{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,28]],"date-time":"2026-01-28T00:19:35Z","timestamp":1769559575297,"version":"3.49.0"},"reference-count":27,"publisher":"MDPI AG","issue":"8","license":[{"start":{"date-parts":[[2013,7,24]],"date-time":"2013-07-24T00:00:00Z","timestamp":1374624000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/3.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Sensors"],"abstract":"<jats:p>Wireless sensor networks (WSNs) can be quickly and randomly deployed in any harsh and unattended environment and only authorized users are allowed to access reliable sensor nodes in WSNs with the aid of gateways (GWNs). Secure authentication models among the users, the sensor nodes and GWN are important research issues for ensuring communication security and data privacy in WSNs. In 2013, Xue et al. proposed a  temporal-credential-based mutual authentication and key agreement scheme for WSNs. However, in this paper, we point out that Xue et al.\u2019s scheme cannot resist stolen-verifier, insider, off-line password guessing, smart card lost problem and many logged-in users\u2019 attacks and these security weaknesses make the scheme inapplicable to practical WSN applications. To tackle these problems, we suggest a simple countermeasure to prevent proposed attacks while the other merits of Xue et al.\u2019s authentication scheme are  left unchanged.<\/jats:p>","DOI":"10.3390\/s130809589","type":"journal-article","created":{"date-parts":[[2013,7,24]],"date-time":"2013-07-24T18:32:09Z","timestamp":1374690729000},"page":"9589-9603","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":120,"title":["An Advanced Temporal Credential-Based Security Scheme  with Mutual Authentication and Key Agreement for Wireless Sensor Networks"],"prefix":"10.3390","volume":"13","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-0637-5666","authenticated-orcid":false,"given":"Chun-Ta","family":"Li","sequence":"first","affiliation":[{"name":"Department of Information Management, Tainan University of Technology, 529 Zhongzheng Road, Tainan City 71002, Taiwan"}]},{"given":"Chi-Yao","family":"Weng","sequence":"additional","affiliation":[{"name":"Department of Computer Science, National Tsing Hua University, 101 Kuang-Fu Road,  Hsinchu City 30013, Taiwan"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8918-1703","authenticated-orcid":false,"given":"Cheng-Chi","family":"Lee","sequence":"additional","affiliation":[{"name":"Department of Library and Information Science, Fu Jen Catholic University, 510 Jhongjheng Road, Sinjhuang Dist., New Taipei City 24205, Taiwan"},{"name":"Department of Photonics and Communication Engineering, Asia University, 500 Lioufeng Road, Taichung City 41354, Taiwan"}]}],"member":"1968","published-online":{"date-parts":[[2013,7,24]]},"reference":[{"key":"ref_1","first-page":"50","article-title":"A game-theoretic approach to security and power conservation in wireless sensor networks","volume":"15","author":"Asadi","year":"2013","journal-title":"Int. J. Netw. Secur."},{"key":"ref_2","first-page":"1","article-title":"Improving Identity-based Random Key Establishment Scheme for Large-scale hierarchical wireless sensor networks","volume":"14","author":"Das","year":"2012","journal-title":"Int. J. Netw. Secur."},{"key":"ref_3","first-page":"157","article-title":"Secure smart card based password authentication scheme with user anonymity","volume":"40","author":"Li","year":"2011","journal-title":"Inform. Technol. Contr."},{"key":"ref_4","doi-asserted-by":"crossref","first-page":"946","DOI":"10.1016\/j.adhoc.2011.12.008","article-title":"Practical and secure localization and key distribution for wireless sensor networks","volume":"10","author":"Mi","year":"2012","journal-title":"Ad Hoc Netw."},{"key":"ref_5","first-page":"45","article-title":"A public key polynomial-based key pre-distribution scheme for large-scale wireless sensor networks","volume":"16","author":"Jie","year":"2012","journal-title":"Ad Hoc Sens. Wirel. Netw."},{"key":"ref_6","first-page":"193","article-title":"Secure end-to-end data aggregation (seeda) protocols for wireless sensor networks","volume":"17","author":"Poornima","year":"2013","journal-title":"Ad Hoc Sens. Wirel. Netw."},{"key":"ref_7","doi-asserted-by":"crossref","first-page":"727","DOI":"10.1016\/j.adhoc.2010.08.020","article-title":"A light-weight authentication scheme for wireless sensor networks","volume":"9","author":"Sierra","year":"2011","journal-title":"Ad Hoc Netw."},{"key":"ref_8","first-page":"251","article-title":"Efficient authenticated key agreement protocols for dynamic wireless sensor networks","volume":"14","author":"Han","year":"2012","journal-title":"Ad Hoc Sens. Wirel. Netw."},{"key":"ref_9","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.jnca.2009.08.001","article-title":"An efficient biometrics-based remote user authentication scheme using smart cards","volume":"33","author":"Li","year":"2010","journal-title":"J. Netw. Comput. Appl."},{"key":"ref_10","doi-asserted-by":"crossref","first-page":"5333","DOI":"10.1016\/j.ins.2011.07.014","article-title":"A lightweight anonymous routing protocol without public key en\/decryptions for wireless ad hoc networks","volume":"181","author":"Li","year":"2011","journal-title":"Inform. Sci."},{"key":"ref_11","doi-asserted-by":"crossref","first-page":"204","DOI":"10.1016\/j.adhoc.2010.07.007","article-title":"Computationally efficient mutual entity authentication in wireless sensor networks","volume":"9","author":"Li","year":"2011","journal-title":"Ad Hoc Netw."},{"key":"ref_12","doi-asserted-by":"crossref","first-page":"35","DOI":"10.1016\/j.mcm.2011.01.010","article-title":"A novel user authentication and privacy preserving scheme with smart cards for wireless communications","volume":"55","author":"Li","year":"2012","journal-title":"Math. Comput. Model."},{"key":"ref_13","first-page":"69","article-title":"A more secure and efficient authentication scheme with roaming service and user anonymity for mobile communications","volume":"41","author":"Li","year":"2012","journal-title":"Inform. Technol. Contr."},{"key":"ref_14","first-page":"180","article-title":"An efficient password authentication scheme for smart card","volume":"14","author":"Ramasamy","year":"2012","journal-title":"Int. J. Netw. Secur."},{"key":"ref_15","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/s12652-011-0051-5","article-title":"A cyber-physical approach to secret key generation in smart environments","volume":"4","author":"Barsocchi","year":"2013","journal-title":"J. Amb. Intell. Human. Comput."},{"key":"ref_16","doi-asserted-by":"crossref","first-page":"73","DOI":"10.1007\/978-3-642-16917-5_8","article-title":"AmbiSec: Securing smart spaces using entropy harvesting","volume":"6439","author":"Barsocchi","year":"2010","journal-title":"Lect. Notes Comput. Sci."},{"key":"ref_17","doi-asserted-by":"crossref","first-page":"1086","DOI":"10.1109\/TWC.2008.080128","article-title":"Two-factor user authentication scheme in wireless sensor networks","volume":"8","author":"Das","year":"2009","journal-title":"IEEE Trans. Wirel. Commun."},{"key":"ref_18","first-page":"361","article-title":"An enhanced two-factor user authentication scheme in wireless sensor networks","volume":"10","author":"Han","year":"2010","journal-title":"Ad Hoc Sens. Wirel. Netw."},{"key":"ref_19","doi-asserted-by":"crossref","first-page":"2450","DOI":"10.3390\/s100302450","article-title":"Cryptanalysis and security improvements of two-factor user authentication in wireless sensor networks","volume":"10","author":"Khan","year":"2010","journal-title":"Sensors"},{"key":"ref_20","first-page":"4821","article-title":"A secure billing service with two-factor user authentication in wireless sensor networks","volume":"7","author":"Li","year":"2011","journal-title":"Int. J. Innov. Comput. Inform. Contr."},{"key":"ref_21","doi-asserted-by":"crossref","first-page":"4767","DOI":"10.3390\/s110504767","article-title":"A secure authentication protocol for wireless sensor networks using elliptic curves cryptography","volume":"11","author":"Yeh","year":"2011","journal-title":"Sens. J."},{"key":"ref_22","doi-asserted-by":"crossref","first-page":"1646","DOI":"10.1016\/j.jnca.2012.03.011","article-title":"A dynamic password-based user authentication scheme for hierarchical wireless sensor networks","volume":"35","author":"Das","year":"2012","journal-title":"J. Netw. Comput. Appl."},{"key":"ref_23","doi-asserted-by":"crossref","unstructured":"Li, C.T., Lee, C.C., and Lee, C.W. (2013). An improved two-factor user authentication protocol for wireless sensor networks using elliptic curve cryptography. Sens. Lett., in press.","DOI":"10.1166\/sl.2013.2669"},{"key":"ref_24","doi-asserted-by":"crossref","first-page":"316","DOI":"10.1016\/j.jnca.2012.05.010","article-title":"A temporal-credential-based mutual authentication and key agreement scheme for wireless sensor networks","volume":"36","author":"Xue","year":"2013","journal-title":"J. Netw. Comput. Appl."},{"key":"ref_25","doi-asserted-by":"crossref","first-page":"704","DOI":"10.4218\/etrij.10.1510.0134","article-title":"A robust mutual authentication protocol for wireless sensor networks","volume":"32","author":"Chen","year":"2010","journal-title":"ETRI J."},{"key":"ref_26","first-page":"119","article-title":"An extended multi-server-based user authentication and key agreement scheme with user anonymity","volume":"7","author":"Li","year":"2013","journal-title":"KSII Trans. Int. Inform. Syst."},{"key":"ref_27","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1049\/iet-ifs.2012.0058","article-title":"A new password authentication and user anonymity scheme based on elliptic curve cryptography and smart card","volume":"7","author":"Li","year":"2013","journal-title":"IET Inform. Secur."}],"container-title":["Sensors"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1424-8220\/13\/8\/9589\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T21:48:11Z","timestamp":1760219291000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1424-8220\/13\/8\/9589"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,7,24]]},"references-count":27,"journal-issue":{"issue":"8","published-online":{"date-parts":[[2013,8]]}},"alternative-id":["s130809589"],"URL":"https:\/\/doi.org\/10.3390\/s130809589","relation":{},"ISSN":["1424-8220"],"issn-type":[{"value":"1424-8220","type":"electronic"}],"subject":[],"published":{"date-parts":[[2013,7,24]]}}}