A three-factor anonymous authentication scheme for wireless sensor networks in internet of things environments
Tóm tắt
Từ khóa
Tài liệu tham khảo
Akyildiz, 2002, Wireless sensor networks: a survey, Comput. Netw., 38, 393, 10.1016/S1389-1286(01)00302-4
Atzori, 2010, The internet of things: a survey, Comput. Netw., 54, 2787, 10.1016/j.comnet.2010.05.010
Burrows, M., Abadi, M., Needham, R.M., 1989. A logic of authentication. In: Proceedings of the Royal Society of London A: Mathematical, Physical and Engineering Sciences, volume 426, The Royal Society, pp. 233–271.
Choi, 2014, Security enhanced user authentication protocol for wireless sensor networks using elliptic curves cryptography, Sensors, 14, 10081, 10.3390/s140610081
Das, 2009, Two-factor user authentication in wireless sensor networks, IEEE Trans. Wirel. Commun., 8, 1086, 10.1109/TWC.2008.080128
Fu, 2017, Privacy-preserving smart semantic search based on conceptual graphs over encrypted outsourced data, IEEE Trans. Inf. Forensics Secur., 12, 1874, 10.1109/TIFS.2017.2692728
He, 2010, An enhanced two-factor user authentication scheme in wireless sensor networks, Ad hoc Sens. Wirel. Netw., 10, 361
He, 2015, A secure temporal-credential-based mutual authentication and key agreement scheme with pseudo identity for wireless sensor networks, Inf. Sci., 321, 263, 10.1016/j.ins.2015.02.010
Heinzelman, 2002, An application-specific protocol architecture for wireless microsensor networks, IEEE Trans. Wirel. Commun., 1, 660, 10.1109/TWC.2002.804190
Jiang, 2015, An efficient two-factor user authentication scheme with unlinkability for wireless sensor networks, Peer-to-Peer Netw. Appl., 8, 1070, 10.1007/s12083-014-0285-z
Jiang, 2016, An untraceable temporal-credential-based two-factor authentication scheme using ecc for wireless sensor networks, J. Netw. Comput. Appl., 76, 37, 10.1016/j.jnca.2016.10.001
Juels, A., Wattenberg, M., 1999. A fuzzy commitment scheme. In: Proceedings of the 6th ACM conference on Computer and communications security. ACM, pp. 28–36.
Khan, 2010, Cryptanalysis and security improvements of two-factor user authentication in wireless sensor networks, Sensors, 10, 2450, 10.3390/s100302450
Kocher, P., Jaffe, J., Jun, B., 1999. Differential power analysis. In: Annual International Cryptology Conference, Springer, pp. 388–397.
Kong, 2017, A belief propagation-based method for task allocation in open and dynamic cloud environments, Knowl.-Based Syst., 115, 123, 10.1016/j.knosys.2016.10.016
Li, 2013, An enhanced smart card based remote user password authentication scheme, J. Netw. Comput. Appl., 36, 1365, 10.1016/j.jnca.2013.02.034
Li, 2013, A novel smart card and dynamic id based remote user authentication scheme for multi-server environments, Math. Comput. Model., 58, 85, 10.1016/j.mcm.2012.06.033
Li, 2015, Cryptanalysis of a dynamic identity-based remote user authentication scheme with verifiable password update, Int. J. Commun. Syst., 28, 374, 10.1002/dac.2676
Li, 2015, An enhancement of a smart card authentication scheme for multi-server architecture, Wirel. Personal. Commun., 80, 175, 10.1007/s11277-014-2002-x
Messerges, 2002, Examining smart-card security under the threat of power analysis attacks, IEEE Trans. Comput., 51, 541, 10.1109/TC.2002.1004593
Shen, 2016, A lightweight multi-layer authentication protocol for wireless body area networks, Future Gener. Comput. Syst.
Shen, 2017, An efficient public auditing protocol with novel dynamic structure for cloud data, IEEE Trans. Inf. Forensics Secur., 10.1109/TIFS.2017.2705620
Shen, 2017, A secure cloud-assisted urban data sharing framework for ubiquitous-cities, Pervasive Mob. Comput., 10.1016/j.pmcj.2017.03.013
Shi, 2013, A new user authentication protocol for wireless sensor networks using elliptic curves cryptography, Int. J. Distrib. Sens. Netw., 10.1155/2013/730831
Wang, 2015, Anonymous two-factor authentication in distributed systems: certain goals are beyond attainment, IEEE Trans. Dependable Secur. Comput., 12, 428, 10.1109/TDSC.2014.2355850
Wang, 2015, Preserving privacy for free: efficient and provably secure two-factor authentication scheme with user anonymity, Inf. Sci., 321, 162, 10.1016/j.ins.2015.03.070
Wu, 2016, A novel and provably secure authentication and key agreement scheme with user anonymity for global mobility networks, Secur. Commun. Netw., 9, 3527, 10.1002/sec.1558
Xia, 2016, A privacy-preserving and copy-deterrence content-based image retrieval scheme in cloud computing, IEEE Trans. Inf. Forensics Secur., 11, 2594, 10.1109/TIFS.2016.2590944
Xia, 2016, A secure and dynamic multi-keyword ranked search scheme over encrypted cloud data, IEEE Trans. Parallel Distrib. Syst., 27, 340, 10.1109/TPDS.2015.2401003
Xue, 2013, A temporal-credential-based mutual authentication and key agreement scheme for wireless sensor networks, J. Netw. Comput. Appl., 36, 316, 10.1016/j.jnca.2012.05.010