References
- Ahmed M. Handshaking problem associated with addressing scheme for the nodes of a wireless sensor network. Int J Adv Res Technol. 2012;1(5):74–78.
- Gope P, Das AK, Kumar N, et al. Lightweight and physically secure anonymous mutual authentication protocol for real-time data access in industrial wireless sensor networks. IEEE Trans Ind Inform. 2019;15(9):4957–4968. doi: https://doi.org/10.1109/TII.2019.2895030
- Wong KH, Zheng Y, Cao J. A dynamic user authentication scheme for wireless sensor networks. IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing (SUTC'06), Taichung, Vol. 1, IEEE; 2006. p. 8.
- Tseng H-R, Jan R-H, Yang W. An improved dynamic user authentication scheme for wireless sensor networks. IEEE GLOBECOM 2007-IEEE Global Telecommunications Conference, Washington, DC, IEEE; 2007. p. 986–990.
- Das ML. Two-factor user authentication in wireless sensor networks. IEEE Trans Wirel Commun. 2009;8(3):1086–1090. doi: https://doi.org/10.1109/TWC.2008.080128
- He D, Gao Y, Chan S, et al. An enhanced two-factor user authentication scheme in wireless sensor networks. Ad Hoc Sens Wirel Netw. 2010;10(4):361–371.
- Yeh H-L, Chen T-H, Liu P-C, et al. A secured authentication protocol for wireless sensor networks using elliptic curves cryptography. Sensors. 2011;11(5):4767–4779. doi: https://doi.org/10.3390/s110504767
- Han W. Weakness of a secured authentication protocol for wireless sensor networks using elliptic curves cryptography. IACR Cryptol EPrint Arch. 2011;2011:293.
- Xue K, Ma C, Hong P, et al. A temporal-credential-based mutual authentication and key agreement scheme for wireless sensor networks. J Netw Comput Appl. 2013;36(1):316–323. doi: https://doi.org/10.1016/j.jnca.2012.05.010
- Das AK, Sharma P, Chatterjee S, et al. A dynamic password-based user authentication scheme for hierarchical wireless sensor networks. J Netw Comp Appl. 2012;35(5):1646–1656. doi: https://doi.org/10.1016/j.jnca.2012.03.011
- Turkanovic M, Holbl M. An improved dynamic password-based user authentication scheme for hierarchical wireless sensor networks. Elektron Elektrotech. 2013;19(6):109–116. doi: https://doi.org/10.5755/j01.eee.19.6.2038
- Li C-T, Weng C-Y, Lee C-C. An advanced temporal credential-based security scheme with mutual authentication and key agreement for wireless sensor networks. Sensors. 2013;13(8):9589–9603. doi: https://doi.org/10.3390/s130809589
- Choi Y, Lee D, Kim J, et al. Security enhanced user authentication protocol for wireless sensor networks using elliptic curves cryptography. Sensors. 2014;14(6):10081–10106. doi: https://doi.org/10.3390/s140610081
- Shi W, Gong P. A new user authentication protocol for wireless sensor networks using elliptic curves cryptography. Int J Distr Sens Netw.. 2013;9(4):730831.
- Jiang Q, Ma J, Wei F, et al. An untraceable temporal-credential-based two-factor authentication scheme using ecc for wireless sensor networks. J Netw Comput Appl. 2016;76:37–48. doi: https://doi.org/10.1016/j.jnca.2016.10.001
- Li X, Niu J, Kumari S, et al. A three-factor anonymous authentication scheme for wireless sensor networks in internet of things environments. J Netw Comput Appl. 2018;103:194–204. doi: https://doi.org/10.1016/j.jnca.2017.07.001
- Wu F, Xu L, Kumari S, et al. A new and secure authentication scheme for wireless sensor networks with formal proof. Peer-to-Peer Netw Appl. 2017;10(1):16–30. doi: https://doi.org/10.1007/s12083-015-0404-5
- Wang D, Li W, Wang P. Measuring two-factor authentication schemes for real-time data access in industrial wireless sensor networks. IEEE Trans Ind Inf. 2018;14(9):4081–4092. doi: https://doi.org/10.1109/TII.2018.2834351
- Gope P, Hwang T. Bsn-care: A secure IOT-based modern healthcare system using body sensor network. IEEE Sens J. 2015;16(5):1368–1376. doi: https://doi.org/10.1109/JSEN.2015.2502401
- Fotouhi M, Bayat M, Das AK, et al. A lightweight and secure two-factor authentication scheme for wireless body area networks in health-care IOT. Comput Netw. 2020;107333.
- Kaur D, Kumar D, Saini KK, et al. An improved user authentication protocol for wireless sensor networks. Trans Emerg Telecommun Technol. 2019;30(10):e3745.
- Kumar D, Chand S, Kumar B. Cryptanalysis and improvement of an authentication protocol for wireless sensor networks applications like safety monitoring in coal mines. J Ambient Intell Humaniz Comput. 2019;10(2):641–660. doi: https://doi.org/10.1007/s12652-018-0712-8
- Ogundoyin SO. An autonomous lightweight conditional privacy-preserving authentication scheme with provable security for vehicular ad-hoc networks. Int J Comput Appl. 2020;42(2):196–211.
- Chang C-C, Le H-D. A provably secure, efficient, and flexible authentication scheme for ad hoc wireless sensor networks. IEEE Trans Wireless Commun. 2015;15(1):357–366. doi: https://doi.org/10.1109/TWC.2015.2473165
- Gope P, Hwang T. A realistic lightweight anonymous authentication protocol for securing real-time application data access in wireless sensor networks. IEEE Trans Ind Electron. 2016;63(11):7124–7132. doi: https://doi.org/10.1109/TIE.2016.2585081
- Dolev D, Yao A. On the security of public key protocols. IEEE Trans Inf Theory. 1983;29(2):198–208. doi: https://doi.org/10.1109/TIT.1983.1056650
- Xie Q, Tang Z, Chen K. Cryptanalysis and improvement on anonymous three-factor authentication scheme for mobile networks. Comput Electr Eng. 2017;59:218–230. doi: https://doi.org/10.1016/j.compeleceng.2016.11.038
- Abdalla M, Fouque P-A, Pointcheval D. Password-based authenticated key exchange in the three-party setting. International Workshop on Public Key Cryptography. Springer; Berlin, Heidelberg, 2005. p. 65–84.
- Wang D, Cheng H, Wang P, et al. Zipf's law in passwords. IEEE Trans Inf Forensics Secur. 2017;12(11):2776–2791. doi: https://doi.org/10.1109/TIFS.2017.2721359
- Park K, Park Y, Park Y, et al. Provably secure and efficient authentication protocol for roaming service in global mobility networks. IEEE Access. 2017;5:25110–25125. doi: https://doi.org/10.1109/ACCESS.2017.2773535
- Roy S, Das AK, Chatterjee S, et al. Provably secure fine-grained data access control over multiple cloud servers in mobile cloud computing based healthcare applications. IEEE Trans Ind Inf. 2018;15(1):457–468. doi: https://doi.org/10.1109/TII.2018.2824815
- Odelu V, Das AK, Goswami A. A secure biometrics-based multi-server authentication protocol using smart cards. IEEE Trans Inf Foren Secur. 2015;10(9):1953–1966. doi: https://doi.org/10.1109/TIFS.2015.2439964
- Bonneau J. The science of guessing: analyzing an anonymized corpus of 70 million passwords. 2012 IEEE Symposium on Security and Privacy, San Francisco, CA, IEEE; 2012. p. 538–552.
- Wang D, Zhang Z, Wang P. Targeted online password guessing: An underestimated threat. Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, Vienna Austria, ACM; 2016. p. 1242–1254.
- Gope P, Lee J, Quek TQ. Lightweight and practical anonymous authentication protocol for RFID systems using physically unclonable functions. IEEE Trans Inf Foren Secur. 2018;13(11):2831–2843. doi: https://doi.org/10.1109/TIFS.2018.2832849
- Blanchet B. An efficient cryptographic protocol verifier based on prolog rules. Proceedings 14th IEEE Computer Security Foundations Workshop, Los Alamitos, IEEE; 2001. p. 82–96.