{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,6,10]],"date-time":"2024-06-10T12:00:48Z","timestamp":1718020848591},"reference-count":26,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2015,4,9]],"date-time":"2015-04-09T00:00:00Z","timestamp":1428537600000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Cloud Comp"],"published-print":{"date-parts":[[2015,12]]},"DOI":"10.1186\/s13677-015-0030-z","type":"journal-article","created":{"date-parts":[[2015,4,8]],"date-time":"2015-04-08T04:51:50Z","timestamp":1428468710000},"update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":15,"title":["A secure user authentication protocol for sensor network in data capturing"],"prefix":"10.1186","volume":"4","author":[{"given":"Zhou","family":"Quan","sequence":"first","affiliation":[]},{"given":"Tang","family":"Chunming","sequence":"additional","affiliation":[]},{"given":"Zhen","family":"Xianghan","sequence":"additional","affiliation":[]},{"given":"Rong","family":"Chunming","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,4,9]]},"reference":[{"key":"30_CR1","volume-title":"The rise of big data: how It\u2019s changing the way we think about the world. Fortuna\u2019s Corner in cloud computing, Cybersecurity, Dow, Intelligence Community, Internet, Markets, national security, S & P, Uncategorized, US Military, April 24, 2013","author":"NC Kenneth","year":"2013","unstructured":"Kenneth NC, Viktor MS: The rise of big data: how It\u2019s changing the way we think about the world. Fortuna\u2019s Corner in cloud computing, Cybersecurity, Dow, Intelligence Community, Internet, Markets, national security, S & P, Uncategorized, US Military, April 24, 2013. 2013."},{"key":"30_CR2","doi-asserted-by":"crossref","unstructured":"Sastry N, Wagner D (2004) Security considerations for IEEE 802.15.4 networks. In Proceedings of the ACM Workshop on Wireless Security (WiSe\u201904). 32\u201342 Sastry N, Wagner D (2004) Security considerations for IEEE 802.15.4 networks. In Proceedings of the ACM Workshop on Wireless Security (WiSe\u201904). 32\u201342","DOI":"10.1145\/1023646.1023654"},{"key":"30_CR3","volume-title":"IEEE Standards for 802.15.4, Part 15, Amendment 4. Wireless medium access control and physical layer specifications for low-rate wireless personal area networks","author":"WG802.15","year":"2003","unstructured":"WG802.15:IEEE Standards for 802.15.4, Part 15, Amendment 4. Wireless medium access control and physical layer specifications for low-rate wireless personal area networks. IEEE, Washington, DC, USA; 2003."},{"issue":"2","key":"30_CR4","doi-asserted-by":"crossref","first-page":"629","DOI":"10.1109\/TCE.2004.1309441","volume":"50","author":"ML Das","year":"2004","unstructured":"Das ML, Saxena A, Gulati VP: A dynamic ID-based remote user authentication scheme. IEEE Trans Consum Electron 2004, 50(2):629\u201331. 10.1109\/TCE.2004.1309441","journal-title":"IEEE Trans Consum Electron"},{"issue":"4","key":"30_CR5","doi-asserted-by":"crossref","first-page":"1243","DOI":"10.1109\/TCE.2003.1261224","volume":"49","author":"KC Leung","year":"2003","unstructured":"Leung KC, Cheng LM, Fong AS, Chan CK: Cryptanalysis of a modified remote user authentication scheme using smart cards. IEEE Trans Consum Electron 2003, 49(4):1243\u20135. 10.1109\/TCE.2003.1261224","journal-title":"IEEE Trans Consum Electron"},{"key":"30_CR6","doi-asserted-by":"crossref","unstructured":"Watro R, Kong D, Cuti S F, Gardiner C, Lynn C, Kruus P (2004) TinyPK: securing sensor networks with public key technology. In Proceedings of the ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN\u201904), 59\u201364 Watro R, Kong D, Cuti S F, Gardiner C, Lynn C, Kruus P (2004) TinyPK: securing sensor networks with public key technology. In Proceedings of the ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN\u201904), 59\u201364","DOI":"10.1145\/1029102.1029113"},{"key":"30_CR7","unstructured":"Benenson Z, Gedicke N, Raivio O (2005) Realizing robust user authentication in sensor networks. In Real-World Wireless Sensor Networks (REALWSN), 14 Benenson Z, Gedicke N, Raivio O (2005) Realizing robust user authentication in sensor networks. In Real-World Wireless Sensor Networks (REALWSN), 14"},{"key":"30_CR8","doi-asserted-by":"crossref","unstructured":"Wong KHM, Yuan Z, Jiannong C, Shengwei W (2006) A dynamic user authentication scheme for wireless sensor networks. In Proceedings of the IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing, 244\u2013251 Wong KHM, Yuan Z, Jiannong C, Shengwei W (2006) A dynamic user authentication scheme for wireless sensor networks. In Proceedings of the IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing, 244-251","DOI":"10.1109\/SUTC.2006.1636182"},{"key":"30_CR9","doi-asserted-by":"crossref","unstructured":"Tseng HR, Jan RH, Yang W (2007) An improved dynamic user authentication scheme for wireless sensor networks. In Proceedings of the 50th Annual IEEE Global Telecommunications Conference (GLOBECOM\u201907), 986\u2013990 Tseng HR, Jan RH, Yang W (2007) An improved dynamic user authentication scheme for wireless sensor networks. In Proceedings of the 50th Annual IEEE Global Telecommunications Conference (GLOBECOM\u201907), 986\u2013990","DOI":"10.1109\/GLOCOM.2007.190"},{"issue":"3","key":"30_CR10","doi-asserted-by":"crossref","first-page":"1086","DOI":"10.1109\/TWC.2008.080128","volume":"8","author":"ML Das","year":"2009","unstructured":"Das ML: Two-factor user authentication in wireless sensor networks. IEEE Trans Wirel Commun 2009, 8(3):1086\u201390. 10.1109\/TWC.2008.080128","journal-title":"IEEE Trans Wirel Commun"},{"key":"30_CR11","doi-asserted-by":"crossref","unstructured":"Ko KC (2008) A novel dynamic user authentication scheme for wireless sensor networks. In Proceedings of the IEEE International Symposium on Wireless Communication Systems, ISWCS\u201908, 608\u2013612 Ko KC (2008) A novel dynamic user authentication scheme for wireless sensor networks. In Proceedings of the IEEE International Symposium on Wireless Communication Systems, ISWCS\u201908, 608\u2013612","DOI":"10.1109\/ISWCS.2008.4726128"},{"key":"30_CR12","unstructured":"Nyang DH, Lee MK (2009) Improvement of Das\u2019s two-factor authentication protocol in wireless sensor networks. Available via DIALOG. . Accessed 15 Jan 2014. http:\/\/eprint.iacr.org\/2009\/631.pdf Nyang DH, Lee MK (2009) Improvement of Das\u2019s two-factor authentication protocol in wireless sensor networks. Available via DIALOG. . Accessed 15 Jan 2014."},{"issue":"9\u201310","key":"30_CR13","doi-asserted-by":"crossref","first-page":"1201","DOI":"10.1002\/dac.1097","volume":"23","author":"B Vaidya","year":"2010","unstructured":"Vaidya B, Rodrigues JJ, Park JH: User authentication schemes with pseudonymity for ubiquitous sensor network in NGN. Int J Communication Syst 2010, 23(9\u201310):1201\u201322. 10.1002\/dac.1097","journal-title":"Int J Communication Syst"},{"issue":"3","key":"30_CR14","doi-asserted-by":"crossref","first-page":"2450","DOI":"10.3390\/s100302450","volume":"10","author":"MK Khan","year":"2010","unstructured":"Khan MK, Alghathbar K: Cryptanalysis and security improvements of \u2018two-factor user authentication in wireless sensor networks\u2019. Sensors 2010, 10(3):2450\u20139. 10.3390\/s100302450","journal-title":"Sensors"},{"key":"30_CR15","doi-asserted-by":"crossref","unstructured":"Khan MK, Alghathbar K (2010), Security Analysis of Two-Factor Authentication In Wireless Sensor Networks. In Proceedings of Advances in Computer Science and Information Technology: AST\/UCMA\/ISA\/ACN 2010 Conferences, 55\u201360 Khan MK, Alghathbar K (2010), Security Analysis of Two-Factor Authentication In Wireless Sensor Networks. In Proceedings of Advances in Computer Science and Information Technology: AST\/UCMA\/ISA\/ACN 2010 Conferences, 55\u201360","DOI":"10.1007\/978-3-642-13577-4_5"},{"issue":"5","key":"30_CR16","doi-asserted-by":"crossref","first-page":"704","DOI":"10.4218\/etrij.10.1510.0134","volume":"32","author":"TH Chen","year":"2010","unstructured":"Chen TH, Shih WK: A robust mutual authentication protocol for wireless sensor networks. ETRI J 2010, 32(5):704\u201312. 10.4218\/etrij.10.1510.0134","journal-title":"ETRI J"},{"issue":"5","key":"30_CR17","doi-asserted-by":"crossref","first-page":"4767","DOI":"10.3390\/s110504767","volume":"11","author":"HL Yeh","year":"2011","unstructured":"Yeh HL, Chen TH, Liu PC, Kim TH, Wei HW: A secured authentication protocol for wireless sensor networks using elliptic curves cryptography. Sensors 2011, 11(5):4767\u201379. 10.3390\/s110504767","journal-title":"Sensors"},{"key":"30_CR18","unstructured":"Han W (2013), Weakness of a secured authentication protocol for wireless sensor networks using elliptic curves cryptography. Available via DIALOG. . Accessed 15 May 2014. http:\/\/eprint.iacr.org\/2011\/293 Han W (2013), Weakness of a secured authentication protocol for wireless sensor networks using elliptic curves cryptography. Available via DIALOG. . Accessed 15 May 2014."},{"issue":"3","key":"30_CR19","doi-asserted-by":"crossref","first-page":"272","DOI":"10.1007\/s11859-010-0318-2","volume":"15","author":"J Yuan","year":"2010","unstructured":"Yuan J, Jiang C, Jiang Z: A biometric-based user authentication for wireless sensor networks. Wuhan Univ J Nat Sci 2010, 15(3):272\u20136. 10.1007\/s11859-010-0318-2","journal-title":"Wuhan Univ J Nat Sci"},{"key":"30_CR20","doi-asserted-by":"crossref","unstructured":"Yoon EJ, Yoo K Y(2011) A new biometric-based user authentication scheme without using password for wireless sensor networks. In Proceedings of the 20th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises, 279\u2013284 Yoon EJ, Yoo K Y(2011) A new biometric-based user authentication scheme without using password for wireless sensor networks. In Proceedings of the 20th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises, 279\u2013284","DOI":"10.1109\/WETICE.2011.47"},{"key":"30_CR21","first-page":"1","volume":"4","author":"A Ohood","year":"2013","unstructured":"Ohood A, Mznah AR, Abdullah AD: An efficient biometric authentication protocol for wireless sensor networks. Int J Distributed Sensor Networks 2013, 4: 1\u201313.","journal-title":"Int J Distributed Sensor Networks"},{"key":"30_CR22","first-page":"1","volume":"3","author":"S Wenbo","year":"2013","unstructured":"Wenbo S, Peng G: A new user authentication protocol for wireless sensor networks using elliptic curves cryptography. Int J Distrib Sens Netw 2013, 3: 1\u20137.","journal-title":"Int J Distrib Sens Netw"},{"key":"30_CR23","volume-title":"Trusted transmission model of wireless sensor networks","author":"Z Quan","year":"2011","unstructured":"Quan Z: Trusted transmission model of wireless sensor networks. South China Agricultural University, China; 2011."},{"key":"30_CR24","unstructured":"Quan Z, Gui F, Deqin X, Jiuhao L (2010) trusted transport model based cluster-merkle-tree for WSNs. in Processing of 2010 IEEE International Conference on Computer Application and System Modeling V1, 564 -568 Quan Z, Gui F, Deqin X, Jiuhao L (2010) trusted transport model based cluster-merkle-tree for WSNs. in Processing of 2010 IEEE International Conference on Computer Application and System Modeling V1, 564 -568"},{"key":"30_CR25","unstructured":"Quan Z, GUI F, Deqin X, Yi T (2012) Trusted architecture for farmland WSNs. in Processing of 2012 Forth IEEE International Conference on Cloud Computing Technology and Science, 782\u2013787 Quan Z, GUI F, Deqin X, Yi T (2012) Trusted architecture for farmland WSNs. in Processing of 2012 Forth IEEE International Conference on Cloud Computing Technology and Science, 782\u2013787"},{"key":"30_CR26","doi-asserted-by":"crossref","first-page":"213","DOI":"10.1007\/3-540-44647-8_13","volume":"2139","author":"D Boneh","year":"2001","unstructured":"Boneh D, Franklin M: Identity based encryption from the Weil pairing. in processing of Advances in Cryptology. Lect Notes Computer Sci 2001, 2139: 213\u201329. 10.1007\/3-540-44647-8_13","journal-title":"Lect Notes Computer Sci"}],"container-title":["Journal of Cloud Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1186\/s13677-015-0030-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1186\/s13677-015-0030-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1186\/s13677-015-0030-z","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,4]],"date-time":"2022-05-04T15:21:51Z","timestamp":1651677711000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.journalofcloudcomputing.com\/content\/4\/1\/6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,4,9]]},"references-count":26,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2015,12]]}},"alternative-id":["30"],"URL":"https:\/\/doi.org\/10.1186\/s13677-015-0030-z","relation":{},"ISSN":["2192-113X"],"issn-type":[{"value":"2192-113X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2015,4,9]]},"article-number":"6"}}