Open Access
Wuhan Univ. J. Nat. Sci.
Volume 28, Number 6, December 2023
Page(s) 541 - 552
Published online 15 January 2024
  1. Tran-Dang H, Krommenacker N, Charpentier P, et al. Toward the Internet of Things for physical Internet: Perspectives and challenges[J]. IEEE Internet of Things Journal, 2020, 7(6): 4711-4736. [CrossRef] [Google Scholar]
  2. Bin Abu Bakar K, Zuhra F T, Isyaku B, et al. A review on the immediate advancement of the Internet of Things in wireless telecommunications[J]. IEEE Access, 2023, 11: 21020-21048. [NASA ADS] [CrossRef] [Google Scholar]
  3. Du J Q, Kang B Y, Han Y B. Improvement on a biometric based user authentication scheme in wireless sensor networks using smart cards[J]. Wuhan University Journal of Natural Sciences, 2020, 25(2): 155-161. [Google Scholar]
  4. Chander B, Kumaravelan G. An improved 2-factor authentication scheme for WSN based on ECC[J]. IETE Technical Review, 2023, 40(2): 167-178. [CrossRef] [Google Scholar]
  5. Szymoniak S, Kesar S. Key agreement and authentication protocols in the Internet of Things: A survey[J]. Applied Sciences, 2022, 13(1): 404. [CrossRef] [Google Scholar]
  6. Ostad-Sharif A, Arshad H, Nikooghadam M, et al. Three party secure data transmission in IoT networks through design of a lightweight authenticated key agreement scheme[J]. Future Generation Computer Systems, 2019, 100: 882-892. [CrossRef] [Google Scholar]
  7. Chen C T, Lee C C, Lin I C. Efficient and secure three-party mutual authentication key agreement protocol for WSNs in IoT environments [J]. PLoS One, 2020, 15(4): e0232277. [Google Scholar]
  8. Chunka C, Banerjee S, Goswami R S. An efficient user authentication and session key agreement in wireless sensor network using smart card[J]. Wireless Personal Communications, 2021, 117(2): 1361-1385. [CrossRef] [Google Scholar]
  9. Lee J, Oh J, Kwon D, et al. PUFTAP-IoT: PUF-based three-factor authentication protocol in IoT environment focused on sensing devices[J]. Sensors, 2022, 22(18):7075. [NASA ADS] [CrossRef] [PubMed] [Google Scholar]
  10. Hu B, Tang W, Xie Q. A two-factor security authentication scheme for wireless sensor networks in IoT environments[J]. Neurocomputing, 2022, 500: 741-749. [CrossRef] [Google Scholar]
  11. Li R, Kang B Y, Mai K Q. Analysis and improvement on a hash-based authentication scheme for multi-server architecture[J]. Wuhan University Journal of Natural Sciences, 2021,26(5): 394-404. [Google Scholar]
  12. Yang S, Zheng X, Liu G, et al. IBA: A secure and efficient device-to-device interaction-based authentication scheme for Internet of Things[J]. Computer Communications, 2023, 200: 171-181. [Google Scholar]
  13. Xie Q, Wong D S, Wang G, et al. Provably secure dynamic ID-based anonymous two-factor authenticated key exchange protocol with extended security model[J]. IEEE Transactions on Information Forensics and Security, 2017, 12(6): 1382-1392. [CrossRef] [Google Scholar]
  14. Sutrala A K, Obaidat M S, Saha S, et al. Authenticated key agreement scheme with user anonymity and untraceability for 5G-enabled softwarized industrial cyber-physical systems[J]. IEEE Transactions on Intelligent Transportation Systems, 2022, 23(3): 2316-2330. [Google Scholar]
  15. Xie Q, Li K H, Tan X, et al. A secure and privacy-preserving authentication protocol for wireless sensor networks in smart city[J]. EURASIP Journal on Wireless Communications and Networking, 2021(2021): 119. [CrossRef] [Google Scholar]
  16. Srinivas J, Das A K, Wazid M, et al. Designing secure user authentication protocol for big data collection in IoT-based intelligent transportation system[J]. IEEE Internet of Things Journal, 2021, 8(9): 7727-7744. [CrossRef] [Google Scholar]
  17. Sahoo S S, Mohanty S, Majhi B. A secure three factor based authentication scheme for health care systems using IoT enabled devices[J]. Journal of Ambient Intelligence and Humanized Computing, 2021, 12(1): 1419-1434. [Google Scholar]

Current usage metrics show cumulative count of Article Views (full-text article views including HTML views, PDF and ePub downloads, according to the available data) and Abstracts Views on Vision4Press platform.

Data correspond to usage on the plateform after 2015. The current usage metrics is available 48-96 hours after online publication and is updated daily on week days.

Initial download of the metrics may take a while.