References
- L. Atzori, A. Iera and G. Morabito, "The internet of Things: A survey," Computer Networks, vol. 54, no. 15, pp. 2787-2805, June, 2010. https://doi.org/10.1016/j.comnet.2010.05.010
- H. Ning, H. Liu and L T. Yang, "Aggregated-proof based hierarchical authentication scheme for the Internet of Things," IEEE trans. on parallel and distribution systems, vol. 26, no. 3, pp. 657-667, March, 2015. https://doi.org/10.1109/TPDS.2014.2311791
- Yoon, E. J., Yoo, K. Y., " Cryptanalysis of robust mutual authentication protocol for wireless sensor networks," in Proc. of the 10th IEEE International Conference on Cognitive Informatics & Cognitive Computing, pp. 392-396, August 18-20, 2011.
- Yick, J., Mukherjee, B., Ghosal, D., "Wireless sensor network survey," Computer Networks, vol. 52, no. 12, pp. 2292-2330, August, 2008. https://doi.org/10.1016/j.comnet.2008.04.002
- Wong K. H. M., Zheng, Y., Cao, J., Wang S., "A dynamic user authentication scheme for wireless sensor networks, " In Proc.of the IEEE international conference on sensor networks, ubiquitous, and trustworthy computing, pp. 244-251, June 5-7, 2006.
- Tseng H. R., Jan R. H., Yang W, "An improved dynamic user authentication scheme for wireless sensor networks," In Proc. of the Global Telecommunications Conference, pp. 986-990, November 26-30, 2007.
- Das, M. L., "Two-factor user authentication in wireless sensor networks," IEEE Transactions on Wireless Communications, vol. 8, no. 3, pp.1086-1090, March, 2009. https://doi.org/10.1109/TWC.2008.080128
- Xu J., Zhu W. T., Feng D. G., "An improved smart card based password authentication scheme with provable security," Computer Standards Interfaces, vol. 31, no. 4, pp. 723-728, June, 2009. https://doi.org/10.1016/j.csi.2008.09.006
- Nyang D. H., Lee M. K., "Improvement of Das's two-factor authentication protocol in wireless sensor networks," IACR Cryptology ePrint Archive, vol. 2009, pp. 1-5, 2009.
- Khan, M. K., Alghathbar, K., "Cryptanalysis and security improvements of two-factor user authentication in wireless sensor networks," Sensors, vol. 10, no. 3, pp.2450-2459, March, 2010. https://doi.org/10.3390/s100302450
- Chen T. H., Shih W. K., "A robust mutual authentication protocol for wireless sensor networks," Electronic Telecommunication Research Institute, vol. 32, no. 5, pp.704-712, October, 2010.
- He D, Gao Y., Chan S., Chen C., Bu J., "An enhanced two-factor user authentication scheme in wireless sensor networks, "Ad Hoc Sensor Wireless Networks, vol. 10, no. 4, pp. 361-371, January, 2010.
- Vaidya B., Makrakis D., Mouftah H., "Two-factor mutual authentication with key agreement in wireless sensor networks," Security and Communication Networks, vol. 9, no. 2, pp. 171-183, April, 2012.
- Das A. K., Sharma P., Chatterjee S., Sing J. K., "A dynamic password-based user authentication scheme for hierarchical wireless networks," Journal of Network and Computer Applications, vol. 35, no. 5, pp.1646-1656, September, 2012. https://doi.org/10.1016/j.jnca.2012.03.011
- Li C. T., Weng C. Y., Lee C. C., "An advanced temporal credential-based security scheme with mutual authentication and key agreement for wireless sensor networks," Sensors, vol. 13, no. 8, pp.9589-9603, July, 2013. https://doi.org/10.3390/s130809589
- Yoo, S. G., Lee H., Kim J., "A performance and usability aware secure two-factor user authentication schemes for wireless sensor networks, "International Journal of Distributed Sensor Networks, vol. 2013, no. 2, pp. 543950, January, 2013.
- Kim J., Lee D., Jeon W., Lee Y. and Won D., "Security analysis and improvements of two-factor mutual authentication with key agreement in wireless sensor networks," Sensors, vol. 14, no. 4, pp.6443-6462, April, 2014. https://doi.org/10.3390/s140406443
- I-Pin Chang, Tian-Fu Lee, Tsung-Hung Lin and Chuan-Ming Liu, "Enhanced two-factor authentication and key agreement using dynamic identities in wireless sensor networks," Sensors, vol. 15, no. 12, pp.29841-29854, November, 2015. https://doi.org/10.3390/s151229767
- Turkanovic M., Holbl M., "An improved dynamic password-based user-authentication scheme for hierarchical wireless sensor networks," Elektronika Ir Elektrotechnika, vol. 19, no. 6, pp. 109-116, June, 2013.
- Xue K., Ma C., Hong P., Ding R., "A temporal-credential-based mutual authentication and key agreement scheme for wireless sensor networks, "Journal of Network and Computer Applications, vol. 36, no. 1, pp. 316-323, January, 2013. https://doi.org/10.1016/j.jnca.2012.05.010
- Li Jiping, Ding Yaoming, Xiong Zenggang and Liu Shouyin, "An Improved Biometric-based User Authentication Scheme for C/S system," International Journal of Distributed Sensor Networks, vol. 2014, no. 2, pp. 275341, January, 2014.
- Debiao He, Neeraj Kumar, Naveen Chilamkurti, "A secure temporal-credential-based mutual authentication and key agreement scheme with pseudo identity for wireless sensor networks," Information Science, vol. 321, no. 10, pp. 263-277, November, 2015. https://doi.org/10.1016/j.ins.2015.02.010
- Debiao He, Sherali Zeadally, "Authentication protocol for ambient assisted living system," IEEE Communications Magazine, vol. 53, no. 1, pp.71-77, January, 2015. https://doi.org/10.1109/MCOM.2015.7010518
- Honglong Chen and Wei Lou, "On protecting end-to-end location privacy against local eavesdropper in wireless sensor networks," Pervasive and Mobile Computing, vol. 16, Part A, pp. 36-50, January, 2015. https://doi.org/10.1016/j.pmcj.2014.01.006
- Honglong Chen, Guoliang Xue and Zhibo Wang, "Efficient and reliable missing tag identificaiton for large-scale RFID systems with unknown tags," IEEE internet of things Journal, vol. 4, no. 3, pp. 736-748, February, 2017. https://doi.org/10.1109/JIOT.2017.2664810
- Zhibo Wang, Honglong Chen, Qing Cao, Hairong Qi, Zhi Wang and Qian Wang, "Achieving location error tolerant barrier coverage for wireless sensor networks," Computer Networks, vol. 112, no. 15, pp. 314-328, January, 2017. https://doi.org/10.1016/j.comnet.2016.11.014
- Zhibo Wang, Qing Cao, Hairong Qi, Honglong Chen and Qian Wang, "Cost-Effective Barrier Coverage Formation in Heterogeneous Wireless Sensor Networks," Ad Hoc Networks, vol. 64, pp. 65-79, September, 2017. https://doi.org/10.1016/j.adhoc.2017.06.004
Cited by
- A Secure and Lightweight Three-Factor Remote User Authentication Protocol for Future IoT Applications vol.2021, pp.None, 2021, https://doi.org/10.1155/2021/8871204