{"id":"https://openalex.org/W2069169235","doi":"https://doi.org/10.1186/s13677-015-0030-z","title":"A secure user authentication protocol for sensor network in data capturing","display_name":"A secure user authentication protocol for sensor network in data capturing","publication_year":2015,"publication_date":"2015-04-08","ids":{"openalex":"https://openalex.org/W2069169235","doi":"https://doi.org/10.1186/s13677-015-0030-z","mag":"2069169235"},"language":"en","primary_location":{"id":"doi:10.1186/s13677-015-0030-z","is_oa":true,"landing_page_url":"https://doi.org/10.1186/s13677-015-0030-z","pdf_url":"https://journalofcloudcomputing.springeropen.com/track/pdf/10.1186/s13677-015-0030-z","source":{"id":"https://openalex.org/S2486819371","display_name":"Journal of Cloud Computing Advances Systems and Applications","issn_l":"2192-113X","issn":["2192-113X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Cloud Computing","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://journalofcloudcomputing.springeropen.com/track/pdf/10.1186/s13677-015-0030-z","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100356471","display_name":"Quan Zhou","orcid":"https://orcid.org/0000-0002-3819-3878"},"institutions":[{"id":"https://openalex.org/I37987034","display_name":"Guangzhou University","ror":"https://ror.org/05ar8rn06","country_code":"CN","type":"education","lineage":["https://openalex.org/I37987034"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Zhou Quan","raw_affiliation_strings":["Key Laboratory of Mathematics and Interdisciplinary Sciences of Guangdong Higher Education Institutes, Guangzhou University, Guangzhou, China"],"affiliations":[{"raw_affiliation_string":"Key Laboratory of Mathematics and Interdisciplinary Sciences of Guangdong Higher Education Institutes, Guangzhou University, Guangzhou, China","institution_ids":["https://openalex.org/I37987034"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101773404","display_name":"Chunming Tang","orcid":"https://orcid.org/0000-0001-8949-4323"},"institutions":[{"id":"https://openalex.org/I37987034","display_name":"Guangzhou University","ror":"https://ror.org/05ar8rn06","country_code":"CN","type":"education","lineage":["https://openalex.org/I37987034"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Tang Chunming","raw_affiliation_strings":["Key Laboratory of Mathematics and Interdisciplinary Sciences of Guangdong Higher Education Institutes, Guangzhou University, Guangzhou, China"],"affiliations":[{"raw_affiliation_string":"Key Laboratory of Mathematics and Interdisciplinary Sciences of Guangdong Higher Education Institutes, Guangzhou University, Guangzhou, China","institution_ids":["https://openalex.org/I37987034"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5084016008","display_name":"Zhen Xianghan","orcid":null},"institutions":[{"id":"https://openalex.org/I80947539","display_name":"Fuzhou University","ror":"https://ror.org/011xvna82","country_code":"CN","type":"education","lineage":["https://openalex.org/I80947539"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zhen Xianghan","raw_affiliation_strings":["College of Mathematics and Computer Science, Fuzhou University, Fuzhou, China"],"affiliations":[{"raw_affiliation_string":"College of Mathematics and Computer Science, Fuzhou University, Fuzhou, China","institution_ids":["https://openalex.org/I80947539"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5108044249","display_name":"Chunming Rong","orcid":"https://orcid.org/0000-0002-8347-0539"},"institutions":[{"id":"https://openalex.org/I92008406","display_name":"University of Stavanger","ror":"https://ror.org/02qte9q33","country_code":"NO","type":"education","lineage":["https://openalex.org/I92008406"]}],"countries":["NO"],"is_corresponding":false,"raw_author_name":"Rong Chunming","raw_affiliation_strings":["Faculty of Science and Technology, University of Stavanger, Stavanger, Norway"],"affiliations":[{"raw_affiliation_string":"Faculty of Science and Technology, University of Stavanger, Stavanger, Norway","institution_ids":["https://openalex.org/I92008406"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5100356471"],"corresponding_institution_ids":["https://openalex.org/I37987034"],"apc_list":{"value":990,"currency":"GBP","value_usd":1214},"apc_paid":{"value":990,"currency":"GBP","value_usd":1214},"fwci":2.8031,"has_fulltext":true,"cited_by_count":27,"citation_normalized_percentile":{"value":0.91434571,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":91,"max":98},"biblio":{"volume":"4","issue":"1","first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9991000294685364,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":0.9962000250816345,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/authentication-protocol","display_name":"Authentication protocol","score":0.8345043659210205},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8272663354873657},{"id":"https://openalex.org/keywords/challenge-handshake-authentication-protocol","display_name":"Challenge-Handshake Authentication Protocol","score":0.7704293727874756},{"id":"https://openalex.org/keywords/otway\u2013rees-protocol","display_name":"Otway\u2013Rees protocol","score":0.6560394167900085},{"id":"https://openalex.org/keywords/lightweight-extensible-authentication-protocol","display_name":"Lightweight Extensible Authentication Protocol","score":0.6374759078025818},{"id":"https://openalex.org/keywords/challenge\u2013response-authentication","display_name":"Challenge\u2013response authentication","score":0.6271083950996399},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.5766225457191467},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5589830279350281},{"id":"https://openalex.org/keywords/data-authentication-algorithm","display_name":"Data Authentication Algorithm","score":0.5293120741844177},{"id":"https://openalex.org/keywords/wide-mouth-frog-protocol","display_name":"Wide Mouth Frog protocol","score":0.5237067937850952},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.48142263293266296},{"id":"https://openalex.org/keywords/protocol","display_name":"Protocol (science)","score":0.42704036831855774},{"id":"https://openalex.org/keywords/cryptographic-protocol","display_name":"Cryptographic protocol","score":0.41996222734451294},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.3511265814304352}],"concepts":[{"id":"https://openalex.org/C21564112","wikidata":"https://www.wikidata.org/wiki/Q4825885","display_name":"Authentication protocol","level":3,"score":0.8345043659210205},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8272663354873657},{"id":"https://openalex.org/C207828512","wikidata":"https://www.wikidata.org/wiki/Q1060131","display_name":"Challenge-Handshake Authentication Protocol","level":4,"score":0.7704293727874756},{"id":"https://openalex.org/C35788789","wikidata":"https://www.wikidata.org/wiki/Q1320237","display_name":"Otway\u2013Rees protocol","level":5,"score":0.6560394167900085},{"id":"https://openalex.org/C167169670","wikidata":"https://www.wikidata.org/wiki/Q1824705","display_name":"Lightweight Extensible Authentication Protocol","level":4,"score":0.6374759078025818},{"id":"https://openalex.org/C131129157","wikidata":"https://www.wikidata.org/wiki/Q1059963","display_name":"Challenge\u2013response authentication","level":4,"score":0.6271083950996399},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.5766225457191467},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5589830279350281},{"id":"https://openalex.org/C168970074","wikidata":"https://www.wikidata.org/wiki/Q5227146","display_name":"Data Authentication Algorithm","level":4,"score":0.5293120741844177},{"id":"https://openalex.org/C124086997","wikidata":"https://www.wikidata.org/wiki/Q4053131","display_name":"Wide Mouth Frog protocol","level":5,"score":0.5237067937850952},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.48142263293266296},{"id":"https://openalex.org/C2780385302","wikidata":"https://www.wikidata.org/wiki/Q367158","display_name":"Protocol (science)","level":3,"score":0.42704036831855774},{"id":"https://openalex.org/C33884865","wikidata":"https://www.wikidata.org/wiki/Q1254335","display_name":"Cryptographic protocol","level":3,"score":0.41996222734451294},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.3511265814304352},{"id":"https://openalex.org/C204787440","wikidata":"https://www.wikidata.org/wiki/Q188504","display_name":"Alternative medicine","level":2,"score":0.0},{"id":"https://openalex.org/C142724271","wikidata":"https://www.wikidata.org/wiki/Q7208","display_name":"Pathology","level":1,"score":0.0},{"id":"https://openalex.org/C71924100","wikidata":"https://www.wikidata.org/wiki/Q11190","display_name":"Medicine","level":0,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1186/s13677-015-0030-z","is_oa":true,"landing_page_url":"https://doi.org/10.1186/s13677-015-0030-z","pdf_url":"https://journalofcloudcomputing.springeropen.com/track/pdf/10.1186/s13677-015-0030-z","source":{"id":"https://openalex.org/S2486819371","display_name":"Journal of Cloud Computing Advances Systems and Applications","issn_l":"2192-113X","issn":["2192-113X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Cloud Computing","raw_type":"journal-article"},{"id":"pmh:oai:brage.bibsys.no:11250/2437505","is_oa":true,"landing_page_url":"http://hdl.handle.net/11250/2437505","pdf_url":null,"source":{"id":"https://openalex.org/S4306400255","display_name":"BIBSYS Brage (BIBSYS (Norway))","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I173212132","host_organization_name":"Vilnius University","host_organization_lineage":["https://openalex.org/I173212132"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"4","raw_type":"Journal article"}],"best_oa_location":{"id":"doi:10.1186/s13677-015-0030-z","is_oa":true,"landing_page_url":"https://doi.org/10.1186/s13677-015-0030-z","pdf_url":"https://journalofcloudcomputing.springeropen.com/track/pdf/10.1186/s13677-015-0030-z","source":{"id":"https://openalex.org/S2486819371","display_name":"Journal of Cloud Computing Advances Systems and Applications","issn_l":"2192-113X","issn":["2192-113X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Cloud Computing","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G1121271761","display_name":null,"funder_award_id":"Program","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G1231421488","display_name":null,"funder_award_id":"under","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G1477544716","display_name":null,"funder_award_id":"Guangdong","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G1602692349","display_name":null,"funder_award_id":"201204","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G204405107","display_name":null,"funder_award_id":"20100099","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G2087396116","display_name":null,"funder_award_id":"China","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G2264121336","display_name":null,"funder_award_id":"S2012010","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G3214160367","display_name":null,"funder_award_id":"No. 11","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G3317480652","display_name":null,"funder_award_id":"Science","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G391238517","display_name":null,"funder_award_id":", and","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G5167091242","display_name":null,"funder_award_id":"No. 1","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G5268303604","display_name":null,"funder_award_id":"11271003","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G5848258319","display_name":null,"funder_award_id":"0 and","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G5994120800","display_name":null,"funder_award_id":"Natural","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G7608752429","display_name":null,"funder_award_id":"Talent","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G7726157001","display_name":null,"funder_award_id":"Grant No.","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G8044945775","display_name":null,"funder_award_id":"201201","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G8863666567","display_name":null,"funder_award_id":"and No.","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320320671","display_name":"National Research Foundation","ror":"https://ror.org/05s0g1g46"},{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320321921","display_name":"Natural Science Foundation of Guangdong Province","ror":null},{"id":"https://openalex.org/F4320326279","display_name":"Department of Education of Guangdong Province","ror":null}],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W2069169235.pdf","grobid_xml":"https://content.openalex.org/works/W2069169235.grobid-xml"},"referenced_works_count":27,"referenced_works":["https://openalex.org/W79790369","https://openalex.org/W1767031616","https://openalex.org/W1967399643","https://openalex.org/W1994248320","https://openalex.org/W2007287631","https://openalex.org/W2015207020","https://openalex.org/W2047413095","https://openalex.org/W2052427916","https://openalex.org/W2053134894","https://openalex.org/W2071319787","https://openalex.org/W2109355501","https://openalex.org/W2112534360","https://openalex.org/W2116392345","https://openalex.org/W2118201189","https://openalex.org/W2122126819","https://openalex.org/W2122782274","https://openalex.org/W2128139253","https://openalex.org/W2135953128","https://openalex.org/W2144016831","https://openalex.org/W2144576616","https://openalex.org/W2152924492","https://openalex.org/W2396834172","https://openalex.org/W2485395889","https://openalex.org/W2952307034","https://openalex.org/W3106397135","https://openalex.org/W4252595028","https://openalex.org/W4256057324"],"related_works":["https://openalex.org/W2362963703","https://openalex.org/W2127299350","https://openalex.org/W2171815479","https://openalex.org/W2294734422","https://openalex.org/W2394314119","https://openalex.org/W2509423372","https://openalex.org/W2999962580","https://openalex.org/W2014544880","https://openalex.org/W1581375245","https://openalex.org/W2480758263"],"abstract_inverted_index":{"Sensor":[0],"network":[1],"is":[2,11,148],"an":[3,25],"important":[4],"approach":[5],"of":[6,90,101,132],"data":[7],"capturing.":[8],"User":[9],"authentication":[10,40,61,84,96,115,146],"a":[12,59,87,99,112,130],"critical":[13],"security":[14,71,107,128,155],"issue":[15],"for":[16,73,137,153],"sensor":[17,20],"networks":[18],"because":[19],"nodes":[21],"are":[22,69],"deployed":[23],"in":[24],"open":[26],"and":[27,54,98,135,151],"unattended":[28],"environment,":[29],"leaving":[30],"them":[31],"possible":[32],"hostile":[33],"attack.":[34],"Some":[35],"researchers":[36],"proposed":[37,58,82,139],"some":[38,70],"user":[39,60,83,95,114,145],"protocols":[41,62],"using":[42,47,63,117],"one-way":[43],"hash":[44],"function":[45],"or":[46],"biometric":[48],"technology.":[49],"Recently,":[50],"Yel":[51],"et":[52,56,93],"al.":[53,57],"Wenbo":[55,92],"elliptic":[64],"curves":[65],"cryptography.":[66],"However,":[67],"there":[68],"weaknesses":[72],"these":[74],"protocols.":[75],"In":[76],"the":[77,91,127,138],"paper,":[78],"we":[79,110,125],"review":[80,89],"several":[81,106],"protocols,":[85,140],"with":[86],"detail":[88],"al.'s":[94],"protocol":[97,103,116,147],"cryptanalysis":[100],"this":[102,144],"that":[104,143],"shows":[105,142],"weaknesses.":[108,123],"Furthermore,":[109],"propose":[111],"secure":[113,150],"identity-based":[118],"cryptography":[119],"to":[120],"overcome":[121],"those":[122],"Finally,":[124],"present":[126],"analysis,":[129],"comparison":[131],"security,":[133],"computation,":[134],"performance":[136],"which":[141],"more":[149],"suitable":[152],"higher":[154],"WSNs.":[156]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":2},{"year":2023,"cited_by_count":2},{"year":2022,"cited_by_count":6},{"year":2021,"cited_by_count":3},{"year":2020,"cited_by_count":2},{"year":2019,"cited_by_count":3},{"year":2018,"cited_by_count":3},{"year":2017,"cited_by_count":5}],"updated_date":"2026-04-13T07:58:08.660418","created_date":"2025-10-10T00:00:00"}
