Security analysis and improvement of a mutual authentication and key agreement solution for wireless sensor networks using chaotic maps
暂无分享,去创建一个
Dieter Hogrefe | Kim-Kwang Raymond Choo | Saru Kumari | WeiGuo Zhang | JiLiang Li | D. Hogrefe | S. Kumari | Jiliang Li | WeiGuo Zhang
[1] Kay Römer,et al. The design space of wireless sensor networks , 2004, IEEE Wireless Communications.
[2] Fan Wu,et al. Cryptanalysis and Improvement of a User Authentication Scheme Preserving Uniqueness and Anonymity for Connected Health Care , 2015, Journal of Medical Systems.
[3] Naveen K. Chilamkurti,et al. A secure temporal-credential-based mutual authentication and key agreement scheme with pseudo identity for wireless sensor networks , 2015, Inf. Sci..
[4] Dheerendra Mishra,et al. Secure and efficient user authentication scheme for multi-gateway wireless sensor networks , 2017, Ad Hoc Networks.
[5] Hamid Mala,et al. A new lightweight authentication and key agreement protocol for Internet of Things , 2016, 2016 13th International Iranian Society of Cryptology Conference on Information Security and Cryptology (ISCISC).
[6] Jong Hyuk Park,et al. User authentication schemes with pseudonymity for ubiquitous sensor network in NGN , 2010, Int. J. Commun. Syst..
[7] Xiong Li,et al. A user friendly mutual authentication and key agreement scheme for wireless sensor networks using chaotic maps , 2016, Future Gener. Comput. Syst..
[8] Antonio Iera,et al. The Internet of Things: A survey , 2010, Comput. Networks.
[9] Yang Xiao,et al. Robust medical ad hoc sensor networks (MASN) with wavelet-based ECG data mining , 2008, Ad Hoc Networks.
[10] Peilin Hong,et al. A temporal-credential-based mutual authentication and key agreement scheme for wireless sensor networks , 2013, J. Netw. Comput. Appl..
[11] H. T. Mouftah,et al. Improved two-factor user authentication in wireless sensor networks , 2010, 2010 IEEE 6th International Conference on Wireless and Mobile Computing, Networking and Communications.
[12] Zinaida Benenson,et al. Realizing Robust User Authentication in Sensor Networks , 2005 .
[13] Ravi Sankar,et al. A Survey of Intrusion Detection Systems in Wireless Sensor Networks , 2014, IEEE Communications Surveys & Tutorials.
[14] Peter Kruus,et al. TinyPK: securing sensor networks with public key technology , 2004, SASN '04.
[15] Cheng-Chi Lee,et al. An Advanced Temporal Credential-Based Security Scheme with Mutual Authentication and Key Agreement for Wireless Sensor Networks , 2013, Sensors.
[16] Muhammad Khurram Khan,et al. Design of an anonymity-preserving three-factor authenticated key exchange protocol for wireless sensor networks , 2016, Comput. Networks.
[17] Martín Abadi,et al. A logic of authentication , 1990, TOCS.
[18] Wei-Kuan Shih,et al. A Robust Mutual Authentication Protocol for Wireless Sensor Networks , 2010 .
[19] Sourav Mukhopadhyay,et al. A Mutual Authentication Framework for Wireless Medical Sensor Networks , 2017, Journal of Medical Systems.
[20] Hsin-Wen Wei,et al. A Secured Authentication Protocol for Wireless Sensor Networks Using Elliptic Curves Cryptography , 2011, Sensors.
[21] Ashok Kumar Das,et al. A dynamic password-based user authentication scheme for hierarchical wireless sensor networks , 2012, J. Netw. Comput. Appl..
[22] Panganamala Ramana Kumar,et al. RHEINISCH-WESTFÄLISCHE TECHNISCHE HOCHSCHULE AACHEN , 2001 .
[23] Muhammad Khurram Khan,et al. Cryptanalysis and Security Improvements of ‘Two-Factor User Authentication in Wireless Sensor Networks’ , 2010, Sensors.
[24] Marko Hölbl,et al. A novel user authentication and key agreement scheme for heterogeneous ad hoc wireless sensor networks, based on the Internet of Things notion , 2014, Ad Hoc Networks.
[25] Saru Kumari,et al. An efficient user authentication and key agreement scheme for heterogeneous wireless sensor network tailored for the Internet of Things environment , 2016, Ad Hoc Networks.
[26] Manik Lal Das,et al. Two-factor user authentication in wireless sensor networks , 2009, IEEE Transactions on Wireless Communications.
[27] Jiannong Cao,et al. A dynamic user authentication scheme for wireless sensor networks , 2006, IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing (SUTC'06).
[28] Marko Hölbl,et al. Notes on “A Temporal-Credential-Based Mutual Authentication and Key Agreement Scheme for Wireless Sensor Networks” , 2014, Wirel. Pers. Commun..