WSN node access authentication protocol based on trusted computing
Although wireless sensor networks (WSNs) are widely used in many fields, such as industrial production, medical studies, and environmental monitoring, they are vulnerable to various security problems. This study proposes a WSN node access authentication protocol based on trusted connection architect...
Uloženo v:
| Vydáno v: | Simulation modelling practice and theory Ročník 117; s. 102522 |
|---|---|
| Hlavní autoři: | , , , , , |
| Médium: | Journal Article |
| Jazyk: | angličtina |
| Vydáno: |
Elsevier B.V
01.05.2022
|
| Témata: | |
| ISSN: | 1569-190X, 1878-1462 |
| On-line přístup: | Získat plný text |
| Tagy: |
Přidat tag
Žádné tagy, Buďte první, kdo vytvoří štítek k tomuto záznamu!
|
| Abstract | Although wireless sensor networks (WSNs) are widely used in many fields, such as industrial production, medical studies, and environmental monitoring, they are vulnerable to various security problems. This study proposes a WSN node access authentication protocol based on trusted connection architecture to prevent easy node capture and various malicious attacks as well as to address the limited energy and computing power and different levels of node credibility in WSNs. First, each node of a WSN is configured using a trusted platform module to ensure complete key generation and safe storage, and thus provides security for the access protocol. Second, an alarm mechanism is introduced to avoid cluster node issues, such as not forwarding data, forwarding part of the data, and forwarding wrong data. This mechanism enhances the troubleshooting capability. Finally, during node access, bidirectional node identity authentication, platform identity authentication, and platform integrity verification are performed to achieve trusted node access. Our protocol is formally verified using Syverson-Van Oorschot (SVO) logic. The security features are applied to analyze the protocol, and back-end analysis modules such as On-the-fly Model-Checker (OFMC) and Constraint Logic based Attack Searcher (CL-AtSe) of the Automated Validation of Internet Security Protocols and Applications (AVISPA) tool are used to test the protocol. The theoretical analysis and test results show that the established security target of the protocol can resist network attacks in real application scenarios. In addition, the implementation efficiency of the protocol is sufficiently analyzed and evaluated. The results show that the protocol has high execution efficiency. In particular, the protocol is suitable for WSNs with high security requirements and limited computing power. |
|---|---|
| AbstractList | Although wireless sensor networks (WSNs) are widely used in many fields, such as industrial production, medical studies, and environmental monitoring, they are vulnerable to various security problems. This study proposes a WSN node access authentication protocol based on trusted connection architecture to prevent easy node capture and various malicious attacks as well as to address the limited energy and computing power and different levels of node credibility in WSNs. First, each node of a WSN is configured using a trusted platform module to ensure complete key generation and safe storage, and thus provides security for the access protocol. Second, an alarm mechanism is introduced to avoid cluster node issues, such as not forwarding data, forwarding part of the data, and forwarding wrong data. This mechanism enhances the troubleshooting capability. Finally, during node access, bidirectional node identity authentication, platform identity authentication, and platform integrity verification are performed to achieve trusted node access. Our protocol is formally verified using Syverson-Van Oorschot (SVO) logic. The security features are applied to analyze the protocol, and back-end analysis modules such as On-the-fly Model-Checker (OFMC) and Constraint Logic based Attack Searcher (CL-AtSe) of the Automated Validation of Internet Security Protocols and Applications (AVISPA) tool are used to test the protocol. The theoretical analysis and test results show that the established security target of the protocol can resist network attacks in real application scenarios. In addition, the implementation efficiency of the protocol is sufficiently analyzed and evaluated. The results show that the protocol has high execution efficiency. In particular, the protocol is suitable for WSNs with high security requirements and limited computing power. |
| ArticleNumber | 102522 |
| Author | Liu, Zenghui Liu, Jing Qin, Hua Liu, Lihui Lai, Yingxu Luo, Shiyao |
| Author_xml | – sequence: 1 givenname: Jing orcidid: 0000-0002-7495-4419 surname: Liu fullname: Liu, Jing email: jingliu@bjut.edu.cn organization: Faculty of Information Technology, Beijing University of Technology, Beijing 100124, China – sequence: 2 givenname: Lihui surname: Liu fullname: Liu, Lihui organization: Faculty of Information Technology, Beijing University of Technology, Beijing 100124, China – sequence: 3 givenname: Zenghui surname: Liu fullname: Liu, Zenghui email: 100150@bpi.edu.cn organization: Beijing Polytechnic, Institute of Electromechanical Engineering, Beijing 100176, China – sequence: 4 givenname: Yingxu surname: Lai fullname: Lai, Yingxu email: laiyingxu@bjut.edu.cn organization: Faculty of Information Technology, Beijing University of Technology, Beijing 100124, China – sequence: 5 givenname: Hua surname: Qin fullname: Qin, Hua email: qinhua@bjut.edu.cn organization: Faculty of Information Technology, Beijing University of Technology, Beijing 100124, China – sequence: 6 givenname: Shiyao surname: Luo fullname: Luo, Shiyao organization: Faculty of Information Technology, Beijing University of Technology, Beijing 100124, China |
| BookMark | eNqFkMtKAzEUhoMo2FbfwMW8wNRkcq0LQYs3KLpQ0V3InKSa0iZDkgq-vVPHlQtdnZ8D38853xjthxgcQicETwkm4nQ1zX7TmTJtcNP0q4Y3zR4aESVVTZho9vvMxawmM_x6iMY5rzAmSgk5Qpcvj_dViNZVBsDlXJlteXeheDDFx1B1KZYIcV21Jjtb9ZuStrn0EeKm2xYf3o7QwdKsszv-mRP0fH31NL-tFw83d_OLRQ0Ui1JLRq1oqZGYUmIUA8NIqywXnHHe0pZQYim0pKXMScKNVU5KaRVbAhPAZnSCzoZeSDHn5JYafPm-siTj15pgvbOhV3qwoXc29GCjh9kvuEt-Y9Lnf9j5gLn-sQ_vks7gXQBnfXJQtI3-74Iv33x9-A |
| CitedBy_id | crossref_primary_10_3390_electronics12041011 crossref_primary_10_1109_ACCESS_2022_3178434 crossref_primary_10_1016_j_simpat_2022_102681 crossref_primary_10_1145_3638043 crossref_primary_10_1007_s10207_023_00737_4 crossref_primary_10_1109_JIOT_2024_3382188 crossref_primary_10_3390_app132112068 crossref_primary_10_3390_app13010404 |
| Cites_doi | 10.1007/s12652-017-0474-8 10.1002/nem.1937 10.1016/j.future.2016.04.016 10.3724/SP.J.1016.2010.00706 10.1016/j.adhoc.2015.01.006 10.1016/j.entcs.2005.06.003 10.1186/gb-2013-14-10-r114 10.1016/j.entcs.2005.11.052 10.1016/j.compeleceng.2017.08.003 10.1109/TII.2017.2773666 10.1007/s12652-016-0345-8 |
| ContentType | Journal Article |
| Copyright | 2022 Elsevier B.V. |
| Copyright_xml | – notice: 2022 Elsevier B.V. |
| DBID | AAYXX CITATION |
| DOI | 10.1016/j.simpat.2022.102522 |
| DatabaseName | CrossRef |
| DatabaseTitle | CrossRef |
| DatabaseTitleList | |
| DeliveryMethod | fulltext_linktorsrc |
| Discipline | Computer Science |
| EISSN | 1878-1462 |
| ExternalDocumentID | 10_1016_j_simpat_2022_102522 S1569190X22000272 |
| GroupedDBID | --K --M .DC .~1 0R~ 123 1B1 1~. 1~5 4.4 457 4G. 5VS 7-5 71M 8P~ AAAKF AAAKG AACTN AAEDT AAEDW AAIAV AAIKJ AAKOC AALRI AAOAW AAQFI AARIN AAXUO AAYFN ABAOU ABBOA ABFNM ABJNI ABMAC ABUCO ABXDB ABYKQ ACAZW ACDAQ ACGFS ACNNM ACRLP ACZNC ADBBV ADEZE ADGUI ADJOM ADMUD ADTZH AEBSH AECPX AEKER AENEX AFKWA AFTJW AGHFR AGUBO AGYEJ AHJVU AHZHX AIALX AIEXJ AIGVJ AIKHN AITUG AJBFU AJOXV ALMA_UNASSIGNED_HOLDINGS AMFUW AMRAJ AOUOD APLSM ARUGR AXJTR BJAXD BKOJK BLXMC CS3 EBS EFJIC EFLBG EJD EO8 EO9 EP2 EP3 FDB FEDTE FIRID FNPLU FYGXN G-Q GBLVA GBOLZ HAMUX HVGLF HZ~ IHE J1W JJJVA KOM M41 MHUIS MO0 N9A O-L O9- OAUVE OZT P-8 P-9 PC. Q38 RIG ROL RPZ SDF SDG SES SEW SPC SPCBC SSB SSD SST SSV SSW SSZ T5K UHS ZMT ~G- 9DU AATTM AAXKI AAYWO AAYXX ABWVN ACLOT ACRPL ACVFH ADCNI ADNMO AEIPS AEUPX AFJKZ AFPUW AIGII AIIUN AKBMS AKRWK AKYEP ANKPU APXCP CITATION EFKBS ~HD |
| ID | FETCH-LOGICAL-c306t-743d6b3a70331a84ca41b8d565455b3b131d3cb1b34e715ad8e777d84fc46c493 |
| ISICitedReferencesCount | 9 |
| ISICitedReferencesURI | http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=000781385000001&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| ISSN | 1569-190X |
| IngestDate | Tue Nov 18 21:50:50 EST 2025 Sat Nov 29 07:06:05 EST 2025 Fri Feb 23 02:40:52 EST 2024 |
| IsPeerReviewed | true |
| IsScholarly | true |
| Keywords | Authentication protocol Wireless sensor networks Syverson-Van Oorschot (SVO), Automated Validation of Internet Security Protocols and Applications (AVISPA) Trusted connection architecture |
| Language | English |
| LinkModel | OpenURL |
| MergedId | FETCHMERGED-LOGICAL-c306t-743d6b3a70331a84ca41b8d565455b3b131d3cb1b34e715ad8e777d84fc46c493 |
| ORCID | 0000-0002-7495-4419 |
| ParticipantIDs | crossref_citationtrail_10_1016_j_simpat_2022_102522 crossref_primary_10_1016_j_simpat_2022_102522 elsevier_sciencedirect_doi_10_1016_j_simpat_2022_102522 |
| PublicationCentury | 2000 |
| PublicationDate | May 2022 2022-05-00 |
| PublicationDateYYYYMMDD | 2022-05-01 |
| PublicationDate_xml | – month: 05 year: 2022 text: May 2022 |
| PublicationDecade | 2020 |
| PublicationTitle | Simulation modelling practice and theory |
| PublicationYear | 2022 |
| Publisher | Elsevier B.V |
| Publisher_xml | – name: Elsevier B.V |
| References | Chen, Chou, Wu (bib0009) 2016; 2016 Mao, Zhang, Li (bib0018) 2018 Nguyen, Laurent, Oualha (bib0002) 2015; 32 Imamoto, Sakurai (bib0015) 2005; 135 Liu, Shen, Li (bib0003) 2013 Violence (bib0001) 2009 Zhang, Chen, Zhang (bib0013) 2010; 33 Wu, Xu, Kumari (bib0020) 2017; 8 (bib0004) 2013 Jain, Hussain (bib0007) 2017 Yein, Lin, Hsieh (bib0010) 2017 Jiang, Kumar, Ma (bib0021) 2017; 27 Syverson, Van Oorschot (bib0014) 1994 Kumari, Li, Wu (bib0005) 2016; 63 Srinivas, Mishra, Mukhopadhyay (bib0006) 2018; 9 Challa, Das, Odelu (bib0012) 2018; 69 Barash, Vaquero-Garcia, González-Vallinas (bib0016) 2013; 14 Fang, Zhang, Yang (bib0011) 2018; 46 Li, Niu, Bhuiyan (bib0019) 2017; 14 Ryu, Kim, Lee (bib0008) 2020 Vigano (bib0017) 2006; 155 Nguyen (10.1016/j.simpat.2022.102522_bib0002) 2015; 32 (10.1016/j.simpat.2022.102522_bib0004) 2013 Imamoto (10.1016/j.simpat.2022.102522_bib0015) 2005; 135 Vigano (10.1016/j.simpat.2022.102522_bib0017) 2006; 155 Violence (10.1016/j.simpat.2022.102522_bib0001) 2009 Mao (10.1016/j.simpat.2022.102522_bib0018) 2018 Barash (10.1016/j.simpat.2022.102522_bib0016) 2013; 14 Ryu (10.1016/j.simpat.2022.102522_bib0008) 2020 Zhang (10.1016/j.simpat.2022.102522_bib0013) 2010; 33 Chen (10.1016/j.simpat.2022.102522_bib0009) 2016; 2016 Challa (10.1016/j.simpat.2022.102522_bib0012) 2018; 69 Srinivas (10.1016/j.simpat.2022.102522_bib0006) 2018; 9 Jain (10.1016/j.simpat.2022.102522_bib0007) 2017 Li (10.1016/j.simpat.2022.102522_bib0019) 2017; 14 Yein (10.1016/j.simpat.2022.102522_bib0010) 2017 Kumari (10.1016/j.simpat.2022.102522_bib0005) 2016; 63 Fang (10.1016/j.simpat.2022.102522_bib0011) 2018; 46 Syverson (10.1016/j.simpat.2022.102522_bib0014) 1994 Jiang (10.1016/j.simpat.2022.102522_bib0021) 2017; 27 Liu (10.1016/j.simpat.2022.102522_bib0003) 2013 Wu (10.1016/j.simpat.2022.102522_bib0020) 2017; 8 |
| References_xml | – volume: 14 start-page: 1 year: 2013 end-page: 8 ident: bib0016 article-title: AVISPA: a web tool for the prediction and analysis of alternative splicing publication-title: Genome Biol. – volume: 155 start-page: 61 year: 2006 end-page: 86 ident: bib0017 article-title: Automated security protocol analysis with the AVISPA tool publication-title: Electronic Notes Theor. Comput. Sci. – year: 2013 ident: bib0004 publication-title: GB/T 29828-2013 Information Security Technology-Trusted Computing Specification-Trusted Connect Architecture – start-page: 1 year: 2017 end-page: 7 ident: bib0007 article-title: Simple, secure and dynamic protocol for mutual authentication of nodes in wireless sensor networks publication-title: Proceedings of the Second International Conference on Electrical, Computer and Communication Technologies (ICECCT) – volume: 63 start-page: 56 year: 2016 end-page: 75 ident: bib0005 article-title: A user friendly mutual authentication and key agreement scheme for wireless sensor networks using chaotic maps publication-title: Fut. Gener. Comput. Syst. – volume: 33 start-page: 706 year: 2010 end-page: 717 ident: bib0013 article-title: Research on trusted network connection publication-title: Chin. J. Comput. – start-page: 2018 year: 2018 ident: bib0018 article-title: Trusted authority assisted three-factor authentication and key agreement protocol for the implantable medical system publication-title: Wireless Commun. Mobile Comput. – volume: 46 start-page: 702 year: 2018 ident: bib0011 article-title: Three factor user authentication protocol for wireless sensor networks based on biometrics publication-title: Acta Electron. Sin. – volume: 27 start-page: e1937 year: 2017 ident: bib0021 article-title: A privacy-aware two-factor authentication protocol based on elliptic curve cryptography for wireless sensor networks publication-title: Int. J. Netw. Manag. – start-page: 1369 year: 2017 end-page: 1375 ident: bib0010 article-title: A secure mutual trust scheme for wireless sensor networks publication-title: Proceedings of the IEEE 26th International Symposium on Industrial Electronics (ISIE) – volume: 69 start-page: 534 year: 2018 end-page: 554 ident: bib0012 article-title: An efficient ECC-based provably secure three-factor user authentication and key agreement protocol for wireless healthcare sensor networks publication-title: Comput. Electric. Eng. – volume: 8 start-page: 101 year: 2017 end-page: 116 ident: bib0020 article-title: A privacy-preserving and provable user authentication scheme for wireless sensor networks based on internet of things security publication-title: J. Ambient Intell. Humaniz. Comput. – start-page: 14 year: 1994 end-page: 28 ident: bib0014 article-title: On unifying some cryptographic protocol logics publication-title: Proceedings of the IEEE Computer Society Symposium on Research in Security and Privacy – volume: 9 start-page: 875 year: 2018 end-page: 895 ident: bib0006 article-title: Provably secure biometric based authentication and key agreement protocol for wireless sensor networks publication-title: J. Ambient Intell. Humaniz. Comput. – year: 2009 ident: bib0001 article-title: Global status report on road safety: time for action – start-page: 1 year: 2020 end-page: 4 ident: bib0008 article-title: Cryptanalysis of Protocol for Heterogeneous Wireless Sensor Networks for the Internet of Things Environment publication-title: Proceedings of the 14th International Conference on Ubiquitous Information Management and Communication (IMCOM) – volume: 135 start-page: 79 year: 2005 end-page: 94 ident: bib0015 article-title: Design and analysis of diffie-Hellman-based key exchange using one-time ID by SVO logic publication-title: Electron. Notes Theor. Comput. Sci. – volume: 2016 start-page: 1 year: 2016 ident: bib0009 article-title: Improved on an efficient user authentication scheme for heterogeneous wireless sensor network tailored for the Internet of Things environment publication-title: IACR Cryptol. ePrint Arch. – volume: 14 start-page: 3599 year: 2017 end-page: 3609 ident: bib0019 article-title: A robust ECC-based provable secure authentication protocol with privacy preserving for industrial internet of things publication-title: IEEE Trans. Ind. Inform. – volume: 32 start-page: 17 year: 2015 end-page: 31 ident: bib0002 article-title: Survey on secure communication protocols for the Internet of Things publication-title: Ad Hoc Networks – start-page: 9 year: 2013 end-page: 12 ident: bib0003 article-title: A fingerprint-based user authentication protocol with one-time password for wireless sensor networks publication-title: Proceedings of the International Conference on Sensor Network Security Technology and Privacy Communication System – start-page: 1 year: 2017 ident: 10.1016/j.simpat.2022.102522_bib0007 article-title: Simple, secure and dynamic protocol for mutual authentication of nodes in wireless sensor networks – volume: 9 start-page: 875 issue: 4 year: 2018 ident: 10.1016/j.simpat.2022.102522_bib0006 article-title: Provably secure biometric based authentication and key agreement protocol for wireless sensor networks publication-title: J. Ambient Intell. Humaniz. Comput. doi: 10.1007/s12652-017-0474-8 – volume: 27 start-page: e1937 issue: 3 year: 2017 ident: 10.1016/j.simpat.2022.102522_bib0021 article-title: A privacy-aware two-factor authentication protocol based on elliptic curve cryptography for wireless sensor networks publication-title: Int. J. Netw. Manag. doi: 10.1002/nem.1937 – start-page: 9 year: 2013 ident: 10.1016/j.simpat.2022.102522_bib0003 article-title: A fingerprint-based user authentication protocol with one-time password for wireless sensor networks – start-page: 1 year: 2020 ident: 10.1016/j.simpat.2022.102522_bib0008 article-title: Cryptanalysis of Protocol for Heterogeneous Wireless Sensor Networks for the Internet of Things Environment – volume: 63 start-page: 56 year: 2016 ident: 10.1016/j.simpat.2022.102522_bib0005 article-title: A user friendly mutual authentication and key agreement scheme for wireless sensor networks using chaotic maps publication-title: Fut. Gener. Comput. Syst. doi: 10.1016/j.future.2016.04.016 – start-page: 14 year: 1994 ident: 10.1016/j.simpat.2022.102522_bib0014 article-title: On unifying some cryptographic protocol logics – volume: 33 start-page: 706 issue: 4 year: 2010 ident: 10.1016/j.simpat.2022.102522_bib0013 article-title: Research on trusted network connection publication-title: Chin. J. Comput. doi: 10.3724/SP.J.1016.2010.00706 – year: 2013 ident: 10.1016/j.simpat.2022.102522_bib0004 – volume: 2016 start-page: 1 year: 2016 ident: 10.1016/j.simpat.2022.102522_bib0009 article-title: Improved on an efficient user authentication scheme for heterogeneous wireless sensor network tailored for the Internet of Things environment publication-title: IACR Cryptol. ePrint Arch. – start-page: 1369 year: 2017 ident: 10.1016/j.simpat.2022.102522_bib0010 article-title: A secure mutual trust scheme for wireless sensor networks – volume: 46 start-page: 702 issue: 3 year: 2018 ident: 10.1016/j.simpat.2022.102522_bib0011 article-title: Three factor user authentication protocol for wireless sensor networks based on biometrics publication-title: Acta Electron. Sin. – volume: 32 start-page: 17 year: 2015 ident: 10.1016/j.simpat.2022.102522_bib0002 article-title: Survey on secure communication protocols for the Internet of Things publication-title: Ad Hoc Networks doi: 10.1016/j.adhoc.2015.01.006 – volume: 135 start-page: 79 issue: 1 year: 2005 ident: 10.1016/j.simpat.2022.102522_bib0015 article-title: Design and analysis of diffie-Hellman-based key exchange using one-time ID by SVO logic publication-title: Electron. Notes Theor. Comput. Sci. doi: 10.1016/j.entcs.2005.06.003 – volume: 14 start-page: 1 issue: 10 year: 2013 ident: 10.1016/j.simpat.2022.102522_bib0016 article-title: AVISPA: a web tool for the prediction and analysis of alternative splicing publication-title: Genome Biol. doi: 10.1186/gb-2013-14-10-r114 – year: 2009 ident: 10.1016/j.simpat.2022.102522_bib0001 – volume: 155 start-page: 61 year: 2006 ident: 10.1016/j.simpat.2022.102522_bib0017 article-title: Automated security protocol analysis with the AVISPA tool publication-title: Electronic Notes Theor. Comput. Sci. doi: 10.1016/j.entcs.2005.11.052 – start-page: 2018 year: 2018 ident: 10.1016/j.simpat.2022.102522_bib0018 article-title: Trusted authority assisted three-factor authentication and key agreement protocol for the implantable medical system publication-title: Wireless Commun. Mobile Comput. – volume: 69 start-page: 534 year: 2018 ident: 10.1016/j.simpat.2022.102522_bib0012 article-title: An efficient ECC-based provably secure three-factor user authentication and key agreement protocol for wireless healthcare sensor networks publication-title: Comput. Electric. Eng. doi: 10.1016/j.compeleceng.2017.08.003 – volume: 14 start-page: 3599 issue: 8 year: 2017 ident: 10.1016/j.simpat.2022.102522_bib0019 article-title: A robust ECC-based provable secure authentication protocol with privacy preserving for industrial internet of things publication-title: IEEE Trans. Ind. Inform. doi: 10.1109/TII.2017.2773666 – volume: 8 start-page: 101 issue: 1 year: 2017 ident: 10.1016/j.simpat.2022.102522_bib0020 article-title: A privacy-preserving and provable user authentication scheme for wireless sensor networks based on internet of things security publication-title: J. Ambient Intell. Humaniz. Comput. doi: 10.1007/s12652-016-0345-8 |
| SSID | ssj0018867 |
| Score | 2.3455877 |
| Snippet | Although wireless sensor networks (WSNs) are widely used in many fields, such as industrial production, medical studies, and environmental monitoring, they are... |
| SourceID | crossref elsevier |
| SourceType | Enrichment Source Index Database Publisher |
| StartPage | 102522 |
| SubjectTerms | Authentication protocol Syverson-Van Oorschot (SVO), Automated Validation of Internet Security Protocols and Applications (AVISPA) Trusted connection architecture Wireless sensor networks |
| Title | WSN node access authentication protocol based on trusted computing |
| URI | https://dx.doi.org/10.1016/j.simpat.2022.102522 |
| Volume | 117 |
| WOSCitedRecordID | wos000781385000001&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| journalDatabaseRights | – providerCode: PRVESC databaseName: Elsevier SD Freedom Collection Journals 2021 customDbUrl: eissn: 1878-1462 dateEnd: 99991231 omitProxy: false ssIdentifier: ssj0018867 issn: 1569-190X databaseCode: AIEXJ dateStart: 20021015 isFulltext: true titleUrlDefault: https://www.sciencedirect.com providerName: Elsevier |
| link | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtV3fb9MwELaqbg-8ABsgNmDyw94qoyZ2YvtxTEOApmpShyg8ECW2wzJtacXSqX_-zrGddi3ixyReoupUx9Hdp_PZvu8OocM0hTUvHzKiwPMRxrQmRSSGxDChy1LGQ65E22yCj0ZiMpFnvd73wIW5veJ1LRYLOfuvpgYZGNtSZ__B3N1LQQC_wejwBLPD868M_2U8GtRTbctkWArAILc57HXjz-ZsQlYzBesP7Pql27sCS7swLbttNm_CUuYD1nF17Rt8uaY5nr3uqFUh_XK6zCU-reYtMMJrlqLT6mJercm-mfrHqtT1xv4Kgxfz1fMI2Mp22X_ukGyDKOP8aioJxB4Tt-w4mbAbWLbmjB2Tc8OxuzOGy7c3ljxqc2Dj2FadSBypea1k9thOZ2eL4_ZqFZborZgnUvTR1tHHk8mn7p5JiLbHcPd5gVzZZgBuzvXr4GUlIDl_ih77nQQ-cgjYQT1T76InoUsH9k77GXoHgMAWENgBAt8HBA6AwC0gMEg8IHAHiOfo8_uT8-MPxHfOIAq2gA2BsFCnBc3BndMoF0zlLCqEhuCdJUlBi4hGmqoiKigzPEpyLQznXAtWKpYqJukL1K-ntXmJcE5LlpihEsqkrLTXtlzkIJFCmkLScg_RoJJM-bLytrvJVRbyBy8zp8jMKjJzitxDpBs1c2VV_vB_HrSd-dDQhXwZAOS3I_cfPPIVerTE92vUB-WbN2hb3TbVzc8Dj6Q7FM2KsQ |
| linkProvider | Elsevier |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=WSN+node+access+authentication+protocol+based+on+trusted+computing&rft.jtitle=Simulation+modelling+practice+and+theory&rft.au=Liu%2C+Jing&rft.au=Liu%2C+Lihui&rft.au=Liu%2C+Zenghui&rft.au=Lai%2C+Yingxu&rft.date=2022-05-01&rft.pub=Elsevier+B.V&rft.issn=1569-190X&rft.eissn=1878-1462&rft.volume=117&rft_id=info:doi/10.1016%2Fj.simpat.2022.102522&rft.externalDocID=S1569190X22000272 |
| thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1569-190X&client=summon |
| thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1569-190X&client=summon |
| thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1569-190X&client=summon |