[1] |
GOZALVEZ J . New 3GPP standard for IoT[J]. IEEE Vehicular Technology Magazine, 2016, 11 (1): 14-20.
|
[2] |
GUO M , LIU Y , YU H , et al. An overview of smart city in China[J]. China Communications, 2016, 13 (5): 203-211.
|
[3] |
XIONG Z , SHENG H , RONG W G , et al. Intelligent transportation systems for smart cities: a progress review[J]. Science China (In-formation Sciences), 2012 (55): 2908-2914,
|
[4] |
MOIS G , SANISLAV T , FOLEA S C , A cyber-physical system for environmental monitoring[J]. IEEE Transactions on Instrumenta-tion and Measurement, 2016, 65 (6): 1463-1471.
|
[5] |
ASKRABA S , PAAP A , ALAMEH K , et al. Laser-stabilized real-Time plant discrimination sensor for precision agriculture[J]. IEEE Sensors Journal, 2016, 16 (17): 6680-6686.
|
[6] |
SHAH S H , IQBAL A , SHAH S S A , Remote health monitoring through an integration of wireless sensor networks, mobile phones&Cloud Computing technologies[C]// IEEE Global Humanitarian Technology Conference. 2013: 401-405.
|
[7] |
YANG Y , ZHAO C , YAO S , et al. Delay performance of net-work-coding-based epidemic routing[J]. IEEE Transactions on Ve-hicular Technology, 2016, 65 (5): 3676-3684.
|
[8] |
CHEN W , JIANG X , TANG Z , et al. Context-based global multi-class semantic image segmentation by wireless multimedia sensor networks[J]. Artificial Intelligence Review, 2015, 43 (4): 579-591.
|
[9] |
YANG Y , ZHANG W , WEI K , et al. Power reduction for mobile devices by deploying low-power base stations[J]. IET Communica-tions, 2014, 8 (18): 3372-3380.
|
[10] |
REN Y , ZADOROZHNY V I , OLESHCHUK V A , et al. A novel approach to trust management in unattended wireless sensor net-works[J]. IEEE Transactions on Mobile Computing, 2014, 13 (7): 1409-1423.
|
[11] |
ZHANG D , LI Y , NING Z , et al. A multi-tag secure network coding scheme against pollution attacks in WSNs[J]. Journal of Computa-tional Information Systems, 2015, 11 (12): 4413-4420.
|
[12] |
DU X , GUIZANI M , XIAO Y , et al. Two tier secure routing proto-col for heterogeneous sensor networks[J]. IEEE Transactions on Wireless Communications, 2007, 6 (9): 3395-3401.
|
[13] |
ZHU C , ZHOU M Z , XU J S , et al. A secure data fusion algorithm based on behavior trust in wireless sensor networksC]// IEEE 4th International Conference on Wireless Communications, Network-ing and Mobile Computing, 2008: 1-4.
|
[14] |
CHEN X , MAKKI K , YEN K , et al. Sensor network security: a survey[J]. IEEE Communications Surveys&Tutorials, 2009, 11 (2): 52-73.
|
[15] |
SINGH S K , SINGH M P , SINGH D K , A survey on network secu-rity and attack defense mechanism for wireless sensor networks[J]. International Journal of Computer Trends and Technology, 2011, 1 (2): 9-17.
|
[16] |
KUMARI S , KHAN M K , ATIQUZZAMAN M , User authentica-tion schemes for wireless sensor networks: a review[J]. Ad Hoc Networks, 2015, 27: 159-194.
|
[17] |
KAUSHAL K , KAUR T . A survey on attacks of WSN and their security mechanisms[J]. International Journal of Computer Appli-cations, 2015, 118 (18): 1-4.
|
[18] |
HUANG Z H , WANG Y L . Survey of security Technologies on wireless sensor networks[J]. Journal of Sensors, 2015, 2015 (4): 1-9.
|
[19] |
BANERJEE P , CHATTERJEE T , DASBIT S . LoENA: low- over-head encryption based node authentication in WSN[C]// IEEE In-ternational Conference on Advances in Computing, Communica-tions and Informatics, 2015: 2126-2132.
|
[20] |
WANG H Y . Wireless sensor networks based on a new block en-cryption algorithm[J]. Applied Mechanics and Materials, 2014: 454-459.
|
[21] |
YANG W , HU J , WANG S . A delaunay triangle-based fuzzy ex-tractor for fingerprint authentication[C]// IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications. 2012: 66-70.
|
[22] |
RAMANUJAM R , SUNDARARAJAN V , SURESH S P . Extending dolev-yao with assertions[M]// Information Systems Security. Berlin:Springer, 2014: 50-68.
|
[23] |
K?HLER D , KüSTERS R , WILKE T . A dolev-yao-based defini-tion of abuse-free protocols[M]// Automata, Languages and Pro-gramming. Berlin Heidelberg:Springer, 2006: 95-106.
|
[24] |
KIM J , LEE D , JEON W , et al. Security analysis and improvements of two-factor mutual authentication with key agreement in wireless sensor networks[J]. Sensors, 2014, 14 (4): 6443-6462.
|
[25] |
HURTADO A J A , BASTARRICA M C , BERGEL A . Avispa: a tool for analyzing software process models[J]. Journal of Software:Evolution and Process, 2014, 26 (4): 434-450.
|
[26] |
ARMANDO A , BASIN D , BOICHUT Y , et al. The AVISPA tool for the automated validation of internet security protocols and ap-plications[C]// Lecture Notes in Computer Science. 2005, 3576 (6): 135-165.
|
[27] |
VIGANò L . Automated security protocol analysis with the AVISPA tool[J]. Electronic Notes in Theoretical Computer Science. 2006, 155 (1): 61-86.
|
[28] |
ROGOWSKI M , SAEED K , RYBNIK M , et al. User authentication for mobile devices[M]// Computer Information Systems and Indus-trial Management. Berlin Heidelberg: Springer, 2013: 47-58.
|
[29] |
WONG K H M , ZHENG Y , CAO J , et al. A dynamic user authenti-cation scheme for wireless sensor networks[C]// IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing. 2006: 1-8.
|
[30] |
JAMIL N , SAMEON S S , MAHMOOD R . A user authentication scheme based on identity-bits commitment for wireless sensor net-works[C]// IEEE Second International Conference on Network Ap-plications Protocols and Services. 2010: 61-66.
|
[31] |
TSENG H R , JAN R H , YANG W . An improved dynamic user authentication scheme for wireless sensor networks[C]// IEEE Global Telecommunications Conference. 2007: 986-990.
|
[32] |
LEE T H . Simple dynamic user authentication protocols for wire-less sensor networks[C]// IEEE Second International Conference on Sensor Technologies and Applications. 2008: 657-660.
|
[33] |
KIANI F , DALKILIC G . Password renewal enhancement for dy-namic authentication in wireless sensor networks[C]// IEEE Second International Conference on Computational Intelligence, Commu-nication Systems and Networks. 2010: 143-146.
|
[34] |
KO L C . A novel dynamic user authentication scheme for wireless sensor networks[C]// IEEE International Symposium on Wireless Communication Systems. 2008: 608-612.
|
[35] |
VAIDYA B , Sá SILVA J , RODRIGUES J J P C . Robust dynamic user authentication scheme for wireless sensor networks[C]// The 5th ACM Symposium on QoS and Security for Wireless and Mo-bile Networks. 2009: 88-91.
|
[36] |
FAYE Y , NIANG I , GUYENNET H . A user authentication-based probabilistic risk approach for wireless sensor networks[C]// IEEE International Conference on Selected Topics in Mobile and Wire-less Networking. 2012: 124-129.
|
[37] |
DAS M L . Two-factor user authentication in wireless sensor net-works[J]. IEEE Transactions on Wireless Communications, 2009, 8 (3): 1086-1090.
|
[38] |
NYANG D H , LEE M K . Improvement of Das's two-factor authen-tication protocol in wireless sensor networks[J]. IACR Cryptology ePrint Archive, 2009, 631-635.
|
[39] |
HUANG H F , CHANG Y F , LIU C H . Enhancement of two-factor user authentication in wireless sensor networks[C]// IEEE 6th In-ternational Conference on Intelligent Information Hiding and Mul-timedia Signal Processing. 2010: 27-30.
|
[40] |
CHEN T H , SHIH W K . A robust mutual authentication protocol for wireless sensor networks[J]. Etri Journal. 2010, 32 (5): 704-712.
|
[41] |
KHAN M K , ALGHATHBAR K . Cryptanalysis and security im-provements of two-factor user authentication in wireless sensor networks[J]. Sensors, 2010, 10 (3): 2450-2459.
|
[42] |
VAIDYA B , MAKRAKIS D , MOUFTAH H T . Improved two-factor user authentication in wireless sensor networks[C]// IEEE 6th International Conference on Wireless and Mobile Com-puting, Networking and Communications. 2010: 600-606.
|
[43] |
HE D , GAO Y , CHAN S , et al. An enhanced two-factor user au-thentication scheme in wireless sensor networks[J]. Ad Hoc&Sensor Wireless Networks, 2010, 10 (4): 361-371.
|
[44] |
KUMAR P , LEE H J , Cryptanalysis on two user authentication protocols using smart card for wireless sensor networks[C]// IEEE Wireless Advanced. 2011: 241-245.
|
[45] |
TAN Z , Cryptanalyses of a two-factor user authentication scheme in wireless sensor networks[J]. Advances in Information Sciences and Service Sciences, 2011, 3 (4): 117-126.
|
[46] |
FAN R , HE D , PAN X . An efficient and DoS-resistant user authen-tication scheme for two-tiered wireless sensor networks[J]. Journal of Zhejiang University Science C, 2011, 12 (7): 550-560.
|
[47] |
QAZI F A . A Survey of Biometric Authentication Systems[C]// The International Conference on Security and Management. 2004: 61-67.
|
[48] |
LEE J K , RYU S R , YOO K Y . Fingerprint-based remote user authentication scheme using smart cards[J]. Electronics Letters, 2002, 38 (12): 554-555.
|
[49] |
LI C T , HWANG M S . An efficient biometrics-based remote user authentication scheme using smart cards[J]. Journal of Network and Computer Applications, 2010, 33 (1): 1-5.
|
[50] |
LEE C C , CHANG R X , CHEN L A . Improvement of li-hwang's biometrics-based remote user authentication scheme using smart cards[J]. WSEAS Transactions on Communications, 2011, 10 (7): 193-200.
|
[51] |
DAS A K . Analysis and improvement on an efficient biomet-ric-based remote user authentication scheme using smart cards[J]. IET Information Security, 2011, 5 (3): 145-151.
|
[52] |
SEKHAR V C , SARVABHATLA M . A robust biometric-based three-factor remote user authentication scheme[J]. Eprint Arxiv, 2014.
|
|
AN Y . Security analysis and enhancements of an effective biomet-ric-based remote user authentication scheme using smart cards[J]. Biomed Research International, 2012 (4): 23-29.
|
[54] |
CHATURVEDI A , MISHRA D , MUKHOPADHYAY S , Improved biometric-based three-factor remote user authentication scheme with key agreement using smart card[M]. Information Systems Se-curity. Berlin Heidelberg: Springer, 2013: 63-77.
|
[55] |
YUAN J , JIANG C , JIANG Z , A biometric-based user authentica-tion for wireless sensor networks[J]. Wuhan University Journal ofNatural Sciences, 2010, 15 (3): 272-276.
|
[56] |
YOON E J , YOO K Y . A new biometric-based user authentication scheme without using password for wireless sensor net-works[C]// The 20th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprise. 2011: 279-284.
|