EduCTX initiative and the EduCTX blockchain network.

ACS Style

Muhamed Turkanovic; Marko Holbl; Kristjan Kosic; Marjan Hericko; Aida Kamisalic. EduCTX: A Blockchain-Based Higher Education Credit Platform. IEEE Access 2018, 6, 5112 -5127.

AMA Style

Muhamed Turkanovic, Marko Holbl, Kristjan Kosic, Marjan Hericko, Aida Kamisalic. EduCTX: A Blockchain-Based Higher Education Credit Platform. IEEE Access. 2018; 6 (99):5112-5127.

Chicago/Turabian Style

Muhamed Turkanovic; Marko Holbl; Kristjan Kosic; Marjan Hericko; Aida Kamisalic. 2018. "EduCTX: A Blockchain-Based Higher Education Credit Platform." IEEE Access 6, no. 99: 5112-5127.

Proceedings article
Published: 13 June 2017 in Sodobne tehnologije in storitve
Reads 0
Downloads 0
ACS Style

Muhamed Turkanović; Aida Kamišalić Latifič. Od velepodatkov do pametnih in hitrih podatkov. Sodobne tehnologije in storitve 2017, 115 -127.

AMA Style

Muhamed Turkanović, Aida Kamišalić Latifič. Od velepodatkov do pametnih in hitrih podatkov. Sodobne tehnologije in storitve. 2017; ():115-127.

Chicago/Turabian Style

Muhamed Turkanović; Aida Kamišalić Latifič. 2017. "Od velepodatkov do pametnih in hitrih podatkov." Sodobne tehnologije in storitve , no. : 115-127.

Journal article
Published: 01 January 2016 in Ad Hoc Networks
Reads 0
Downloads 0

The concept of Internet of Things (IOT), which is already at our front doors, is that every object in the Internet infrastructure (II) is interconnected into a global dynamic expanding network. Sensors and smart objects are beside classical computing devices key parties of the IOT. We can already exploit the benefits of the IOT by using various weareables or smart phones which are full of diverse sensors and actuators and are connected to the II via GPRS or Wi-Fi. Since sensors are a key part of IOT, thus are wireless sensor networks (WSN). Researchers are already working on new techniques and efficient approaches on how to integrate WSN better into the IOT environment. One aspect of it is the security aspect of the integration. Recently, Turkanović et al.’s proposed a highly efficient and novel user authentication and key agreement scheme (UAKAS) for heterogeneous WSN (HWSN) which was adapted to the IOT notion. Their scheme presented a novel approach where a user from the IOT can authenticate with a specific sensor node from the HWSN without having to communicate with a gateway node. Moreover their scheme is highly efficient since it is based on a simple symmetric cryptosystem. Unfortunately we have found that Turkanović et al.’s scheme has some security shortcomings and is susceptible to some cryptographic attacks. This paper focuses on overcoming the security weaknesses of Turkanović et al.’s scheme, by proposing a new and improved UAKAS. The proposed scheme enables the same functionality but improves the security level and enables the HWSN to dynamically grow without influencing any party involved in the UAKAS. The results of security analysis by BAN-logic and AVISPA tools confirm the security properties of the proposed scheme.

ACS Style

Mohammad Sabzinejad Farash; Muhamed Turkanović; Saru Kumari; Marko Hölbl. An efficient user authentication and key agreement scheme for heterogeneous wireless sensor network tailored for the Internet of Things environment. Ad Hoc Networks 2016, 36, 152 -176.

AMA Style

Mohammad Sabzinejad Farash, Muhamed Turkanović, Saru Kumari, Marko Hölbl. An efficient user authentication and key agreement scheme for heterogeneous wireless sensor network tailored for the Internet of Things environment. Ad Hoc Networks. 2016; 36 ():152-176.

Chicago/Turabian Style

Mohammad Sabzinejad Farash; Muhamed Turkanović; Saru Kumari; Marko Hölbl. 2016. "An efficient user authentication and key agreement scheme for heterogeneous wireless sensor network tailored for the Internet of Things environment." Ad Hoc Networks 36, no. : 152-176.

Journal article
Published: 01 September 2014 in Ad Hoc Networks
Reads 0
Downloads 0
ACS Style

Muhamed Turkanović; Boštjan Brumen; Marko Hölbl. A novel user authentication and key agreement scheme for heterogeneous ad hoc wireless sensor networks, based on the Internet of Things notion. Ad Hoc Networks 2014, 20, 96 -112.

AMA Style

Muhamed Turkanović, Boštjan Brumen, Marko Hölbl. A novel user authentication and key agreement scheme for heterogeneous ad hoc wireless sensor networks, based on the Internet of Things notion. Ad Hoc Networks. 2014; 20 ():96-112.

Chicago/Turabian Style

Muhamed Turkanović; Boštjan Brumen; Marko Hölbl. 2014. "A novel user authentication and key agreement scheme for heterogeneous ad hoc wireless sensor networks, based on the Internet of Things notion." Ad Hoc Networks 20, no. : 96-112.

Journal article
Published: 14 June 2014 in Quantum Information Processing
Reads 0
Downloads 0

Recently quantum computation and cryptography principles are exploited in the design of security systems for wireless sensor networks (WSNs), which are consequently named as quantum WSN. Quantum cryptography is presumably secure against any eavesdropper and thus labeled as providing unconditional security. This paper tries to analyze the aspect of the applicative use of quantum principles in WSN. The outcome of the analysis elaborates a summary about the inadequacy of applicative use of quantum cryptography in WSN and presents an overview of all possible applicative challenges and problems while designing quantum-based security systems for WSN. Since WSNs are highly complex frameworks, with many restrictions and constraints, every security system has to be fully compatible and worthwhile. The aim of the paper was to contribute a verdict about this topic, backed up by equitable facts.

ACS Style

Muhamed Turkanović; Marko Hölbl. The (in)adequacy of applicative use of quantum cryptography in wireless sensor networks. Quantum Information Processing 2014, 13, 2255 -2275.

AMA Style

Muhamed Turkanović, Marko Hölbl. The (in)adequacy of applicative use of quantum cryptography in wireless sensor networks. Quantum Information Processing. 2014; 13 (10):2255-2275.

Chicago/Turabian Style

Muhamed Turkanović; Marko Hölbl. 2014. "The (in)adequacy of applicative use of quantum cryptography in wireless sensor networks." Quantum Information Processing 13, no. 10: 2255-2275.

Journal article
Published: 04 December 2013 in Wireless Personal Communications
Reads 0
Downloads 0

Xue et al. recently proposed an innovative mutual authentication and key agreement scheme for wireless sensor networks based on temporal credential using smart cards. However, in this paper we demonstrate that their scheme is vulnerable to password guessing attacks, node capture attacks and denial-of-service attacks. Furthermore we show that their scheme has some inconsistencies which make it less secure and more computationally costly than originally presented.

ACS Style

Muhamed Turkanović; Marko Hölbl. Notes on “A Temporal-Credential-Based Mutual Authentication and Key Agreement Scheme for Wireless Sensor Networks”. Wireless Personal Communications 2013, 77, 907 -922.

AMA Style

Muhamed Turkanović, Marko Hölbl. Notes on “A Temporal-Credential-Based Mutual Authentication and Key Agreement Scheme for Wireless Sensor Networks”. Wireless Personal Communications. 2013; 77 (2):907-922.

Chicago/Turabian Style

Muhamed Turkanović; Marko Hölbl. 2013. "Notes on “A Temporal-Credential-Based Mutual Authentication and Key Agreement Scheme for Wireless Sensor Networks”." Wireless Personal Communications 77, no. 2: 907-922.

Journal article
Published: 12 June 2013 in Elektronika ir Elektrotechnika
Reads 0
Downloads 0

User authentication is an important issue in wireless sensor networks (WSN). Das et al. recently proposed a dynamic password-based user authentication scheme for hierarchical wireless sensor networks (HWSN), which provides high security and a simple authentication approach. In this paper we present a flaw in Das et al.’s scheme that makes it infeasible for real-life implementation. Additionally, we demonstrate that Das et al.’s scheme has redundant elements. To overcome these imperfections we propose an enhanced user authentication scheme based on Das et al.’s, which is both efficient and secure.DOI: http://dx.doi.org/10.5755/j01.eee.19.6.2038

ACS Style

Muhamed Turkanović; Marko Holbl. An Improved Dynamic Password-based User Authentication Scheme for Hierarchical Wireless Sensor Networks. Elektronika ir Elektrotechnika 2013, 19, 109-116 .

AMA Style

Muhamed Turkanović, Marko Holbl. An Improved Dynamic Password-based User Authentication Scheme for Hierarchical Wireless Sensor Networks. Elektronika ir Elektrotechnika. 2013; 19 (6):109-116.

Chicago/Turabian Style

Muhamed Turkanović; Marko Holbl. 2013. "An Improved Dynamic Password-based User Authentication Scheme for Hierarchical Wireless Sensor Networks." Elektronika ir Elektrotechnika 19, no. 6: 109-116.