JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE) ›› 2015, Vol. 50 ›› Issue (05): 12-17.doi: 10.6040/j.issn.1671-9352.0.2014.431
Previous Articles Next Articles
WAN Zhi-ping
CLC Number:
[1] 张明. 一种改进的动态用户认证协议[J]. 电子学报, 2011, 24(6):137-139. ZHANG Ming. An improved dynamic user authentication protocol[J]. Electronic Science and Technology, 2011, 24(6):137-139. [2] 李兴华, 邓凌娟, 张渊, 等. 基于博弈论的身份认证协议的分析——NGUYEN LH 方案的改进[J]. 通信学报, 2013, 34(8):18-36. LI Xinghua, DENG Lingjuan, ZHANG Yuan, et al. Rational analysis of authentication protocols based on NGUYEN LH scheme[J]. Journal on Communications, 2013, 34(8):18-36. [3] WANG Chao, MAO Kefei, LIU Jianwei, et al. Identity-based dynamic authenticated group key agreement protocol for space information network[J].Lecture Notes in Computer Science, 2013, 7873:535-548. [4] LI Chun-Ta, LEE Cheng-Chi, LEE Chin-Wen. An improved two-factor user authentication protocol for wireless sensor networks using elliptic curve cryptography[J]. Sensor Letters, 2013, 11(5):958-965. [5] WONG K H M, ZHENG Yuan, CAO Jiannong, et al.A dynamic user authentication scheme for wireless sensor networks[C]//Proceedings of the IEEE International Conference on Sensor Networks Ubiquitous and Trustworthy Computing. Los Alamitos: IEEE Computer Society, 2006:244-251. [6] Binod Vaidya, Jorge S Silva, Joel J P C Rodrigues. Robust dynamic user authentication scheme for w ireless sensor networks[C]//Proceedings of the 5th ACM Symposium on QoS and Security for Wireless and Mobile Networks.New York: ACM Press, 2009:28-29. [7] KO Lee-Chun. A novel dynamic user authentication scheme for wireless sensor networks[C]//Proceedings of IEEE International Symposium on Wireless Communication Systems. New York: IEEE, 2008:608-612. [8] DAS M L. Efficient user authentication and secure data transmission in wireless sensor networks[C]//Proceedings of the 16th IEEE International Conference on Networks. New York: IEEE, 2008:1-6. [9] KHAN M K, ALGHATHBAR K. Cryptanalysis and security improvements of “two-factor user authentication in wireless sensor networks[J]. SENSORS, 2010, 10(3):2450-2459. [10] DYANG D H, LEE M K. Improvement of Das's two-factor authentication protocol in wireless sensor networks [EB/OL]. [2014-01-22].http://eprint.iacr.org/2009/631.pdf. [11] VAIDYA B, RODRIGUES J J, PARK J H. User authentication schemes with pseudonymity for ubiquitous sensor network in NGN[J]. International Journal of Communication Systems, 2010, 23(9-10):1201-1222. [12] KHAN M K, ALGHATHBAR K. Cryptanalysis and security improvements of two-factor user authentication in wireless sensor networks[J]. Sensors, 2010, 10(3):2450-2459. [13] SHI Wenbo, GONG Peng. A new user authentication protocol for wireless sensor networks using elliptic curves cryptography [J]. International Journal of Distributed Sensor Networks, 2013, 730831:1-7. [14] YOO S G, PARK K Y, KIM J. A security-performance-balanced user authentication scheme for wireless sensor networks[J]. International Journal of Distributed Sensor Networks, 2012, 382810:1-11. [15] DONG Qi, LIU Donggang, NING Peng. Providing DoS resistance for signature-based broadcast authentication in sensor networks[J]. ACM Transactions on Embedded Computing Systems (TECS), 2013, 12(3): 73.1-73.26. [16] LIN Qiaomin, WANG Yangjunxiong, SHAO Xing, et al. Novel three-party password-based authenticated key exchange protocol for wireless sensor networks[J]//Communications in Computer and Information Science, 2013, 334:263-270. [17] CHEN Tien-Ho, SHIH Wei-Kuan. A robust mutual authentication protocol for wireless sensor networks[J]. ETRI Journal, 2010, 32(5):704-712. |
[1] | ZHAO Feng, XU Xiu. An improved DV-hop algorithm based on iterative computation and two communication ranges for sensor network localization [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2015, 50(07): 31-37. |
[2] | ZHOU Xian-cun, LI Ming-xi, LI Rui-xia, XU Ming-juan, LING Hai-bo. Research on the multi-point collaboration detection against replication attacks [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2015, 50(07): 54-65. |
[3] | LI Guo-qing. A trust evaluation model based on connection number for wireless sensor networks [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2014, 49(09): 123-128. |
[4] | ZHAO Ze-mao1, LIU Yang1, ZHANG Fan1,2, ZHOU Jian-qin1, ZHANG Pin1. Research on source location privacy routing based on angle and probability in wireless sensor networks [J]. J4, 2013, 48(09): 1-9. |
[5] | WAN Run-ze1, LEI Jian-jun1, YUAN Cao2. An optimization strategy for managing dormant nodes in wireless sensor networks base on fuzzy clustering [J]. J4, 2013, 48(09): 17-21. |
[6] | L Jia-liang1,2,3, WANG Ying-long1,3, CUI Huan-qing1, WEI Nuo2,3, GUO Qiang2,3. Study on the node localization schemes of three dimensional wireless sensor networks based on particle swarm optimization [J]. J4, 2013, 48(05): 78-82. |
[7] | CUI Huan-qing1,2, WANG Ying-long1*, L Jia-liang1,2, WEI Nuo1. Distributed node localization based on the stochastic particle swarm optimization [J]. J4, 2012, 47(9): 51-55. |
[8] | GUO Xiao-dong1, DU Peng1, ZHANG Xue-fen2. A energy-efficient distributed detection and power allocation algorithm in wireless sensor networks [J]. J4, 2012, 47(9): 60-64. |
[9] | YAO Wu-jun1, DING Yi1,WEI Li-xian1, YANG Xiao-yuan1,2. An ARQ error control scheme based on RSSI in wireless sensor networks [J]. J4, 2011, 46(9): 61-66. |
[10] | ZHOU Shu-wang1,2,3, WANG Ying-long1,3, GUO Qiang1,2, WEI Nuo1,2, GUO Wen-juan1,3. A new method for localization based on network coverage and intelligent search [J]. J4, 2010, 45(11): 27-31. |
[11] | GUO Wen-juan1,2, WANG Ying-long1,2, Wei Nuo1,3, GUO Qiang1,3, ZHOU Shu-wang1,2,3. A time synchronization protocol for wireless sensor networks based on the Kalman filter [J]. J4, 2010, 45(11): 32-36. |
[12] | ZHOU Shu-Wang, WANG Yang-Long, GUO Jiang, WEI Nuo. Particle swarm optimizationbasedwireless sensor network nodes localization method [J]. J4, 2009, 44(9): 52-55. |
[13] | ZHANG Xian-yi ,WANG Ying-long ,GUO Qiang,ZHAO Hong-lei . Research on the indoors channel fading model in WSN [J]. J4, 2008, 43(11): 44-47 . |
|