An Improved User Authentication Protocol for Hierarchical Wireless Sensor Networks using Elliptic Curve Cryptography
暂无分享,去创建一个
[1] Bao Li,et al. An Efficient Scheme for User Authentication in Wireless Sensor Networks , 2007, 21st International Conference on Advanced Information Networking and Applications Workshops (AINAW'07).
[2] Juho Kim,et al. A Security-Performance-Balanced User Authentication Scheme for Wireless Sensor Networks , 2012, Int. J. Distributed Sens. Networks.
[3] L. Washington. Elliptic Curves: Number Theory and Cryptography , 2003 .
[4] Ian F. Akyildiz,et al. Wireless sensor networks: a survey , 2002, Comput. Networks.
[5] Ian F. Akyildiz,et al. Sensor Networks , 2002, Encyclopedia of GIS.
[6] Peilin Hong,et al. A temporal-credential-based mutual authentication and key agreement scheme for wireless sensor networks , 2013, J. Netw. Comput. Appl..
[7] Fagen Li,et al. Indentity-based broadcast signcryption , 2008, Comput. Stand. Interfaces.
[8] Muhammad Khurram Khan,et al. Cryptanalysis and Security Improvements of ‘Two-Factor User Authentication in Wireless Sensor Networks’ , 2010, Sensors.
[9] Zinaida Benenson,et al. Realizing Robust User Authentication in Sensor Networks , 2005 .
[10] Peter Kruus,et al. CONSTRAINTS AND APPROACHES FOR DISTRIBUTED SENSOR NETWORK SECURITY , 2000 .
[11] Dharma P. Agrawal,et al. An improved key distribution mechanism for large-scale hierarchical wireless sensor networks , 2007, Ad Hoc Networks.
[12] Bo Sheng,et al. Public-key based access control in sensornet , 2011, Wirel. Networks.
[13] David E. Culler,et al. System architecture directions for networked sensors , 2000, SIGP.
[14] Sasikanth Avancha,et al. Security for Sensor Networks , 2004 .
[15] Vipul Gupta,et al. Energy analysis of public-key cryptography for wireless sensor networks , 2005, Third IEEE International Conference on Pervasive Computing and Communications.
[16] Sheetal Kalra,et al. Elliptic curve cryptography: survey and its security applications , 2011, ACAI '11.
[17] Ashok Kumar Das,et al. A dynamic password-based user authentication scheme for hierarchical wireless sensor networks , 2012, J. Netw. Comput. Appl..
[18] Satyajit Banerjee,et al. Symmetric key based authenticated querying in wireless sensor networks , 2006, InterSense '06.
[19] Chun Chen,et al. An Enhanced Two-factor User Authentication Scheme in Wireless Sensor Networks , 2010, Ad Hoc Sens. Wirel. Networks.
[20] Peter Kruus,et al. TinyPK: securing sensor networks with public key technology , 2004, SASN '04.
[21] Wei Wei,et al. An Efficient Two-Factor User Authentication Framework for Wireless Sensor Networks , 2011 .
[22] Moni Naor,et al. Universal one-way hash functions and their cryptographic applications , 1989, STOC '89.
[23] Ibrahima Niang,et al. A Survey of Access Control Schemes in Wireless Sensor Networks , 2011 .
[24] Daojing He,et al. An efficient and DoS-resistant user authentication scheme for two-tiered wireless sensor networks , 2011, Journal of Zhejiang University SCIENCE C.
[25] Rakesh Maharana,et al. An Improved Authentication Protocol for Hierarchical Wireless Sensor Networks using ECC , 2013 .
[26] Mun-Kyu Lee,et al. Improvement of Das's Two-Factor Authentication Protocol in Wireless Sensor Networks , 2009, IACR Cryptol. ePrint Arch..
[27] Chunguang Ma,et al. On the (in)security of some smart-card-based password authentication schemes for WSN , 2012, IACR Cryptol. ePrint Arch..
[28] Mohamed Abid,et al. A lightweight user authentication scheme for Wireless Sensor Networks , 2010, ACS/IEEE International Conference on Computer Systems and Applications - AICCSA 2010.
[29] Rehana Yasmin,et al. An efficient authentication framework for wireless sensor networks , 2012 .
[30] Adi Shamir,et al. A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.
[31] Omar Cheikhrouhou,et al. An ID-based user authentication scheme for Wireless Sensor Networks using ECC , 2011, ICM 2011 Proceeding.
[32] Wuu Yang,et al. An Improved Dynamic User Authentication Scheme for Wireless Sensor Networks , 2007, IEEE GLOBECOM 2007 - IEEE Global Telecommunications Conference.
[33] Behrouz A. Forouzan. Cryptography & Network Security , 2007 .
[34] Whitfield Diffie,et al. New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.
[35] Wuu Yang,et al. A robust user authentication scheme with self-certificates for wireless sensor networks , 2011, Secur. Commun. Networks.
[36] Lui Sha,et al. Real-time communication and coordination in embedded sensor networks , 2003, Proc. IEEE.
[37] Weisong Shi,et al. Wireless Sensor Network Security: A Survey , 2006 .
[38] Manik Lal Das,et al. Two-factor user authentication in wireless sensor networks , 2009, IEEE Transactions on Wireless Communications.
[39] Jiannong Cao,et al. A dynamic user authentication scheme for wireless sensor networks , 2006, IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing (SUTC'06).
[40] Felix C. Freiling,et al. User Authentication in Sensor Networks , 2004, GI Jahrestagung.
[41] Moti Yung,et al. Perfectly Secure Key Distribution for Dynamic Conferences , 1998, Inf. Comput..