| 1 |
QURABAT A M K A , KADHUM A Q A M , SUHA A A . An overview of periodic wireless sensor networks to the Internet of Things. IOP Conference Series: Materials Science and Engineering, 2020, 928 (3): 032055.
doi: 10.1088/1757-899X/928/3/032055
|
| 2 |
KUNZ-JACQUES S, POINTCHEVAL D. About the security of MTI/C0 and MQV[C]//Proceedings of the 5th International Conference on Security and Cryptography for Networks. Berlin, Germany: Springer, 2006: 156-172.
|
| 3 |
LAW L , MENEZES A , QU M H , et al. An efficient protocol for authenticated key agreement. Designs, Codes and Cryptography, 2003, 28 (2): 119- 134.
doi: 10.1023/A:1022595222606
|
| 4 |
KRAWCZYK H. HMQV: a high-performance secure diffie-Hellman protocol[C]//SHOUP V. Advances in cryptology-CRYPTO 2005. Berlin, Germany: Springer, 2005: 546-566.
|
| 5 |
LAUTER K, MITYAGIN A. Security analysis of KEA authenticated key exchange protocol[C]//YUNG M, DODIS Y, KIAYIAS A, et al. Public Key Cryptography-PKC 2006. Berlin, Germany: Springer, 2006: 378-394.
|
| 6 |
SHAMIR A. Identity-based cryptosystems and signature schemes[C]//BLAKLEY G R, CHAUM D. Advances in cryptology. Berlin, Germany: Springer, 1985: 47-53.
|
| 7 |
JIN C H , XU Y L , CHEN G H , et al. EBIAC: efficient biometric identity-based access control for wireless body area networks. Journal of Systems Architecture, 2021, 121, 102317.
doi: 10.1016/j.sysarc.2021.102317
|
| 8 |
BABU E S , DADI A K , SINGH K K , et al. A distributed identity-based authentication scheme for Internet of Things devices using permissioned blockchain system. Expert Systems, 2022, 39 (10): e12941.
doi: 10.1111/exsy.12941
|
| 9 |
RAJU K , CHINNADURAI M . An identity-based secure and optimal authentication scheme for the cloud computing environment. Computers, Materials[WT《Times New Roman》]& Continua, 2021, 69 (1): 1057- 1072.
|
| 10 |
JAO D. Elliptic curve cryptography[M]//STAVROULAKIS P, STAMP M. Handbook of information and communication security. Berlin, Germany: Springer, 2010: 35-57.
|
| 11 |
李贵勇, 张航, 韩才君, 等. 面向无线传感器网络的认证密钥协商机制. 小型微型计算机系统, 2024, 45 (5): 1204- 1208.
|
|
LI G Y , ZHANG H , HAN C J , et al. Authentication and key agreement mechanism for wirelesssensor networks. Journal of Chinese Computer Systems, 2024, 45 (5): 1204- 1208.
|
| 12 |
SEO S H , WON J , SULTANA S , et al. Effective key management in dynamic wireless sensor networks. IEEE Transactions on Information Forensics and Security, 2015, 10 (2): 371- 383.
doi: 10.1109/TIFS.2014.2375555
|
| 13 |
WU L B , ZHANG Y B , LI L , et al. Efficient and anonymous authentication scheme for wireless body area networks. Journal of Medical Systems, 2016, 40 (6): 134.
doi: 10.1007/s10916-016-0491-8
|
| 14 |
DEBIAO H , SHERALI Z , NEERAJ K , et al. Anonymous authentication for wireless body area networks with provable security. IEEE Systems Journal, 2017, 11 (4): 2590- 2601.
doi: 10.1109/JSYST.2016.2544805
|
| 15 |
DAS K A , WAZID M , YANNAM R A , et al. Provably secure ECC-based device access control and key agreement protocol for IoT environment. IEEE Access, 2019, 7, 755382- 55397.
|
| 16 |
王向阳. 物联网认证密钥协商协议设计与分析技术研究[D]. 郑州: 战略支援部队信息工程大学, 2023.
|
|
WANG X Y. Research on design and analysis of authentication key agreement protocol for Internet of Things[D]. Zhengzhou: Information Engineering University, 2023. (in Chinese)
|
| 17 |
ISLAM S H , BISWAS G P . A pairing-free identity-based two-party authenticated key agreement protocol for secure and efficient communication. Journal of King Saud University-Computer and Information Sciences, 2017, 29 (1): 63- 73.
doi: 10.1016/j.jksuci.2015.01.004
|
| 18 |
DANG L , XU J , CAO X , et al. Efficient identity-based authenticated key agreement protocol with provable security for vehicular ad hoc networks. International Journal of Distributed Sensor Networks, 2018, 14 (4): 1550147718772545.
|
| 19 |
BALA S , VERMA A K . A non-interactive certificateless two-party authenticated key agreement protocol for wireless sensor networks. International Journal of Ad Hoc and Ubiquitous Computing, 2016, 21 (2): 140- 155.
doi: 10.1504/IJAHUC.2016.075187
|
| 20 |
DENG L Z . An improved certificateless two-party authenticated key agreement protocol for wireless sensor networks. International Journal of Ad Hoc and Ubiquitous Computing, 2020, 34 (4): 208.
doi: 10.1504/IJAHUC.2020.108576
|
| 21 |
KUMAR M, SAXENA P C. Pairing-free authenticated identity-based two-party key agreement protocol for resource-constraint devices[C]//SINGH P K, PAPRZYCKI M, BHARGAVA B, et al. Futuristic trends in network and communication technologies. Berlin, Germany: Springer, 2018: 425-440.
|
| 22 |
刘畅, 王晋, 田里, 等. 一种适用于基于身份的认证密钥协商的逆向防火墙协议. 重庆大学学报, 2022, 45 (5): 21-32, 42.
|
|
LIU C , WANG J , TIAN L , et al. A reverse firewall protocol for identity-based authenticated key agreement. Journal of Chongqing University, 2022, 45 (5): 21-32, 42.
|
| 23 |
宋庆, 马米米, 邓淼磊, 等. 轻量级的两方认证密钥协商协议. 计算机工程与应用, 2024, 60 (14): 283- 293.
|
|
SONG Q , MA M M , DENG M L , et al. Lightweight two-party authenticated key agreement protocol. Computer Engineering and Applications, 2024, 60 (14): 283- 293.
|
| 24 |
JIA X Y , HE D B , KUMAR N , et al. A provably secure and efficient identity-based anonymous authentication scheme for mobile edge computing. IEEE Systems Journal, 2020, 14 (1): 560- 571.
doi: 10.1109/JSYST.2019.2896064
|
| 25 |
XIE D , YANG J H , BIAN W X , et al. An improved identity-based anonymous authentication scheme resistant to semi-trusted server attacks. IEEE Internet of Things Journal, 2023, 10 (1): 734- 746.
doi: 10.1109/JIOT.2022.3203991
|
| 26 |
周海东, 王三超. 数字签名技术在网络通信安全中的应用. 集成电路应用, 2023, 40 (3): 344- 345.
|
|
ZHOU H D , WANG S C . Application of digital signature technology in network communication security. Application of IC, 2023, 40 (3): 344- 345.
|
| 27 |
BURROWS M , ABADI M , NEEDHAM R . A logic of authentication. ACM Transactions on Computer Systems, 1990, 8 (1): 18- 36.
doi: 10.1145/77648.77649
|
| 28 |
HUANG W . ECC-based three-factor authentication and key agreement scheme for wireless sensor networks. Scientific Reports, 2024, 14 (1): 1787.
doi: 10.1038/s41598-024-52134-z
|