{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,6]],"date-time":"2026-03-06T03:54:31Z","timestamp":1772769271082,"version":"3.50.1"},"reference-count":25,"publisher":"MDPI AG","issue":"7","license":[{"start":{"date-parts":[[2015,7,14]],"date-time":"2015-07-14T00:00:00Z","timestamp":1436832000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61071127"],"award-info":[{"award-number":["61071127"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61471318"],"award-info":[{"award-number":["61471318"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Sensors"],"abstract":"<jats:p>The feature of non-infrastructure support in a wireless ad hoc network (WANET) makes it suffer from various attacks. Moreover, user authentication is the first safety barrier in a network. A mutual trust is achieved by a protocol which enables communicating parties to authenticate each other at the same time and to exchange session keys. For the resource-constrained WANET, an efficient and lightweight user authentication scheme is necessary. In this paper, we propose a user authentication scheme based on the self-certified public key system and elliptic curves cryptography for a WANET. Using the proposed scheme, an efficient two-way user authentication and secure session key agreement can be achieved. Security analysis shows that our proposed scheme is resilient to common known attacks. In addition, the performance analysis shows that our proposed scheme performs similar or better compared with some existing user authentication schemes.<\/jats:p>","DOI":"10.3390\/s150717057","type":"journal-article","created":{"date-parts":[[2015,7,14]],"date-time":"2015-07-14T10:53:35Z","timestamp":1436871215000},"page":"17057-17075","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":24,"title":["A User Authentication Scheme Based on Elliptic Curves Cryptography for Wireless Ad Hoc Networks"],"prefix":"10.3390","volume":"15","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-1366-1030","authenticated-orcid":false,"given":"Huifang","family":"Chen","sequence":"first","affiliation":[{"name":"Department of Information Science and Electronic Engineering, Zhejiang University,  Hangzhou 310027, China"},{"name":"Zhejiang Provincial Key Laboratory of Information Network Technology, Hangzhou 310027, China"}]},{"given":"Linlin","family":"Ge","sequence":"additional","affiliation":[{"name":"Department of Information Science and Electronic Engineering, Zhejiang University,  Hangzhou 310027, China"}]},{"given":"Lei","family":"Xie","sequence":"additional","affiliation":[{"name":"Department of Information Science and Electronic Engineering, Zhejiang University,  Hangzhou 310027, China"},{"name":"Zhejiang Provincial Key Laboratory of Information Network Technology, Hangzhou 310027, China"}]}],"member":"1968","published-online":{"date-parts":[[2015,7,14]]},"reference":[{"key":"ref_1","first-page":"171","article-title":"A survey of various attacks in mobile ad hoc networks","volume":"2","author":"Kumaar","year":"2013","journal-title":"Int. J. Comput. Sci. Mob. Comput."},{"key":"ref_2","unstructured":"Bechler, M., Hof, H.J., Kraft, D., Pahlke, F., and Wolf, L. (2004, January 7\u201311). A cluster-based security architecture for ad hoc networks. Proceedings of the 23th Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM 2004), Hongkong, China."},{"key":"ref_3","unstructured":"Deng, H., Mukherjee, A., and Agrawal, D.P. (2004, January 5\u20137). Threshold and identity-based key management and authentication for wireless ad hoc networks. Proceedings of Information Technology: Coding and Computing (ITCC 2004), Las Vegas, NV, USA."},{"key":"ref_4","unstructured":"Zhu, X., and Xu, S. (2012, January 20\u201321). A new authentication scheme for wireless ad hoc network. Proceedings of the 2012 International Conference on Information Management, Innovation Management and Industrial Engineering (ICIII 2012), Sanya, China."},{"key":"ref_5","unstructured":"Alhakami, W., Mansour, A., Safdar, G.A., and Albermany, S. (2013, January 7\u20139). A secure MAC protocol for cognitive radio networks (SMCRN). Proceedings of the 2013 Science and Information Conference (SAI 2013), London, UK."},{"key":"ref_6","unstructured":"Kohnfelder, L. (1978). Towards a Practical Public-Key Cryptosystem. [Ph.D. Thesis, Massachusetts Institute of Technology]."},{"key":"ref_7","unstructured":"Shamir, A. (1984, January 19\u201322). Identity-based cryptosystems and signature schemes. Proceedings of Advances in Cryptology (CRYPTO 84), Berlin, Germany."},{"key":"ref_8","unstructured":"Girault, M. (1991, January 8\u201311). Self-certified public keys. Proceedings of Advances in Cryptology (EUROCRYPT 91), Brighton, UK."},{"key":"ref_9","doi-asserted-by":"crossref","first-page":"36","DOI":"10.1007\/s102070100002","article-title":"The elliptic curve digital signature algorithm (ECDSA)","volume":"1","author":"Johnson","year":"2001","journal-title":"Int. J. Inf. Secur."},{"key":"ref_10","doi-asserted-by":"crossref","unstructured":"Jing, C., Li, B., and Xu, H. (2007, January 21\u201323). An efficient scheme for user authentication in wireless sensor networks. Proceedings of the 21th IEEE International Conference on Advanced Information Networking and Applications Workshops (AINAW 2007), Niagara Falls, ON, Canada.","DOI":"10.1109\/AINAW.2007.80"},{"key":"ref_11","doi-asserted-by":"crossref","unstructured":"Zhao, X., Lv, Y., Yeap, T.H., and Hou, B. (, January 25\u201327August). A novel authentication and key agreement scheme for wireless mesh networks. Proceedings of the 5th IEEE International Joint Conference on INC, IMS and IDC (NCM 2009), Seoul, Korea.","DOI":"10.1109\/NCM.2009.93"},{"key":"ref_12","unstructured":"Zhang, C., and Wang, X. (2012, January 9\u201311). A novel self-certified security access authentication protocol in the space network. Proceeding of the 2012 IEEE International Conference on Communication and Technology (ICCT 2012), Chengdu, China."},{"key":"ref_13","doi-asserted-by":"crossref","first-page":"102","DOI":"10.1007\/978-0-387-35256-5_8","article-title":"Self-certified keys concepts and applications","volume":"3","author":"Petersen","year":"1997","journal-title":"Commun. Multimed. Secur."},{"key":"ref_14","unstructured":"Daniel, R.L. (2012). Standards for Efficient Cryptography, SEC 2: Recommended Elliptic Curve Domain Parameters, Certicom Corp."},{"key":"ref_15","doi-asserted-by":"crossref","first-page":"959","DOI":"10.1016\/j.jpdc.2006.03.006","article-title":"A distributed multi-party key agreement protocol for dynamic collaborative groups using ECC","volume":"66","author":"Giruka","year":"2006","journal-title":"J. Parallel Distrib. Comput."},{"key":"ref_16","doi-asserted-by":"crossref","first-page":"39","DOI":"10.1504\/IJSSC.2014.060687","article-title":"A time stamp-based elliptic curve cryptosystem for wireless ad-hoc sensor networks","volume":"4","author":"Indra","year":"2014","journal-title":"Int. J. Space-Based Situat. Comput."},{"key":"ref_17","first-page":"1","article-title":"Secure and efficient authentication scheme for mobile sink in WSNs based on bilinear pairings","volume":"2014","author":"Zhang","year":"2014","journal-title":"Int. J. Distrib. Sens. Netw."},{"key":"ref_18","doi-asserted-by":"crossref","first-page":"2408","DOI":"10.4304\/jcp.6.11.2408-2416","article-title":"An ECC-based two-party authenticated key agreement protocol for mobile ad hoc networks","volume":"6","author":"Ammayappan","year":"2011","journal-title":"J. Comput."},{"key":"ref_19","doi-asserted-by":"crossref","first-page":"311","DOI":"10.1002\/nem.1827","article-title":"An improved authentication with key agreement scheme on elliptic curve cryptosystem for global mobility networks","volume":"23","author":"Li","year":"2013","journal-title":"Int. J. Netw. Manag."},{"key":"ref_20","doi-asserted-by":"crossref","first-page":"290","DOI":"10.1631\/jzus.A0820202","article-title":"Self-certified multi-proxy signature schemes with message recovery","volume":"10","author":"Wu","year":"2009","journal-title":"J. Zhejiang Univ."},{"key":"ref_21","doi-asserted-by":"crossref","first-page":"624","DOI":"10.1093\/comjnl\/bxt046","article-title":"Achieving key privacy and invisibility for unattended wireless sensor networks in healthcare","volume":"57","author":"Babamir","year":"2014","journal-title":"Comput. J."},{"key":"ref_22","doi-asserted-by":"crossref","first-page":"142","DOI":"10.1016\/j.jcss.2011.01.002","article-title":"An improved two-party identity-based authenticated key agreement protocol using pairings","volume":"78","author":"Holbl","year":"2012","journal-title":"J. Comput. Syst. Sci."},{"key":"ref_23","first-page":"2389","article-title":"A novel mobile agent authentication scheme for multi-host environments using self-certified pairing-based public key cryptosystem","volume":"7","author":"Tsaur","year":"2011","journal-title":"Int. J. Innov. Comput. Inf. Control"},{"key":"ref_24","doi-asserted-by":"crossref","first-page":"2569","DOI":"10.1109\/TWC.2006.05063","article-title":"Mutual authentication and key exchange protocols for roaming services in wireless mobile networks","volume":"5","author":"Jiang","year":"2006","journal-title":"IEEE Trans. Wirel. Commun."},{"key":"ref_25","doi-asserted-by":"crossref","unstructured":"Wenger, E. (2013, January 25\u201328). Hardware architectures for MSP430-based wireless sensor nodes performing elliptic curve cryptography. Proceedings of the 11th International Conference on Applied Cryptography and Network Security (ACNS 2013), Banff, AB, Canada.","DOI":"10.1007\/978-3-642-38980-1_18"}],"container-title":["Sensors"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1424-8220\/15\/7\/17057\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T20:49:07Z","timestamp":1760215747000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1424-8220\/15\/7\/17057"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,7,14]]},"references-count":25,"journal-issue":{"issue":"7","published-online":{"date-parts":[[2015,7]]}},"alternative-id":["s150717057"],"URL":"https:\/\/doi.org\/10.3390\/s150717057","relation":{},"ISSN":["1424-8220"],"issn-type":[{"value":"1424-8220","type":"electronic"}],"subject":[],"published":{"date-parts":[[2015,7,14]]}}}