Authentication protocols for internet of things: a comprehensive survey

MA Ferrag, LA Maglaras, H Janicke… - Security and …, 2017 - Wiley Online Library
In this paper, a comprehensive survey of authentication protocols for Internet of Things (IoT)
is presented. Specifically more than forty authentication protocols developed for or applied …

User authentication schemes for wireless sensor networks: A review

S Kumari, MK Khan, M Atiquzzaman - Ad Hoc Networks, 2015 - Elsevier
Wireless sensor networks (WSNs) are applicable in versatile domains ranging from very
common to those which demand crucial security concerns. The deployment of WSNs in …

Robust anonymous authentication protocol for health-care applications using wireless medical sensor networks

D He, N Kumar, J Chen, CC Lee, N Chilamkurti… - Multimedia …, 2015 - Springer
With the fast development of wireless communication technologies and semiconductor
technologies, the wireless sensor network (WSN) has been widely used in many …

An untraceable temporal-credential-based two-factor authentication scheme using ECC for wireless sensor networks

Q Jiang, J Ma, F Wei, Y Tian, J Shen, Y Yang - Journal of Network and …, 2016 - Elsevier
Recently, He et al. proposed an anonymous two-factor authentication scheme following the
concept of temporal-credential for wireless sensor networks (WSNs), which is claimed to be …

An efficient authentication and key agreement scheme for multi-gateway wireless sensor networks in IoT deployment

F Wu, L Xu, S Kumari, X Li, J Shen, KKR Choo… - Journal of Network and …, 2017 - Elsevier
Wireless sensor networks (WSNs) for Internet of Things (IoT) can be deployed in a wide
range of industries such as agriculture and military. However, designing a secure and …

An efficient two-factor user authentication scheme with unlinkability for wireless sensor networks

Q Jiang, J Ma, X Lu, Y Tian - Peer-to-peer Networking and Applications, 2015 - Springer
User authentication with unlinkability is one of the corner stone services for many security
and privacy services which are required to secure communications in wireless sensor …

A secure and robust temporal credential-based three-factor user authentication scheme for wireless sensor networks

AK Das - Peer-to-peer Networking and Applications, 2016 - Springer
User authentication is one of the most important security services required for the resource-
constrained wireless sensor networks (WSNs). In user authentication, for critical applications …

A privacy-preserving and provable user authentication scheme for wireless sensor networks based on internet of things security

F Wu, L Xu, S Kumari, X Li - Journal of Ambient Intelligence and …, 2017 - Springer
Abstract The notion Internet of Things (IoT) means all things in the global network can be
interconnected and accessed. Wireless sensor network (WSN) is one of the most important …

An improved and anonymous two-factor authentication protocol for health-care applications with wireless medical sensor networks

F Wu, L Xu, S Kumari, X Li - Multimedia Systems, 2017 - Springer
Wireless sensor networks (WSNs) are fast developed and widely used in many applications.
One of the most important applications is wireless medical sensor network (WMSN) which …

A secure and effective biometric‐based user authentication scheme for wireless sensor networks using smart card and fuzzy extractor

AK Das - International Journal of Communication Systems, 2017 - Wiley Online Library
User authentication is a prominent security requirement in wireless sensor networks (WSNs)
for accessing the real‐time data from the sensors directly by a legitimate user (external …