{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,12,7]],"date-time":"2024-12-07T05:16:48Z","timestamp":1733548608011,"version":"3.30.1"},"reference-count":22,"publisher":"Tech Science Press","issue":"3","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["AUTOSOFT"],"published-print":{"date-parts":[[2018,9]]},"DOI":"10.31209\/2018.100000019","type":"journal-article","created":{"date-parts":[[2018,7,30]],"date-time":"2018-07-30T20:35:38Z","timestamp":1532982938000},"page":"519-529","source":"Crossref","is-referenced-by-count":1,"title":["A user authentication protocol combined with trust model, biometrics and ECC for wireless sensor networks"],"prefix":"10.32604","volume":"24","author":[{"given":"Tao","family":"Liu","sequence":"first","affiliation":[]},{"given":"Gan","family":"Huang","sequence":"additional","affiliation":[]}],"member":"17807","published-online":{"date-parts":[[2018]]},"reference":[{"issue":"5","key":"ref0","doi-asserted-by":"publisher","first-page":"521","DOI":"10.1023\/A:1016598314198","article-title":"SPINS: security protocols for sensor networks","volume":"8","author":"Perrig","year":"2002","unstructured":"Adrian Perrig, Robert Szewczyk, J. D. Tygar,et al., (2002). SPINS: security protocols for sensor networks, Journal Wireless Networks, 8(5):521-534.","journal-title":"Journal Wireless Networks"},{"key":"ref1","doi-asserted-by":"publisher","first-page":"233","DOI":"10.1098\/rspa.1989.0125","article-title":". A logic of authentication, Proceedings of the Royal Society of London A: Mathematical, Physical and Engineering Sciences","author":"Burrows","year":"1989","unstructured":"Burrows M, Abadi M, and Needham R M., (1989).  A logic of authentication, Proceedings of the Royal Society of London A: Mathematical, Physical and Engineering Sciences. The Royal Society, 426(1871): 233-271","journal-title":"The Royal Society 426(1871)"},{"issue":"6","key":"ref2","doi-asserted-by":"publisher","first-page":"10081","DOI":"10.3390\/s140610081","article-title":"Security enhanced user authentication protocol for wireless sensor networks using elliptic curves cryptography","volume":"14","author":"Choi","year":"2014","unstructured":"Choi Y, Lee D, Kim J, et al., (2014). Security enhanced user authentication protocol for wireless sensor networks using elliptic curves cryptography, Sensors, 14(6): 10081-10106.","journal-title":"Sensors (Basel)","ISSN":"https:\/\/id.crossref.org\/issn\/1424-8220","issn-type":"print"},{"issue":"8","key":"ref3","doi-asserted-by":"publisher","first-page":"1247","DOI":"10.1109\/JPROC.2003.814918","article-title":"Sensor networks: Evolution, opportunities and challenges","volume":"91","author":"Chong","year":"2003","unstructured":"Chong C Y & Kumar S, (2003).  Sensor networks: Evolution, opportunities and challenges, Proceedings of IEEE. 91(8), 1247-1256.","journal-title":"Proc IEEE","ISSN":"https:\/\/id.crossref.org\/issn\/0018-9219","issn-type":"print"},{"issue":"3","key":"ref4","first-page":"1086","article-title":"Two-factor user authentication in wireless sensor networks[J]. Wireless Communications","volume":"8","author":"Das","year":"2009","unstructured":"Das M L., (2009). Two-factor user authentication in wireless sensor networks[J]. Wireless Communications, IEEE Transactions on, 8(3): 1086-1090.","journal-title":"IEEE Transactions on"},{"issue":"2","key":"ref5","doi-asserted-by":"publisher","first-page":"243","DOI":"10.1016\/j.tcs.2005.05.020","article-title":"Ant colony optimization theory: A survey","volume":"344","author":"Dorigo","year":"2005","unstructured":"Dorigo M & Blum C., (2005). Ant colony optimization theory: A survey[J]. Theoretical computer science, 344(2): 243-278.","journal-title":"Theor Comput Sci","ISSN":"https:\/\/id.crossref.org\/issn\/0304-3975","issn-type":"print"},{"issue":"02","key":"ref6","first-page":"58","article-title":"The Principle and Application Research on Ant Colony Algorithm Based on Swarm Intelligence","volume":"28","author":"Feng","year":"2014","unstructured":"Feng Yue-hua & CHEN Zhou-ji, (2014). The Principle and Application Research on Ant Colony Algorithm Based on Swarm Intelligence[J].Journal of Lanzhou University of Arts and Science(Natural Sciences).28(02):58-62.","journal-title":"Journal of Lanzhou University of Arts and Science"},{"issue":"7","key":"ref7","first-page":"133","article-title":"Design and Analysis of New Authorization Schemein SaaSMode","volume":"37","author":"Han","year":"2011","unstructured":"Han Qiu-jun & DING Yue-Wei, (2011). Design and Analysis of New Authorization Schemein SaaSMode, Computer Engineering 37(7):133-135","journal-title":"Computer Engineering"},{"key":"ref8","first-page":"517","article-title":"An enhanced remote user authentication scheme providing mutual authentication and key agreement with Smart Cards, The 5th International Conference on Information Assurance and Security,  Xi'an: IEEE","volume":"2009","author":"Li","year":"2009","unstructured":"Li C T., (2009). An enhanced remote user authentication scheme providing mutual authentication and key agreement with Smart Cards, The 5th International Conference on Information Assurance and Security,  Xi'an: IEEE Computer Society, 2009: 517-520.","journal-title":"Comput Soc","ISSN":"https:\/\/id.crossref.org\/issn\/0095-2737","issn-type":"print"},{"unstructured":"Long Wei, (2015).  Research on Anonymous Identity Authentication Based on Biometrics[D], BEIJING JIAOTONG UNIVERSITY, 2015(4):2-13","key":"ref9"},{"key":"ref10","doi-asserted-by":"publisher","first-page":"71","DOI":"10.1109\/sahcn.2004.1381904","article-title":"A Public-key Infrastructure for Key Distribution in TinyOS based on Elliptic Curve Cryptography","volume-title":"Proceedings of the 1st IEEE International Conference on Sensor and Ad Hoc Communications and Networks","author":"Malan","year":"2004","unstructured":"Malan DJ,Welsh M, and Smith MD, et al., (2004).  A Public-key Infrastructure for Key Distribution in TinyOS based on Elliptic Curve Cryptography,Proceedings of the 1st IEEE International Conference on Sensor and Ad Hoc Communications and Networks, USA :IEEE Press, 2004:71-80."},{"issue":"2","key":"ref11","doi-asserted-by":"publisher","first-page":"163","DOI":"10.1007\/s11235-010-9281-7","article-title":"Providing trust in wireless sensor networks using a bio-inspired technique","volume":"46","author":"M\u00e1rmol","year":"2011","unstructured":"M\u00e1rmol F G & P\u00e9rez G M., (2011). Providing trust in wireless sensor networks using a bio-inspired technique[J]. Telecommunication systems, 46(2): 163-180.","journal-title":"Telecomm Syst","ISSN":"https:\/\/id.crossref.org\/issn\/1018-4864","issn-type":"print"},{"unstructured":"M\u00e1rmol F G & P\u00e9rez G M., (2009). TRMSim-WSN, trust and reputation models simulator for wireless sensor network, Communications, 2009. ICC'09. IEEE International Conference on. IEEE, 2009: 1-5.","key":"ref12"},{"issue":"7","key":"ref13","doi-asserted-by":"publisher","first-page":"385","DOI":"10.1155\/2013\/764064","article-title":"An improved trust model based on interactive ant algorithms and its applications in wireless sensor networks","author":"Pan","year":"2013","unstructured":"Pan Y, Yu Y, and Yan L., (2013). An improved trust model based on interactive ant algorithms and its applications in wireless sensor networks[J]. International Journal of Distributed Sensor Networks, 2013(7):385-388.","journal-title":"Int J Distrib Sensor Netw","ISSN":"https:\/\/id.crossref.org\/issn\/1550-1329","issn-type":"print"},{"issue":"7","key":"ref14","first-page":"1300","article-title":"Design and Logical Analysis of Security Protocols","volume":"14","author":"Qing","year":"2003","unstructured":"Qing Si-han., (2003). Design and Logical Analysis of Security Protocols, Journal of Software, 14(7):1300-1309","journal-title":"J Softw","ISSN":"https:\/\/id.crossref.org\/issn\/1000-9825","issn-type":"print"},{"issue":"1","key":"ref15","doi-asserted-by":"publisher","first-page":"650","DOI":"10.3390\/s120100650","article-title":"Multipath routing in wireless sensor networks: survey and research challenges","volume":"12","author":"Radi","year":"2012","unstructured":"Radi M, Dezfouli B, Bakar K A, et al., (2012). Multipath routing in wireless sensor networks: survey and research challenges, Sensors, 2012, 12(1): 650-685.","journal-title":"Sensors (Basel)","ISSN":"https:\/\/id.crossref.org\/issn\/1424-8220","issn-type":"print"},{"unstructured":"Syverson Paul F. & Oorschot Paul C.van, (1994).  On Unifying Some Cryptographic Protocol Logics[C].Proceedings of the 1994 IEEE Computer Society Symposium on Security and Privacy. Oakland, USA: IEEE Computer Society Press, 1994. pp:14-28","key":"ref16"},{"key":"ref17","doi-asserted-by":"publisher","first-page":"59","DOI":"10.1145\/1029102.1029113","article-title":"TinyPK: securing sensor networks with public key technology","volume-title":"Proceedings of the 2nd ACM workshop on Security of ad hoc and sensor networks","author":"Watro","year":"2004","unstructured":"Watro R, Kong D, Cuti S, et al., (2004).  TinyPK: securing sensor networks with public key technology, Proceedings of the 2nd ACM workshop on Security of ad hoc and sensor networks. ACM, 2004: 59-64."},{"unstructured":"Wong K H M, Zheng Y, Cao J, et al., (2006).  A dynamic user authentication scheme for wireless sensor networks, Sensor Networks, Ubiquitous, and Trustworthy Computing, IEEE International Conference on. 2006: 1- 8.","key":"ref18"},{"issue":"1","key":"ref19","doi-asserted-by":"publisher","first-page":"316","DOI":"10.1016\/j.jnca.2012.05.010","article-title":"A temporal-credential-based mutual authentication and key agreement scheme for wireless sensor networks","volume":"36","author":"Xue","year":"2013","unstructured":"Xue K, Ma C, Hong P, et al., (2013). A temporal-credential-based mutual authentication and key agreement scheme for wireless sensor networks, Journal of Network & Computer Applications, 36(1):316-323.","journal-title":"J Netw Comput Appl","ISSN":"https:\/\/id.crossref.org\/issn\/1084-8045","issn-type":"print"},{"issue":"5","key":"ref20","doi-asserted-by":"publisher","first-page":"4767","DOI":"10.3390\/s110504767","article-title":"A secured authentication protocol for wireless sensor networks using elliptic curves cryptography","volume":"11","author":"Yeh","year":"2011","unstructured":"Yeh H L, Chen T H, Liu P C, et al., (2011). A secured authentication protocol for wireless sensor networks using elliptic curves cryptography, Sensors, 11(5): 4767-4779.","journal-title":"Sensors (Basel)","ISSN":"https:\/\/id.crossref.org\/issn\/1424-8220","issn-type":"print"},{"issue":"3","key":"ref21","doi-asserted-by":"publisher","first-page":"272","DOI":"10.1007\/s11859-010-0318-2","article-title":"A Biometric-Based User Authentication for Wireless Sensor Networks","volume":"15","author":"Yuan","year":"2010","unstructured":"Yuan Jianjun, Jiang Changjun, Jiang Zuowen, et al., (2010). A Biometric-Based User Authentication for Wireless Sensor Networks, WuHan University Journal of Natural Sciences, 15 (3): 272-276","journal-title":"WuHan University Journal of Natural Sciences"}],"container-title":["Intelligent Automation and Soft Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.techscience.com\/uploads\/attached\/file\/20200810\/20200810011754_27685.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,12,6]],"date-time":"2024-12-06T18:27:01Z","timestamp":1733509621000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.techscience.com\/iasc\/v24n3\/39777"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"references-count":22,"journal-issue":{"issue":"3","published-online":{"date-parts":[[2018,9]]},"published-print":{"date-parts":[[2018,9]]}},"URL":"https:\/\/doi.org\/10.31209\/2018.100000019","relation":{},"ISSN":["1079-8587","2326-005X"],"issn-type":[{"type":"print","value":"1079-8587"},{"type":"electronic","value":"2326-005X"}],"subject":[],"published":{"date-parts":[[2018]]}}}