WSN node access authentication protocol based on trusted computing

Although wireless sensor networks (WSNs) are widely used in many fields, such as industrial production, medical studies, and environmental monitoring, they are vulnerable to various security problems. This study proposes a WSN node access authentication protocol based on trusted connection architect...

Celý popis

Uloženo v:
Podrobná bibliografie
Vydáno v:Simulation modelling practice and theory Ročník 117; s. 102522
Hlavní autoři: Liu, Jing, Liu, Lihui, Liu, Zenghui, Lai, Yingxu, Qin, Hua, Luo, Shiyao
Médium: Journal Article
Jazyk:angličtina
Vydáno: Elsevier B.V 01.05.2022
Témata:
ISSN:1569-190X, 1878-1462
On-line přístup:Získat plný text
Tagy: Přidat tag
Žádné tagy, Buďte první, kdo vytvoří štítek k tomuto záznamu!
Abstract Although wireless sensor networks (WSNs) are widely used in many fields, such as industrial production, medical studies, and environmental monitoring, they are vulnerable to various security problems. This study proposes a WSN node access authentication protocol based on trusted connection architecture to prevent easy node capture and various malicious attacks as well as to address the limited energy and computing power and different levels of node credibility in WSNs. First, each node of a WSN is configured using a trusted platform module to ensure complete key generation and safe storage, and thus provides security for the access protocol. Second, an alarm mechanism is introduced to avoid cluster node issues, such as not forwarding data, forwarding part of the data, and forwarding wrong data. This mechanism enhances the troubleshooting capability. Finally, during node access, bidirectional node identity authentication, platform identity authentication, and platform integrity verification are performed to achieve trusted node access. Our protocol is formally verified using Syverson-Van Oorschot (SVO) logic. The security features are applied to analyze the protocol, and back-end analysis modules such as On-the-fly Model-Checker (OFMC) and Constraint Logic based Attack Searcher (CL-AtSe) of the Automated Validation of Internet Security Protocols and Applications (AVISPA) tool are used to test the protocol. The theoretical analysis and test results show that the established security target of the protocol can resist network attacks in real application scenarios. In addition, the implementation efficiency of the protocol is sufficiently analyzed and evaluated. The results show that the protocol has high execution efficiency. In particular, the protocol is suitable for WSNs with high security requirements and limited computing power.
AbstractList Although wireless sensor networks (WSNs) are widely used in many fields, such as industrial production, medical studies, and environmental monitoring, they are vulnerable to various security problems. This study proposes a WSN node access authentication protocol based on trusted connection architecture to prevent easy node capture and various malicious attacks as well as to address the limited energy and computing power and different levels of node credibility in WSNs. First, each node of a WSN is configured using a trusted platform module to ensure complete key generation and safe storage, and thus provides security for the access protocol. Second, an alarm mechanism is introduced to avoid cluster node issues, such as not forwarding data, forwarding part of the data, and forwarding wrong data. This mechanism enhances the troubleshooting capability. Finally, during node access, bidirectional node identity authentication, platform identity authentication, and platform integrity verification are performed to achieve trusted node access. Our protocol is formally verified using Syverson-Van Oorschot (SVO) logic. The security features are applied to analyze the protocol, and back-end analysis modules such as On-the-fly Model-Checker (OFMC) and Constraint Logic based Attack Searcher (CL-AtSe) of the Automated Validation of Internet Security Protocols and Applications (AVISPA) tool are used to test the protocol. The theoretical analysis and test results show that the established security target of the protocol can resist network attacks in real application scenarios. In addition, the implementation efficiency of the protocol is sufficiently analyzed and evaluated. The results show that the protocol has high execution efficiency. In particular, the protocol is suitable for WSNs with high security requirements and limited computing power.
ArticleNumber 102522
Author Liu, Zenghui
Liu, Jing
Qin, Hua
Liu, Lihui
Lai, Yingxu
Luo, Shiyao
Author_xml – sequence: 1
  givenname: Jing
  orcidid: 0000-0002-7495-4419
  surname: Liu
  fullname: Liu, Jing
  email: jingliu@bjut.edu.cn
  organization: Faculty of Information Technology, Beijing University of Technology, Beijing 100124, China
– sequence: 2
  givenname: Lihui
  surname: Liu
  fullname: Liu, Lihui
  organization: Faculty of Information Technology, Beijing University of Technology, Beijing 100124, China
– sequence: 3
  givenname: Zenghui
  surname: Liu
  fullname: Liu, Zenghui
  email: 100150@bpi.edu.cn
  organization: Beijing Polytechnic, Institute of Electromechanical Engineering, Beijing 100176, China
– sequence: 4
  givenname: Yingxu
  surname: Lai
  fullname: Lai, Yingxu
  email: laiyingxu@bjut.edu.cn
  organization: Faculty of Information Technology, Beijing University of Technology, Beijing 100124, China
– sequence: 5
  givenname: Hua
  surname: Qin
  fullname: Qin, Hua
  email: qinhua@bjut.edu.cn
  organization: Faculty of Information Technology, Beijing University of Technology, Beijing 100124, China
– sequence: 6
  givenname: Shiyao
  surname: Luo
  fullname: Luo, Shiyao
  organization: Faculty of Information Technology, Beijing University of Technology, Beijing 100124, China
BookMark eNqFkMtKAzEUhoMo2FbfwMW8wNRkcq0LQYs3KLpQ0V3InKSa0iZDkgq-vVPHlQtdnZ8D38853xjthxgcQicETwkm4nQ1zX7TmTJtcNP0q4Y3zR4aESVVTZho9vvMxawmM_x6iMY5rzAmSgk5Qpcvj_dViNZVBsDlXJlteXeheDDFx1B1KZYIcV21Jjtb9ZuStrn0EeKm2xYf3o7QwdKsszv-mRP0fH31NL-tFw83d_OLRQ0Ui1JLRq1oqZGYUmIUA8NIqywXnHHe0pZQYim0pKXMScKNVU5KaRVbAhPAZnSCzoZeSDHn5JYafPm-siTj15pgvbOhV3qwoXc29GCjh9kvuEt-Y9Lnf9j5gLn-sQ_vks7gXQBnfXJQtI3-74Iv33x9-A
CitedBy_id crossref_primary_10_3390_electronics12041011
crossref_primary_10_1109_ACCESS_2022_3178434
crossref_primary_10_1016_j_simpat_2022_102681
crossref_primary_10_1145_3638043
crossref_primary_10_1007_s10207_023_00737_4
crossref_primary_10_1109_JIOT_2024_3382188
crossref_primary_10_3390_app132112068
crossref_primary_10_3390_app13010404
Cites_doi 10.1007/s12652-017-0474-8
10.1002/nem.1937
10.1016/j.future.2016.04.016
10.3724/SP.J.1016.2010.00706
10.1016/j.adhoc.2015.01.006
10.1016/j.entcs.2005.06.003
10.1186/gb-2013-14-10-r114
10.1016/j.entcs.2005.11.052
10.1016/j.compeleceng.2017.08.003
10.1109/TII.2017.2773666
10.1007/s12652-016-0345-8
ContentType Journal Article
Copyright 2022 Elsevier B.V.
Copyright_xml – notice: 2022 Elsevier B.V.
DBID AAYXX
CITATION
DOI 10.1016/j.simpat.2022.102522
DatabaseName CrossRef
DatabaseTitle CrossRef
DatabaseTitleList
DeliveryMethod fulltext_linktorsrc
Discipline Computer Science
EISSN 1878-1462
ExternalDocumentID 10_1016_j_simpat_2022_102522
S1569190X22000272
GroupedDBID --K
--M
.DC
.~1
0R~
123
1B1
1~.
1~5
4.4
457
4G.
5VS
7-5
71M
8P~
AAAKF
AAAKG
AACTN
AAEDT
AAEDW
AAIAV
AAIKJ
AAKOC
AALRI
AAOAW
AAQFI
AARIN
AAXUO
AAYFN
ABAOU
ABBOA
ABFNM
ABJNI
ABMAC
ABUCO
ABXDB
ABYKQ
ACAZW
ACDAQ
ACGFS
ACNNM
ACRLP
ACZNC
ADBBV
ADEZE
ADGUI
ADJOM
ADMUD
ADTZH
AEBSH
AECPX
AEKER
AENEX
AFKWA
AFTJW
AGHFR
AGUBO
AGYEJ
AHJVU
AHZHX
AIALX
AIEXJ
AIGVJ
AIKHN
AITUG
AJBFU
AJOXV
ALMA_UNASSIGNED_HOLDINGS
AMFUW
AMRAJ
AOUOD
APLSM
ARUGR
AXJTR
BJAXD
BKOJK
BLXMC
CS3
EBS
EFJIC
EFLBG
EJD
EO8
EO9
EP2
EP3
FDB
FEDTE
FIRID
FNPLU
FYGXN
G-Q
GBLVA
GBOLZ
HAMUX
HVGLF
HZ~
IHE
J1W
JJJVA
KOM
M41
MHUIS
MO0
N9A
O-L
O9-
OAUVE
OZT
P-8
P-9
PC.
Q38
RIG
ROL
RPZ
SDF
SDG
SES
SEW
SPC
SPCBC
SSB
SSD
SST
SSV
SSW
SSZ
T5K
UHS
ZMT
~G-
9DU
AATTM
AAXKI
AAYWO
AAYXX
ABWVN
ACLOT
ACRPL
ACVFH
ADCNI
ADNMO
AEIPS
AEUPX
AFJKZ
AFPUW
AIGII
AIIUN
AKBMS
AKRWK
AKYEP
ANKPU
APXCP
CITATION
EFKBS
~HD
ID FETCH-LOGICAL-c306t-743d6b3a70331a84ca41b8d565455b3b131d3cb1b34e715ad8e777d84fc46c493
ISICitedReferencesCount 9
ISICitedReferencesURI http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=000781385000001&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
ISSN 1569-190X
IngestDate Tue Nov 18 21:50:50 EST 2025
Sat Nov 29 07:06:05 EST 2025
Fri Feb 23 02:40:52 EST 2024
IsPeerReviewed true
IsScholarly true
Keywords Authentication protocol
Wireless sensor networks
Syverson-Van Oorschot (SVO), Automated Validation of Internet Security Protocols and Applications (AVISPA)
Trusted connection architecture
Language English
LinkModel OpenURL
MergedId FETCHMERGED-LOGICAL-c306t-743d6b3a70331a84ca41b8d565455b3b131d3cb1b34e715ad8e777d84fc46c493
ORCID 0000-0002-7495-4419
ParticipantIDs crossref_citationtrail_10_1016_j_simpat_2022_102522
crossref_primary_10_1016_j_simpat_2022_102522
elsevier_sciencedirect_doi_10_1016_j_simpat_2022_102522
PublicationCentury 2000
PublicationDate May 2022
2022-05-00
PublicationDateYYYYMMDD 2022-05-01
PublicationDate_xml – month: 05
  year: 2022
  text: May 2022
PublicationDecade 2020
PublicationTitle Simulation modelling practice and theory
PublicationYear 2022
Publisher Elsevier B.V
Publisher_xml – name: Elsevier B.V
References Chen, Chou, Wu (bib0009) 2016; 2016
Mao, Zhang, Li (bib0018) 2018
Nguyen, Laurent, Oualha (bib0002) 2015; 32
Imamoto, Sakurai (bib0015) 2005; 135
Liu, Shen, Li (bib0003) 2013
Violence (bib0001) 2009
Zhang, Chen, Zhang (bib0013) 2010; 33
Wu, Xu, Kumari (bib0020) 2017; 8
(bib0004) 2013
Jain, Hussain (bib0007) 2017
Yein, Lin, Hsieh (bib0010) 2017
Jiang, Kumar, Ma (bib0021) 2017; 27
Syverson, Van Oorschot (bib0014) 1994
Kumari, Li, Wu (bib0005) 2016; 63
Srinivas, Mishra, Mukhopadhyay (bib0006) 2018; 9
Challa, Das, Odelu (bib0012) 2018; 69
Barash, Vaquero-Garcia, González-Vallinas (bib0016) 2013; 14
Fang, Zhang, Yang (bib0011) 2018; 46
Li, Niu, Bhuiyan (bib0019) 2017; 14
Ryu, Kim, Lee (bib0008) 2020
Vigano (bib0017) 2006; 155
Nguyen (10.1016/j.simpat.2022.102522_bib0002) 2015; 32
(10.1016/j.simpat.2022.102522_bib0004) 2013
Imamoto (10.1016/j.simpat.2022.102522_bib0015) 2005; 135
Vigano (10.1016/j.simpat.2022.102522_bib0017) 2006; 155
Violence (10.1016/j.simpat.2022.102522_bib0001) 2009
Mao (10.1016/j.simpat.2022.102522_bib0018) 2018
Barash (10.1016/j.simpat.2022.102522_bib0016) 2013; 14
Ryu (10.1016/j.simpat.2022.102522_bib0008) 2020
Zhang (10.1016/j.simpat.2022.102522_bib0013) 2010; 33
Chen (10.1016/j.simpat.2022.102522_bib0009) 2016; 2016
Challa (10.1016/j.simpat.2022.102522_bib0012) 2018; 69
Srinivas (10.1016/j.simpat.2022.102522_bib0006) 2018; 9
Jain (10.1016/j.simpat.2022.102522_bib0007) 2017
Li (10.1016/j.simpat.2022.102522_bib0019) 2017; 14
Yein (10.1016/j.simpat.2022.102522_bib0010) 2017
Kumari (10.1016/j.simpat.2022.102522_bib0005) 2016; 63
Fang (10.1016/j.simpat.2022.102522_bib0011) 2018; 46
Syverson (10.1016/j.simpat.2022.102522_bib0014) 1994
Jiang (10.1016/j.simpat.2022.102522_bib0021) 2017; 27
Liu (10.1016/j.simpat.2022.102522_bib0003) 2013
Wu (10.1016/j.simpat.2022.102522_bib0020) 2017; 8
References_xml – volume: 14
  start-page: 1
  year: 2013
  end-page: 8
  ident: bib0016
  article-title: AVISPA: a web tool for the prediction and analysis of alternative splicing
  publication-title: Genome Biol.
– volume: 155
  start-page: 61
  year: 2006
  end-page: 86
  ident: bib0017
  article-title: Automated security protocol analysis with the AVISPA tool
  publication-title: Electronic Notes Theor. Comput. Sci.
– year: 2013
  ident: bib0004
  publication-title: GB/T 29828-2013 Information Security Technology-Trusted Computing Specification-Trusted Connect Architecture
– start-page: 1
  year: 2017
  end-page: 7
  ident: bib0007
  article-title: Simple, secure and dynamic protocol for mutual authentication of nodes in wireless sensor networks
  publication-title: Proceedings of the Second International Conference on Electrical, Computer and Communication Technologies (ICECCT)
– volume: 63
  start-page: 56
  year: 2016
  end-page: 75
  ident: bib0005
  article-title: A user friendly mutual authentication and key agreement scheme for wireless sensor networks using chaotic maps
  publication-title: Fut. Gener. Comput. Syst.
– volume: 33
  start-page: 706
  year: 2010
  end-page: 717
  ident: bib0013
  article-title: Research on trusted network connection
  publication-title: Chin. J. Comput.
– start-page: 2018
  year: 2018
  ident: bib0018
  article-title: Trusted authority assisted three-factor authentication and key agreement protocol for the implantable medical system
  publication-title: Wireless Commun. Mobile Comput.
– volume: 46
  start-page: 702
  year: 2018
  ident: bib0011
  article-title: Three factor user authentication protocol for wireless sensor networks based on biometrics
  publication-title: Acta Electron. Sin.
– volume: 27
  start-page: e1937
  year: 2017
  ident: bib0021
  article-title: A privacy-aware two-factor authentication protocol based on elliptic curve cryptography for wireless sensor networks
  publication-title: Int. J. Netw. Manag.
– start-page: 1369
  year: 2017
  end-page: 1375
  ident: bib0010
  article-title: A secure mutual trust scheme for wireless sensor networks
  publication-title: Proceedings of the IEEE 26th International Symposium on Industrial Electronics (ISIE)
– volume: 69
  start-page: 534
  year: 2018
  end-page: 554
  ident: bib0012
  article-title: An efficient ECC-based provably secure three-factor user authentication and key agreement protocol for wireless healthcare sensor networks
  publication-title: Comput. Electric. Eng.
– volume: 8
  start-page: 101
  year: 2017
  end-page: 116
  ident: bib0020
  article-title: A privacy-preserving and provable user authentication scheme for wireless sensor networks based on internet of things security
  publication-title: J. Ambient Intell. Humaniz. Comput.
– start-page: 14
  year: 1994
  end-page: 28
  ident: bib0014
  article-title: On unifying some cryptographic protocol logics
  publication-title: Proceedings of the IEEE Computer Society Symposium on Research in Security and Privacy
– volume: 9
  start-page: 875
  year: 2018
  end-page: 895
  ident: bib0006
  article-title: Provably secure biometric based authentication and key agreement protocol for wireless sensor networks
  publication-title: J. Ambient Intell. Humaniz. Comput.
– year: 2009
  ident: bib0001
  article-title: Global status report on road safety: time for action
– start-page: 1
  year: 2020
  end-page: 4
  ident: bib0008
  article-title: Cryptanalysis of Protocol for Heterogeneous Wireless Sensor Networks for the Internet of Things Environment
  publication-title: Proceedings of the 14th International Conference on Ubiquitous Information Management and Communication (IMCOM)
– volume: 135
  start-page: 79
  year: 2005
  end-page: 94
  ident: bib0015
  article-title: Design and analysis of diffie-Hellman-based key exchange using one-time ID by SVO logic
  publication-title: Electron. Notes Theor. Comput. Sci.
– volume: 2016
  start-page: 1
  year: 2016
  ident: bib0009
  article-title: Improved on an efficient user authentication scheme for heterogeneous wireless sensor network tailored for the Internet of Things environment
  publication-title: IACR Cryptol. ePrint Arch.
– volume: 14
  start-page: 3599
  year: 2017
  end-page: 3609
  ident: bib0019
  article-title: A robust ECC-based provable secure authentication protocol with privacy preserving for industrial internet of things
  publication-title: IEEE Trans. Ind. Inform.
– volume: 32
  start-page: 17
  year: 2015
  end-page: 31
  ident: bib0002
  article-title: Survey on secure communication protocols for the Internet of Things
  publication-title: Ad Hoc Networks
– start-page: 9
  year: 2013
  end-page: 12
  ident: bib0003
  article-title: A fingerprint-based user authentication protocol with one-time password for wireless sensor networks
  publication-title: Proceedings of the International Conference on Sensor Network Security Technology and Privacy Communication System
– start-page: 1
  year: 2017
  ident: 10.1016/j.simpat.2022.102522_bib0007
  article-title: Simple, secure and dynamic protocol for mutual authentication of nodes in wireless sensor networks
– volume: 9
  start-page: 875
  issue: 4
  year: 2018
  ident: 10.1016/j.simpat.2022.102522_bib0006
  article-title: Provably secure biometric based authentication and key agreement protocol for wireless sensor networks
  publication-title: J. Ambient Intell. Humaniz. Comput.
  doi: 10.1007/s12652-017-0474-8
– volume: 27
  start-page: e1937
  issue: 3
  year: 2017
  ident: 10.1016/j.simpat.2022.102522_bib0021
  article-title: A privacy-aware two-factor authentication protocol based on elliptic curve cryptography for wireless sensor networks
  publication-title: Int. J. Netw. Manag.
  doi: 10.1002/nem.1937
– start-page: 9
  year: 2013
  ident: 10.1016/j.simpat.2022.102522_bib0003
  article-title: A fingerprint-based user authentication protocol with one-time password for wireless sensor networks
– start-page: 1
  year: 2020
  ident: 10.1016/j.simpat.2022.102522_bib0008
  article-title: Cryptanalysis of Protocol for Heterogeneous Wireless Sensor Networks for the Internet of Things Environment
– volume: 63
  start-page: 56
  year: 2016
  ident: 10.1016/j.simpat.2022.102522_bib0005
  article-title: A user friendly mutual authentication and key agreement scheme for wireless sensor networks using chaotic maps
  publication-title: Fut. Gener. Comput. Syst.
  doi: 10.1016/j.future.2016.04.016
– start-page: 14
  year: 1994
  ident: 10.1016/j.simpat.2022.102522_bib0014
  article-title: On unifying some cryptographic protocol logics
– volume: 33
  start-page: 706
  issue: 4
  year: 2010
  ident: 10.1016/j.simpat.2022.102522_bib0013
  article-title: Research on trusted network connection
  publication-title: Chin. J. Comput.
  doi: 10.3724/SP.J.1016.2010.00706
– year: 2013
  ident: 10.1016/j.simpat.2022.102522_bib0004
– volume: 2016
  start-page: 1
  year: 2016
  ident: 10.1016/j.simpat.2022.102522_bib0009
  article-title: Improved on an efficient user authentication scheme for heterogeneous wireless sensor network tailored for the Internet of Things environment
  publication-title: IACR Cryptol. ePrint Arch.
– start-page: 1369
  year: 2017
  ident: 10.1016/j.simpat.2022.102522_bib0010
  article-title: A secure mutual trust scheme for wireless sensor networks
– volume: 46
  start-page: 702
  issue: 3
  year: 2018
  ident: 10.1016/j.simpat.2022.102522_bib0011
  article-title: Three factor user authentication protocol for wireless sensor networks based on biometrics
  publication-title: Acta Electron. Sin.
– volume: 32
  start-page: 17
  year: 2015
  ident: 10.1016/j.simpat.2022.102522_bib0002
  article-title: Survey on secure communication protocols for the Internet of Things
  publication-title: Ad Hoc Networks
  doi: 10.1016/j.adhoc.2015.01.006
– volume: 135
  start-page: 79
  issue: 1
  year: 2005
  ident: 10.1016/j.simpat.2022.102522_bib0015
  article-title: Design and analysis of diffie-Hellman-based key exchange using one-time ID by SVO logic
  publication-title: Electron. Notes Theor. Comput. Sci.
  doi: 10.1016/j.entcs.2005.06.003
– volume: 14
  start-page: 1
  issue: 10
  year: 2013
  ident: 10.1016/j.simpat.2022.102522_bib0016
  article-title: AVISPA: a web tool for the prediction and analysis of alternative splicing
  publication-title: Genome Biol.
  doi: 10.1186/gb-2013-14-10-r114
– year: 2009
  ident: 10.1016/j.simpat.2022.102522_bib0001
– volume: 155
  start-page: 61
  year: 2006
  ident: 10.1016/j.simpat.2022.102522_bib0017
  article-title: Automated security protocol analysis with the AVISPA tool
  publication-title: Electronic Notes Theor. Comput. Sci.
  doi: 10.1016/j.entcs.2005.11.052
– start-page: 2018
  year: 2018
  ident: 10.1016/j.simpat.2022.102522_bib0018
  article-title: Trusted authority assisted three-factor authentication and key agreement protocol for the implantable medical system
  publication-title: Wireless Commun. Mobile Comput.
– volume: 69
  start-page: 534
  year: 2018
  ident: 10.1016/j.simpat.2022.102522_bib0012
  article-title: An efficient ECC-based provably secure three-factor user authentication and key agreement protocol for wireless healthcare sensor networks
  publication-title: Comput. Electric. Eng.
  doi: 10.1016/j.compeleceng.2017.08.003
– volume: 14
  start-page: 3599
  issue: 8
  year: 2017
  ident: 10.1016/j.simpat.2022.102522_bib0019
  article-title: A robust ECC-based provable secure authentication protocol with privacy preserving for industrial internet of things
  publication-title: IEEE Trans. Ind. Inform.
  doi: 10.1109/TII.2017.2773666
– volume: 8
  start-page: 101
  issue: 1
  year: 2017
  ident: 10.1016/j.simpat.2022.102522_bib0020
  article-title: A privacy-preserving and provable user authentication scheme for wireless sensor networks based on internet of things security
  publication-title: J. Ambient Intell. Humaniz. Comput.
  doi: 10.1007/s12652-016-0345-8
SSID ssj0018867
Score 2.3455877
Snippet Although wireless sensor networks (WSNs) are widely used in many fields, such as industrial production, medical studies, and environmental monitoring, they are...
SourceID crossref
elsevier
SourceType Enrichment Source
Index Database
Publisher
StartPage 102522
SubjectTerms Authentication protocol
Syverson-Van Oorschot (SVO), Automated Validation of Internet Security Protocols and Applications (AVISPA)
Trusted connection architecture
Wireless sensor networks
Title WSN node access authentication protocol based on trusted computing
URI https://dx.doi.org/10.1016/j.simpat.2022.102522
Volume 117
WOSCitedRecordID wos000781385000001&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
journalDatabaseRights – providerCode: PRVESC
  databaseName: Elsevier SD Freedom Collection Journals 2021
  customDbUrl:
  eissn: 1878-1462
  dateEnd: 99991231
  omitProxy: false
  ssIdentifier: ssj0018867
  issn: 1569-190X
  databaseCode: AIEXJ
  dateStart: 20021015
  isFulltext: true
  titleUrlDefault: https://www.sciencedirect.com
  providerName: Elsevier
link http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtV3fb9MwELaqbg-8ABsgNmDyw94qoyZ2YvtxTEOApmpShyg8ECW2wzJtacXSqX_-zrGddi3ixyReoupUx9Hdp_PZvu8OocM0hTUvHzKiwPMRxrQmRSSGxDChy1LGQ65E22yCj0ZiMpFnvd73wIW5veJ1LRYLOfuvpgYZGNtSZ__B3N1LQQC_wejwBLPD868M_2U8GtRTbctkWArAILc57HXjz-ZsQlYzBesP7Pql27sCS7swLbttNm_CUuYD1nF17Rt8uaY5nr3uqFUh_XK6zCU-reYtMMJrlqLT6mJercm-mfrHqtT1xv4Kgxfz1fMI2Mp22X_ukGyDKOP8aioJxB4Tt-w4mbAbWLbmjB2Tc8OxuzOGy7c3ljxqc2Dj2FadSBypea1k9thOZ2eL4_ZqFZborZgnUvTR1tHHk8mn7p5JiLbHcPd5gVzZZgBuzvXr4GUlIDl_ih77nQQ-cgjYQT1T76InoUsH9k77GXoHgMAWENgBAt8HBA6AwC0gMEg8IHAHiOfo8_uT8-MPxHfOIAq2gA2BsFCnBc3BndMoF0zlLCqEhuCdJUlBi4hGmqoiKigzPEpyLQznXAtWKpYqJukL1K-ntXmJcE5LlpihEsqkrLTXtlzkIJFCmkLScg_RoJJM-bLytrvJVRbyBy8zp8jMKjJzitxDpBs1c2VV_vB_HrSd-dDQhXwZAOS3I_cfPPIVerTE92vUB-WbN2hb3TbVzc8Dj6Q7FM2KsQ
linkProvider Elsevier
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=WSN+node+access+authentication+protocol+based+on+trusted+computing&rft.jtitle=Simulation+modelling+practice+and+theory&rft.au=Liu%2C+Jing&rft.au=Liu%2C+Lihui&rft.au=Liu%2C+Zenghui&rft.au=Lai%2C+Yingxu&rft.date=2022-05-01&rft.pub=Elsevier+B.V&rft.issn=1569-190X&rft.eissn=1878-1462&rft.volume=117&rft_id=info:doi/10.1016%2Fj.simpat.2022.102522&rft.externalDocID=S1569190X22000272
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1569-190X&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1569-190X&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1569-190X&client=summon