1 |
A. K. Das, "An Unconditionally Secure Key Management Scheme for Large-scale Wireless Sensor Networks", IEEE International Conference on Communication systems and Networks, pp. 1-10, 2009.
|
2 |
A. K. Das, P. Sharma, S. Chatterjee, and J. K. Sing, "A Dynamic Password-based User Authentication Scheme for Hierarchical Wireless Sensor Networks", Journal of Network and Computer Applications, Vol. 35, No, 5, pp. 1646-1656, 2012.
DOI
|
3 |
L. Lamport, "Password Authentication with Insecure Communication", Communications of the ACM, Vol. 24, No. 11, pp. 770-772, 1981.
DOI
|
4 |
R. Watro, and D. Kong, et al., "Securing Sensor Network with Public Key Technology", ACM Workshop Security of Ad Hoc Sensor Network, pp. 59-64, 2004.
|
5 |
K. Wong, Y. Zheng, and J. Cao, et al., "A Dynamic User Authentication Scheme for Wireless Sensor Networks", IEEE International Conference Sensor Networks, Ubiquitous and Trustworthy Computing, IEEE Computing Society, pp. 244-251, 2006.
|
6 |
M. L. Das, "Two-factor User Authentication Scheme in Wireless Sensor Network", IEEE Transactions on Wireless Communications, Vol. 8, No. 3, pp. 1086-1090, 2009.
DOI
ScienceOn
|
7 |
M. K. Khan, and K. Alghathbar, "Cryptanalysis and Security Improvements of Two-factor User Authentication in Wireless Sensor Networks", Sensors, Vol. 10, No. 3, pp. 2450-2459, 2010.
DOI
ScienceOn
|
8 |
D. He, Y. Gao, S. Chan, C. Chen, and J. Bu, "An Enhanced Two-factor User Authentication Scheme in Wireless Sensor Networks", Ad Hoc & Sensor Wireless Networks, Vol. 10, No. 4, pp. 361-371, 2010.
|
9 |
H. L. Yeh, T. H. Chen, P. C. Liu, T. H. Kim, and H. W. Wei, "A Secure Authentication Protocol for Wireless Sensor Network Using Elliptic Curve Cryptography", Sensors, Vol. 11, No. 5, pp. 4767-4779, 2011.
DOI
|
10 |
C. T. Li, C. Y. Weng, and C. C. Lee, et al., "Security Flaws of a Password Authentication Scheme for Hierarchical WSNs", Journal of Advances in Computer Networks, Vol. 1, No. 2, pp. 121-124, 2013.
|
11 |
J. Yuan, C. Jiang, and Z. Jiang, "A Biometric-Based User Authentication for Wireless Sensor Networks", Wuhan University Journal of Natural Science, Vol. 15, No. 3, pp. 272-276, 2010.
DOI
|
12 |
H. Lee, and Y. Park, "A Design and Implementation of User Authentication System using Biometric Information", Journal of the Korea Academia-Industrial Cooperation Society(JKAIS), Vol. 11, No. 9, pp. 3548-3557, 2010.
DOI
|
13 |
Y. Joo, "Analysis on Security Vulnerabilities of a Biometric-based User Authentication Scheme for Wireless Sensor Networks", Journal of the Institute of Internet, Broadcasting and Communication(JIIBC), Vol. 14, No. 2, pp. 147-153, 2014.
DOI
|
14 |
P. Kocher, J. Jaffe, and B. Jun, "Differential Power Analysis", Proceedings of Advances in Cryptology, pp. 388-397, 1999.
|
15 |
T. S. Messerges, E. A. Dabbish, and R. H. Sloan, "Examining Smart-Card Security under the Threat of Power Analysis Attacks", IEEE Transactions on Computers, Vol. 51, No. 5, pp. 541-552, 2002
DOI
|