共 149 条
[1]
Li X(2017)A robust ecc-based provable secure authentication protocol with privacy preserving for industrial internet of things IEEE Trans. Ind. Inf. 14 3599-3609
[2]
Jianwei Niu Md(2002)Wireless sensor networks: a survey Comput. Netw. 38 393-422
[3]
Bhuiyan ZA(2020)Efficient multi-factor user authentication protocol with forward secrecy for real-time data access in wsns ACM Trans. Cyber Phys. Syst. 4 1-26
[4]
Fan W(2014)Understanding security failures of two-factor authentication schemes for real-time applications in hierarchical wireless sensor networks Ad Hoc Netw. 20 1-15
[5]
Karuppiah M(2018)Measuring two-factor authentication schemes for real-time data access in industrial wireless sensor networks IEEE Trans. Ind. Inform. 14 4081-4092
[6]
Kumari S(2014)On the anonymity of two-factor authentication schemes for wireless sensor networks: attacks, principle and solutions Comput. Netw. 73 41-57
[7]
Akyildiz IF(2017)A new and secure authentication scheme for wireless sensor networks with formal proof Peer-to-Peer Network. Appl. 10 16-30
[8]
Su W(2016)A secure and robust temporal credential-based three-factor user authentication scheme for wireless sensor networks Peer-to-Peer Network. Appl. 9 223-244
[9]
Sankarasubramaniam Y(2018)On the security of a provably secure, efficient, and flexible authentication scheme for ad hoc wireless sensor networks Int. J. Distrib. Sens. Netw. 14 1550147718756311-1146
[10]
Cayirci E(2018)Anonymous lightweight chaotic map-based authenticated key agreement protocol for industrial internet of things IEEE Trans. Depend. Secure Comput. 17 1133-204