[1] |
TAI Weiliang, CHANG Yafen, LI Weihan.An IoT Notion-based Authentication and Key Agreement Scheme Ensuring User Anonymity for Heterogeneous Ad Hoc Wireless Sensor Networks[J]. Journal of Information Security and Applications, 2017, 34(2): 133-141.
|
[2] |
TURKANOVIĆ M, BRUMEN B, HÖLBL M. A Novel User Authentication and Key Agreement Scheme for Heterogeneous Ad Hoc Wireless Sensor Networks, Based on the Internet of Things Notion[J]. Ad Hoc Networks, 2014, 20(2): 96-112.
|
[3] |
HE Debiao, KUMAR N, CHILAMKURTI N.A Secure Temporal-credential-based Mutual Authentication and Key Agreement Scheme with Pseudo Identity for Wireless Sensor Networks[C]//IEEE. 2013 International Symposium on Wireless and Pervasive Computing, November 20-22, 2013, Taipei, Taiwan, China. New Jersey: IEEE, 2014: 263-277.
|
[4] |
XUE Kaiping, MA Changsha, HONG Peilin, et al.A Temporal-credential-based Mutual Authentication and Key Agreement Scheme for Wireless Sensor Networks[J]. Journal of Network & Computer Applications, 2013, 36(1): 316-323.
|
[5] |
WU Fan, XU Lili, KUMARI S, et al.An Efficient Authentication and Key Agreement Scheme for Multi-gateway Wireless Sensor Networks in IoT Deployment[J]. Journal of Network and Computer Applications, 2017, 89(C): 72-85.
|
[6] |
FARASHA M S, TURKANOVIĆ M, KUMARI S, et al.An Efficient User Authentication and Key Agreement Scheme for Heterogeneous Wireless Sensor Network Tailored for the Internet of Things Environment[J]. Ad Hoc Networks, 2016, 36(P1): 152-176.
|
[7] |
KUMARI S, LI Xiong, WU Fan, et al. Design of a Provably Secure Biometrics-based Multi-cloud-server Authentication Scheme[EB/OL]. .
|
[8] |
AMIN R, BISWAS G P. A Secure Light Weight Scheme for User Authentication and Key Agreement in Multi-gateway Based Wireless Sensor Networks[EB/OL]. , 2017-10-24.
|
[9] |
陈宇,王晋东. 无线传感网身份认证协议研究[J]. 信息网络安全,2011(12):46-47.
|
[10] |
LI Xiong, IBRAHIM M H, KUMARI S, et al. Anonymous Mutual Authentication and Key Agreement Scheme for Wearable Sensor in Wireless Body Area Networks[EB/OL]. , 2017-10-24.
|
[11] |
CHOO K K R, NAM J, WON D. A Mechanical Approach to Derive Identity-based Protocols from Diffie-Hellman-based Protocols[EB/OL]. , 2017-10-24.
|
[12] |
王博识. 物联网安全架构初探[J]. 信息网络安全,2016(S1):137-140.
|
[13] |
SIMPLICIO M, SILVA M V M, ALVES R, et al. Lightweight and Escrow-less Authenticated Key Agreement for the Internet of Things[EB/OL]. , 2017-10-24.
|
[14] |
SIMPLICIO M A, OLIVEIRA B T D, MARGI C B, et al. Survey and Comparison of Message Authentication Solutions on Wireless Sensor Networks[J]. Ad Hoc Networks, 2013, 11(3): 1221-1236.
|
[15] |
钟敦昊,张冬梅,张玉. 一种基于相似度计算的无线传感器网络入侵检测方法[J]. 信息网络安全,2016(2):22-27.
|