Efficient and security enhanced anonymous authentication with key agreement scheme in wireless sensor networks

J Jung, J Moon, D Lee, D Won - Sensors, 2017 - mdpi.com
At present, users can utilize an authenticated key agreement protocol in a Wireless Sensor
Network (WSN) to securely obtain desired information, and numerous studies have …

An anonymous user authentication and key agreement scheme based on a symmetric cryptosystem in wireless sensor networks

J Jung, J Kim, Y Choi, D Won - Sensors, 2016 - mdpi.com
In wireless sensor networks (WSNs), a registered user can login to the network and use a
user authentication protocol to access data collected from the sensor nodes. Since WSNs …

A lightweight secure user authentication and key agreement protocol for wireless sensor networks

J Mo, H Chen - Security and Communication Networks, 2019 - Wiley Online Library
Wireless sensor networks (WSNs) have great potential for numerous domains of application
because of their ability to sense and understand unattended environments. However, a …

A provably secure anonymous authenticated key exchange protocol based on ECC for wireless sensor networks

K Zhang, K Xu, F Wei - Wireless Communications and Mobile …, 2018 - Wiley Online Library
In wireless sensor networks, users sometimes need to retrieve real‐time data directly from
the sensor nodes. Many authentication protocols are proposed to address the security and …

Provably secure dynamic anonymous authentication protocol for wireless sensor networks in internet of things

Z Ding, Q Xie - Sustainability, 2023 - mdpi.com
Wireless sensor networks are a promising application of the Internet of Things in the
sustainable development of smart cities, and have been afforded significant attention since …

Lightweight and anonymous three-factor authentication and access control scheme for real-time applications in wireless sensor networks

AH Adavoudi-Jolfaei, M Ashouri-Talouki… - Peer-to-Peer Networking …, 2019 - Springer
Wireless sensor networks (WSNs) play an important role and support a variety of real time
applications, such as healthcare monitoring, military surveillance, vehicular tracking and, so …

An energy efficient mutual authentication and key agreement scheme preserving anonymity for wireless sensor networks

Y Lu, L Li, H Peng, Y Yang - Sensors, 2016 - mdpi.com
WSNs (Wireless sensor networks) are nowadays viewed as a vital portion of the IoTs
(Internet of Things). Security is a significant issue in WSNs, especially in resource …

Anonymous three-factor authenticated key agreement for wireless sensor networks

Y Lu, G Xu, L Li, Y Yang - Wireless Networks, 2019 - Springer
Secure information exchange in wireless sensor networks (WSN) is a continuing issue since
the resource-constrained sensors generally deployed over an unattended environment. To …

An enhanced symmetric cryptosystem and biometric-based anonymous user authentication and session key establishment scheme for WSN

M Alotaibi - IEEE Access, 2018 - ieeexplore.ieee.org
Wireless sensor networks (WSNs) are progressive ad hoc networks that comprise of
distributed sensors that are typically and randomly deployed over the target region. The …

A lightweight anonymous authentication protocol with perfect forward secrecy for wireless sensor networks

L Xiong, D Peng, T Peng, H Liang, Z Liu - Sensors, 2017 - mdpi.com
Due to their frequent use in unattended and hostile deployment environments, the security in
wireless sensor networks (WSNs) has attracted much interest in the past two decades …