Evaluating Authentication Schemes for Real-Time Data in Wireless Sensor Network
Published 2020 View Full Article
- Home
- Publications
- Publication Search
- Publication Details
Title
Evaluating Authentication Schemes for Real-Time Data in Wireless Sensor Network
Authors
Keywords
-
Journal
WIRELESS PERSONAL COMMUNICATIONS
Volume -, Issue -, Pages -
Publisher
Springer Science and Business Media LLC
Online
2020-04-24
DOI
10.1007/s11277-020-07385-0
References
Ask authors/readers for more resources
Related references
Note: Only part of the references are listed.- SMAC-AS: MAC Based Secure Authentication Scheme for Wireless Sensor Network
- (2019) Deepti Singh et al. WIRELESS PERSONAL COMMUNICATIONS
- An efficient ECC-based provably secure three-factor user authentication and key agreement protocol for wireless healthcare sensor networks
- (2018) Sravani Challa et al. COMPUTERS & ELECTRICAL ENGINEERING
- A lightweight and robust two-factor authentication scheme for personalized healthcare systems using wireless medical sensor networks
- (2018) Fan Wu et al. Future Generation Computer Systems-The International Journal of eScience
- A secure user authentication and key-agreement scheme using wireless sensor networks for agriculture monitoring
- (2018) Rifaqat Ali et al. Future Generation Computer Systems-The International Journal of eScience
- A robust and anonymous patient monitoring system using wireless medical sensor networks
- (2018) Ruhul Amin et al. Future Generation Computer Systems-The International Journal of eScience
- On the design of secure user authenticated key management scheme for multigateway-based wireless sensor networks using ECC
- (2018) Anil Kumar Sutrala et al. INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS
- A three-factor anonymous authentication scheme for wireless sensor networks in internet of things environments
- (2018) Xiong Li et al. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS
- An untraceable and anonymous password authentication protocol for heterogeneous wireless sensor networks
- (2018) Ruhul Amin et al. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS
- Two-Factor Authenticated Key Agreement Supporting Unlinkability in 5G-Integrated Wireless Sensor Networks
- (2018) Sooyeon Shin et al. IEEE Access
- Cryptanalysis and improvement of an authentication protocol for wireless sensor networks applications like safety monitoring in coal mines
- (2018) Devender Kumar et al. Journal of Ambient Intelligence and Humanized Computing
- A Mutual Authentication Framework for Wireless Medical Sensor Networks
- (2017) Jangirala Srinivas et al. JOURNAL OF MEDICAL SYSTEMS
- An efficient authentication and key agreement scheme for multi-gateway wireless sensor networks in IoT deployment
- (2017) Fan Wu et al. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS
- Efficient authentication protocol for secure multimedia communications in IoT-enabled wireless sensor networks
- (2017) Dheerendra Mishra et al. MULTIMEDIA TOOLS AND APPLICATIONS
- Efficient and Security Enhanced Anonymous Authentication with Key Agreement Scheme in Wireless Sensor Networks
- (2017) Jaewook Jung et al. SENSORS
- Anonymous three-factor authenticated key agreement for wireless sensor networks
- (2017) Yanrong Lu et al. WIRELESS NETWORKS
- Improving Security of Lightweight Authentication Technique for Heterogeneous Wireless Sensor Networks
- (2017) Chandra Sekhar Vorugunti et al. WIRELESS PERSONAL COMMUNICATIONS
- Lightweight three-factor authentication and key agreement protocol for internet-integrated wireless sensor networks
- (2017) Qi Jiang et al. IEEE Access
- An efficient user authentication and key agreement scheme for heterogeneous wireless sensor network tailored for the Internet of Things environment
- (2016) Mohammad Sabzinejad Farash et al. Ad Hoc Networks
- A secure light weight scheme for user authentication and key agreement in multi-gateway based wireless sensor networks
- (2016) Ruhul Amin et al. Ad Hoc Networks
- Authentication protocol for wireless sensor networks applications like safety monitoring in coal mines
- (2016) Shipra Kumari et al. Computer Networks
- Design of an anonymity-preserving three-factor authenticated key exchange protocol for wireless sensor networks
- (2016) Ruhul Amin et al. Computer Networks
- On the design of a secure user authentication and key agreement scheme for wireless sensor networks
- (2016) Saru Kumari et al. CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE
- A user friendly mutual authentication and key agreement scheme for wireless sensor networks using chaotic maps
- (2016) Saru Kumari et al. Future Generation Computer Systems-The International Journal of eScience
- A Realistic Lightweight Anonymous Authentication Protocol for Securing Real-Time Application Data Access in Wireless Sensor Networks
- (2016) Prosanta Gope et al. IEEE TRANSACTIONS ON INDUSTRIAL ELECTRONICS
- A Provably Secure, Efficient, and Flexible Authentication Scheme for Ad hoc Wireless Sensor Networks
- (2016) Chin-Chen Chang et al. IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS
- A privacy-aware two-factor authentication protocol based on elliptic curve cryptography for wireless sensor networks
- (2016) Qi Jiang et al. International Journal of Network Management
- An untraceable temporal-credential-based two-factor authentication scheme using ECC for wireless sensor networks
- (2016) Qi Jiang et al. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS
- Three-Factor User Authentication and Key Agreement Using Elliptic Curve Cryptosystem in Wireless Sensor Networks
- (2016) YoHan Park et al. SENSORS
- An Anonymous User Authentication and Key Agreement Scheme Based on a Symmetric Cryptosystem in Wireless Sensor Networks
- (2016) Jaewook Jung et al. SENSORS
- Cryptanalysis and Improvement in User Authentication and Key Agreement Scheme for Wireless Sensor Network
- (2016) Akansha Singh et al. WIRELESS PERSONAL COMMUNICATIONS
- A Secure Smartcard-Based Anonymous User Authentication Scheme for Healthcare Applications Using Wireless Medical Sensor Networks
- (2016) Ashok Kumar Das et al. WIRELESS PERSONAL COMMUNICATIONS
- An improved and provably secure three-factor user authentication scheme for wireless sensor networks
- (2016) Fan Wu et al. Peer-to-Peer Networking and Applications
- A privacy-preserving and provable user authentication scheme for wireless sensor networks based on Internet of Things security
- (2016) Fan Wu et al. Journal of Ambient Intelligence and Humanized Computing
- A secure temporal-credential-based mutual authentication and key agreement scheme with pseudo identity for wireless sensor networks
- (2015) Debiao He et al. INFORMATION SCIENCES
- A secure and effective biometric-based user authentication scheme for wireless sensor networks using smart card and fuzzy extractor
- (2015) Ashok Kumar Das INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS
- An improved and anonymous two-factor authentication protocol for health-care applications with wireless medical sensor networks
- (2015) Fan Wu et al. MULTIMEDIA SYSTEMS
- A new authentication protocol for healthcare applications using wireless medical sensor networks with user anonymity
- (2015) Xiong Li et al. Security and Communication Networks
- Enhanced Two-Factor Authentication and Key Agreement Using Dynamic Identities in Wireless Sensor Networks
- (2015) I-Pin Chang et al. SENSORS
- Secure and Efficient Mutual Adaptive User Authentication Scheme for Heterogeneous Wireless Sensor Networks Using Multimedia Client–Server Systems
- (2015) Bakkiam David Deebak WIRELESS PERSONAL COMMUNICATIONS
- A Secure and Efficient User Anonymity-Preserving Three-Factor Authentication Protocol for Large-Scale Distributed Wireless Sensor Networks
- (2015) Ashok Kumar Das WIRELESS PERSONAL COMMUNICATIONS
- A new and secure authentication scheme for wireless sensor networks with formal proof
- (2015) Fan Wu et al. Peer-to-Peer Networking and Applications
- A novel user authentication and key agreement scheme for heterogeneous ad hoc wireless sensor networks, based on the Internet of Things notion
- (2014) Muhamed Turkanović et al. Ad Hoc Networks
- An effective ECC-based user access control scheme with attribute-based encryption for wireless sensor networks
- (2014) Santanu Chatterjee et al. Security and Communication Networks
- A Provably-Secure ECC-Based Authentication Scheme for Wireless Sensor Networks
- (2014) Junghyun Nam et al. SENSORS
- Security Enhanced User Authentication Protocol for Wireless Sensor Networks Using Elliptic Curves Cryptography
- (2014) Younsung Choi et al. SENSORS
- An efficient two-factor user authentication scheme with unlinkability for wireless sensor networks
- (2014) Qi Jiang et al. Peer-to-Peer Networking and Applications
- A secure and robust temporal credential-based three-factor user authentication scheme for wireless sensor networks
- (2014) Ashok Kumar Das Peer-to-Peer Networking and Applications
- An Improved User Authentication Protocol for Healthcare Services via Wireless Medical Sensor Networks
- (2014) Muhammad Khurram Khan et al. International Journal of Distributed Sensor Networks
- An Improved Dynamic Password-based User Authentication Scheme for Hierarchical Wireless Sensor Networks
- (2013) M. Turkanovic et al. Elektronika Ir Elektrotechnika
- An energy-efficient access control scheme for wireless sensor networks based on elliptic curve cryptography
- (2013) Xuan Hung Le et al. JOURNAL OF COMMUNICATIONS AND NETWORKS
- Robust anonymous authentication protocol for health-care applications using wireless medical sensor networks
- (2013) Debiao He et al. MULTIMEDIA SYSTEMS
- An Advanced Temporal Credential-Based Security Scheme with Mutual Authentication and Key Agreement for Wireless Sensor Networks
- (2013) Chun-Ta Li et al. SENSORS
- A Robust User Authentication Scheme Using Dynamic Identity in Wireless Sensor Networks
- (2013) Wen-Bin Hsieh et al. WIRELESS PERSONAL COMMUNICATIONS
- An Efficient Biometric Authentication Protocol for Wireless Sensor Networks
- (2013) Ohood Althobaiti et al. International Journal of Distributed Sensor Networks
- A New User Authentication Protocol for Wireless Sensor Networks Using Elliptic Curves Cryptography
- (2013) Wenbo Shi et al. International Journal of Distributed Sensor Networks
- A dynamic password-based user authentication scheme for hierarchical wireless sensor networks
- (2012) Ashok Kumar Das et al. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS
- A temporal-credential-based mutual authentication and key agreement scheme for wireless sensor networks
- (2012) Kaiping Xue et al. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS
- On the security and improvement of a two-factor user authentication scheme in wireless sensor networks
- (2012) Da-Zhi Sun et al. Personal and Ubiquitous Computing
- Two-factor mutual authentication with key agreement in wireless sensor networks
- (2012) Binod Vaidya et al. Security and Communication Networks
- E-SAP: Efficient-Strong Authentication Protocol for Healthcare Applications Using Wireless Medical Sensor Networks
- (2012) Pardeep Kumar et al. SENSORS
- A Security-Performance-Balanced User Authentication Scheme for Wireless Sensor Networks
- (2012) Sang Guun Yoo et al. International Journal of Distributed Sensor Networks
- An efficient and DoS-resistant user authentication scheme for two-tiered wireless sensor networks
- (2011) Rong Fan et al. Journal of Zhejiang University-SCIENCE C-Computers & Electronics
- A Secured Authentication Protocol for Wireless Sensor Networks Using Elliptic Curves Cryptography
- (2011) Hsiu-Lien Yeh et al. SENSORS
- A Robust Mutual Authentication Protocol for Wireless Sensor Networks
- (2010) Tien-Ho Chen ETRI JOURNAL
- Cryptanalysis and Security Improvements of ‘Two-Factor User Authentication in Wireless Sensor Networks’
- (2010) Muhammad Khurram Khan et al. SENSORS
- Two-factor user authentication in wireless sensor networks
- (2009) Manik Lal Das IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS
- User authentication schemes with pseudonymity for ubiquitous sensor network in NGN
- (2009) Binod Vaidya et al. INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS
Add your recorded webinar
Do you already have a recorded webinar? Grow your audience and get more views by easily listing your recording on Peeref.
Upload NowCreate your own webinar
Interested in hosting your own webinar? Check the schedule and propose your idea to the Peeref Content Team.
Create Now