[1] 刘伟,董恩清,宋洋.无线传感器网络节点三维定位的翻转模糊检测[J].电子学报,2016,44(2):374-384. LIU W,DONG E Q,SONG Y.Flip ambiguity detection for three-dimensional node localization in wireless sensor networks[J].Acta Electronica Sinica,2016,44(2):374-384.(in Chinese)
[2] BUTUN I,MORGERA S D,SANKAR R.A survey of intrusion detection systems in wireless sensor networks[J].IEEE Communications Surveys & Tutorials,2014,16(1):266-282.
[3] 李继国,张亦辰,卫晓霞.可证安全的基于证书广播加密方案[J].电子学报,2016,44(5):1101-1110. LI J G,ZHANG Y C,WEI X X.A provably secure certificate-based broadcast encryption scheme[J].Acta Electronica Sinica,2016,44(5):1101-1110.(in Chinese)
[4] 杨鹏,唐洋,舒娜,王汝言.供给需求关系感知的间断连接无线网络安全路由机制[J].通信学报,2015,36(Z1):42-52. YANG P,TANG Y,SHU N,WANG R Y.Secure supply and demand relationship perception routing in intermittently connected wireless networks[J].Journal on Communications,2015,36(Z1):42-52.(in Chinese)
[5] 肖云鹏,姚豪豪,刘宴兵.一种基于云模型的WSNs节点信誉安全方案[J].电子学报,2016,44(1):168-175. XIAO Y P,YAO H H,LIU Y B.A WSNs node reputation security scheme based on cloud model[J].Acta Electronica Sinica,2016,44(1):168-175.(in Chinese)
[6] FANG W D,SHAN L H,JIA G Q,JI X H,CHEN S J.A low complexity secure network coding in wireless sensor network[J].Journal of Internet Technology,2016,17(5):905-913.
[7] 李晓伟,张玉清,张格非,刘雪峰,范丹.基于智能卡的强安全认证与密钥协商协议[J].电子学报,2014,42(8):1587-1593. LI X W,ZHANG Y Q,ZHANG G F,LIU X F,FAN D.Strongly secure authenticated key agreement protocol using smart card[J].Acta Electronica Sinica,2014,42(8):1587-1593.(in Chinese)
[8] CHEN X Q,CAO T J,ZHAI J X.Untraceability analysis of two RFID authentication protocols[J].Chinese Journal of Electronics,2016,25(9):912-920.
[9] 刘云,杨亮,范科峰,王勇,唐仕军.一种改进的动态用户认证协议[J].电子学报,2013,41(1):42-46. LIU Y,YANG L,FAN K F,WANG Y,TANG S J.Improved dynamic user authentication protocol[J].Acta Electronica Sinica,2013,41(1):42-46.(in Chinese)
[10] QAZI F A,QAZI F A.A survey of biometric authentication systems[A].Proceedings of the International Conference on Security and Management,SAM'04[C].Las Vegas,Nevada,USA:SAM,2004.61-67.
[11] KUMARI S,KHAN M K,ATIQUZZAMAN M.User authentication schemes for wireless sensor networks:A review[J].Ad Hoc Networks,2015,27:159-194.
[12] KAUSHAL K,KAUR T.A survey on attacks of WSN and their security mechanisms[J].International Journal of Computer Applications,2015,118(18):1-4.
[13] LEE J K,RYU S R,YOO K Y.Fingerprint-based remote user authentication scheme using smart cards[J].Electronics Letters,2002,38(12):554-555.
[14] LI C T,HWANG M S.An efficient biometrics-based remote user authentication scheme using smart cards[J].Journal of Network and computer applications,2010,33(1):1-5.
[15] YUAN J,JIANG C,JIANG Z.A biometric-based user authentication for wireless sensor networks[J].Wuhan University Journal of Natural Sciences,2010,15(3):272-276.
[16] LEE C C,CHANG R X,CHEN L A.Improvement of li-hwang's biometrics-based remote user authentication scheme using smart cards[J].WSEAS Transactions on Communications,2011,10(7):193-200.
[17] YOON E J,YOO K Y.A new biometric-based user authentication scheme without using password for wireless sensor networks[A].The 20th IEEE International Workshops on Enabling Technologies:Infrastructure for Collaborative Enterprises (WETICE)[C].USA:IEEE,2011.279-284.
[18] DAS M L.Two-factor user authentication in wireless sensor networks[J].IEEE Transactions on Wireless Communications,2009,8(3):1086-1090.
[19] SEKHAR V C,SARVABHATLA M.A robust biometric-based three-factor remote user authentication scheme[A].The Smithsonian/NASA Astrophysics Data System[C].USA:NASA,2014.arXiv:1401.1318.
[20] AN Y.Security analysis and enhancements of an effective biometric-based remote user authentication scheme using smart cards[J].Journal of Biomedicine & Biotechnology,2012,DOI:10.1155/2012/519723.
[21] CHATURVEDI A,MISHRA D,MUKHOPADHYAY S.Improved Biometric-Based Three-Factor Remote User Authentication Scheme with Key Agreement Using Smart Card[M].Springer Berlin Heidelberg,2013.63-77.
[22] AWASTHI A K,SRIVASTAVA K.A biometric authentication scheme for telecare medicine information systems with nonce[J].Journal of Medical Systems,2013,37(5):1-4.
[23] LIU X,SHEN Y,LI S,CHEN F.A fingerprint-based user authentication protocol with one-time password for wireless sensor networks[A].Proceedings of International Conference on Sensor Network Security Technology and Privacy Communication System (SNS & PCS)[C].Harbin,China:IEEE Press,2013.9-12.
[24] KIANI F,DALKILIC G.Password renewal enhancement for dynamic authentication in wireless sensor networks[A].Proceedings of the 2nd International Conference on Computational Intelligence,Communication Systems and Networks[C].Liverpool,United Kingdom:IEEE Press,2010.143-146.
[25] LIU X Y,HUANG T L,WANG X,TANG X J.A user authentication scheme based on dynamic password for wireless sensor networks[A].Proceedings of International Conference on Intelligent Computing and Integrated Systems (ICISS)[C].Guilin,China:IEEE Press,2010.145-148.
[26] 喻丽春.基于AES和RSA算法的一次性口令认证[J].西安邮电大学学报,2017,22(1):38-43. YU L.One-time password authentication based on AES and RSA algorithm[J].Journal of Xi'an University of Posts and Telecommunications,2017,22(1):38-43.(in Chinese)
[27] 韩伟力,袁琅,李思斯,王晓阳.一种基于样本的模拟口令集生成算法[J].计算机学报,2017,40(5):1151-1155. HAN W,YUAN L,LI S,WANG X.An efficient algorithm to generate password sets based on samples[J].Chinese Journal of Computers,2017,40(5):1151-1155.(in Chinese)
[28] 王平,汪定,黄欣沂.口令安全研究进展[J].计算机研究与发展,2016,53(10):2173-2188. WANG P,WANG D,HUANG X.Advances in password security[J].Journal of Computer Research and Development,2016,53(10):2173-2188.(in Chinese)
[29] RAMANUJAM R,SUNDARARAJAN V,SURESH S P.Extending Dolev-Yao with Assertions[M].Springer International Publishing,2014.50-68.
[30] KIM J,LEE D,JEON W,et al.Security analysis and improvements of two-factor mutual authentication with key agreement in wireless sensor networks[J].Sensors,2014,14(4):6443-6462.
[31] HURTADO ALEGRíA J A,BASTARRICA M C,BERGEL A.Avispa:a tool for analyzing software process models[J].Journal of Software:Evolution and Process,2014,26(4):434-450. |