Survey on user authentication protocol in wireless sensor network
In wireless sensor network (WSN), the user authentication technology is an effective approach, which can guarantee the user's validity, avoid WSN's information disclosure. Meanwhile, the users also need to verify the WSN's validity, avoid obtaining incorrect or false information. Howe...
| Published in: | 网络与信息安全学报 |
|---|---|
| Main Authors: | Wei-dong FANG, Wu-xiong ZHANG, Lian-hai SHAN, Wei HE, Wei CHEN |
| Format: | Article |
| Language: | English |
| Published: |
POSTS&TELECOM PRESS Co., LTD
2017-01-01
|
| Subjects: | |
| Online Access: | http://www.cjnis.com.cn/thesisDetails#10.11959/j.issn.2096-109x.2017.00129 |
Similar Items
Survey on user authentication protocol in wireless sensor network
by: Wei-dong FANG,Wei HE, et al.
Published: (2017-01-01)
by: Wei-dong FANG,Wei HE, et al.
Published: (2017-01-01)
A Provably Secure Three-Factor Authentication Protocol Based on Chebyshev Chaotic Mapping for Wireless Sensor Network
by: Jiaqing Mo, et al.
Published: (2022-01-01)
by: Jiaqing Mo, et al.
Published: (2022-01-01)
BBAP-WSN: A New Blockchain-Based Authentication Protocol for Wireless Sensor Networks
by: Murat Dener, et al.
Published: (2023-01-01)
by: Murat Dener, et al.
Published: (2023-01-01)
A Provably-Secure ECC-Based Authentication Scheme for Wireless Sensor Networks
by: Junghyun Nam, et al.
Published: (2014-11-01)
by: Junghyun Nam, et al.
Published: (2014-11-01)
Secure and Authenticated Data Communication in Wireless Sensor Networks
by: Omar Alfandi, et al.
Published: (2015-08-01)
by: Omar Alfandi, et al.
Published: (2015-08-01)
A Survey of Energy Efficient Security Architectures and Protocols for Wireless Sensor Networks
by: Krzysztof Daniluk, et al.
Published: (2012-09-01)
by: Krzysztof Daniluk, et al.
Published: (2012-09-01)
UCAP:a PCL secure user authentication protocol in cloud computing
by: Xuefeng LI, et al.
Published: (2018-08-01)
by: Xuefeng LI, et al.
Published: (2018-08-01)
UCAP:a PCL secure user authentication protocol in cloud computing
by: Xuefeng LI, et al.
Published: (2018-08-01)
by: Xuefeng LI, et al.
Published: (2018-08-01)
Physical-Unclonable-Function-Based Lightweight Three-Factor Authentication for Multiserver Architectures
by: Qi Xie, et al.
Published: (2023-12-01)
by: Qi Xie, et al.
Published: (2023-12-01)
User Authentication and Authorization Framework in IoT Protocols
by: Ammar Mohammad, et al.
Published: (2022-09-01)
by: Ammar Mohammad, et al.
Published: (2022-09-01)
Two-factor wearable device authentication protocol based on PUF and IPI
by: Jun WANG, et al.
Published: (2017-06-01)
by: Jun WANG, et al.
Published: (2017-06-01)
Two-factor wearable device authentication protocol based on PUF and IPI
by: Jun WANG, et al.
Published: (2017-06-01)
by: Jun WANG, et al.
Published: (2017-06-01)
A Novel Authentication Method That Combines Honeytokens and Google Authenticator
by: Vassilis Papaspirou, et al.
Published: (2023-07-01)
by: Vassilis Papaspirou, et al.
Published: (2023-07-01)
Strengthening Cloud Security: An Innovative Multi-Factor Multi-Layer Authentication Framework for Cloud User Authentication
by: Ayman Mohamed Mostafa, et al.
Published: (2023-09-01)
by: Ayman Mohamed Mostafa, et al.
Published: (2023-09-01)
EVALUATION OF DATA COLLECTION TREE ROUTING PROTOCOLS FOR WIRELESS SENSOR NETWORKS
by: Do Huy Khoi
Published: (2024-12-01)
by: Do Huy Khoi
Published: (2024-12-01)
AN EFFICIENT TWO-SERVER AUTHENTICATION AND KEY EXCHANGE PROTOCOL FOR ACCESSING SECURE CLOUD SERVICES
by: Durbadal Chattaraj, et al.
Published: (2018-04-01)
by: Durbadal Chattaraj, et al.
Published: (2018-04-01)
Device Risk Analysis Protocol for SMS-Based OTP Authentication
by: Maciej Bartlomiejczyk, et al.
Published: (2024-01-01)
by: Maciej Bartlomiejczyk, et al.
Published: (2024-01-01)
Security Enhanced User Authentication Protocol for Wireless Sensor Networks Using Elliptic Curves Cryptography
by: Younsung Choi, et al.
Published: (2014-06-01)
by: Younsung Choi, et al.
Published: (2014-06-01)
User-Authentication Protocol to Secure Wireless Sensor Network Access in the Internet of Things Context
by: Benfilali Mostefa, et al.
Published: (2024-06-01)
by: Benfilali Mostefa, et al.
Published: (2024-06-01)
A blockchain-empowered authentication scheme for worm detection in wireless sensor network
by: Yuling Chen, et al.
Published: (2024-04-01)
by: Yuling Chen, et al.
Published: (2024-04-01)
Security analysis and provision of authentication protocol, based on peer-to-peer structure in IOT platform
by: Dongdong Liu, et al.
Published: (2024-10-01)
by: Dongdong Liu, et al.
Published: (2024-10-01)
A Comprehensive Survey on Routing and Security in Mobile Wireless Sensor Networks
by: Ahmed Al-Nasser, et al.
Published: (2021-12-01)
by: Ahmed Al-Nasser, et al.
Published: (2021-12-01)
Cryptanalysis and improvement of a password-based user authentication scheme for the integrated EPR information system
by: SK Hafizul Islam, et al.
Published: (2015-04-01)
by: SK Hafizul Islam, et al.
Published: (2015-04-01)
Spoofing detection on adaptive authentication System‐A survey
by: Hind Baaqeel, et al.
Published: (2022-03-01)
by: Hind Baaqeel, et al.
Published: (2022-03-01)
Multi-user broadcast authentication scheme in wireless sensor networks with defending against DoS attacks
by: GUO Jiang-hong, et al.
Published: (2011-01-01)
by: GUO Jiang-hong, et al.
Published: (2011-01-01)
Multi-user broadcast authentication scheme in wireless sensor networks with defending against DoS attacks
by: GUO Jiang-hong, et al.
Published: (2011-01-01)
by: GUO Jiang-hong, et al.
Published: (2011-01-01)
Deep-Learning-Based Physical Layer Authentication for Industrial Wireless Sensor Networks
by: Run-Fa Liao, et al.
Published: (2019-05-01)
by: Run-Fa Liao, et al.
Published: (2019-05-01)
Rational analysis of authentication protocols based on NGUYEN L H scheme
by: Xing-hua LI, et al.
Published: (2013-08-01)
by: Xing-hua LI, et al.
Published: (2013-08-01)
Rational analysis of authentication protocols based on NGUYEN L H scheme
by: Xing-hua LI, et al.
Published: (2013-08-01)
by: Xing-hua LI, et al.
Published: (2013-08-01)
Energy Efficient ECC Authenticated Key Exchange Protocol for Star Topology Wireless Sensor Networks
by: Andrzej Chmielowiec, et al.
Published: (2024-03-01)
by: Andrzej Chmielowiec, et al.
Published: (2024-03-01)
Physical-Unclonable-Function-Based Secure and Anonymous User Authentication for Smart Homes
by: Hakjun Lee, et al.
Published: (2024-01-01)
by: Hakjun Lee, et al.
Published: (2024-01-01)
A Survey on Quantitative Risk Estimation Approaches for Secure and Usable User Authentication on Smartphones
by: Maria Papaioannou, et al.
Published: (2023-03-01)
by: Maria Papaioannou, et al.
Published: (2023-03-01)
Unlocking Security for Comprehensive Electroencephalogram-Based User Authentication Systems
by: Adnan Elahi Khan Khalil, et al.
Published: (2024-12-01)
by: Adnan Elahi Khan Khalil, et al.
Published: (2024-12-01)
Smart Home Security: An Efficient Multi-Factor Authentication Protocol
by: Ghazaleh Sarbishaei, et al.
Published: (2024-01-01)
by: Ghazaleh Sarbishaei, et al.
Published: (2024-01-01)
SMFA: Strengthening Multi-Factor Authentication With Steganography for Enhanced Security
by: Afjal H. Sarower, et al.
Published: (2025-01-01)
by: Afjal H. Sarower, et al.
Published: (2025-01-01)
A three-factor mutual authentication scheme for telecare medical information system based on ECC
by: Muthukumar Manickam, et al.
Published: (2024-01-01)
by: Muthukumar Manickam, et al.
Published: (2024-01-01)
Provably Secure Pseudo-Identity Three-Factor Authentication Protocol Based on Extended Chaotic-Maps for Lightweight Mobile Devices
by: Devanapalli Suresh, et al.
Published: (2022-01-01)
by: Devanapalli Suresh, et al.
Published: (2022-01-01)
Deniable authentication for multi-party protocol
by: Yong CHEN, et al.
Published: (2016-06-01)
by: Yong CHEN, et al.
Published: (2016-06-01)
Deniable authentication for multi-party protocol
by: Yong CHEN,Long LU,Sheng-ke ZENG,Ming-xing HE
Published: (2016-06-01)
by: Yong CHEN,Long LU,Sheng-ke ZENG,Ming-xing HE
Published: (2016-06-01)
Identity based authentication protocol for wireless sensor networks
by: Moisés Salinas Rosales, et al.
Published: (2013-03-01)
by: Moisés Salinas Rosales, et al.
Published: (2013-03-01)
Similar Items
-
Survey on user authentication protocol in wireless sensor network
by: Wei-dong FANG,Wei HE, et al.
Published: (2017-01-01) -
A Provably Secure Three-Factor Authentication Protocol Based on Chebyshev Chaotic Mapping for Wireless Sensor Network
by: Jiaqing Mo, et al.
Published: (2022-01-01) -
BBAP-WSN: A New Blockchain-Based Authentication Protocol for Wireless Sensor Networks
by: Murat Dener, et al.
Published: (2023-01-01) -
A Provably-Secure ECC-Based Authentication Scheme for Wireless Sensor Networks
by: Junghyun Nam, et al.
Published: (2014-11-01) -
Secure and Authenticated Data Communication in Wireless Sensor Networks
by: Omar Alfandi, et al.
Published: (2015-08-01)
