4.4 Article

A biometrics-based anonymous authentication and key agreement scheme for wireless sensor networks

Related references

Note: Only part of the references are listed.
Article Computer Science, Artificial Intelligence

AAA-WSN: Anonymous access authentication scheme for wireless sensor networks in big data environment

Shadi Nashwan

Summary: This research focuses on proposing an anonymous access authentication scheme for wireless sensor networks in big data environments, which effectively addresses security issues in WSNs, including user anonymity, mutual authentication, and perfect forward secrecy. Through security and performance analysis, the AAA-WSN scheme demonstrates excellent security and efficiency.

EGYPTIAN INFORMATICS JOURNAL (2021)

Article Computer Science, Information Systems

Lightweight three factor scheme for real-time data access in wireless sensor networks

Hanguang Luo et al.

WIRELESS NETWORKS (2020)

Article Engineering, Electrical & Electronic

A provably secure biometrics and ECC-based authentication and key agreement scheme for WSNs

Saru Kumari et al.

INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS (2020)

Article Engineering, Electrical & Electronic

Energy-Efficient UAV Routing for Wireless Sensor Networks

Jaeuk Baek et al.

IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY (2020)

Article Computer Science, Information Systems

Efficient and privacy-preserving authentication scheme for wireless body area networks

Mengxia Shuai et al.

JOURNAL OF INFORMATION SECURITY AND APPLICATIONS (2020)

Article Computer Science, Hardware & Architecture

Secure two-factor lightweight authentication protocol using self-certified public key cryptography for multi-server 5G networks

Inam ul Haq et al.

JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2020)

Article Mathematics, Applied

A secure three-factor authentication scheme for wireless sensor networks using ECC

Devender Kumar et al.

JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY (2020)

Article Computer Science, Information Systems

An Authentication Information Exchange Scheme in WSN for IoT Applications

Sheng-Kai Yang et al.

IEEE ACCESS (2020)

Article Computer Science, Theory & Methods

EDAK: An Efficient Dynamic Authentication and Key Management Mechanism for heterogeneous WSNs

Samir Athmani et al.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2019)

Review Environmental Sciences

Wireless Sensor Networks for monitoring underwater sediment transport

A. J. Watt et al.

SCIENCE OF THE TOTAL ENVIRONMENT (2019)

Article Computer Science, Interdisciplinary Applications

An improved three-factor authentication scheme for patient monitoring using WSN in remote health-care system

Preeti Soni et al.

COMPUTER METHODS AND PROGRAMS IN BIOMEDICINE (2019)

Article Computer Science, Information Systems

An improved and provably secure three-factor user authentication scheme for wireless sensor networks

Fan Wu et al.

PEER-TO-PEER NETWORKING AND APPLICATIONS (2018)

Article Computer Science, Information Systems

A robust mutual authentication protocol for WSN with multiple base-stations

Ruhul Amin et al.

AD HOC NETWORKS (2018)

Article Computer Science, Hardware & Architecture

An efficient ECC-based provably secure three-factor user authentication and key agreement protocol for wireless healthcare sensor networks

Sravani Challa et al.

COMPUTERS & ELECTRICAL ENGINEERING (2018)

Article Computer Science, Theory & Methods

A lightweight and robust two-factor authentication scheme for personalized healthcare systems using wireless medical sensor networks

Fan Wu et al.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2018)

Article Automation & Control Systems

Measuring Two-Factor Authentication Schemes for Real-Time Data Access in Industrial Wireless Sensor Networks

Ding Wang et al.

IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2018)

Article Computer Science, Hardware & Architecture

A three-factor anonymous authentication scheme for wireless sensor networks in internet of things environments

Xiong Li et al.

JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2018)

Article Computer Science, Information Systems

A Provably Secure Anonymous Authenticated Key Exchange Protocol Based on ECC for Wireless Sensor Networks

Ke Zhang et al.

WIRELESS COMMUNICATIONS & MOBILE COMPUTING (2018)

Article Telecommunications

Security analysis and improvement of a mutual authentication and key agreement solution for wireless sensor networks using chaotic maps

JiLiang Li et al.

TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES (2018)

Article Computer Science, Information Systems

Improved-Precision Time Synchronization Protocol for WSNs Based on Averaging Consensus Control

Ali Al-Shaikhi

IEEE ACCESS (2018)

Proceedings Paper Computer Science, Theory & Methods

Cryptanalysis and Improvement of an ECC-Based Authentication Protocol for Wireless Sensor Networks

Taeui Song et al.

COMPUTATIONAL SCIENCE AND ITS APPLICATIONS (ICCSA 2018), PT II (2018)

Article Computer Science, Information Systems

Secure and efficient user authentication scheme for multi-gateway wireless sensor networks

Jangirala Srinivas et al.

AD HOC NETWORKS (2017)

Article Computer Science, Theory & Methods

Provably Secure Remote Truly Three-Factor Authentication Scheme With Privacy Protection on Biometrics

Chun-I Fan et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2009)