References
- Kumari, Saru, Muhammad Khurram Khan, and Mohammed Atiquzzaman, "User authentication schemes for wireless sensor networks: A review," Ad Hoc Networks, 2015, pp.159-194. https://doi.org/10.1016/j.adhoc.2014.11.018
- Jiang, Qi, et al, "A privacy‐aware two‐factor authentication protocol based on elliptic curve cryptography for wireless sensor networks," International Journal of Network Management, Vol.27, No.3, 2017.
- Choi, Younsung, et al, "Security enhanced user authentication protocol for wireless sensor networks using elliptic curves cryptography," Sensors, Vol.14, No.6, 2014, pp.10081-10106. https://doi.org/10.3390/s140610081
- Khan, Muhammad Khurram, and Khaled Alghathbar, "Cryptanalysis and security improvements of 'two-factor user authentication in wireless sensor networks'," Sensors, Vol.10, No.3, 2010, pp.2450-2459. https://doi.org/10.3390/s100302450
- Das, Manik Lal, "Two-factor user authentication in wireless sensor networks," IEEE transactions on wireless communications Vol.8, No.3, 2009, pp.1086-1090. https://doi.org/10.1109/TWC.2008.080128
- Chaudhry, Shehzad Ashraf, et al, "An improved and provably secure privacy preserving authentication protocol for SIP," Peer-to-Peer Networking and Applications, Vol.10, No.1, 2017, pp.1-15. https://doi.org/10.1007/s12083-015-0400-9
- He, Daojing, et al, "An enhanced two-factor user authentication scheme in wireless sensor networks," Ad hoc & sensor wireless networks, Vol.10, No.4, 2010, pp.361-371.
- Yeh, Hsiu-Lien, et al, "A secured authentication protocol for wireless sensor networks using elliptic curves cryptography," Sensors, Vol.11, No.5, 2011, pp.4767-4779. https://doi.org/10.3390/s110504767
- Shi, Wenbo, and Peng Gong, "A new user authentication protocol for wireless sensor networks using elliptic curves cryptography," International Journal of Distributed Sensor Networks, Vol.9, No.4, 2013.
- Chen, Tien‐Ho, and Wei‐Kuan Shih, "A robust mutual authentication protocol for wireless sensor networks," ETRI journal, Vol.32, No.5, 2010, pp.704-712. https://doi.org/10.4218/etrij.10.1510.0134
- Wang, Ding, et al, "Anonymous two-factor authentication in distributed systems: Certain goals are beyond attainment," IEEE Transactions on Dependable and Secure Computing, Vol.12, No.4, 2014, pp.428-442. https://doi.org/10.1109/TDSC.2014.2355850
- Hankerson, Darrel, Alfred J. Menezes, and Scott Vanstone, "Guide to elliptic curve cryptography," Computing Reviews, Vol.46, No.1, 2005.
- Choi, Younsung, et al, "Security enhanced anonymous multiserver authenticated key agreement scheme using smart cards and biometrics," The Scientific World Journal, 2014.
- Choi, Younsung, Youngsook Lee, and Dongho Won, "Security improvement on biometric based authentication scheme for wireless sensor networks using fuzzy extraction," International Journal of Distributed Sensor Networks, Vol.12, No.1, 2016.
- Jung, Jaewook, et al, "An anonymous user authentication and key agreement scheme based on a symmetric cryptosystem in wireless sensor networks," Sensors, Vol.16, No.8, 2016.
- 박중오, "무선 네트워크 환경에서 기기 관리 및 사용자 인증을 위한 안전한 통신 프레임워크 설계", 디지털산업정보학회 논문지, 제15권, 제2호, 2019, pp.43-52.
- 이재영, "스마트카드 기반의 사용자 인증 기법에 관한 연구", 디지털산업정보학회 논문지, 제14권, 제2호, 2018, pp.27-33.