Open Access
Issue
ITM Web Conf.
Volume 52, 2023
International Conference on Connected Object and Artificial Intelligence (COCIA’2023)
Article Number 01003
Number of page(s) 11
Section Connected Objects and Systems
DOI https://doi.org/10.1051/itmconf/20235201003
Published online 08 May 2023
  1. M. Fariss, H. El Gafif, A. Toumanari, A Lightweight ECC-Based Three-Factor Mutual Authentication and Key Agreement Protocol for WSNs in IoT, IJACSA, 13 (2022) [CrossRef] [Google Scholar]
  2. H.-R. Tseng, R.-H. Jan, W. Yang, An Improved Dynamic User Authentication Scheme for Wireless Sensor Networks, in Proceedings of the Global Communications Conference, GLOBECOM, 26-30 November 2007, Washington, DC, USA (2007) [Google Scholar]
  3. P. S. Teh, N. Zhang, A. B. J. Teoh, K. Chen, A survey on touch dynamics authentication in mobile devices, Comput. Secur. 59 210–235 (2016) [CrossRef] [Google Scholar]
  4. M. L. Das, Two-factor user authentication in wireless sensor networks, IEEE Trans Commun 8 1086–1090 (2009) [Google Scholar]
  5. D. Nyang, M.-K. Lee, Improvement of Das’s Two-Factor Authentication Protocol in Wireless Sensor Networks, IACR Cryptology ePrint Archive, 2009 631 (2009) [Google Scholar]
  6. K. Xue, C. Ma, P. Hong, R. Ding, A temporal-credential-based mutual authentication and key agreement scheme for wireless sensor networks, J. Netw. Comput. Appl., 36 316–323 (2013) [CrossRef] [Google Scholar]
  7. D. He, N. Kumar, N. Chilamkurti, A secure temporal-credential-based mutual authentication and key agreement scheme with pseudo identity for wireless sensor networks, Inf. Sci., 321 263–277 (2015) [CrossRef] [Google Scholar]
  8. M. Qi, J. Chen, New robust biometrics-based mutual authentication scheme with key agreement using elliptic curve cryptography, Multimed Tools Appl 77, 23335–23351 (2018) [CrossRef] [MathSciNet] [Google Scholar]
  9. S. S. Sahoo, S. Mohanty, B. Majhi, Improved Biometric-Based Mutual Authentication and Key Agreement Scheme Using ECC, Wireless Pers Commun 111, 991–1017 (2020) [CrossRef] [Google Scholar]
  10. J. Ryu, J. Oh, D. Kwon, S. Son, J. Lee, Y. Park, Y. Park, Secure ECC-Based ThreeFactor Mutual Authentication Protocol for Telecare Medical Information System, IEEE Access 10, 11511-11526 (2022) [CrossRef] [Google Scholar]
  11. P. Gope, A. K. Das, N. Kumar, Y. Cheng, Lightweight and Physically Secure Anonymous Mutual Authentication Protocol for Real-Time Data Access in Industrial Wireless Sensor Networks, IEEE Trans Industr Inform 15 4957–4968 (2019) [CrossRef] [Google Scholar]
  12. M. F. Moghadam, M. Nikooghadam, M. A. B. Al Jabban, M. Alishahi, L. Mortazavi, A. Mohajerzadeh, An Efficient Authentication and Key Agreement Scheme Based on ECDH for Wireless Sensor Network, IEEE Access 8 73182–73192 (2020) [CrossRef] [Google Scholar]
  13. C. J. F. Cremers, Scyther: semantics and verification of security protocols, Eindhoven University of Technology (2006) [Google Scholar]
  14. D. Kwon, S. Yu, J. Lee, S. Son, Y. Park, Wsn-slap: Secure and lightweight mutual authentication protocol for wireless sensor networks, Sensors 21 (2021) [Google Scholar]
  15. B. N. Koblitz, Elliptic Curve Cryptosystems, Math. Comput. 48 203–209 (1987) [CrossRef] [Google Scholar]
  16. V. S. Miller, Use of Elliptic Curves in Cryptography, LNCS 218 417–426 (1986) [Google Scholar]
  17. L. Gong, R. Needham, R. Yahalom, Reasoning about Belief in Cryptographic Protocols, in Proceedings 1990 IEEE Computer Society Symposium on Research in Security and Privacy, Oakland, CA, USA, (1990) [Google Scholar]
  18. P. C. van Oorschot, Extending Cryptographic Logics of Belief to Key Agreement Protocols, Oorschot, Paul C. van. “Extending cryptographic logics of belief to key agreement protocols.” Conference on Computer and Communications Security (1993) [Google Scholar]

Current usage metrics show cumulative count of Article Views (full-text article views including HTML views, PDF and ePub downloads, according to the available data) and Abstracts Views on Vision4Press platform.

Data correspond to usage on the plateform after 2015. The current usage metrics is available 48-96 hours after online publication and is updated daily on week days.

Initial download of the metrics may take a while.