{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,8]],"date-time":"2025-04-08T07:04:27Z","timestamp":1744095867865},"reference-count":33,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2017,2,4]],"date-time":"2017-02-04T00:00:00Z","timestamp":1486166400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Wireless Pers Commun"],"published-print":{"date-parts":[[2017,8]]},"DOI":"10.1007\/s11277-017-3988-7","type":"journal-article","created":{"date-parts":[[2017,2,4]],"date-time":"2017-02-04T09:50:33Z","timestamp":1486201833000},"page":"3141-3166","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":9,"title":["Improving Security of Lightweight Authentication Technique for Heterogeneous Wireless Sensor Networks"],"prefix":"10.1007","volume":"95","author":[{"given":"Chandra Sekhar","family":"Vorugunti","sequence":"first","affiliation":[]},{"given":"Bharavi","family":"Mishra","sequence":"additional","affiliation":[]},{"given":"Ruhul","family":"Amin","sequence":"additional","affiliation":[]},{"given":"Rakesh P.","family":"Badoni","sequence":"additional","affiliation":[]},{"given":"Mrudula","family":"Sarvabhatla","sequence":"additional","affiliation":[]},{"given":"Dheerendra","family":"Mishra","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,2,4]]},"reference":[{"key":"3988_CR1","doi-asserted-by":"crossref","unstructured":"Amin, R., & Biswas, G. P. (2016). A secure light weight scheme for user authentication and key agreement in multi-gateway based wireless sensor networks. Ad Hoc Networks,\u00a0\n                    36, 58\u201380.\u00a0","DOI":"10.1016\/j.adhoc.2015.05.020"},{"key":"3988_CR2","doi-asserted-by":"crossref","unstructured":"Armando, A., Basin, D., Boichut, Y., Chevalier, Y., Compagna, L., Cu\u00e9llar, J., Drielsma, P.\u00a0H., H\u00e9am, P.-C., Kouchnarenko, O., & Mantovani, J., et\u00a0al. (2005). The avispa tool for the automated validation of internet security protocols and applications. In Computer Aided Verification. Springer, pp. 281\u2013285.","DOI":"10.1007\/11513988_27"},{"key":"3988_CR3","unstructured":"Automated Validation of Internet Security Protocols and Applications. \n                        http:\/\/www.avispa-project.org\/\n                        \n                    . Accessed on January 2014."},{"issue":"3","key":"3988_CR4","doi-asserted-by":"crossref","first-page":"181","DOI":"10.1007\/s10207-004-0055-7","volume":"4","author":"D Basin","year":"2005","unstructured":"Basin, D., M\u00f6dersheim, S., & Vigano, L. (2005). Ofmc: A symbolic model checker for security protocols. International Journal of Information Security, 4(3), 181\u2013208.","journal-title":"International Journal of Information Security"},{"key":"3988_CR5","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-662-09527-0","volume-title":"Protocols for authentication and key establishment","author":"C Boyd","year":"2003","unstructured":"Boyd, C., & Mathuria, A. (2003). Protocols for authentication and key establishment. Berlin: Springer."},{"issue":"5","key":"3988_CR6","doi-asserted-by":"crossref","first-page":"704","DOI":"10.4218\/etrij.10.1510.0134","volume":"32","author":"T-H Chen","year":"2010","unstructured":"Chen, T.-H., & Shih, W.-K. (2010). A robust mutual authentication protocol for wireless sensor networks. Etri Journal, 32(5), 704\u2013712.","journal-title":"Etri Journal"},{"issue":"3","key":"3988_CR7","doi-asserted-by":"crossref","first-page":"1086","DOI":"10.1109\/TWC.2008.080128","volume":"8","author":"ML Das","year":"2009","unstructured":"Das, M. L. (2009). Two-factor user authentication in wireless sensor networks. IEEE Transactions on Wireless Communications, 8(3), 1086\u20131090.","journal-title":"IEEE Transactions on Wireless Communications"},{"issue":"2","key":"3988_CR8","doi-asserted-by":"crossref","first-page":"198","DOI":"10.1109\/TIT.1983.1056650","volume":"29","author":"D Dolev","year":"1983","unstructured":"Dolev, D., & Yao, A. C. (1983). On the security of public key protocols. IEEE Transactions on Information Theory, 29(2), 198\u2013208.","journal-title":"IEEE Transactions on Information Theory"},{"key":"3988_CR9","doi-asserted-by":"crossref","unstructured":"Eisenbarth, T. Kasper, T., Moradi, A., Paar, C., Salmasizadeh, M., & Shalmani, M.\u00a0T.\u00a0M. (2008). On the power of power analysis in the real world: A complete break of the keeloq code hopping scheme. In Advances in Cryptology-CRYPTO. Springer, 2008, pp. 203\u2013220.","DOI":"10.1007\/978-3-540-85174-5_12"},{"key":"3988_CR10","doi-asserted-by":"publisher","unstructured":"He, D., Kumar, N., & Chilamkurti, N. (2015). A secure temporal-credential-based mutual authentication and key agreement scheme with pseudo identity for wireless sensor networks. Information Sciences\n                    321, 263\u2013277. doi:\n                        10.1016\/j.ins.2015.02.010\n                        \n                    . \n                        http:\/\/www.sciencedirect.com\/science\/article\/pii\/S0020025515001012\n                        \n                    .","DOI":"10.1016\/j.ins.2015.02.010"},{"issue":"4","key":"3988_CR11","first-page":"361","volume":"10","author":"D He","year":"2010","unstructured":"He, D., Gao, Y., Chan, S., Chen, C., & Bu, J. (2010). An enhanced two-factor user authentication scheme in wireless sensor networks. Ad Hoc and Sensor Wireless Networks, 10(4), 361\u2013371.","journal-title":"Ad Hoc and Sensor Wireless Networks"},{"issue":"2","key":"3988_CR12","doi-asserted-by":"crossref","first-page":"229","DOI":"10.1007\/s11277-013-1282-x","volume":"74","author":"D He","year":"2014","unstructured":"He, D., Zhang, Y., & Chen, J. (2014). Cryptanalysis and improvement of an anonymous authentication protocol for wireless access networks. Wireless Personal Communications, 74(2), 229\u2013243.","journal-title":"Wireless Personal Communications"},{"key":"3988_CR13","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-015-2735-1","author":"B Huang","year":"2015","unstructured":"Huang, B., Khan, M., Wu, L., Muhaya, F., & He, D. (2015). An efficient remote user authentication with key agreement scheme using elliptic curve cryptography. Wireless Personal Communications. doi:\n                        10.1007\/s11277-015-2735-1\n                        \n                    .","journal-title":"Wireless Personal Communications"},{"issue":"11","key":"3988_CR14","doi-asserted-by":"crossref","first-page":"2245","DOI":"10.1016\/j.patcog.2004.04.011","volume":"37","author":"ATB Jin","year":"2004","unstructured":"Jin, A. T. B., Ling, D. N. C., & Goh, A. (2004). Biohashing: Two factor authentication featuring fingerprint data and tokenised random number. Pattern Recognition, 37(11), 2245\u20132255.","journal-title":"Pattern Recognition"},{"key":"3988_CR15","doi-asserted-by":"crossref","first-page":"37","DOI":"10.1016\/j.jisa.2014.10.008","volume":"20","author":"S Kalra","year":"2015","unstructured":"Kalra, S., & Sood, S. K. (2015). Advanced password based authentication scheme for wireless sensor networks. Journal of Information Security and Applications, 20, 37\u201346.","journal-title":"Journal of Information Security and Applications"},{"issue":"3","key":"3988_CR16","doi-asserted-by":"crossref","first-page":"2450","DOI":"10.3390\/s100302450","volume":"10","author":"MK Khan","year":"2010","unstructured":"Khan, M. K., & Alghathbar, K. (2010). Cryptanalysis and security improvements of \u2018two-factor user authentication in wireless sensor networks\u2019. Sensors, 10(3), 2450\u20132459.","journal-title":"Sensors"},{"key":"3988_CR17","doi-asserted-by":"crossref","unstructured":"Kocher, K., Jaffe, J., & Jun, B. (1999). Differential power analysis. In Advances in Cryptology CRYPTO\u201999. Springer, pp. 388\u2013397.","DOI":"10.1007\/3-540-48405-1_25"},{"issue":"1","key":"3988_CR18","first-page":"553","volume":"18","author":"T Maitra","year":"2016","unstructured":"Maitra, T., Amin, R., Giri, D., & Srivastava, P. D. (2016). An efficient and robust user authentication scheme for hierarchical wireless sensor networks without tamper-proof smart card. International Journal of Network Security, 18(1), 553\u2013564.","journal-title":"International Journal of Network Security"},{"issue":"5","key":"3988_CR19","doi-asserted-by":"crossref","first-page":"541","DOI":"10.1109\/TC.2002.1004593","volume":"51","author":"TS Messerges","year":"2002","unstructured":"Messerges, T. S., Dabbish, E., Sloan, R. H., et al. (2002). Examining smart-card security under the threat of power analysis attacks. IEEE Transactions on Computers, 51(5), 541\u2013552.","journal-title":"IEEE Transactions on Computers"},{"issue":"1","key":"3988_CR20","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/s10916-014-0154-6","volume":"39","author":"D Mishra","year":"2015","unstructured":"Mishra, D. (2015). On the security flaws in id-based password authentication schemes for telecare medical information systems. Journal of Medical Systems, 39(1), 1\u201316.","journal-title":"Journal of Medical Systems"},{"key":"3988_CR21","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-015-2975-0","author":"D Mishra","year":"2015","unstructured":"Mishra, D. (2015). Design and analysis of a provably secure multi-server authentication scheme. Wireless Personal Communications. doi:\n                        10.1007\/s11277-015-2975-0\n                        \n                    .","journal-title":"Wireless Personal Communications"},{"issue":"18","key":"3988_CR22","doi-asserted-by":"crossref","first-page":"8129","DOI":"10.1016\/j.eswa.2014.07.004","volume":"41","author":"D Mishra","year":"2014","unstructured":"Mishra, D., Das, A. K., & Mukhopadhyay, S. (2014). A secure user anonymity-preserving biometric-based multi-server authenticated key agreement scheme using smart cards. Expert Systems with Applications, 41(18), 8129\u20138143.","journal-title":"Expert Systems with Applications"},{"issue":"15","key":"3988_CR23","doi-asserted-by":"crossref","first-page":"851","DOI":"10.1049\/el.2011.1525","volume":"47","author":"L Nanni","year":"2011","unstructured":"Nanni, L., Brahnam, S., & Lumini, A. (2011). Biohashing applied to orientation-based minutia descriptor for secure fingerprint authentication system. Electronics Letters, 47(15), 851\u2013853.","journal-title":"Electronics Letters"},{"issue":"3","key":"3988_CR24","doi-asserted-by":"crossref","first-page":"295","DOI":"10.1016\/j.patrec.2007.10.005","volume":"29","author":"L Nanni","year":"2008","unstructured":"Nanni, L., & Lumini, A. (2008). Random subspace for an improved biohashing for face authentication. Pattern Recognition Letters, 29(3), 295\u2013300.","journal-title":"Pattern Recognition Letters"},{"issue":"9","key":"3988_CR25","doi-asserted-by":"crossref","first-page":"1230","DOI":"10.1002\/dac.2373","volume":"25","author":"H Ning","year":"2012","unstructured":"Ning, H., & Hu, S. (2012). Technology classification, industry, and education for future internet of things. International Journal of Communication Systems, 25(9), 1230\u20131241.","journal-title":"International Journal of Communication Systems"},{"issue":"5","key":"3988_CR26","doi-asserted-by":"crossref","first-page":"321","DOI":"10.1016\/j.csi.2010.03.008","volume":"32","author":"R Song","year":"2010","unstructured":"Song, R. (2010). Advanced smart card based password authentication protocol. Computer Standards and Interfaces, 32(5), 321\u2013325.","journal-title":"Computer Standards and Interfaces"},{"key":"3988_CR27","doi-asserted-by":"crossref","unstructured":"Wander, A.\u00a0S., Gura, N., Eberle, H., Gupta, V., & Shantz, S.\u00a0C. (2005). Energy analysis of public-key cryptography for wireless sensor networks. In Third IEEE international conference on pervasive computing and communications, 2005. PerCom 2005, IEEE, pp. 324\u2013328.","DOI":"10.1109\/PERCOM.2005.18"},{"key":"3988_CR28","doi-asserted-by":"crossref","unstructured":"Watro, R., Kong, D., Cuti, S. -F., Gardiner, C., Lynn, C., & Kruus, P. (2004). Tinypk: Securing sensor networks with public key technology. In Proceedings of the 2nd ACM workshop on security of ad hoc and sensor networks, ACM, pp. 59\u201364.","DOI":"10.1145\/1029102.1029113"},{"key":"3988_CR29","doi-asserted-by":"crossref","unstructured":"Wong, K.\u00a0H., Zheng, Y., Cao, J., & Wang, S. (2006). A dynamic user authentication scheme for wireless sensor networks. In IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing, 2006, IEEE, Vol.\u00a01, p. 8.","DOI":"10.1109\/SUTC.2006.1636182"},{"issue":"1","key":"3988_CR30","doi-asserted-by":"crossref","first-page":"316","DOI":"10.1016\/j.jnca.2012.05.010","volume":"36","author":"K Xue","year":"2013","unstructured":"Xue, K., Ma, C., Hong, P., & Ding, R. (2013). A temporal-credential-based mutual authentication and key agreement scheme for wireless sensor networks. Journal of Network and Computer Applications, 36(1), 316\u2013323.","journal-title":"Journal of Network and Computer Applications"},{"issue":"4","key":"3988_CR31","doi-asserted-by":"crossref","first-page":"723","DOI":"10.1016\/j.csi.2008.09.006","volume":"31","author":"J Xu","year":"2009","unstructured":"Xu, J., Zhu, W.-T., & Feng, D.-G. (2009). An improved smart card based password authentication scheme with provable security. Computer Standards and Interfaces, 31(4), 723\u2013728.","journal-title":"Computer Standards and Interfaces"},{"issue":"5","key":"3988_CR32","doi-asserted-by":"crossref","first-page":"4767","DOI":"10.3390\/s110504767","volume":"11","author":"H-L Yeh","year":"2011","unstructured":"Yeh, H.-L., Chen, T.-H., Liu, P.-C., Kim, T.-H., & Wei, H.-W. (2011). A secured authentication protocol for wireless sensor networks using elliptic curves cryptography. Sensors, 11(5), 4767\u20134779.","journal-title":"Sensors"},{"issue":"12","key":"3988_CR33","doi-asserted-by":"crossref","first-page":"2292","DOI":"10.1016\/j.comnet.2008.04.002","volume":"52","author":"J Yick","year":"2008","unstructured":"Yick, J., Mukherjee, B., & Ghosal, D. (2008). Wireless sensor network survey. Computer Networks, 52(12), 2292\u20132330.","journal-title":"Computer Networks"}],"container-title":["Wireless Personal Communications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11277-017-3988-7\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-017-3988-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-017-3988-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,7,31]],"date-time":"2017-07-31T09:42:38Z","timestamp":1501494158000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11277-017-3988-7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,2,4]]},"references-count":33,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2017,8]]}},"alternative-id":["3988"],"URL":"https:\/\/doi.org\/10.1007\/s11277-017-3988-7","relation":{},"ISSN":["0929-6212","1572-834X"],"issn-type":[{"value":"0929-6212","type":"print"},{"value":"1572-834X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017,2,4]]}}}