{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,27]],"date-time":"2026-03-27T09:36:40Z","timestamp":1774604200781,"version":"3.50.1"},"reference-count":40,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2016,8,3]],"date-time":"2016-08-03T00:00:00Z","timestamp":1470182400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Peer-to-Peer Netw. Appl."],"published-print":{"date-parts":[[2018,1]]},"DOI":"10.1007\/s12083-016-0485-9","type":"journal-article","created":{"date-parts":[[2016,8,3]],"date-time":"2016-08-03T03:54:54Z","timestamp":1470196494000},"page":"1-20","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":82,"title":["An improved and provably secure three-factor user authentication scheme for wireless sensor networks"],"prefix":"10.1007","volume":"11","author":[{"given":"Fan","family":"Wu","sequence":"first","affiliation":[]},{"given":"Lili","family":"Xu","sequence":"additional","affiliation":[]},{"given":"Saru","family":"Kumari","sequence":"additional","affiliation":[]},{"given":"Xiong","family":"Li","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,8,3]]},"reference":[{"key":"485_CR1","doi-asserted-by":"crossref","unstructured":"Abdalla M, Izabachene M, Pointcheval D (2008) Anonymous and transparent gateway-based password-authenticated key exchange. Springer, pp 133\u2013148","DOI":"10.1007\/978-3-540-89641-8_10"},{"key":"485_CR2","doi-asserted-by":"crossref","unstructured":"Althobaiti O, Al-Rodhaan M, Al-Dhelaan A (2013) An efficient biometric authentication protocol for wireless sensor networks. Int J Distrib Sensor Netw 2013","DOI":"10.1155\/2013\/407971"},{"key":"485_CR3","unstructured":"Blanchet B, Allamigeon X, Smyth B Online demo for proverif. \nhttp:\/\/proverif.rocq.inria.fr\/index.php"},{"key":"485_CR4","doi-asserted-by":"crossref","unstructured":"Bresson E, Chevassut O, Pointcheval D (2003) Security proofs for an efficient password-based key exchange. In: Proceedings of the 10th ACM conference on computer and communications security. ACM, pp 241\u2013250","DOI":"10.1145\/948109.948142"},{"issue":"5","key":"485_CR5","doi-asserted-by":"crossref","first-page":"704","DOI":"10.4218\/etrij.10.1510.0134","volume":"32","author":"TH Chen","year":"2010","unstructured":"Chen T H, Shih W K (2010) A robust mutual authentication protocol for wireless sensor networks. Etri J 32(5):704\u2013712","journal-title":"Etri J"},{"key":"485_CR6","doi-asserted-by":"crossref","unstructured":"Das A K (2014) Cryptanalysis of an efficient biometric authentication protocol for wireless sensor networks. Springer, pp 1\u20139","DOI":"10.1007\/978-3-662-44966-0_1"},{"key":"485_CR7","doi-asserted-by":"publisher","unstructured":"Das AK (2014) A secure and robust temporal credential-based three-factor user authentication scheme for wireless sensor networks. In: Peer-to-Peer Netw Appl, pp 1\u201322. doi:\n10.1007\/s12083-014-0324-9","DOI":"10.1007\/s12083-014-0324-9"},{"key":"485_CR8","doi-asserted-by":"publisher","unstructured":"Das AK (2015) A secure and effective biometric-based user authentication scheme for wireless sensor networks using smart card and fuzzy extractor. Int J Commun Syst. doi:\n10.1002\/dac.2933","DOI":"10.1002\/dac.2933"},{"key":"485_CR9","doi-asserted-by":"publisher","unstructured":"Das AK (2015) A secure and efficient user anonymity-preserving three-factor authentication protocol for large-scale distributed wireless sensor networks. In: Wirel Pers Commun, pp 1\u201328. doi:\n10.1007\/s11277-015-2288-3","DOI":"10.1007\/s11277-015-2288-3"},{"issue":"3","key":"485_CR10","doi-asserted-by":"crossref","first-page":"1086","DOI":"10.1109\/TWC.2008.080128","volume":"8","author":"ML Das","year":"2009","unstructured":"Das M L (2009) Two-factor user authentication in wireless sensor networks. IEEE T Wirel Commun 8 (3):1086\u20131090","journal-title":"IEEE T Wirel Commun"},{"key":"485_CR11","doi-asserted-by":"crossref","unstructured":"Dodis Y, Reyzin L, Smith A (2004) Fuzzy extractors: How to generate strong keys from biometrics and other noisy data. In: Advances in cryptology-Eurocrypt 2004. Springer, pp 523\u2013540","DOI":"10.1007\/978-3-540-24676-3_31"},{"issue":"2","key":"485_CR12","doi-asserted-by":"crossref","first-page":"198","DOI":"10.1109\/TIT.1983.1056650","volume":"29","author":"D Dolev","year":"1983","unstructured":"Dolev D, Yao A C (1983) On the security of public key protocols. IEEE T Inform Theory 29(2):198\u2013208","journal-title":"IEEE T Inform Theory"},{"issue":"4","key":"485_CR13","doi-asserted-by":"crossref","first-page":"933","DOI":"10.1109\/TIFS.2009.2031942","volume":"4","author":"CI Fan","year":"2009","unstructured":"Fan C I, Lin Y H (2009) Provably secure remote truly three-factor authentication scheme with privacy protection on biometrics. IEEE T Inform Forensics Secur 4(4):933\u2013945","journal-title":"IEEE T Inform Forensics Secur"},{"issue":"6","key":"485_CR14","first-page":"929","volume":"15","author":"P Guo","year":"2014","unstructured":"Guo P, Wang J, Geng X H, Kim C S, Kim J U (2014) A variable threshold-value authentication architecture for wireless mesh networks. J. Int. Technol. 15(6):929\u2013935","journal-title":"J. Int. Technol."},{"issue":"4","key":"485_CR15","first-page":"361","volume":"10","author":"D He","year":"2010","unstructured":"He D, Gao Y, Chan S, Chen C, Bu J (2010) An enhanced two-factor user authentication scheme in wireless sensor networks. Ad Hoc & Sensor Wirel Netw 10(4):361\u2013371","journal-title":"Ad Hoc & Sensor Wirel Netw"},{"key":"485_CR16","doi-asserted-by":"publisher","unstructured":"Jiang Q, Ma J, Lu X, Tian Y (2014) An efficient two-factor user authentication scheme with unlinkability for wireless sensor networks. Peer-to-Peer Netw Appl:1\u201312. doi:\n10.1007\/s12083-014-0285-z","DOI":"10.1007\/s12083-014-0285-z"},{"key":"485_CR17","doi-asserted-by":"crossref","unstructured":"Kang H, Hori Y, Katashita T, Hagiwara M, Iwamura K (2014) Cryptographie key generation from puf data using efficient fuzzy extractors. In: 2014 16th International conference on advanced communication technology (ICACT). IEEE, pp 23\u201326","DOI":"10.1109\/ICACT.2014.6778915"},{"issue":"3","key":"485_CR18","doi-asserted-by":"crossref","first-page":"2450","DOI":"10.3390\/s100302450","volume":"10","author":"MK Khan","year":"2010","unstructured":"Khan M K, Alghathbar K (2010) Cryptanalysis and security improvements of \u2019two-factor user authentication in wireless sensor networks\u2019. Sensors 10(3):2450\u20132459","journal-title":"Sensors"},{"key":"485_CR19","doi-asserted-by":"crossref","unstructured":"Kocher P, Jaffe J, Jun B (1999) Differential power analysis. In: Advances in cryptology-CRYPTO 99. Springer, pp 388\u2013397","DOI":"10.1007\/3-540-48405-1_25"},{"key":"485_CR20","doi-asserted-by":"crossref","unstructured":"Kumar P, Lee H J (2011) Cryptanalysis on two user authentication protocols using smart card for wireless sensor networks. In: Wireless advanced (WiAd), 2011. IEEE, pp 241\u2013245","DOI":"10.1109\/WiAd.2011.5983262"},{"issue":"12","key":"485_CR21","doi-asserted-by":"crossref","first-page":"554","DOI":"10.1049\/el:20020380","volume":"38","author":"J Lee","year":"2002","unstructured":"Lee J, Ryu S, Yoo K (2002) Fingerprint-based remote user authentication scheme using smart cards. Electron Lett 38(12):554\u2013555","journal-title":"Electron Lett"},{"issue":"1","key":"485_CR22","doi-asserted-by":"crossref","first-page":"85","DOI":"10.1016\/j.mcm.2012.06.033","volume":"58","author":"X Li","year":"2013","unstructured":"Li X, Ma J, Wang W, Xiong Y, Zhang J (2013) A novel smart card and dynamic id based remote user authentication scheme for multi-server environments. Math Comput Modell 58(1): 85\u201395","journal-title":"Math Comput Modell"},{"issue":"5","key":"485_CR23","doi-asserted-by":"crossref","first-page":"1365","DOI":"10.1016\/j.jnca.2013.02.034","volume":"36","author":"X Li","year":"2013","unstructured":"Li X, Niu J, Khan M K, Liao J (2013) An enhanced smart card based remote user password authentication scheme. J Netw Comput Appl 36(5):1365\u20131371","journal-title":"J Netw Comput Appl"},{"issue":"1","key":"485_CR24","doi-asserted-by":"crossref","first-page":"73","DOI":"10.1016\/j.jnca.2010.09.003","volume":"34","author":"X Li","year":"2011","unstructured":"Li X, Niu J W, Ma J, Wang W D, Liu C L (2011) Cryptanalysis and improvement of a biometrics-based remote user authentication scheme using smart cards. J Netw Comput Appl 34(1):73\u201379","journal-title":"J Netw Comput Appl"},{"issue":"2","key":"485_CR25","doi-asserted-by":"crossref","first-page":"763","DOI":"10.1016\/j.jnca.2011.11.009","volume":"35","author":"X Li","year":"2012","unstructured":"Li X, Xiong Y, Ma J, Wang W (2012) An efficient and security dynamic identity based authentication protocol for multi-server architecture using smart cards. J Netw Comput Appl 35(2):763\u2013769","journal-title":"J Netw Comput Appl"},{"key":"485_CR26","doi-asserted-by":"publisher","unstructured":"Liu Z, Wenger E, Gro \u03b2 sch\u00e4 dl J (2014) Mote-ecc: Energy-scalable elliptic curve cryptography for wireless-sensor-networks. In: Boureanu I, Owesarski P, Vaudenay S (eds) Applied cryptography and network security, lecture notes in computer science, vol 8479. Springer International Publishing, pp 361\u2013379, DOI \n10.1007\/978-3-319-07536-5_22","DOI":"10.1007\/978-3-319-07536-5_22"},{"issue":"2","key":"485_CR27","doi-asserted-by":"crossref","first-page":"100","DOI":"10.1049\/iet-ifs.2010.0096","volume":"5","author":"S Mangard","year":"2011","unstructured":"Mangard S, Oswald E, Standaert F X (2011) One for all call for one: Unifying standard differential power analysis attacks. IET Inform Secur 5(2):100\u2013110","journal-title":"IET Inform Secur"},{"issue":"5","key":"485_CR28","doi-asserted-by":"crossref","first-page":"541","DOI":"10.1109\/TC.2002.1004593","volume":"51","author":"TS Messerges","year":"2002","unstructured":"Messerges T S, Dabbish E A, Sloan R H (2002) Examining smart-card security under the threat of power analysis attacks. IEEE T Comput 51(5):541\u2013552","journal-title":"IEEE T Comput"},{"key":"485_CR29","doi-asserted-by":"crossref","unstructured":"Pointcheval D, Zimmer S (2008) Multi-factor authenticated key exchange. In: Applied cryptography and network security. Springer, pp 277\u2013295","DOI":"10.1007\/978-3-540-68914-0_17"},{"key":"485_CR30","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.adhoc.2014.03.003","volume":"20","author":"D Wang","year":"2014","unstructured":"Wang D, Wang P (2014) Understanding security failures of two-factor authentication schemes for real-time applications in hierarchical wireless sensor networks. Ad Hoc Netw 20:1\u201315","journal-title":"Ad Hoc Netw"},{"key":"485_CR31","doi-asserted-by":"crossref","unstructured":"Watro R, Kong D, Cuti Sf, Gardiner C, Lynn C, Kruus P (2004) Tinypk: Securing sensor networks with public key technology. In: Proceedings of the 2nd ACM workshop on Security of ad hoc and sensor networks. ACM, pp 59\u201364","DOI":"10.1145\/1029102.1029113"},{"key":"485_CR32","doi-asserted-by":"publisher","unstructured":"Wu F, Xu L (2013) Security analysis and improvement of a privacy authentication scheme for telecare medical information systems. J Med Syst 37(4). doi:\n10.1007\/s10916-013-9958-z","DOI":"10.1007\/s10916-013-9958-z"},{"key":"485_CR33","doi-asserted-by":"publisher","unstructured":"Wu F, Xu L, Kumari S, Li X (2015) A new and secure authentication scheme for wireless sensor networks with formal proof. Peer-to-Peer Netw Appl. doi:\n10.1007\/s12083-015-0404-5","DOI":"10.1007\/s12083-015-0404-5"},{"key":"485_CR34","doi-asserted-by":"crossref","first-page":"274","DOI":"10.1016\/j.compeleceng.2015.02.015","volume":"45","author":"F Wu","year":"2015","unstructured":"Wu F, Xu L, Kumari S, Li X (2015) A novel and provably secure biometrics-based three-factor remote authentication scheme for mobile client\u2013server networks. Comput Electr Eng 45:274\u2013285","journal-title":"Comput Electr Eng"},{"key":"485_CR35","doi-asserted-by":"publisher","unstructured":"Xu L, Wu F (2014) Cryptanalysis and improvement of a user authentication scheme preserving uniqueness and anonymity for connected health care. J Med Syst.\n10.1007\/s10916-014-0179-x","DOI":"10.1007\/s10916-014-0179-x"},{"issue":"2","key":"485_CR36","doi-asserted-by":"publisher","first-page":"245","DOI":"10.1002\/sec.977","volume":"8","author":"L Xu","year":"2015","unstructured":"Xu L, Wu F (2015) An improved and provable remote user authentication scheme based on elliptic curve cryptosystem with user anonymity. Secur Commun Netw 8(2):245\u2013260. doi:\n10.1002\/sec.977","journal-title":"Secur Commun Netw"},{"issue":"1","key":"485_CR37","doi-asserted-by":"crossref","first-page":"316","DOI":"10.1016\/j.jnca.2012.05.010","volume":"36","author":"K Xue","year":"2013","unstructured":"Xue K, Ma C, Hong P, Ding R (2013) A temporal-credential-based mutual authentication and key agreement scheme for wireless sensor networks. J Netw Comput Appl 36(1):316\u2013323","journal-title":"J Netw Comput Appl"},{"issue":"5","key":"485_CR38","doi-asserted-by":"crossref","first-page":"4767","DOI":"10.3390\/s110504767","volume":"11","author":"HL Yeh","year":"2011","unstructured":"Yeh H L, Chen T H, Liu P C, Kim T H, Wei H W (2011) A secured authentication protocol for wireless sensor networks using elliptic curves cryptography. Sensors 11(5):4767\u20134779","journal-title":"Sensors"},{"key":"485_CR39","unstructured":"Yoon E J, Yoo K Y (2011) A new biometric-based user authentication scheme without using password for wireless sensor networks. In: 2011 20th IEEE international workshops on enabling technologies: Infrastructure for collaborative enterprises (WETICE). IEEE, pp 279\u2013284"},{"issue":"3","key":"485_CR40","doi-asserted-by":"crossref","first-page":"272","DOI":"10.1007\/s11859-010-0318-2","volume":"15","author":"J Yuan","year":"2010","unstructured":"Yuan J, Jiang C, Jiang Z (2010) A biometric-based user authentication for wireless sensor networks. Wuhan Univ J Nat Sci 15(3):272\u2013276","journal-title":"Wuhan Univ J Nat Sci"}],"container-title":["Peer-to-Peer Networking and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s12083-016-0485-9\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-016-0485-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-016-0485-9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-016-0485-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2018,1,30]],"date-time":"2018-01-30T07:09:39Z","timestamp":1517296179000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s12083-016-0485-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,8,3]]},"references-count":40,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2018,1]]}},"alternative-id":["485"],"URL":"https:\/\/doi.org\/10.1007\/s12083-016-0485-9","relation":{},"ISSN":["1936-6442","1936-6450"],"issn-type":[{"value":"1936-6442","type":"print"},{"value":"1936-6450","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016,8,3]]}}}