{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,8,5]],"date-time":"2024-08-05T23:12:23Z","timestamp":1722899543550},"reference-count":22,"publisher":"Hindawi Limited","license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/3.0\/"}],"funder":[{"DOI":"10.13039\/501100004663","name":"Ministry of Science and Technology, Taiwan","doi-asserted-by":"publisher","award":["MOST 103-2221-E-324-023","MOST 103-2632-E-324-001-MY3","MOST 103-2622-E-212-009-CC2"],"id":[{"id":"10.13039\/501100004663","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Journal of Sensors"],"published-print":{"date-parts":[[2015]]},"abstract":"In recent years, wireless sensor networks have been used in a variety of environments; a wireless network infrastructure, established to communicate and exchange information in a monitoring area, has also been applied in different environments. However, for sensitive applications, security is the paramount issue. In this paper, we propose using bilinear pairing to design dynamic key management and authentication scheme of the hierarchical sensor network. We use the dynamic key management and the pairing-based cryptography (PBC) to establish the session key and the hash message authentication code (HMAC) to support the mutual authentication between the sensors and the base station. In addition, we also embed the capability of the Global Positioning System (GPS) to cluster nodes to find the best path of the sensor network. The proposed scheme can also provide the requisite security of the dynamic key management, mutual authentication, and session key protection. Our scheme can defend against impersonation attack, replay attack, wormhole attack, and message manipulation attack.<\/jats:p>","DOI":"10.1155\/2015\/534657","type":"journal-article","created":{"date-parts":[[2015,3,15]],"date-time":"2015-03-15T21:01:08Z","timestamp":1426453268000},"page":"1-14","source":"Crossref","is-referenced-by-count":11,"title":["A Bilinear Pairing-Based Dynamic Key Management and Authentication for Wireless Sensor Networks"],"prefix":"10.1155","volume":"2015","author":[{"ORCID":"http:\/\/orcid.org\/0000-0002-4958-2043","authenticated-orcid":true,"given":"Chin-Ling","family":"Chen","sequence":"first","affiliation":[{"name":"Department of Computer Science and Information Engineering, Chaoyang University of Technology, Taichung 41349, Taiwan"}]},{"ORCID":"http:\/\/orcid.org\/0000-0003-2404-9303","authenticated-orcid":true,"given":"Tzay-Farn","family":"Shih","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Information Engineering, Chaoyang University of Technology, Taichung 41349, Taiwan"}]},{"given":"Yu-Ting","family":"Tsai","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Information Engineering, Chaoyang University of Technology, Taichung 41349, Taiwan"}]},{"given":"De-Kui","family":"Li","sequence":"additional","affiliation":[{"name":"Department of Logistics Management, Wuhan Technology and Business University, Wuhan, Hubei 430065, China"}]}],"member":"98","reference":[{"issue":"4","key":"1","doi-asserted-by":"crossref","first-page":"973","DOI":"10.2298\/CSIS110406063X","volume":"8","year":"2011","journal-title":"Computer Science and Information Systems"},{"issue":"6","key":"2","doi-asserted-by":"crossref","first-page":"644","DOI":"10.1109\/TIT.1976.1055638","volume":"22","year":"1976","journal-title":"IEEE Transactions on Information Theory"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1145\/359340.359342"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1016\/j.entcs.2008.05.004"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2011.04.019"},{"key":"7","doi-asserted-by":"crossref","first-page":"2009","DOI":"10.1016\/j.proeng.2012.01.253","volume":"29","year":"2012","journal-title":"Procedia Engineering"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2004.41"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2007.04.021"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2006.05.011"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2010.05.013"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1006\/inco.1998.2717"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1016\/j.jpdc.2010.03.009"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2012.04.015"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2012.03.020"},{"issue":"4","key":"18","doi-asserted-by":"crossref","first-page":"953","DOI":"10.2298\/CSIS110222051Q","volume":"8","year":"2011","journal-title":"Computer Science and Information Systems"},{"key":"19","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2009.99"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2006.12.011"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2006.12.011"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2010.05.071"},{"key":"23","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2009.07.005"},{"key":"24","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2009.09.005"},{"key":"25","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2012.03.004"}],"container-title":["Journal of Sensors"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/downloads.hindawi.com\/journals\/js\/2015\/534657.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/js\/2015\/534657.xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/js\/2015\/534657.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,23]],"date-time":"2017-06-23T07:23:40Z","timestamp":1498202620000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.hindawi.com\/journals\/js\/2015\/534657\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"references-count":22,"alternative-id":["534657","534657"],"URL":"https:\/\/doi.org\/10.1155\/2015\/534657","relation":{},"ISSN":["1687-725X","1687-7268"],"issn-type":[{"value":"1687-725X","type":"print"},{"value":"1687-7268","type":"electronic"}],"subject":[],"published":{"date-parts":[[2015]]}}}