[1] Watro R, Kong D, Cuti S, et al. TinyPK: Securing sensor networks with public key technology[C]// Proceedings of the 2nd ACM Workshop on Security of Ad Hoc and Sensor Networks. 2004:59-64.
[2] Wong K H M, Zheng Yuan, Cao Jiannong, et al. A dynamic user authentication scheme for wireless sensor networks[C]// Proceedings of the 2006 IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing (SUTC’06). 2006,1:244-251.
[3] Das A K, Sharma P, Chatterjee S, et al. A dynamic password-based user authentication scheme for hierarchical wireless sensor networks[J]. Journal of Network and Computer Applications, 2012,35(5):1646-1656.
[4] Vaidya B, Makrakis D, Mouftah H T. Improved two-factor user authentication in wireless sensor networks[C]// Proceedings of the 6th IEEE International Conference on Wireless and Mobile Computing, Networking and Communications. 2010:600-606.
[5] He Daojing, Gao Yi, Chan S, et al. An enhanced two-factor user authentication scheme in wireless sensor networks[J]. International Journal of Ad Hoc & Sensor Wireless Networks, 2010,10(4):361-371.
[6] Huang Hui-Feng, Chang Ya-Fen, Liu Chun-Hung. Enhancement of two-factor user authentication in wireless sensor networks[C]// Proceedings of the 6th IEEE International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP). 2010:27-30.
[7] Khan M K, Alghathbar K. Cryptanalysis and security improvements of ‘two-factor user authentication in wireless sensor networks’[J]. Sensors, 2010,10(3):2450-2459.
[8] Xue Kaiping, Ma Changsha, Hong Peilin, et al. A temporal-credential-based mutual authentication and key agreement scheme for wireless sensor networks[J]. Journal of Network and Computer Applications, 2013,36(1):316-323.
[9] 杨庚,程宏兵. 一种有效的无线传感器网络密钥协商方案[J]. 电子学报, 2008,36(7):1389-1395.
[10] Zhang Yuanyuan, Gu Dawu, Li Juanru. Exploiting unidirectional links for key establishment protocols in heterogeneous sensor networks[J]. Computer Communications, 2008,31(13):2959-2971.
[11] Turkanovic M, Holbl M. An improved dynamic password-based user authentication scheme for hierarchical wireless sensor networks[J]. Elektronika Ir Elektrotechnika, 2013,19(6):109-116.
[12] Yeh Hsiu-Lien, Chen Tien-Ho, Liu Pin-Chuan, et al. A secured authentication protocol for wireless sensor networks using elliptic curves cryptography[J]. Sensors, 2011,11(5):4767-4779.
[13] Iltaf N, Ghafoor A. A fuzzy based credibility evaluation of recommended trust in pervasive computing environment[C]// Proceedings of the 2013 IEEE Consumer Communications and Networking Conference (CCNC). 2013:617-620.
[14] Chen Tien-Ho, Shih Wei-Kuan. A robust mutual authentication protocol for wireless sensor networks[J]. ETRI Journal, 2010,32(5):704-712.
[15] Fan Rong, Ping Ling-Di, Fu Jian-Qing, et al. A secure and efficient user authentication protocol for two-tiered wireless sensor networks[C]// Proceedings of the 2nd Pacific-Asia Conference on Circuits, Communications and System (PACCS). 2010:425-428. |