[1] DAS M L. Two-factor user authentication in wireless sensor networks[J]. Wireless Communications, 2009, 8(3): 1086-1090. [2] NYANG D H, LEE M K. Improvement of Das's two-factor authentication protocol in wireless sensor networks[EB/OL]. [2014-10-10]. https://eprint.iacr.org/2009/631.pdf. [3] HE D, GAO Y, CHAN S, et al. An enhanced two-factor user authentication scheme in wireless sensor networks[J]. Ad Hoc and Sensor Wireless Networks, 2010, 10(4): 361-371. [4] HUANG H F, CHANG Y F, LIU C H. Enhancement of two-factor user authentication in wireless sensor networks[C]//Proceedings of the 2010 Sixth International Conference on Intelligent Information Hiding and Multimedia Signal Processing. Piscataway: IEEE Press,2010: 27-30. [5] KHAN M K, ALGHATHBAR K. Cryptanalysis and security im-provements of 'two-factor user authentication in wireless sensor networks'[J]. Sensors, 2010, 10(3): 2450-2459. [6] SUN D, LI J, FENG Z, et al. On the security and improvement of a two-factor user authentication scheme in wireless sensor networks[J]. Personal and Ubiquitous Computing, 2013, 17(5): 895-905. [7] KUMAR P, LEE H J. Cryptanalysis on two user authentication protocols using smart card for wireless sensor networks[C]//Proceedings of the 2011 IEEE Wireless Advanced. Piscataway: IEEE Press, 2011: 241-245. [8] FAN R, HE D, PAN X. An efficient and DoS-resistant user authentication scheme for two-tiered wireless sensor networks[J]. Journal of Zhejiang University Science C, 2011, 12(7): 550-560. [9] VAIDYA B, MAKRAKIS D, MOUFTAH H T. Improved two-factor user authentication in wireless sensor networks[C]//Proceedings of the 2010 IEEE 6th International Conference on Wireless and Mobile Computing, Networking and Communications. Piscataway: IEEE Press, 2010: 600-606. [10] YUAN J J. An enhanced two-factor user authentication in wireless sensor networks[J]. Telecommunication Systems, 2014, 55(1): 105-113. [11] YEH H L, CHEN T H, LIU P C, et al. A secured authentication protocol for wireless sensor networks using elliptic curves cryptography[J]. Sensors, 2011, 11(5): 4767-4779. [12] CHEN T H, SHIH W K. A robust mutual authentication protocol for wireless sensor networks[J]. Etri Journal, 2010, 32(5): 704-712. [13] YOO S G, PARK K Y, KIM J. A security-performance-balanced user authentication scheme for wireless sensor networks[J]. International Journal of Distributed Sensor Networks, 2012,2012, Article ID 382810. [14] SHI W, GONG P. A new user authentication protocol for wireless sensor networks using elliptic curves cryptography[J]. International Journal of Distributed Sensor Networks, 2013,2013, Article ID 730831. [15] KUMAR P, CHOUDHURY A J, SAIN M, et al. RUASN: a robust user authentication framework for wireless sensor networks[J]. Sensors, 2011, 11(5): 5020-5046. [16] XUE K, MA C, HONG P, et al. A temporal-credential-based mutual authentication and key agreement scheme for wireless sensor networks[J]. Journal of Network and Computer Applications, 2013, 36(1): 316-323. [17] NAM J, KIM M, PAIK J, et al. A provably-secure ECC-based authentication scheme for wireless sensor networks[J]. Sensors, 2014, 14(11): 21023-21044. [18] FAN R, FU J, PAN X. A secure and efficient user authentication protocol for two-tiered wireless sensor networks [C]//Proceedings of the 2010 Second Pacific-Asia Conference on Circuits, Communications and System. Piscataway: IEEE Press, 2010,1: 425-428. [19] KALRA S, SOOD S K. Advanced password based authentication scheme for wireless sensor networks[J]. Journal of Information Security and Applications, 2015, 20: 37-46. [20] LI C T, LEE C C, WANG L J, et al. A secure billing service with two-factor user authentication in wireless sensor networks[J]. International Journal of Innovative Computing, Information and Control, 2011, 7(8): 4821-4832. [21] LI X, BAO F, LI S, et al. FLAP: an efficient WLAN initial access authentication protocol[J]. Parallel and Distributed Systems, 2014, 25(2): 488-497. |