{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,16]],"date-time":"2026-01-16T02:15:18Z","timestamp":1768529718450,"version":"3.49.0"},"reference-count":30,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2015,9,5]],"date-time":"2015-09-05T00:00:00Z","timestamp":1441411200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"name":"Fujian Education and Scientific Research Program for Young and Middle-aged Teachers","award":["JA14369"],"award-info":[{"award-number":["JA14369"]}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"crossref","award":["61300220"],"award-info":[{"award-number":["61300220"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]},{"name":"Scientific Research Fund of Hunan Provincial Education Department","award":["13C324"],"award-info":[{"award-number":["13C324"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Peer-to-Peer Netw. Appl."],"published-print":{"date-parts":[[2017,1]]},"DOI":"10.1007\/s12083-015-0404-5","type":"journal-article","created":{"date-parts":[[2015,9,5]],"date-time":"2015-09-05T01:55:06Z","timestamp":1441418106000},"page":"16-30","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":87,"title":["A new and secure authentication scheme for wireless sensor networks with formal proof"],"prefix":"10.1007","volume":"10","author":[{"given":"Fan","family":"Wu","sequence":"first","affiliation":[]},{"given":"Lili","family":"Xu","sequence":"additional","affiliation":[]},{"given":"Saru","family":"Kumari","sequence":"additional","affiliation":[]},{"given":"Xiong","family":"Li","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,9,5]]},"reference":[{"key":"404_CR1","doi-asserted-by":"crossref","unstructured":"Abdalla M, Izabachene M, Pointcheval D (2008) Anonymous and transparent gateway-based password-authenticated key exchange. Cryptology and Network Security. Springer, pp 133\u2013148","DOI":"10.1007\/978-3-540-89641-8_10"},{"key":"404_CR2","doi-asserted-by":"crossref","unstructured":"Bresson E, Chevassut O, Pointcheval D (2003) Security proofs for an efficient password-based key exchange. In: Proceedings of the 10th ACM conference on Computer and communications security, pp 241\u2013250. ACM","DOI":"10.1145\/948109.948142"},{"issue":"5","key":"404_CR3","doi-asserted-by":"crossref","first-page":"704","DOI":"10.4218\/etrij.10.1510.0134","volume":"32","author":"TH Chen","year":"2010","unstructured":"Chen TH, Shih WK (2010) A robust mutual authentication protocol for wireless sensor networks. Etri Journal 32(5):704\u2013712","journal-title":"Etri Journal"},{"key":"404_CR4","doi-asserted-by":"crossref","unstructured":"Chiou SY (2013) Authenticated blind issuing of symmetric keys for mobile access control system without trusted parties. Math Probl Eng 2013, Article ID 858579","DOI":"10.1155\/2013\/858579"},{"issue":"6","key":"404_CR5","doi-asserted-by":"crossref","first-page":"10, 081","DOI":"10.3390\/s140610081","volume":"14","author":"Y Choi","year":"2014","unstructured":"Choi Y, Lee D, Kim J, Jung J, Nam J, Won D (2014) Security enhanced user authentication protocol for wireless sensor networks using elliptic curves cryptography. Sensors 14(6):10, 081\u201310,106","journal-title":"Sensors"},{"issue":"3","key":"404_CR6","doi-asserted-by":"crossref","first-page":"1086","DOI":"10.1109\/TWC.2008.080128","volume":"8","author":"ML Das","year":"2009","unstructured":"Das ML (2009) Two-factor user authentication in wireless sensor networks. IEEE T Wirel Commun 8 (3):1086\u20131090","journal-title":"IEEE T Wirel Commun"},{"issue":"7","key":"404_CR7","doi-asserted-by":"crossref","first-page":"550","DOI":"10.1631\/jzus.C1000377","volume":"12","author":"R Fan","year":"2011","unstructured":"Fan R, He Dj, Pan Xz (2011) An efficient and dos-resistant user authentication scheme for two-tiered wireless sensor networks. J Zhejiang Univ Sci C 12(7):550\u2013560","journal-title":"J Zhejiang Univ Sci C"},{"key":"404_CR8","first-page":"293","volume":"2011","author":"W Han","year":"2011","unstructured":"Han W (2011) Weakness of a secured authentication protocol for wireless sensor networks using elliptic curves cryptography. IACR Cryptology ePrint Archive 2011:293","journal-title":"IACR Cryptology ePrint Archive"},{"issue":"11","key":"404_CR9","doi-asserted-by":"crossref","first-page":"5348","DOI":"10.1109\/TIE.2012.2218562","volume":"60","author":"D He","year":"2013","unstructured":"He D, Chen C, Chan S, Bu J, Yang LT (2013) Security analysis and improvement of a secure and distributed reprogramming protocol for wireless sensor networks. IEEE Trans Ind Electron 60(11):5348\u20135354","journal-title":"IEEE Trans Ind Electron"},{"issue":"4","key":"404_CR10","first-page":"361","volume":"10","author":"D He","year":"2010","unstructured":"He D, Gao Y, Chan S, Chen C, Bu J (2010) An enhanced two-factor user authentication scheme in wireless sensor networks. Ad Hoc Sensor Wirel Netw 10(4):361\u2013371","journal-title":"Ad Hoc Sensor Wirel Netw"},{"key":"404_CR11","doi-asserted-by":"publisher","unstructured":"He D, Kumar N, Chen J, Lee CC, Chilamkurti N, Yeo SS (2013) Robust anonymous authentication protocol for health-care applications using wireless medical sensor networks. Multimed Syst. doi: 10.1007\/s00530-013-0346-9","DOI":"10.1007\/s00530-013-0346-9"},{"issue":"6","key":"404_CR12","first-page":"1070","volume":"8","author":"Q Jiang","year":"2015","unstructured":"Jiang Q, Ma J, Lu X, Tian Y (2015) An efficient two-factor user authentication scheme with unlinkability for wireless sensor networks. Peer-to-Peer Netw Appl 8(6):1070\u20131081. doi: 10.1007\/s12083-014-0285-z","journal-title":"Peer-to-Peer Netw Appl"},{"issue":"3","key":"404_CR13","doi-asserted-by":"crossref","first-page":"2450","DOI":"10.3390\/s100302450","volume":"10","author":"MK Khan","year":"2010","unstructured":"Khan MK, Alghathbar K (2010) Cryptanalysis and security improvements of two-factor user authentication in wireless sensor networks. Sensors 10(3):2450\u20132459","journal-title":"Sensors"},{"key":"404_CR14","doi-asserted-by":"crossref","unstructured":"Kocher P, Jaffe J, Jun B (1999) Differential power analysis. In: Advances in Cryptology-CRYPTO99, pp 388\u2013397. Springer","DOI":"10.1007\/3-540-48405-1_25"},{"key":"404_CR15","first-page":"159","volume":"27","author":"S Kumari","year":"2015","unstructured":"Kumari S, Khan MK, Atiquzzaman M (2015) User authentication schemes for wireless sensor networks: A review. Ad Hoc Netw 27:159\u2013194. doi: 10.1016\/j.adhoc.2014.11.018","journal-title":"Ad Hoc Netw"},{"issue":"2","key":"404_CR16","doi-asserted-by":"crossref","first-page":"100","DOI":"10.1049\/iet-ifs.2010.0096","volume":"5","author":"S Mangard","year":"2011","unstructured":"Mangard S, Oswald E, Standaert FX (2011) One for allcall for one: unifying standard differential power analysis attacks. IET Inform Secur 5(2):100\u2013110","journal-title":"IET Inform Secur"},{"key":"404_CR17","doi-asserted-by":"crossref","unstructured":"Menezes AJ, Van Oorschot PC, Vanstone SA (1996) Handbook of applied cryptography. CRC press","DOI":"10.1201\/9781439821916"},{"issue":"5","key":"404_CR18","doi-asserted-by":"crossref","first-page":"541","DOI":"10.1109\/TC.2002.1004593","volume":"51","author":"TS Messerges","year":"2002","unstructured":"Messerges TS, Dabbish EA, Sloan RH (2002) Examining smart-card security under the threat of power analysis attacks. IEEE T Comput 51(5):541\u2013552","journal-title":"IEEE T Comput"},{"key":"404_CR19","doi-asserted-by":"crossref","unstructured":"Shi W, Gong P (2013) A new user authentication protocol for wireless sensor networks using elliptic curves cryptography. Int J Distribu Sens Netw 2013, Article ID 730831","DOI":"10.1155\/2013\/730831"},{"key":"404_CR20","unstructured":"Stallings W (2010) Cryptography and network security, principles and practices, 5th edition. Practice Hall"},{"issue":"5","key":"404_CR21","doi-asserted-by":"crossref","first-page":"895","DOI":"10.1007\/s00779-012-0540-3","volume":"17","author":"DZ Sun","year":"2013","unstructured":"Sun DZ, Li JX, Feng ZY, Cao ZF, Xu GQ (2013) On the security and improvement of a two-factor user authentication scheme in wireless sensor networks. Pers Ubiquit Comput 17(5):895\u2013 905","journal-title":"Pers Ubiquit Comput"},{"key":"404_CR22","doi-asserted-by":"crossref","unstructured":"Vaidya B, Makrakis D, Mouftah HT (2010) Improved two-factor user authentication in wireless sensor networks. In: Wireless and Mobile Computing, Networking and Communications (WiMob), 2010 IEEE 6th International Conference on, pp 600\u2013606. IEEE","DOI":"10.1109\/WIMOB.2010.5645004"},{"key":"404_CR23","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.adhoc.2014.03.003","volume":"20","author":"D Wang","year":"2014","unstructured":"Wang D, Wang P (2014) Understanding security failures of two-factor authentication schemes for real-time applications in hierarchical wireless sensor networks. Ad Hoc Netw 20:1\u2013 15","journal-title":"Ad Hoc Netw"},{"key":"404_CR24","doi-asserted-by":"crossref","unstructured":"Watro R, Kong D (2004) Cuti, S.f., Gardiner, C., Lynn, C., Kruus, P.: Tinypk: securing sensor networks with public key technology. In: Proceedings of the 2nd ACM workshop on Security of ad hoc and sensor networks, pp 59\u201364. ACM","DOI":"10.1145\/1029102.1029113"},{"key":"404_CR25","first-page":"316","volume":"45","author":"F Wu","year":"2015","unstructured":"Wu F, Xu L, Kumari S, Li X (2015) A novel and provably secure biometrics-based three-factor remote authentication scheme for mobile clientcserver networks. Comput Electr Eng 45:316\u2013327. doi: 10.1016\/j.compeleceng.2015.02.015","journal-title":"Comput Electr Eng"},{"key":"404_CR26","doi-asserted-by":"publisher","unstructured":"Xu L, Wu F (2015) Cryptanalysis and improvement of a user authentication scheme preserving uniqueness and anonymity for connected health care. J Med Syst 39(2), Article no. 179. doi: 10.1007\/s10916-014-0179-x","DOI":"10.1007\/s10916-014-0179-x"},{"issue":"2","key":"404_CR27","doi-asserted-by":"crossref","first-page":"245","DOI":"10.1002\/sec.977","volume":"8","author":"L Xu","year":"2015","unstructured":"Xu L, Wu F (2015) An improved and provable remote user authentication scheme based on elliptic curve cryptosystem with user anonymity. Secur Commun Netw 8(2):245\u2013260","journal-title":"Secur Commun Netw"},{"issue":"1","key":"404_CR28","doi-asserted-by":"crossref","first-page":"316","DOI":"10.1016\/j.jnca.2012.05.010","volume":"36","author":"K Xue","year":"2013","unstructured":"Xue K, Ma C, Hong P, Ding R (2013) A temporal-credential-based mutual authentication and key agreement scheme for wireless sensor networks. J Netw Comput Appl 36(1):316\u2013 323","journal-title":"J Netw Comput Appl"},{"issue":"5","key":"404_CR29","doi-asserted-by":"crossref","first-page":"4767","DOI":"10.3390\/s110504767","volume":"11","author":"HL Yeh","year":"2011","unstructured":"Yeh HL, Chen TH, Liu PC, Kim TH, Wei HW (2011) A secured authentication protocol for wireless sensor networks using elliptic curves cryptography. Sensors 11(5):4767\u20134779","journal-title":"Sensors"},{"key":"404_CR30","doi-asserted-by":"crossref","unstructured":"Yoo SG, Park KY, Kim J (2012) A security-performance-balanced user authentication scheme for wireless sensor networks. Int J Distribu Sens Netw 2012, Article ID 382810","DOI":"10.1155\/2012\/382810"}],"container-title":["Peer-to-Peer Networking and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-015-0404-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s12083-015-0404-5\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-015-0404-5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-015-0404-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,30]],"date-time":"2019-08-30T02:24:34Z","timestamp":1567131874000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s12083-015-0404-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,9,5]]},"references-count":30,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2017,1]]}},"alternative-id":["404"],"URL":"https:\/\/doi.org\/10.1007\/s12083-015-0404-5","relation":{},"ISSN":["1936-6442","1936-6450"],"issn-type":[{"value":"1936-6442","type":"print"},{"value":"1936-6450","type":"electronic"}],"subject":[],"published":{"date-parts":[[2015,9,5]]}}}