{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,11]],"date-time":"2025-11-11T21:33:27Z","timestamp":1762896807777,"version":"3.37.3"},"reference-count":45,"publisher":"Springer Science and Business Media LLC","issue":"18","license":[{"start":{"date-parts":[[2021,5,14]],"date-time":"2021-05-14T00:00:00Z","timestamp":1620950400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,5,14]],"date-time":"2021-05-14T00:00:00Z","timestamp":1620950400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2021,7]]},"DOI":"10.1007\/s11042-021-10950-9","type":"journal-article","created":{"date-parts":[[2021,5,14]],"date-time":"2021-05-14T19:02:36Z","timestamp":1621018956000},"page":"27131-27154","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":10,"title":["A secure and efficient user authentication protocol for wireless sensor network"],"prefix":"10.1007","volume":"80","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-5382-0035","authenticated-orcid":false,"given":"Devender","family":"Kumar","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,5,14]]},"reference":[{"key":"10950_CR1","doi-asserted-by":"crossref","unstructured":"Carlson, J., Han, R., Lao, S., Narayan, C., Sanghani, S.: Rapid prototyping of mobile input devices using wireless sensor nodes. In: Mobile Computing Systems and Applications, 2003. Proceedings. Fifth IEEE Workshop on, pp. 21\u201329. IEEE (2003)","DOI":"10.1109\/MCSA.2003.1240764"},{"key":"10950_CR2","doi-asserted-by":"publisher","first-page":"26","DOI":"10.1016\/j.comcom.2017.05.009","volume":"110","author":"P Chandrakar","year":"2017","unstructured":"Chandrakar P, Om H (2017) A secure and robust anonymous three-factor remote user authentication scheme for multi-server environment using ecc. Computer Communications 110:26\u201334","journal-title":"Computer Communications"},{"issue":"1","key":"10950_CR3","doi-asserted-by":"publisher","first-page":"418","DOI":"10.1016\/j.jnca.2010.03.004","volume":"34","author":"WR Claycomb","year":"2011","unstructured":"Claycomb WR, Shin D (2011) A novel node level security policy framework for wireless sensor networks. Journal of Network and Computer Applications 34(1):418\u2013428","journal-title":"Journal of Network and Computer Applications"},{"issue":"3","key":"10950_CR4","doi-asserted-by":"publisher","first-page":"1377","DOI":"10.1007\/s11277-015-2288-3","volume":"82","author":"AK Das","year":"2015","unstructured":"Das AK (2015) A secure and efficient user anonymity-preserving three-factor authentication protocol for large-scale distributed wireless sensor networks. Wireless Personal Communications 82(3):1377\u20131404","journal-title":"Wireless Personal Communications"},{"issue":"1","key":"10950_CR5","doi-asserted-by":"publisher","first-page":"223","DOI":"10.1007\/s12083-014-0324-9","volume":"9","author":"AK Das","year":"2016","unstructured":"Das AK (2016) A secure and robust temporal credential-based three-factor user authentication scheme for wireless sensor networks. Peer-to-peer Networking and Applications 9(1):223\u2013244","journal-title":"Peer-to-peer Networking and Applications"},{"issue":"1","key":"10950_CR6","doi-asserted-by":"publisher","first-page":"e2933","DOI":"10.1002\/dac.2933","volume":"30","author":"AK Das","year":"2017","unstructured":"Das AK (2017) A secure and effective biometric-based user authentication scheme for wireless sensor networks using smart card and fuzzy extractor. International Journal of Communication Systems 30(1):e2933","journal-title":"International Journal of Communication Systems"},{"issue":"13","key":"10950_CR7","doi-asserted-by":"publisher","first-page":"2070","DOI":"10.1002\/sec.1464","volume":"9","author":"AK Das","year":"2016","unstructured":"Das AK, Sutrala AK, Kumari S, Odelu V, Wazid M, Li X (2016) An efficient multi-gateway-based three-factor user authentication and key agreement scheme in hierarchical wireless sensor networks. Security and Communication Networks 9(13):2070\u20132092","journal-title":"Security and Communication Networks"},{"issue":"3","key":"10950_CR8","doi-asserted-by":"publisher","first-page":"1086","DOI":"10.1109\/TWC.2008.080128","volume":"8","author":"ML Das","year":"2009","unstructured":"Das ML (2009) Two-factor user authentication in wireless sensor networks. IEEE Transactions on Wireless Communications 8(3):1086\u20131090","journal-title":"IEEE Transactions on Wireless Communications"},{"issue":"2","key":"10950_CR9","doi-asserted-by":"publisher","first-page":"198","DOI":"10.1109\/TIT.1983.1056650","volume":"29","author":"D Dolev","year":"1983","unstructured":"Dolev D, Yao A (1983) On the security of public key protocols. IEEE Transactions on information theory 29(2):198\u2013208","journal-title":"IEEE Transactions on information theory"},{"key":"10950_CR10","doi-asserted-by":"crossref","unstructured":"Ghahramani, M., Javidan, R., Shojafar, M.: A secure biometric-based authentication protocol for global mobility networks in smart cities. The Journal of Supercomputing pp. 1\u201327 (2020)","DOI":"10.1007\/s11227-020-03160-x"},{"issue":"11","key":"10950_CR11","doi-asserted-by":"publisher","first-page":"7124","DOI":"10.1109\/TIE.2016.2585081","volume":"63","author":"P Gope","year":"2016","unstructured":"Gope P, Hwang T (2016) A realistic lightweight anonymous authentication protocol for securing real-time application data access in wireless sensor networks. IEEE Transactions on Industrial Electronics 63(11):7124\u20137132","journal-title":"IEEE Transactions on Industrial Electronics"},{"issue":"4","key":"10950_CR12","first-page":"361","volume":"10","author":"D He","year":"2010","unstructured":"He D, Gao Y, Chan S, Chen C, Bu J (2010) An enhanced two-factor user authentication scheme in wireless sensor networks. Ad Hoc & Sensor Wireless Networks 10(4):361\u2013371","journal-title":"Ad Hoc & Sensor Wireless Networks"},{"issue":"1","key":"10950_CR13","doi-asserted-by":"publisher","first-page":"49","DOI":"10.1007\/s00530-013-0346-9","volume":"21","author":"D He","year":"2015","unstructured":"He D, Kumar N, Chen J, Lee CC, Chilamkurti N, Yeo SS (2015) Robust anonymous authentication protocol for health-care applications using wireless medical sensor networks. Multimedia Systems 21(1):49\u201360","journal-title":"Multimedia Systems"},{"key":"10950_CR14","doi-asserted-by":"publisher","first-page":"263","DOI":"10.1016\/j.ins.2015.02.010","volume":"321","author":"D He","year":"2015","unstructured":"He D, Kumar N, Chilamkurti N (2015) A secure temporal-credential-based mutual authentication and key agreement scheme with pseudo identity for wireless sensor networks. Information Sciences 321:263\u2013277","journal-title":"Information Sciences"},{"key":"10950_CR15","doi-asserted-by":"crossref","unstructured":"Huang, H.F., Chang, Y.F., Liu, C.H.: Enhancement of two-factor user authentication in wireless sensor networks. In: Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP), 2010 Sixth International Conference on, pp. 27\u201330. IEEE (2010)","DOI":"10.1109\/IIHMSP.2010.14"},{"issue":"6","key":"10950_CR16","doi-asserted-by":"publisher","first-page":"1070","DOI":"10.1007\/s12083-014-0285-z","volume":"8","author":"Q Jiang","year":"2015","unstructured":"Jiang Q, Ma J, Lu X, Tian Y (2015) An efficient two-factor user authentication scheme with unlinkability for wireless sensor networks. Peer-to-peer Networking and Applications 8(6):1070\u20131081","journal-title":"Peer-to-peer Networking and Applications"},{"key":"10950_CR17","doi-asserted-by":"publisher","first-page":"37","DOI":"10.1016\/j.jnca.2016.10.001","volume":"76","author":"Q Jiang","year":"2016","unstructured":"Jiang Q, Ma J, Wei F, Tian Y, Shen J, Yang Y (2016) An untraceable temporal-credential-based two-factor authentication scheme using ecc for wireless sensor networks. Journal of Network and Computer Applications 76:37\u201348","journal-title":"Journal of Network and Computer Applications"},{"key":"10950_CR18","doi-asserted-by":"publisher","first-page":"182","DOI":"10.1016\/j.compeleceng.2017.03.016","volume":"63","author":"Q Jiang","year":"2017","unstructured":"Jiang Q, Ma J, Yang C, Ma X, Shen J, Chaudhry SA (2017) Efficient end-to-end authentication protocol for wearable health monitoring systems. Computers & Electrical Engineering 63:182\u2013195","journal-title":"Computers & Electrical Engineering"},{"key":"10950_CR19","doi-asserted-by":"publisher","first-page":"3376","DOI":"10.1109\/ACCESS.2017.2673239","volume":"5","author":"Q Jiang","year":"2017","unstructured":"Jiang Q, Zeadally S, Ma J, He D (2017) Lightweight three-factor authentication and key agreement protocol for internet-integrated wireless sensor networks. IEEE Access 5:3376\u20133392","journal-title":"IEEE Access"},{"issue":"10","key":"10950_CR20","doi-asserted-by":"publisher","first-page":"e3745","DOI":"10.1002\/ett.3745","volume":"30","author":"D Kaur","year":"2019","unstructured":"Kaur D, Kumar D, Saini KK, Grover HS (2019) An improved user authentication protocol for wireless sensor networks. Transactions on Emerging Telecommunications Technologies 30(10):e3745","journal-title":"Transactions on Emerging Telecommunications Technologies"},{"issue":"3","key":"10950_CR21","doi-asserted-by":"publisher","first-page":"2450","DOI":"10.3390\/s100302450","volume":"10","author":"MK Khan","year":"2010","unstructured":"Khan MK, Alghathbar K (2010) Cryptanalysis and security improvements of a two-factor user authentication in wireless sensor networks. Sensors 10(3):2450\u20132459","journal-title":"Sensors"},{"issue":"2","key":"10950_CR22","doi-asserted-by":"publisher","first-page":"1005","DOI":"10.1109\/SURV.2013.091513.00050","volume":"16","author":"HH Kilinc","year":"2014","unstructured":"Kilinc HH, Yanik T (2014) A survey of sip authentication and key agreement schemes. IEEE Communications Surveys & Tutorials 16(2):1005\u20131023","journal-title":"IEEE Communications Surveys & Tutorials"},{"key":"10950_CR23","doi-asserted-by":"crossref","unstructured":"Ko, L.C.: A novel dynamic user authentication scheme for wireless sensor networks. In: 2008 IEEE International Symposium on Wireless Communication Systems, pp. 608\u2013612. IEEE (2008)","DOI":"10.1109\/ISWCS.2008.4726128"},{"key":"10950_CR24","doi-asserted-by":"crossref","unstructured":"Kocher, P., Jaffe, J., Jun, B.: Differential power analysis. In: Annual International Cryptology Conference, pp. 388\u2013397. Springer (1999)","DOI":"10.1007\/3-540-48405-1_25"},{"issue":"2","key":"10950_CR25","doi-asserted-by":"publisher","first-page":"641","DOI":"10.1007\/s12652-018-0712-8","volume":"10","author":"D Kumar","year":"2019","unstructured":"Kumar D, Chand S, Kumar B (2019) Cryptanalysis and improvement of an authentication protocol for wireless sensor networks applications like safety monitoring in coal mines. Journal of Ambient Intelligence and Humanized Computing 10(2):641\u2013660","journal-title":"Journal of Ambient Intelligence and Humanized Computing"},{"issue":"6","key":"10950_CR26","doi-asserted-by":"publisher","first-page":"315","DOI":"10.1049\/iet-net.2019.0009","volume":"9","author":"D Kumar","year":"2020","unstructured":"Kumar D, Chand S, Kumar B (2020) Cryptanalysis and improvement of a user authentication scheme for wireless sensor networks using chaotic maps. IET Networks 9(6):315\u2013325","journal-title":"IET Networks"},{"issue":"2","key":"10950_CR27","doi-asserted-by":"publisher","first-page":"1625","DOI":"10.3390\/s120201625","volume":"12","author":"P Kumar","year":"2012","unstructured":"Kumar P, Lee SG, Lee HJ (2012) E-sap: efficient-strong authentication protocol for healthcare applications using wireless medical sensor networks. Sensors 12(2):1625\u20131647","journal-title":"Sensors"},{"key":"10950_CR28","doi-asserted-by":"publisher","first-page":"56","DOI":"10.1016\/j.future.2016.04.016","volume":"63","author":"S Kumari","year":"2016","unstructured":"Kumari S, Li X, Wu F, Das AK, Arshad H, Khan MK (2016) A user friendly mutual authentication and key agreement scheme for wireless sensor networks using chaotic maps. Future Generation Computer Systems 63:56\u201375","journal-title":"Future Generation Computer Systems"},{"key":"10950_CR29","doi-asserted-by":"publisher","first-page":"137","DOI":"10.1016\/j.comnet.2016.05.007","volume":"104","author":"S Kumari","year":"2016","unstructured":"Kumari S, Om H (2016) Authentication protocol for wireless sensor networks applications like safety monitoring in coal mines. Computer Networks 104:137\u2013154","journal-title":"Computer Networks"},{"key":"10950_CR30","doi-asserted-by":"crossref","unstructured":"Lee, T.H.: Simple dynamic user authentication protocols for wireless sensor networks. In: Sensor Technologies and Applications, 2008. SENSORCOMM\u201908. Second International Conference on, pp. 657\u2013660. IEEE (2008)","DOI":"10.1109\/SENSORCOMM.2008.43"},{"issue":"8","key":"10950_CR31","doi-asserted-by":"publisher","first-page":"9589","DOI":"10.3390\/s130809589","volume":"13","author":"CT Li","year":"2013","unstructured":"Li CT, Weng CY, Lee CC (2013) An advanced temporal credential-based security scheme with mutual authentication and key agreement for wireless sensor networks. Sensors 13(8):9589\u20139603","journal-title":"Sensors"},{"key":"10950_CR32","doi-asserted-by":"publisher","first-page":"2643","DOI":"10.1002\/sec.1214","volume":"9","author":"X Li","year":"2016","unstructured":"Li X, Niu J, Kumari S, Liao J, Liang W, Khan MK (2016) A new authentication protocol for healthcare applications using wireless medical sensor networks with user anonymity. Security and Communication Networks 9:2643\u20132655","journal-title":"Security and Communication Networks"},{"key":"10950_CR33","doi-asserted-by":"crossref","unstructured":"Mainwaring, A., Culler, D., Polastre, J., Szewczyk, R., Anderson, J.: Wireless sensor networks for habitat monitoring. In: Proceedings of the 1st ACM international workshop on Wireless sensor networks and applications, pp. 88\u201397. ACM (2002)","DOI":"10.1145\/570738.570751"},{"issue":"4","key":"10950_CR34","doi-asserted-by":"publisher","first-page":"1986","DOI":"10.1016\/j.cnsns.2010.08.015","volume":"16","author":"Y Niu","year":"2011","unstructured":"Niu Y, Wang X (2011) An anonymous key agreement protocol based on chaotic maps. Communications in Nonlinear Science and Numerical Simulation 16(4):1986\u20131992","journal-title":"Communications in Nonlinear Science and Numerical Simulation"},{"issue":"4","key":"10950_CR35","first-page":"307","volume":"1","author":"C Otto","year":"2006","unstructured":"Otto C, Milenkovic A, Sanders C, Jovanov E (2006) System architecture of a wireless body area sensor network for ubiquitous health monitoring. Journal of Mobile Multimedia 1(4):307\u2013326","journal-title":"Journal of Mobile Multimedia"},{"key":"10950_CR36","doi-asserted-by":"crossref","unstructured":"Shnayder, V., Hempstead, M., Chen, B.r., Allen, G.W., Welsh, M.: Simulating the power consumption of large-scale sensor network applications. In: Proceedings of the 2nd international conference on Embedded networked sensor systems, pp. 188\u2013200. ACM (2004)","DOI":"10.1145\/1031495.1031518"},{"key":"10950_CR37","doi-asserted-by":"crossref","unstructured":"Tseng, H.R., Jan, R.H., Yang, W.: An improved dynamic user authentication scheme for wireless sensor networks. In: IEEE GLOBECOM 2007-IEEE Global Telecommunications Conference, pp. 986\u2013990. IEEE (2007)","DOI":"10.1109\/GLOCOM.2007.190"},{"issue":"9\u201310","key":"10950_CR38","doi-asserted-by":"publisher","first-page":"1201","DOI":"10.1002\/dac.1097","volume":"23","author":"B Vaidya","year":"2010","unstructured":"Vaidya B, Rodrigues JJ, Park JH (2010) User authentication schemes with pseudonymity for ubiquitous sensor network in ngn. International Journal of Communication Systems 23(9\u201310):1201\u20131222","journal-title":"International Journal of Communication Systems"},{"issue":"4","key":"10950_CR39","first-page":"708","volume":"15","author":"D Wang","year":"2016","unstructured":"Wang D, Wang P (2016) Two birds with one stone: Two-factor authentication with security beyond conventional bound. IEEE transactions on dependable and secure computing 15(4):708\u2013722","journal-title":"IEEE transactions on dependable and secure computing"},{"issue":"12","key":"10950_CR40","doi-asserted-by":"publisher","first-page":"4052","DOI":"10.1016\/j.cnsns.2010.02.014","volume":"15","author":"X Wang","year":"2010","unstructured":"Wang X, Zhao J (2010) An improved key agreement protocol based on chaos. Communications in Nonlinear Science and Numerical Simulation 15(12):4052\u20134057","journal-title":"Communications in Nonlinear Science and Numerical Simulation"},{"key":"10950_CR41","doi-asserted-by":"crossref","unstructured":"Wang, X-y., Gao, Y-y..: A switch-modulated method for chaos digital secure communication based on user-defined protocol. Communications in Nonlinear Science and Numerical Simulation 15(1), 99\u2013104 (2010)","DOI":"10.1016\/j.cnsns.2008.05.002"},{"key":"10950_CR42","doi-asserted-by":"crossref","unstructured":"Wong, K.H., Zheng, Y., Cao, J., Wang, S.: A dynamic user authentication scheme for wireless sensor networks. In: IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing (SUTC\u201906), pp. 244\u2013251. IEEE (2006)","DOI":"10.1109\/SUTC.2006.1636182"},{"issue":"1","key":"10950_CR43","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s12083-016-0485-9","volume":"11","author":"F Wu","year":"2018","unstructured":"Wu F, Xu L, Kumari S, Li X (2018) An improved and provably secure three-factor user authentication scheme for wireless sensor networks. Peer-to-Peer Networking and Applications 11(1):1\u201320","journal-title":"Peer-to-Peer Networking and Applications"},{"issue":"11","key":"10950_CR44","doi-asserted-by":"publisher","first-page":"110503","DOI":"10.1088\/1674-1056\/22\/11\/110503","volume":"22","author":"W Xing-Yuan","year":"2013","unstructured":"Xing-Yuan W, Da-Peng L (2013) A secure key agreement protocol based on chaotic maps. Chinese Physics B 22(11):110503","journal-title":"Chinese Physics B"},{"issue":"1","key":"10950_CR45","doi-asserted-by":"publisher","first-page":"316","DOI":"10.1016\/j.jnca.2012.05.010","volume":"36","author":"K Xue","year":"2013","unstructured":"Xue K, Ma C, Hong P, Ding R (2013) A temporal-credential-based mutual authentication and key agreement scheme for wireless sensor networks. Journal of Network and Computer Applications 36(1):316\u2013323","journal-title":"Journal of Network and Computer Applications"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-021-10950-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11042-021-10950-9\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-021-10950-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,8,30]],"date-time":"2024-08-30T22:24:50Z","timestamp":1725056690000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11042-021-10950-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,5,14]]},"references-count":45,"journal-issue":{"issue":"18","published-print":{"date-parts":[[2021,7]]}},"alternative-id":["10950"],"URL":"https:\/\/doi.org\/10.1007\/s11042-021-10950-9","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"type":"print","value":"1380-7501"},{"type":"electronic","value":"1573-7721"}],"subject":[],"published":{"date-parts":[[2021,5,14]]},"assertion":[{"value":"17 March 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"12 March 2021","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"14 April 2021","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"14 May 2021","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}