Lightweight and anonymous three-factor authentication and access control scheme for real-time applications in wireless sensor networks
Published 2017 View Full Article
- Home
- Publications
- Publication Search
- Publication Details
Title
Lightweight and anonymous three-factor authentication and access control scheme for real-time applications in wireless sensor networks
Authors
Keywords
Wireless sensor networks, User anonymity, Three-factor authentication, Key agreement, Access control
Journal
Peer-to-Peer Networking and Applications
Volume -, Issue -, Pages -
Publisher
Springer Nature
Online
2017-12-21
DOI
10.1007/s12083-017-0627-8
References
Ask authors/readers for more resources
Related references
Note: Only part of the references are listed.- Design of an anonymity-preserving three-factor authenticated key exchange protocol for wireless sensor networks
- (2016) Ruhul Amin et al. Computer Networks
- Lightweight and Energy-Efficient Mutual Authentication and Key Agreement Scheme With User Anonymity for Secure Communication in Global Mobility Networks
- (2016) Prosanta Gope et al. IEEE Systems Journal
- A Realistic Lightweight Anonymous Authentication Protocol for Securing Real-Time Application Data Access in Wireless Sensor Networks
- (2016) Prosanta Gope et al. IEEE TRANSACTIONS ON INDUSTRIAL ELECTRONICS
- A Provably Secure, Efficient, and Flexible Authentication Scheme for Ad hoc Wireless Sensor Networks
- (2016) Chin-Chen Chang et al. IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS
- A realistic lightweight authentication protocol preserving strong anonymity for securing RFID system
- (2015) Prosanta Gope et al. COMPUTERS & SECURITY
- A Secure and Efficient User Anonymity-Preserving Three-Factor Authentication Protocol for Large-Scale Distributed Wireless Sensor Networks
- (2015) Ashok Kumar Das WIRELESS PERSONAL COMMUNICATIONS
- On the anonymity of two-factor authentication schemes for wireless sensor networks: Attacks, principle and solutions
- (2014) Ding Wang et al. Computer Networks
- Enhanced three-factor security protocol for consumer USB mass storage devices
- (2014) Debiao He et al. IEEE TRANSACTIONS ON CONSUMER ELECTRONICS
- An Efficient Generic Framework for Three-Factor Authentication With Provably Secure Instantiation
- (2014) Jiangshan Yu et al. IEEE Transactions on Information Forensics and Security
- A User Anonymity Preserving Three-Factor Authentication Scheme for Telecare Medicine Information Systems
- (2014) Zuowen Tan JOURNAL OF MEDICAL SYSTEMS
- An efficient two-factor user authentication scheme with unlinkability for wireless sensor networks
- (2014) Qi Jiang et al. Peer-to-Peer Networking and Applications
- A secure and robust temporal credential-based three-factor user authentication scheme for wireless sensor networks
- (2014) Ashok Kumar Das Peer-to-Peer Networking and Applications
- A secure effective key management scheme for dynamic access control in a large leaf class hierarchy
- (2013) Vanga Odelu et al. INFORMATION SCIENCES
- A dynamic password-based user authentication scheme for hierarchical wireless sensor networks
- (2012) Ashok Kumar Das et al. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS
- A temporal-credential-based mutual authentication and key agreement scheme for wireless sensor networks
- (2012) Kaiping Xue et al. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS
- On the security and improvement of a two-factor user authentication scheme in wireless sensor networks
- (2012) Da-Zhi Sun et al. Personal and Ubiquitous Computing
- Two-factor mutual authentication with key agreement in wireless sensor networks
- (2012) Binod Vaidya et al. Security and Communication Networks
- An efficient and DoS-resistant user authentication scheme for two-tiered wireless sensor networks
- (2011) Rong Fan et al. Journal of Zhejiang University-SCIENCE C-Computers & Electronics
- RUASN: A Robust User Authentication Framework for Wireless Sensor Networks
- (2011) Pardeep Kumar et al. SENSORS
- A Secured Authentication Protocol for Wireless Sensor Networks Using Elliptic Curves Cryptography
- (2011) Hsiu-Lien Yeh et al. SENSORS
- A Robust Mutual Authentication Protocol for Wireless Sensor Networks
- (2010) Tien-Ho Chen ETRI JOURNAL
- A Generic Framework for Three-Factor Authentication: Preserving Security and Privacy in Distributed Systems
- (2010) Xinyi Huang et al. IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS
- Cryptanalysis and improvement of a biometrics-based remote user authentication scheme using smart cards
- (2010) Xiong Li et al. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS
- Cryptanalysis and Security Improvements of ‘Two-Factor User Authentication in Wireless Sensor Networks’
- (2010) Muhammad Khurram Khan et al. SENSORS
- Two-factor user authentication in wireless sensor networks
- (2009) Manik Lal Das IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS
- An efficient biometrics-based remote user authentication scheme using smart cards
- (2009) Chun-Ta Li et al. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS
- Energy conservation in wireless sensor networks: A survey
- (2008) Giuseppe Anastasi et al. Ad Hoc Networks
Publish scientific posters with Peeref
Peeref publishes scientific posters from all research disciplines. Our Diamond Open Access policy means free access to content and no publication fees for authors.
Learn MoreCreate your own webinar
Interested in hosting your own webinar? Check the schedule and propose your idea to the Peeref Content Team.
Create Now