WSN node access authentication protocol based on trusted computing

[1]  Hyoungshick Kim,et al.  Cryptanalysis of Protocol for Heterogeneous Wireless Sensor Networks for the Internet of Things Environment , 2020, 2020 14th International Conference on Ubiquitous Information Management and Communication (IMCOM).

[2]  Saru Kumari,et al.  Provably secure biometric based authentication and key agreement protocol for wireless sensor networks , 2017, Journal of Ambient Intelligence and Humanized Computing.

[3]  Fan Wu,et al.  A Robust ECC-Based Provable Secure Authentication Protocol With Privacy Preserving for Industrial Internet of Things , 2018, IEEE Transactions on Industrial Informatics.

[4]  Ling Zhang,et al.  Trusted Authority Assisted Three-Factor Authentication and Key Agreement Protocol for the Implantable Medical System , 2018, Wirel. Commun. Mob. Comput..

[5]  Athanasios V. Vasilakos,et al.  An efficient ECC-based provably secure three-factor user authentication and key agreement protocol for wireless healthcare sensor networks , 2017, Comput. Electr. Eng..

[6]  Alan Dahgwo Yein,et al.  A secure mutual trust scheme for wireless sensor networks , 2017, 2017 IEEE 26th International Symposium on Industrial Electronics (ISIE).

[7]  Jianfeng Ma,et al.  A privacy‐aware two‐factor authentication protocol based on elliptic curve cryptography for wireless sensor networks , 2017, Int. J. Netw. Manag..

[8]  Xiong Li,et al.  A privacy-preserving and provable user authentication scheme for wireless sensor networks based on Internet of Things security , 2017, J. Ambient Intell. Humaniz. Comput..

[9]  Muzzammil Hussain,et al.  Simple, secure and dynamic protocol for mutual authentication of nodes in wireless sensor networks , 2017, 2017 Second International Conference on Electrical, Computer and Communication Technologies (ICECCT).

[10]  Xiong Li,et al.  A user friendly mutual authentication and key agreement scheme for wireless sensor networks using chaotic maps , 2016, Future Gener. Comput. Syst..

[11]  Maryline Laurent-Maknavicius,et al.  Survey on secure communication protocols for the Internet of Things , 2015, Ad Hoc Networks.

[12]  Weijun Gao,et al.  AVISPA: a web tool for the prediction and analysis of alternative splicing , 2013, Genome Biology.

[13]  Xin Liu,et al.  A fingerprint-based user authentication protocol with one-time password for wireless sensor networks , 2013, PROCEEDINGS OF 2013 International Conference on Sensor Network Security Technology and Privacy Communication System.

[14]  Luca Viganò,et al.  Automated Security Protocol Analysis With the AVISPA Tool , 2006, MFPS.

[15]  Kouichi Sakurai,et al.  Design and Analysis of Diffie-Hellman-Based Key Exchange Using One-time ID by SVO Logic , 2005, ARSPA@ICALP.

[16]  Paul F. Syverson,et al.  On unifying some cryptographic protocol logics , 1994, Proceedings of 1994 IEEE Computer Society Symposium on Research in Security and Privacy.

[17]  Yalin Chen,et al.  Improved on an efficient user authentication scheme for heterogeneous wireless sensor network tailored for the Internet of Things environment , 2016, IACR Cryptol. ePrint Arch..

[18]  Zhang Huan,et al.  Research on Trusted Network Connection , 2010 .