4.6 Article

Understanding Node Capture Attacks in User Authentication Schemes for Wireless Sensor Networks

Related references

Note: Only part of the references are listed.
Article Computer Science, Hardware & Architecture

Secure Remote User Authenticated Key Establishment Protocol for Smart Home Environment

Mohammad Wazid et al.

IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING (2020)

Article Computer Science, Hardware & Architecture

Anonymous Lightweight Chaotic Map-Based Authenticated Key Agreement Protocol for Industrial Internet of Things

Jangirala Srinivas et al.

IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING (2020)

Article Computer Science, Information Systems

A Secure Three-Factor User Authentication Protocol With Forward Secrecy for Wireless Medical Sensor Network Systems

Xiong Li et al.

IEEE SYSTEMS JOURNAL (2020)

Article Computer Science, Hardware & Architecture

A lightweight anonymous user authentication and key establishment scheme for wearable devices

Ankur Gupta et al.

COMPUTER NETWORKS (2019)

Article Computer Science, Theory & Methods

OTPaaS-One Time Password as a Service

Emir Erdem et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2019)

Article Telecommunications

A lightweight authentication scheme for vehicular ad hoc networks based on MSR

Xu Yang et al.

VEHICULAR COMMUNICATIONS (2019)

Article Automation & Control Systems

A Robust ECC-Based Provable Secure Authentication Protocol With Privacy Preserving for Industrial Internet of Things

Xiong Li et al.

IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2018)

Article Computer Science, Artificial Intelligence

Provably secure biometric based authentication and key agreement protocol for wireless sensor networks

Jangirala Srinivas et al.

JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING (2018)

Article Computer Science, Hardware & Architecture

An efficient ECC-based provably secure three-factor user authentication and key agreement protocol for wireless healthcare sensor networks

Sravani Challa et al.

COMPUTERS & ELECTRICAL ENGINEERING (2018)

Article Computer Science, Theory & Methods

A lightweight and robust two-factor authentication scheme for personalized healthcare systems using wireless medical sensor networks

Fan Wu et al.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2018)

Article Computer Science, Theory & Methods

A secure user authentication and key-agreement scheme using wireless sensor networks for agriculture monitoring

Rifaqat Ali et al.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2018)

Article Computer Science, Theory & Methods

A robust and anonymous patient monitoring system using wireless medical sensor networks

Ruhul Amin et al.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2018)

Article Automation & Control Systems

Measuring Two-Factor Authentication Schemes for Real-Time Data Access in Industrial Wireless Sensor Networks

Ding Wang et al.

IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2018)

Article Computer Science, Hardware & Architecture

TouchWB: Touch behavioral user authentication based on web browsing on smartphones

Weizhi Meng et al.

JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2018)

Article Computer Science, Hardware & Architecture

A three-factor anonymous authentication scheme for wireless sensor networks in internet of things environments

Xiong Li et al.

JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2018)

Article Computer Science, Hardware & Architecture

An untraceable and anonymous password authentication protocol for heterogeneous wireless sensor networks

Ruhul Amin et al.

JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2018)

Article Computer Science, Information Systems

Design of Secure User Authenticated Key Management Protocol for Generic IoT Networks

Mohammad Wazid et al.

IEEE INTERNET OF THINGS JOURNAL (2018)

Article Computer Science, Information Systems

A new and secure authentication scheme for wireless sensor networks with formal proof

Fan Wu et al.

PEER-TO-PEER NETWORKING AND APPLICATIONS (2017)

Article Engineering, Electrical & Electronic

Secure multi-factor remote user authentication scheme for Internet of Things environments

Parwinder Kaur Dhillon et al.

INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS (2017)

Article Computer Science, Hardware & Architecture

An efficient authentication and key agreement scheme for multi-gateway wireless sensor networks in IoT deployment

Fan Wu et al.

JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2017)

Article Computer Science, Information Systems

Secure and efficient user authentication scheme for multi-gateway wireless sensor networks

Jangirala Srinivas et al.

AD HOC NETWORKS (2017)

Article Computer Science, Information Systems

An IoT notion-based authentication and key agreement scheme ensuring user anonymity for heterogeneous ad hoc wireless sensor networks

Wei-Liang Tai et al.

JOURNAL OF INFORMATION SECURITY AND APPLICATIONS (2017)

Article Computer Science, Information Systems

Password-Authenticated Group Key Exchange: A Cross-Layer Design

Yuexin Zhang et al.

ACM TRANSACTIONS ON INTERNET TECHNOLOGY (2016)

Article Computer Science, Hardware & Architecture

Authentication protocol for wireless sensor networks applications like safety monitoring in coal mines

Shipra Kumari et al.

COMPUTER NETWORKS (2016)

Article Computer Science, Hardware & Architecture

Design of an anonymity-preserving three-factor authenticated key exchange protocol for wireless sensor networks

Ruhul Amin et al.

COMPUTER NETWORKS (2016)

Article Computer Science, Theory & Methods

A user friendly mutual authentication and key agreement scheme for wireless sensor networks using chaotic maps

Saru Kumari et al.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2016)

Article Automation & Control Systems

A Realistic Lightweight Anonymous Authentication Protocol for Securing Real-Time Application Data Access in Wireless Sensor Networks

Prosanta Gope et al.

IEEE TRANSACTIONS ON INDUSTRIAL ELECTRONICS (2016)

Article Engineering, Electrical & Electronic

A Provably Secure, Efficient, and Flexible Authentication Scheme for Ad hoc Wireless Sensor Networks

Chin-Chen Chang et al.

IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS (2016)

Article Computer Science, Hardware & Architecture

An untraceable temporal-credential-based two-factor authentication scheme using ECC for wireless sensor networks

Qi Jiang et al.

JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2016)

Article Computer Science, Information Systems

Provably secure user authentication and key agreement scheme for wireless sensor networks

Ashok Kumar Das et al.

SECURITY AND COMMUNICATION NETWORKS (2016)

Article Computer Science, Information Systems

A Secure Anonymous Authentication Protocol for Mobile Services on Elliptic Curve Cryptography

Alavalapati Goutham Reddy et al.

IEEE ACCESS (2016)

Article Computer Science, Information Systems

Secure biometric-based authentication scheme with smart card revocation/reissue for wireless sensor networks

YoHan Park et al.

INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS (2016)

Article Computer Science, Information Systems

Security Improvement on Biometric Based Authentication Scheme for Wireless Sensor Networks Using Fuzzy Extraction

Younsung Choi et al.

INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS (2016)

Article Computer Science, Information Systems

Two-factor mutual authentication with key agreement in wireless sensor networks

Binod Vaidya et al.

SECURITY AND COMMUNICATION NETWORKS (2016)

Article Computer Science, Hardware & Architecture

Anonymous Two-Factor Authentication in Distributed Systems: Certain Goals Are Beyond Attainment

Ding Wang et al.

IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING (2015)

Article Computer Science, Information Systems

An efficient two-factor user authentication scheme with unlinkability for wireless sensor networks

Qi Jiang et al.

PEER-TO-PEER NETWORKING AND APPLICATIONS (2015)

Article Engineering, Electrical & Electronic

Security flaws in two improved remote user authentication schemes using smart cards

Chun-Guang Ma et al.

INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS (2014)

Article Engineering, Electrical & Electronic

An Improved Dynamic Password-based User Authentication Scheme for Hierarchical Wireless Sensor Networks

M. Turkanovic et al.

ELEKTRONIKA IR ELEKTROTECHNIKA (2013)

Article Computer Science, Hardware & Architecture

A temporal-credential-based mutual authentication and key agreement scheme for wireless sensor networks

Kaiping Xue et al.

JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2013)

Article Chemistry, Analytical

Advanced Biometric-Based User Authentication Scheme for Wireless Sensor Networks

Eun-Jun Yoon et al.

SENSOR LETTERS (2013)

Article Computer Science, Information Systems

A New User Authentication Protocol for Wireless Sensor Networks Using Elliptic Curves Cryptography

Wenbo Shi et al.

INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS (2013)

Article Health Care Sciences & Services

An Improved Authentication Scheme for Telecare Medicine Information Systems

Jianghong Wei et al.

JOURNAL OF MEDICAL SYSTEMS (2012)

Article Computer Science, Hardware & Architecture

A dynamic password-based user authentication scheme for hierarchical wireless sensor networks

Ashok Kumar Das et al.

JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2012)

Review Computer Science, Hardware & Architecture

Dynamic ID-based remote user password authentication schemes using smart cards: A review

R. Madhusudhan et al.

JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2012)

Article Computer Science, Information Systems

An efficient and DoS-resistant user authentication scheme for two-tiered wireless sensor networks

Rong Fan et al.

JOURNAL OF ZHEJIANG UNIVERSITY-SCIENCE C-COMPUTERS & ELECTRONICS (2011)

Article Chemistry, Analytical

RUASN: A Robust User Authentication Framework for Wireless Sensor Networks

Pardeep Kumar et al.

SENSORS (2011)

Article Engineering, Electrical & Electronic

User authentication schemes with pseudonymity for ubiquitous sensor network in NGN

Binod Vaidya et al.

INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS (2010)

Article Engineering, Electrical & Electronic

Two-Factor User Authentication in Wireless Sensor Networks

Manik Lal Das

IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS (2009)