共 25 条
- [1] Wazid M., Das A.K., Odelu V., Kumar N., Susilo W., Secure remote user authenticated key establishment protocol for smart home environment, IEEE Transactions on Dependable and Secure Computing, (2017)
- [2] Kumari S., Om H., Authentication protocol for wireless sensor networks applications like safety monitoring in coal mines, Computer Networks, 104, C, pp. 137-154, (2016)
- [3] Gupta A., Tripathi M., Shaikh T.J., Sharma A., A Lightweight Anonymous User Authentication and Key Establishment Scheme for Wearable Devices, Computer Networks, 149, A, pp. 29-42, (2019)
- [4] Wazid M., Das A.K., Odelu V., Kumar N., Conti M., Jo M., Design of secure user authenticated key management protocol for generic iot networks, IEEE Internet of Things Journal, 5, 1, pp. 269-282, (2017)
- [5] Srinivas J., Mukhopadhyay S., Mishra D., Secure and efficient user authentication scheme for multi-gateway wireless sensor networks, Ad Hoc Networks, 54, A, pp. 147-169, (2017)
- [6] Wang D., Li W., Wang P., Measuring two-factor authentication schemes for real-time data access in industrial wireless sensor networks, IEEE Transactions on Industrial Informatics, 14, 9, pp. 4081-4092, (2018)
- [7] Ali R., Pal A.K., Kumari S., Karuppiah M., Conti M., A secure user authentication and key-agreement scheme using wireless sensor networks for agriculture monitoring, Future Generation Computer Systems, 84, C, pp. 200-215, (2018)
- [8] Das M.L., Two-factor user authentication in wireless sensor networks, IEEE Transactions on Wireless Communications, 8, 3, pp. 1086-1090, (2009)
- [9] Khan M.K., Alghathbar K., Cryptanalysis and security improvements of 'two-factor user authentication in wireless sensor networks, Sensors, 10, 3, pp. 2450-2459, (2010)
- [10] Chen T.H., Shih W.K., A robust mutual authentication protocol for wireless sensor networks, ETRI Journal, 32, 5, pp. 704-712, (2010)