{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,10]],"date-time":"2026-04-10T19:05:48Z","timestamp":1775847948771,"version":"3.50.1"},"reference-count":38,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2021,8,20]],"date-time":"2021-08-20T00:00:00Z","timestamp":1629417600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2021,8,20]],"date-time":"2021-08-20T00:00:00Z","timestamp":1629417600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Sci. China Inf. Sci."],"published-print":{"date-parts":[[2022,1]]},"DOI":"10.1007\/s11432-020-2975-6","type":"journal-article","created":{"date-parts":[[2021,8,24]],"date-time":"2021-08-24T09:04:20Z","timestamp":1629795860000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":73,"title":["Efficient privacy-preserving user authentication scheme with forward secrecy for industry 4.0"],"prefix":"10.1007","volume":"65","author":[{"given":"Chenyu","family":"Wang","sequence":"first","affiliation":[]},{"given":"Ding","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Guoai","family":"Xu","sequence":"additional","affiliation":[]},{"given":"Debiao","family":"He","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,8,20]]},"reference":[{"key":"2975_CR1","doi-asserted-by":"crossref","unstructured":"Kemmerer S. Manufacturing Interoperability Program: A Synopsis. National Institue of Standards and Technology, Technical Report, 2009","DOI":"10.6028\/NIST.IR.7533"},{"key":"2975_CR2","doi-asserted-by":"publisher","first-page":"4598","DOI":"10.1109\/JIOT.2019.2942271","volume":"7","author":"S Garg","year":"2020","unstructured":"Garg S, Kaur K, Kaddoum G, et al. Toward secure and provable authentication for internet of things: realizing industry 4.0. IEEE Internet Things J, 2020, 7: 4598\u20134606","journal-title":"IEEE Internet Things J"},{"key":"2975_CR3","doi-asserted-by":"publisher","first-page":"3599","DOI":"10.1109\/TII.2017.2773666","volume":"14","author":"X Li","year":"2018","unstructured":"Li X, Niu J, Bhuiyan M Z A, et al. A robust ECC-based provable secure authentication protocol with privacy preserving for industrial Internet of Things. IEEE Trans Ind Inf, 2018, 14: 3599\u20133609","journal-title":"IEEE Trans Ind Inf"},{"key":"2975_CR4","doi-asserted-by":"publisher","first-page":"6428","DOI":"10.1007\/s11227-017-2048-0","volume":"74","author":"S Kumari","year":"2018","unstructured":"Kumari S, Karuppiah M, Das A K, et al. A secure authentication scheme based on elliptic curve cryptography for IoT and cloud servers. J Supercomput, 2018, 74: 6428\u20136453","journal-title":"J Supercomput"},{"key":"2975_CR5","doi-asserted-by":"publisher","first-page":"64","DOI":"10.1109\/MCOM.2017.1700390","volume":"56","author":"C Lin","year":"2018","unstructured":"Lin C, He D, Kumar N, et al. Security and privacy for the Internet of drones: challenges and solutions. IEEE Commun Mag, 2018, 56: 64\u201369","journal-title":"IEEE Commun Mag"},{"key":"2975_CR6","doi-asserted-by":"publisher","first-page":"4081","DOI":"10.1109\/TII.2018.2834351","volume":"14","author":"D Wang","year":"2018","unstructured":"Wang D, Li W, Wang P. Measuring two-factor authentication schemes for real-time data access in industrial wireless sensor networks. IEEE Trans Ind Inf, 2018, 14: 4081\u20134092","journal-title":"IEEE Trans Ind Inf"},{"key":"2975_CR7","doi-asserted-by":"publisher","unstructured":"Wang C, Wang D, Tu Y, et al. Understanding node capture attacks in user authentication schemes for wireless sensor networks. IEEE Trans Depend Secure Comput, 2020. doi: https:\/\/doi.org\/10.1109\/TDSC.2020.2974220","DOI":"10.1109\/TDSC.2020.2974220"},{"key":"2975_CR8","doi-asserted-by":"publisher","first-page":"1310","DOI":"10.1109\/JBHI.2017.2753464","volume":"22","author":"A K Das","year":"2018","unstructured":"Das A K, Wazid M, Kumar N, et al. Design of secure and lightweight authentication protocol for wearable devices environment. IEEE J Biomed Health Inform, 2018, 22: 1310\u20131322","journal-title":"IEEE J Biomed Health Inform"},{"key":"2975_CR9","doi-asserted-by":"crossref","unstructured":"Bresson E, Chevassut O, Pointcheval D. Security proofs for an efficient password-based key exchange. In: Proceedings of the 10th ACM Conference on Computer and Communications Security, 2003. 41\u201350","DOI":"10.1145\/948109.948142"},{"key":"2975_CR10","first-page":"708","volume":"15","author":"D Wang","year":"2018","unstructured":"Wang D, Wang P. Two birds with one stone: two-factor authentication with security beyond conventional bound. IEEE Trans Depend Secure Comput, 2018, 15: 708\u2013722","journal-title":"IEEE Trans Depend Secure Comput"},{"key":"2975_CR11","doi-asserted-by":"publisher","first-page":"2052","DOI":"10.1109\/TIFS.2016.2573746","volume":"11","author":"D He","year":"2016","unstructured":"He D, Zeadally S, Kumar N, et al. Efficient and anonymous mobile user authentication protocol using self-certified public key cryptography for multi-server architectures. IEEE Trans Inform Forensic Secur, 2016, 11: 2052\u20132064","journal-title":"IEEE Trans Inform Forensic Secur"},{"key":"2975_CR12","doi-asserted-by":"crossref","unstructured":"Meng W, Li W, Jiang L, et al. Socialauth: designing touch behavioral smartphone user authentication based on social networking applications. In: Proceedings of IFIP International Conference on ICT Systems Security and Privacy Protection, 2019. 562: 180\u2013193","DOI":"10.1007\/978-3-030-22312-0_13"},{"key":"2975_CR13","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.jnca.2018.05.010","volume":"117","author":"W Meng","year":"2018","unstructured":"Meng W, Wang Y, Wong D S, et al. TouchWB: touch behavioral user authentication based on web browsing on smartphones. J Network Comput Appl, 2018, 117: 1\u20139","journal-title":"J Network Comput Appl"},{"key":"2975_CR14","unstructured":"Wu T D. The secure remote password protocol. In: Proceedings of Internet Society Symposium on Network and Distributed System Security, 1998. 98: 97\u2013111"},{"key":"2975_CR15","doi-asserted-by":"publisher","first-page":"1086","DOI":"10.1109\/TWC.2008.080128","volume":"8","author":"M L Das","year":"2009","unstructured":"Das M L. Two-factor user authentication in wireless sensor networks. IEEE Trans Wirel Commun, 2009, 8: 1086\u20131090","journal-title":"IEEE Trans Wirel Commun"},{"key":"2975_CR16","doi-asserted-by":"publisher","first-page":"550","DOI":"10.1631\/jzus.C1000377","volume":"12","author":"R Fan","year":"2011","unstructured":"Fan R, He D, Pan X, et al. An efficient and DoS-resistant user authentication scheme for two-tiered wireless sensor networks. J Zhejiang Univ Sci C, 2011, 12: 550\u2013560","journal-title":"J Zhejiang Univ Sci C"},{"key":"2975_CR17","doi-asserted-by":"publisher","first-page":"41","DOI":"10.1016\/j.comnet.2014.07.010","volume":"73","author":"D Wang","year":"2014","unstructured":"Wang D, Wang P. On the anonymity of two-factor authentication schemes for wireless sensor networks: attacks, principle and solutions. Comput Netw, 2014, 73: 41\u201357","journal-title":"Comput Netw"},{"key":"2975_CR18","doi-asserted-by":"publisher","first-page":"1646","DOI":"10.1016\/j.jnca.2012.03.011","volume":"35","author":"A K Das","year":"2012","unstructured":"Das A K, Sharma P, Chatterjee S, et al. A dynamic password-based user authentication scheme for hierarchical wireless sensor networks. J Network Comput Appl, 2012, 35: 1646\u20131656","journal-title":"J Network Comput Appl"},{"key":"2975_CR19","doi-asserted-by":"publisher","first-page":"316","DOI":"10.1016\/j.jnca.2012.05.010","volume":"36","author":"K Xue","year":"2013","unstructured":"Xue K, Ma C, Hong P, et al. A temporal-credential-based mutual authentication and key agreement scheme for wireless sensor networks. J Network Comput Appl, 2013, 36: 316\u2013323","journal-title":"J Network Comput Appl"},{"key":"2975_CR20","doi-asserted-by":"publisher","first-page":"2215","DOI":"10.1002\/dac.2468","volume":"27","author":"C G Ma","year":"2014","unstructured":"Ma C G, Wang D, Zhao S D. Security flaws in two improved remote user authentication schemes using smart cards. Int J Commun Syst, 2014, 27: 2215\u20132227","journal-title":"Int J Commun Syst"},{"key":"2975_CR21","doi-asserted-by":"publisher","first-page":"10081","DOI":"10.3390\/s140610081","volume":"14","author":"Y Choi","year":"2014","unstructured":"Choi Y, Lee D, Kim J, et al. Security enhanced user authentication protocol for wireless sensor networks using elliptic curves cryptography. Sensors, 2014, 14: 10081\u201310106","journal-title":"Sensors"},{"key":"2975_CR22","doi-asserted-by":"publisher","first-page":"263","DOI":"10.1016\/j.ins.2015.02.010","volume":"321","author":"D He","year":"2015","unstructured":"He D, Kumar N, Chilamkurti N. A secure temporal-credential-based mutual authentication and key agreement scheme with pseudo identity for wireless sensor networks. Inf Sci, 2015, 321: 263\u2013277","journal-title":"Inf Sci"},{"key":"2975_CR23","doi-asserted-by":"publisher","first-page":"4394","DOI":"10.1109\/ACCESS.2016.2596292","volume":"4","author":"A G Reddy","year":"2016","unstructured":"Reddy A G, Das A K, Yoon E J, et al. A secure anonymous authentication protocol for mobile services on elliptic curve cryptography. IEEE Access, 2016, 4: 4394\u20134407","journal-title":"IEEE Access"},{"key":"2975_CR24","doi-asserted-by":"publisher","first-page":"3376","DOI":"10.1109\/ACCESS.2017.2673239","volume":"5","author":"Q Jiang","year":"2017","unstructured":"Jiang Q, Zeadally S, Ma J, et al. Lightweight three-factor authentication and key agreement protocol for internet-integrated wireless sensor networks. IEEE Access, 2017, 5: 3376\u20133392","journal-title":"IEEE Access"},{"key":"2975_CR25","doi-asserted-by":"publisher","first-page":"428","DOI":"10.1109\/TDSC.2014.2355850","volume":"12","author":"D Wang","year":"2015","unstructured":"Wang D, He D, Wang P, et al. Anonymous two-factor authentication in distributed systems: certain goals are beyond attainment. IEEE Trans Depend Secure Comput, 2015, 12: 428\u2013442","journal-title":"IEEE Trans Depend Secure Comput"},{"key":"2975_CR26","doi-asserted-by":"publisher","first-page":"198","DOI":"10.1109\/TIT.1983.1056650","volume":"29","author":"D Dolev","year":"1983","unstructured":"Dolev D, Yao A. On the security of public key protocols. IEEE Trans Inform Theor, 1983, 29: 198\u2013208","journal-title":"IEEE Trans Inform Theor"},{"key":"2975_CR27","doi-asserted-by":"crossref","unstructured":"Wang D, Wang P. On the implications of Zipf\u2019s law in passwords. In: Proceedings of European Symposium on Research in Computer Security, 2016. 111\u2013131","DOI":"10.1007\/978-3-319-45744-4_6"},{"key":"2975_CR28","first-page":"2375","volume":"30","author":"W Li","year":"2019","unstructured":"Li W, Wang D, Wang P. Insider attacks against multi-factor authentication protocols for wireless sensor networks (in Chinese). J Softw, 2019, 30: 2375\u20132391","journal-title":"J Softw"},{"key":"2975_CR29","doi-asserted-by":"publisher","first-page":"2776","DOI":"10.1109\/TIFS.2017.2721359","volume":"12","author":"D Wang","year":"2017","unstructured":"Wang D, Cheng H, Wang P, et al. Zipf\u2019s law in passwords. IEEE Trans Inform Forensic Secur, 2017, 12: 2776\u20132791","journal-title":"IEEE Trans Inform Forensic Secur"},{"key":"2975_CR30","doi-asserted-by":"publisher","first-page":"30","DOI":"10.1049\/iet-cps.2018.5054","volume":"4","author":"D Wang","year":"2020","unstructured":"Wang D, Wang P, Wang C. Efficient multi-factor user authentication protocol with forward secrecy for real-time data access in WSNS. ACM Trans Cyber-Phys Syst, 2020, 4: 30","journal-title":"ACM Trans Cyber-Phys Syst"},{"key":"2975_CR31","doi-asserted-by":"publisher","first-page":"39","DOI":"10.1109\/JSYST.2019.2899580","volume":"14","author":"X Li","year":"2020","unstructured":"Li X, Peng J, Obaidat M S, et al. A secure three-factor user authentication protocol with forward secrecy for wireless medical sensor network systems. IEEE Syst J, 2020, 14: 39\u201350","journal-title":"IEEE Syst J"},{"key":"2975_CR32","doi-asserted-by":"publisher","first-page":"882","DOI":"10.1016\/j.future.2019.04.019","volume":"100","author":"A O Sharif","year":"2019","unstructured":"Sharif A O, Arshad H, Nikooghadam M, et al. Three party secure data transmission in IoT networks through design of a lightweight authenticated key agreement scheme. Future Gener Comput Syst, 2019, 100: 882\u2013892","journal-title":"Future Gener Comput Syst"},{"key":"2975_CR33","doi-asserted-by":"publisher","first-page":"1133","DOI":"10.1109\/TDSC.2018.2857811","volume":"17","author":"J Srinivas","year":"2020","unstructured":"Srinivas J, Das A K, Wazid M, et al. Anonymous lightweight chaotic map-based authenticated key agreement protocol for industrial Internet of Things. IEEE Trans Depend Secure Comput, 2020, 17: 1133\u20131146","journal-title":"IEEE Trans Depend Secure Comput"},{"key":"2975_CR34","doi-asserted-by":"publisher","first-page":"727","DOI":"10.1016\/j.future.2017.08.042","volume":"82","author":"F Wu","year":"2018","unstructured":"Wu F, Li X, Sangaiah A K, et al. A lightweight and robust two-factor authentication scheme for personalized healthcare systems using wireless medical sensor networks. Future Gener Comput Syst, 2018, 82: 727\u2013737","journal-title":"Future Gener Comput Syst"},{"key":"2975_CR35","doi-asserted-by":"publisher","first-page":"483","DOI":"10.1016\/j.future.2016.05.032","volume":"80","author":"R Amin","year":"2018","unstructured":"Amin R, Islam S H, Biswas G P, et al. A robust and anonymous patient monitoring system using wireless medical sensor networks. Future Gener Comput Syst, 2018, 80: 483\u2013495","journal-title":"Future Gener Comput Syst"},{"key":"2975_CR36","doi-asserted-by":"publisher","first-page":"391","DOI":"10.1109\/TDSC.2017.2764083","volume":"17","author":"M Wazid","year":"2020","unstructured":"Wazid M, Das A K, Odelu V, et al. Secure remote user authenticated key establishment protocol for smart home environment. IEEE Trans Depend Secure Comput, 2020, 17: 391\u2013406","journal-title":"IEEE Trans Depend Secure Comput"},{"key":"2975_CR37","doi-asserted-by":"publisher","first-page":"2123","DOI":"10.3390\/s16122123","volume":"16","author":"Y H Park","year":"2016","unstructured":"Park Y H, Park Y H. Three-factor user authentication and key agreement using elliptic curve cryptosystem in wireless sensor networks. Sensors, 2016, 16: 2123\u20132140","journal-title":"Sensors"},{"key":"2975_CR38","doi-asserted-by":"publisher","first-page":"147","DOI":"10.1016\/j.adhoc.2016.11.002","volume":"54","author":"J Srinivas","year":"2017","unstructured":"Srinivas J, Mukhopadhyay S, Mishra D. Secure and efficient user authentication scheme for multi-gateway wireless sensor networks. Ad Hoc Netw, 2017, 54: 147\u2013169","journal-title":"Ad Hoc Netw"}],"container-title":["Science China Information Sciences"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11432-020-2975-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11432-020-2975-6\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11432-020-2975-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,3]],"date-time":"2023-02-03T21:15:44Z","timestamp":1675458944000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11432-020-2975-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,8,20]]},"references-count":38,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2022,1]]}},"alternative-id":["2975"],"URL":"https:\/\/doi.org\/10.1007\/s11432-020-2975-6","relation":{},"ISSN":["1674-733X","1869-1919"],"issn-type":[{"value":"1674-733X","type":"print"},{"value":"1869-1919","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,8,20]]},"assertion":[{"value":"26 February 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"11 May 2020","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"2 July 2020","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"20 August 2021","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}],"article-number":"112301"}}