Computer Applications and Software, Volume. 42, Issue 4, 83(2025)
THE IDENTITY AUTHENTICATION SCHEME FOR UWSN BASED ON THREE FACTORS
[1] [1] Sadhukhan D, Ray S, Biswas G P, et al. A lightweight remote user authentication scheme for IoT communication using elliptic curve cryptography[J]. The Journal of Supercomputing, 2020, 77: 1114-1151.
[2] [2] Ostad-Sharif A, Arshad H, Nikooghadam M, et al. Three party secure data transmission in IoT networks through design of a lightweight authenticated key agreement scheme[J]. Future Generation Computer Systems, 2019, 100: 882-892.
[3] [3] Mishra D, Vijayakumar P, Sureshkumar V, et al. Efficient authentication protocol for secure multimedia communications in IoT-enabled wireless sensor networks[J]. Multimedia Tools Applications, 2017, 77(14): 18295-18325.
[4] [4] Dhillon P K, Kalra S. A lightweight biometrics based remote user authentication scheme for IoT services[J]. Journal of Information Security and Applications, 2017, 34: 255-270.
[5] [5] Challa S, Wazid M, Das A K, et al. Secure signature-based authenticated key establishment scheme for future IoT applications[J]. IEEE Access, 2017, 5: 3028-3043.
[6] [6] Wazid M, Das A K, Odelu V, et al. Design of secure user authenticated key management protocol for generic IoT networks[J]. IEEE Internet of Things, 2018, 5(1): 269-282.
[7] [7] Das A K, Wazid M, Kumar N, et al. Design of secure and lightweight authentication protocol for wearable devices environment[J]. IEEE Journal of Biomedical and Health Informatics, 2018, 22(4): 1310-1322.
[8] [8] Gope P, Das A K, Kumar N, et al. Lightweight and physically secure anonymous mutual authentication protocol for real-time data access in industrial wireless sensor networks[J]. IEEE Transactions on Industrial Informatics, 2019, 15 (9): 4957-4968.
[9] [9] Shuai M X, Yu N, Wang H X, et al. Anonymous authentication scheme for smart home environment with provable security[J]. Computers Security, 2019, 86: 132-146.
[10] [10] Fakroon M, Alshahrani M, Gebali F, et al. Secure remote anonymous user authentication scheme for smart home environment[J]. Internet of Things, 2020, 17(2): 391-406.
[11] [11] Bian W X, Gope P, Cheng Y Q, Li Q. Bio-aka: An efficient fingerprint based two factor user authentication and key agreement scheme[J]. Future Generation Computer Systems, 2020, 109: 45-55.
[12] [12] Wang D, Zhang X Z, Zhang Z J, et al. Understanding security failures of multifactor authentication schemes for multiserver environments[J]. Computer and Security, 2020, 88: 1619-1632.
[13] [13] Poorambage Q P, Schmitt C, Kumar P, et al. Two-phase authentication protocol for wireless sensor networks in distributed IoT applications[C]//IEEE Wireless Communications and Networking Conference, 2014: 2728-2733.
[14] [14] Nam J Y, Raymond K, Han S, et al. Efficient and anonymous two-factor user authentication in wireless sensor networks: Achieving user anonymity with lightweight sensor computation[J]. PLoS One, 2015, 10(4): e0116709.
[15] [15] Srinivas J, Mishra D, Mukhopadhyay S, et al. Provably secure biometric based authentication and key agreement protocol for wireless sensor networks[J]. Journal of Ambient Intelligence & Humanized Computing, 2017, 9(4): 875-895.
[16] [16] Mao D M, Zhang L, Li X Y, et al. Trusted authority assisted three-factor authentication and key agreement protocol for the implantable medical system[J]. Wireless Communications and Mobile Computing, 2018, 2018: 1-16.
[17] [17] Jiang Q, Kumar N, Ma J F, et al. A privacy-aware two-factor authentication protocol based on elliptic curve cryptography for wireless sensor networks: A privacy-aware two-factor authentication protocol[J]. International Journal of Network Management, 2016, 27(3): 1937-1940.
Get Citation
Copy Citation Text
Chen Haozhang, Du Xiujuan, Zhang Shuailiang, Wang Yongju. THE IDENTITY AUTHENTICATION SCHEME FOR UWSN BASED ON THREE FACTORS[J]. Computer Applications and Software, 2025, 42(4): 83
Category:
Received: Oct. 12, 2021
Accepted: Aug. 25, 2025
Published Online: Aug. 25, 2025
The Author Email: