[1] Perrig A, Szewczyk R, Tygar J D, et al. SPINS:security protocols for sensor networks[J]. Wireless networks, 2002, 8(5):521-534.
[2] Katiyar S, Rizwan S, Gujral R. Network security described technology based on RSA and biometrics for authenticity in WSN[J]. International Journal of Advanced Research in Computer Science and Software Engineering, 2016, 6(2):328-333.
[3] Peris-Lopez P, Hernandez-Castro J C, Estevez-Tapiador J M, et al. Cryptanalysis of a novel authentication protocol conforming to EPC-C1G2 standard[J]. Computer Standards & Interfaces, 2009, 31(2):372-380.
[4] Al-Mahmud A, Morogan M C. Identity-based authentication and access control in wireless sensor networks[J]. International Journal of Computer Applications, 2012, 41(13):18-24.
[5] 张敏. 无线传感器网络中的认证技术研究[D]. 北京:北京邮电大学图书馆, 2013.
[6] Turkanovic M, Holbl M. An improved dynamic password-based user authentication scheme for hierarchical wireless sensor networks[J]. Elektronika Ir Elektrotechnika, 2013, 19(6):109-116.
[7] Farash M S, Turkanovic M, Kumari S, et al. An efficient user authentication and key agreement scheme for heterogeneous wireless sensor network tailored for the internet of things environment[J]. Ad-Hoc Networks, 2016, 36(P1):152-176.
[8] 范修伟, 卢建朱. 一种轻量级的WSN认证和密钥协商方案[J]. 计算机工程, 2013, 39(3):146-151. Fan Xiuwei, Lu Jianzhu. A light-weight authentication and key agreement scheme for wireless sensor network[J]. Computer Engineering, 2013, 39(3):146-151.
[9] Abduvaliev A, Lee S, Lee Y K. Simple Hash based message authentication scheme for wireless sensor networks[C]//International Conference on Communications and Information Technologies. Dresden:IEEE Press, 2009:982-986. |