Open Access
Wuhan Univ. J. Nat. Sci.
Volume 28, Number 6, December 2023
Page(s) 523 - 530
Published online 15 January 2024
  1. Guo Y M, Zhang Z F, Guo Y J. SecFHome: Secure remote authentication in fog-enabled smart home environment[J]. Computer Networks, 2022, 207: 108818. [CrossRef] [Google Scholar]
  2. Bai L Y, Hsu C, Harn L, et al. A practical lightweight anonymous authentication and key establishment scheme for resource-asymmetric smart environments[J]. IEEE Transactions on Dependable and Secure Computing, 2022(1): 1-11. [Google Scholar]
  3. Pirayesh J, Giaretta A, Conti M, et al. A PLS-HECC-based device authentication and key agreement scheme for smart home networks[J]. Computer Networks, 2022, 216: 109077. [Google Scholar]
  4. Li R, Kang B Y, Mai K Q . Analysis and improvement on a Hash-based authentication scheme for multi-server architecture[J]. Wuhan University Journal of Natural Sciences, 2021, 26(5): 394-404. [Google Scholar]
  5. Sutrala A K, Obaidat M S, Saha S, et al. Authenticated key agreement scheme with user anonymity and untraceability for 5G-enabled softwarized industrial cyber-physical systems[J]. IEEE Transactions on Intelligent Transportation Systems, 2021, 23(3): 2316-2330. [Google Scholar]
  6. Abbas G, Tanveer M, Abbas Z H, et al. A secure remote user authentication scheme for 6LoWPAN-based Internet of Things[J]. PloS one, 2021, 16(11): e0258279. [Google Scholar]
  7. Chen C M, Deng X T, Kumar S, et al. Blockchain-based medical data sharing schedule guaranteeing security of individual entities[J]. Journal of Ambient Intelligence and Humanized Computing, 2021:1-10. [Google Scholar]
  8. Cho Y, Oh J, Kwon D, et al. A secure and anonymous user authentication scheme for IoT-enabled smart home environments using PUF[J]. IEEE Access, 2022, 10: 101330-101346. [CrossRef] [Google Scholar]
  9. Wang D, Wang P. Understanding security failures of two-factor authentication schemes for real-time applications in hierarchical wireless sensor networks[J]. Ad Hoc Networks, 2014, 20: 1-15. [CrossRef] [Google Scholar]
  10. Du J Q, Kang B Y, Han Y B. Improvement on a biometric based user authentication scheme in wireless sensor networks using smart cards[J]. Wuhan University Journal of Natural Sciences, 2020, 25(2): 155-161. [Google Scholar]
  11. Lamport L. Password authentication with insecure communication[J]. Communications of the ACM, 1981, 24(11): 770-772. [CrossRef] [Google Scholar]
  12. Hwang M S, Li L H. A new remote user authentication scheme using smart cards[J]. IEEE Transactions on Consumer Electronics, 2000, 46(1): 28-30. [CrossRef] [Google Scholar]
  13. Jeong J, Chung M Y, Choo H. Integrated OTP-based user authentication scheme using smart cards in home networks[C]//Proceedings of the 41st Annual Hawaii International Conference on System Sciences (HICSS 2008). New York: IEEE, 2008: 294-294. [Google Scholar]
  14. Shuai M X, Yu N H, Wang H X, et al. Anonymous authentication scheme for smart home environment with provable security[J]. Computers & Security, 2019, 86: 132-146. [Google Scholar]
  15. Xu M, Dong Q, Zhou M, et al. Security analysis on "anonymous authentication scheme for smart home environment with provable security"[J]. Wireless Communications and Mobile Computing, 2020, 2020: 1-4. [CrossRef] [Google Scholar]
  16. Kaur D, Kumar D. Cryptanalysis and improvement of a two-factor user authentication scheme for smart home[J]. Journal of Information Security and Applications, 2021, 58: 102787. [CrossRef] [Google Scholar]
  17. Yu S, Jho N, Park Y. Lightweight three-factor-based privacy-preserving authentication scheme for IoT-enabled smart homes[J]. IEEE Access, 2021, 9: 126186-126197. [NASA ADS] [CrossRef] [Google Scholar]
  18. Nyangaresi V O. Lightweight anonymous authentication protocol for resource-constrained smart home devices based on elliptic curve cryptography[J]. Journal of Systems Architecture, 2022, 133: 102763. [CrossRef] [Google Scholar]
  19. Xia Y D, Qi R X, Ji S, et al. PUF-assisted lightweight group authentication and key agreement protocol in smart home[J]. Wireless Communications and Mobile Computing, 2022, 2022: 1-15. [CrossRef] [Google Scholar]
  20. Zou S H, Cao Q, Wang C Y, et al. A robust two-factor user authentication scheme-based ECC for smart home in IoT[J]. IEEE Systems Journal, 2021, 16(3): 4938-4949. [Google Scholar]

Current usage metrics show cumulative count of Article Views (full-text article views including HTML views, PDF and ePub downloads, according to the available data) and Abstracts Views on Vision4Press platform.

Data correspond to usage on the plateform after 2015. The current usage metrics is available 48-96 hours after online publication and is updated daily on week days.

Initial download of the metrics may take a while.