A Realistic Lightweight Anonymous Authentication Protocol for Securing Real-Time Application Data Access in Wireless Sensor Networks
User authentication in wireless sensor networks (WSN) is a critical security issue due to their unattended and hostile deployment in the field. Since the sensor nodes are equipped with limited computing power, storage, and communication modules, authenticating remote users in such resource-constrain...
Uloženo v:
| Vydáno v: | IEEE transactions on industrial electronics (1982) Ročník 63; číslo 11; s. 7124 - 7132 |
|---|---|
| Hlavní autoři: | , |
| Médium: | Journal Article |
| Jazyk: | angličtina |
| Vydáno: |
New York
IEEE
01.11.2016
The Institute of Electrical and Electronics Engineers, Inc. (IEEE) |
| Témata: | |
| ISSN: | 0278-0046, 1557-9948 |
| On-line přístup: | Získat plný text |
| Tagy: |
Přidat tag
Žádné tagy, Buďte první, kdo vytvoří štítek k tomuto záznamu!
|
| Abstract | User authentication in wireless sensor networks (WSN) is a critical security issue due to their unattended and hostile deployment in the field. Since the sensor nodes are equipped with limited computing power, storage, and communication modules, authenticating remote users in such resource-constrained environment is a paramount security concern. Until now, impressive efforts have been made for designing authentication schemes with user anonymity by using only the lightweight cryptographic primitives, such as symmetric key encryption/decryption and hash functions. However, to the best of our knowledge, none has succeeded so far. In this paper, we take an initial step to shed light on the rationale underlying this prominent issue. In order to do that here at first, we demonstrate that the existing solutions for anonymous user authentication in WSN are impractical. Subsequently, we propose a realistic authentication protocol for WSN, which can ensure various imperative security properties like user anonymity, untraceability, forward/backward secrecy, perfect forward secrecy, etc. |
|---|---|
| AbstractList | User authentication in wireless sensor networks (WSN) is a critical security issue due to their unattended and hostile deployment in the field. Since the sensor nodes are equipped with limited computing power, storage, and communication modules, authenticating remote users in such resource-constrained environment is a paramount security concern. Until now, impressive efforts have been made for designing authentication schemes with user anonymity by using only the lightweight cryptographic primitives, such as symmetric key encryption/decryption and hash functions. However, to the best of our knowledge, none has succeeded so far. In this paper, we take an initial step to shed light on the rationale underlying this prominent issue. In order to do that here at first, we demonstrate that the existing solutions for anonymous user authentication in WSN are impractical. Subsequently, we propose a realistic authentication protocol for WSN, which can ensure various imperative security properties like user anonymity, untraceability, forward/backward secrecy, perfect forward secrecy, etc. |
| Author | Tzonelih Hwang Gope, Prosanta |
| Author_xml | – sequence: 1 givenname: Prosanta surname: Gope fullname: Gope, Prosanta email: prosanta.nitdgp@gmail.com organization: Centre for Res. in Cyber Security, Singapore Univ. of Technol. & Design, Singapore, Singapore – sequence: 2 surname: Tzonelih Hwang fullname: Tzonelih Hwang email: hwangtl@ismail.csie.ncku.edu.tw organization: Dept. of Comput. Sci. & Inf. Eng., Nat. Cheng Kung Univ., Tainan, Taiwan |
| BookMark | eNp9kEtLxDAURoMoOD72gpuA6443adOky-IbBhUdcVnSeKvRTjMmKeLeH27noQsXbpJAvvNd7tkhm53rkJADBmPGoDieXp2NObB8zIUSoNgGGTEhZFIUmdokI-BSJQBZvk12QngFYJlgYkS-SnqHurUhWkMn9vklfuDipOXQ_zlzfaBlH1-wG_51tK6jt95FZ1xLG-fpPZre2-55WZJM7QxpOZ-3P9lTHTUtjcEQqO3oo_XYLt732IWBvsb44fxb2CNbjW4D7q_vXfJwfjY9uUwmNxdXJ-UkMamQMSlqyVPMFGu4EJoxhPpJFVygzEUjhSrSvJHaCExTU_O81gIzI7KmzrHInsCku-Ro1Tv37r3HEKtX1_tuGFkxlTLgHJQcUrBKGe9C8NhUc29n2n9WDKqF62pwXS1cV2vXA5L_QYyNSwXRa9v-Bx6uQIuIv3OkAIBh12_0Ao9u |
| CODEN | ITIED6 |
| CitedBy_id | crossref_primary_10_1007_s11276_020_02491_0 crossref_primary_10_1007_s11276_025_03980_w crossref_primary_10_1007_s12083_020_01063_5 crossref_primary_10_1109_TETC_2017_2759306 crossref_primary_10_1007_s10207_022_00619_1 crossref_primary_10_1007_s12083_021_01190_7 crossref_primary_10_1007_s11042_024_19898_y crossref_primary_10_1016_j_cose_2024_104310 crossref_primary_10_1016_j_jisa_2021_102798 crossref_primary_10_1016_j_sysarc_2018_12_005 crossref_primary_10_1007_s10796_021_10139_3 crossref_primary_10_1007_s11036_020_01706_0 crossref_primary_10_1109_TII_2022_3204692 crossref_primary_10_1155_2021_1680866 crossref_primary_10_1016_j_comnet_2018_11_021 crossref_primary_10_1007_s10207_021_00545_8 crossref_primary_10_1007_s00521_021_05990_z crossref_primary_10_1016_j_jksuci_2023_101785 crossref_primary_10_1109_ACCESS_2019_2926578 crossref_primary_10_1109_ACCESS_2019_2941575 crossref_primary_10_1109_TNSM_2022_3173975 crossref_primary_10_1016_j_future_2019_12_028 crossref_primary_10_1016_j_comcom_2023_06_017 crossref_primary_10_32604_cmc_2024_049017 crossref_primary_10_1109_TVT_2022_3188769 crossref_primary_10_1080_1206212X_2020_1825159 crossref_primary_10_3390_s20051357 crossref_primary_10_3390_sym14071483 crossref_primary_10_1007_s12046_020_1319_2 crossref_primary_10_3233_JIFS_179936 crossref_primary_10_1109_TII_2022_3179728 crossref_primary_10_1002_ett_3813 crossref_primary_10_1007_s11845_020_02425_x crossref_primary_10_1109_TMC_2025_3526076 crossref_primary_10_1109_JIOT_2023_3317292 crossref_primary_10_1002_ett_4747 crossref_primary_10_1109_TNSE_2022_3151843 crossref_primary_10_26636_jtit_2019_134019 crossref_primary_10_3390_s20247136 crossref_primary_10_1109_JSAC_2020_3020599 crossref_primary_10_1109_JSYST_2021_3101201 crossref_primary_10_1002_dac_4823 crossref_primary_10_1007_s11042_024_18114_1 crossref_primary_10_1007_s11334_023_00532_3 crossref_primary_10_1016_j_micpro_2022_104722 crossref_primary_10_1007_s11042_025_20738_w crossref_primary_10_1109_JIOT_2019_2923373 crossref_primary_10_1007_s11227_020_03415_7 crossref_primary_10_1007_s12652_024_04810_1 crossref_primary_10_1109_ACCESS_2023_3255646 crossref_primary_10_1016_j_compeleceng_2017_03_008 crossref_primary_10_1016_j_jksuci_2023_101601 crossref_primary_10_3390_s19051141 crossref_primary_10_1109_JIOT_2024_3367799 crossref_primary_10_1109_ACCESS_2019_2910859 crossref_primary_10_1186_s13638_021_02000_7 crossref_primary_10_1177_1550147717709460 crossref_primary_10_1016_j_future_2017_06_023 crossref_primary_10_3390_s18113663 crossref_primary_10_1007_s12083_017_0627_8 crossref_primary_10_3390_s25175594 crossref_primary_10_1109_JIOT_2024_3483275 crossref_primary_10_3390_cryptography3030020 crossref_primary_10_3390_app6120418 crossref_primary_10_1109_TSMC_2019_2957175 crossref_primary_10_1002_dac_4139 crossref_primary_10_1016_j_asej_2025_103605 crossref_primary_10_1016_j_future_2025_107711 crossref_primary_10_1016_j_jisa_2022_103259 crossref_primary_10_3390_math11132951 crossref_primary_10_1007_s11042_023_14539_2 crossref_primary_10_1109_TIFS_2018_2832849 crossref_primary_10_1007_s12083_024_01806_8 crossref_primary_10_1109_TII_2020_3043802 crossref_primary_10_1016_j_iot_2023_100782 crossref_primary_10_1109_ACCESS_2020_2980739 crossref_primary_10_1007_s11277_020_07527_4 crossref_primary_10_1088_2631_8695_ade75d crossref_primary_10_1002_dac_5992 crossref_primary_10_1109_ACCESS_2020_2978303 crossref_primary_10_1016_j_future_2017_08_006 crossref_primary_10_1109_JSEN_2019_2931932 crossref_primary_10_1002_dac_4724 crossref_primary_10_1007_s12083_020_00973_8 crossref_primary_10_1016_j_comnet_2021_108476 crossref_primary_10_1109_TDSC_2022_3148825 crossref_primary_10_1111_exsy_13579 crossref_primary_10_1016_j_comnet_2019_04_031 crossref_primary_10_1109_TIE_2020_2979567 crossref_primary_10_1109_TCC_2022_3216580 crossref_primary_10_1016_j_csi_2023_103735 crossref_primary_10_1007_s12652_018_0712_8 crossref_primary_10_1109_TDSC_2025_3563552 crossref_primary_10_1109_ACCESS_2019_2942987 crossref_primary_10_1049_iet_ifs_2019_0491 crossref_primary_10_1371_journal_pone_0298276 crossref_primary_10_1002_dac_3242 crossref_primary_10_1007_s11704_023_2595_x crossref_primary_10_1016_j_comcom_2020_02_011 crossref_primary_10_1109_TCE_2018_2811260 crossref_primary_10_1109_JSYST_2022_3152561 crossref_primary_10_1109_TII_2019_2895030 crossref_primary_10_3390_s23125703 crossref_primary_10_1109_TII_2018_2834351 crossref_primary_10_3390_s25072013 crossref_primary_10_1109_JSEN_2016_2628413 crossref_primary_10_1109_JIOT_2023_3279035 crossref_primary_10_1109_TIE_2017_2716863 crossref_primary_10_1007_s10916_017_0699_2 crossref_primary_10_1109_ACCESS_2024_3424418 crossref_primary_10_1016_j_jnca_2021_103281 crossref_primary_10_1109_ACCESS_2019_2941701 crossref_primary_10_1109_TDSC_2020_2974220 crossref_primary_10_1016_j_mejo_2021_105265 crossref_primary_10_1109_JIOT_2017_2723915 crossref_primary_10_1016_j_future_2019_06_020 crossref_primary_10_2298_SJEE2502223D crossref_primary_10_3390_s17112681 crossref_primary_10_1007_s11042_021_10950_9 crossref_primary_10_1007_s11277_020_07385_0 crossref_primary_10_32604_cmc_2025_060372 crossref_primary_10_3390_s16111908 crossref_primary_10_1007_s12652_018_0710_x crossref_primary_10_1109_TIFS_2022_3227753 crossref_primary_10_1109_ACCESS_2020_2985719 crossref_primary_10_1109_ACCESS_2021_3096188 crossref_primary_10_1109_JIOT_2023_3285992 crossref_primary_10_1109_TGCN_2021_3077318 crossref_primary_10_1016_j_sysarc_2022_102650 crossref_primary_10_1007_s11276_018_1841_x crossref_primary_10_1016_j_jisa_2020_102683 crossref_primary_10_1016_j_sysarc_2021_102296 crossref_primary_10_1108_IJPCC_06_2021_0144 crossref_primary_10_3390_s24041243 crossref_primary_10_1016_j_comcom_2024_04_011 crossref_primary_10_1002_dac_4194 crossref_primary_10_1051_matecconf_201817303019 crossref_primary_10_1016_j_comnet_2020_107333 crossref_primary_10_1007_s42452_020_04089_9 crossref_primary_10_1002_dac_5028 crossref_primary_10_3390_sym14010046 crossref_primary_10_1007_s11128_022_03717_0 crossref_primary_10_1016_j_future_2017_08_042 crossref_primary_10_1016_j_future_2020_11_010 crossref_primary_10_4108_eetpht_9_3114 crossref_primary_10_1109_TSC_2020_2964537 crossref_primary_10_1109_TII_2017_2773666 crossref_primary_10_1016_j_egyr_2022_02_061 crossref_primary_10_1109_JIOT_2022_3142084 crossref_primary_10_1145_3474554 crossref_primary_10_3390_electronics13173385 crossref_primary_10_1016_j_iot_2023_101037 crossref_primary_10_1007_s11042_022_12946_5 crossref_primary_10_1145_3325130 crossref_primary_10_1016_j_comcom_2020_06_010 crossref_primary_10_1109_TII_2019_2944678 crossref_primary_10_1109_TII_2024_3414443 |
| Cites_doi | 10.1145/1182807.1182823 10.3390/s130809589 10.1007/s12083-014-0285-z 10.1109/JSEN.2015.2502401 10.1109/MCOM.2002.1024422 10.1109/ICECC.2011.6067856 10.1016/j.jnca.2015.12.003 10.1109/TMC.2011.126 10.1631/jzus.C1000377 10.1016/j.cose.2015.05.004 10.1007/BF00124891 10.1007/BF01388651 10.1002/dac.2933 10.1109/TWC.2008.080128 10.1109/TIT.1983.1056650 10.4218/etrij.10.1510.0134 10.1016/j.jnca.2012.05.010 10.1007/s11277-015-2288-3 10.1109/JSEN.2015.2441113 10.1109/SUTC.2006.1636182 10.3390/s110505020 10.1007/s12083-014-0324-9 10.1007/3-540-48405-1_25 10.1109/JSYST.2015.2416396 10.1016/j.comnet.2014.07.010 10.3390/s110504767 |
| ContentType | Journal Article |
| Copyright | Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2016 |
| Copyright_xml | – notice: Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2016 |
| DBID | 97E RIA RIE AAYXX CITATION 7SP 8FD L7M |
| DOI | 10.1109/TIE.2016.2585081 |
| DatabaseName | IEEE All-Society Periodicals Package (ASPP) 2005-present IEEE All-Society Periodicals Package (ASPP) 1998–Present IEEE Electronic Library (IEL) CrossRef Electronics & Communications Abstracts Technology Research Database Advanced Technologies Database with Aerospace |
| DatabaseTitle | CrossRef Technology Research Database Advanced Technologies Database with Aerospace Electronics & Communications Abstracts |
| DatabaseTitleList | Technology Research Database |
| Database_xml | – sequence: 1 dbid: RIE name: IEEE Electronic Library (IEL) url: https://ieeexplore.ieee.org/ sourceTypes: Publisher |
| DeliveryMethod | fulltext_linktorsrc |
| Discipline | Engineering |
| EISSN | 1557-9948 |
| EndPage | 7132 |
| ExternalDocumentID | 4224039951 10_1109_TIE_2016_2585081 7500072 |
| Genre | orig-research |
| GroupedDBID | -~X .DC 0R~ 29I 4.4 5GY 5VS 6IK 97E 9M8 AAJGR AARMG AASAJ AAWTH ABAZT ABQJQ ABVLG ACGFO ACGFS ACIWK ACKIV ACNCT AENEX AETIX AGQYO AGSQL AHBIQ AI. AIBXA AKJIK AKQYR ALLEH ALMA_UNASSIGNED_HOLDINGS ASUFR ATWAV BEFXN BFFAM BGNUA BKEBE BPEOZ CS3 DU5 EBS EJD HZ~ H~9 IBMZZ ICLAB IFIPE IFJZH IPLJI JAVBF LAI M43 MS~ O9- OCL P2P RIA RIE RNS TAE TN5 TWZ VH1 VJK AAYXX CITATION 7SP 8FD L7M |
| ID | FETCH-LOGICAL-c357t-9b723e481f255a11e0bd8925e765f758936f7ac5e33cb26ba5e4c54fb6e94d0c3 |
| IEDL.DBID | RIE |
| ISICitedReferencesCount | 189 |
| ISICitedReferencesURI | http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=000388622100048&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| ISSN | 0278-0046 |
| IngestDate | Wed Oct 15 13:15:01 EDT 2025 Sat Nov 29 01:31:32 EST 2025 Tue Nov 18 22:22:14 EST 2025 Tue Aug 26 16:42:46 EDT 2025 |
| IsPeerReviewed | true |
| IsScholarly | true |
| Issue | 11 |
| Language | English |
| License | https://ieeexplore.ieee.org/Xplorehelp/downloads/license-information/IEEE.html |
| LinkModel | DirectLink |
| MergedId | FETCHMERGED-LOGICAL-c357t-9b723e481f255a11e0bd8925e765f758936f7ac5e33cb26ba5e4c54fb6e94d0c3 |
| Notes | ObjectType-Article-1 SourceType-Scholarly Journals-1 ObjectType-Feature-2 content type line 14 |
| ORCID | 0000-0001-5636-8726 |
| PQID | 1831022087 |
| PQPubID | 85464 |
| PageCount | 9 |
| ParticipantIDs | proquest_journals_1831022087 crossref_primary_10_1109_TIE_2016_2585081 ieee_primary_7500072 crossref_citationtrail_10_1109_TIE_2016_2585081 |
| PublicationCentury | 2000 |
| PublicationDate | 2016-Nov. 2016-11-00 20161101 |
| PublicationDateYYYYMMDD | 2016-11-01 |
| PublicationDate_xml | – month: 11 year: 2016 text: 2016-Nov. |
| PublicationDecade | 2010 |
| PublicationPlace | New York |
| PublicationPlace_xml | – name: New York |
| PublicationTitle | IEEE transactions on industrial electronics (1982) |
| PublicationTitleAbbrev | TIE |
| PublicationYear | 2016 |
| Publisher | IEEE The Institute of Electrical and Electronics Engineers, Inc. (IEEE) |
| Publisher_xml | – name: IEEE – name: The Institute of Electrical and Electronics Engineers, Inc. (IEEE) |
| References | ref13 ref12 ref15 ref11 ref10 ref2 ref1 ref17 ref16 ref19 ref18 nguyen (ref5) 0 ref24 ref23 ref26 ref25 ref20 ref21 he (ref9) 2010; 10 ref28 (ref30) 2016 ref27 jiang (ref14) 2012; 9 ref29 ref8 ref7 ref4 ref3 ref6 dovel (ref22) 1983; 29 |
| References_xml | – ident: ref2 doi: 10.1145/1182807.1182823 – ident: ref17 doi: 10.3390/s130809589 – ident: ref20 doi: 10.1007/s12083-014-0285-z – ident: ref4 doi: 10.1109/JSEN.2015.2502401 – ident: ref1 doi: 10.1109/MCOM.2002.1024422 – start-page: 248 year: 0 ident: ref5 article-title: A dynamic ID-based authentication scheme publication-title: Proc 6th Int Conf Netw Comput Adv Inf Manage – ident: ref24 doi: 10.1109/ICECC.2011.6067856 – ident: ref27 doi: 10.1016/j.jnca.2015.12.003 – ident: ref3 doi: 10.1109/TMC.2011.126 – ident: ref11 doi: 10.1631/jzus.C1000377 – ident: ref25 doi: 10.1016/j.cose.2015.05.004 – ident: ref28 doi: 10.1007/BF00124891 – ident: ref29 doi: 10.1007/BF01388651 – ident: ref19 doi: 10.1002/dac.2933 – ident: ref8 doi: 10.1109/TWC.2008.080128 – volume: 29 start-page: 198 year: 1983 ident: ref22 article-title: On the security of public key protocols publication-title: IEEE Trans Inf Theory doi: 10.1109/TIT.1983.1056650 – ident: ref15 doi: 10.4218/etrij.10.1510.0134 – ident: ref16 doi: 10.1016/j.jnca.2012.05.010 – ident: ref18 doi: 10.1007/s11277-015-2288-3 – ident: ref6 doi: 10.1109/JSEN.2015.2441113 – volume: 10 start-page: 361 year: 2010 ident: ref9 article-title: An enhanced two-factor user authentication scheme in wireless sensor networks publication-title: Wireless Adhoc and Sensor Networks – ident: ref7 doi: 10.1109/SUTC.2006.1636182 – ident: ref13 doi: 10.3390/s110505020 – ident: ref21 doi: 10.1007/s12083-014-0324-9 – ident: ref23 doi: 10.1007/3-540-48405-1_25 – ident: ref26 doi: 10.1109/JSYST.2015.2416396 – ident: ref12 doi: 10.1016/j.comnet.2014.07.010 – volume: 9 start-page: 103 year: 2012 ident: ref14 article-title: Security enhancement of robust user authentication framework for wireless sensor networks publication-title: China Commun – year: 2016 ident: ref30 – ident: ref10 doi: 10.3390/s110504767 |
| SSID | ssj0014515 |
| Score | 2.589504 |
| Snippet | User authentication in wireless sensor networks (WSN) is a critical security issue due to their unattended and hostile deployment in the field. Since the... |
| SourceID | proquest crossref ieee |
| SourceType | Aggregation Database Enrichment Source Index Database Publisher |
| StartPage | 7124 |
| SubjectTerms | Authentication Cryptography Logic gates Mutual authentication Protocols Real-time systems user anonymity wireless sensor network (WSN) Wireless sensor networks |
| Title | A Realistic Lightweight Anonymous Authentication Protocol for Securing Real-Time Application Data Access in Wireless Sensor Networks |
| URI | https://ieeexplore.ieee.org/document/7500072 https://www.proquest.com/docview/1831022087 |
| Volume | 63 |
| WOSCitedRecordID | wos000388622100048&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| journalDatabaseRights | – providerCode: PRVIEE databaseName: IEEE Electronic Library (IEL) customDbUrl: eissn: 1557-9948 dateEnd: 99991231 omitProxy: false ssIdentifier: ssj0014515 issn: 0278-0046 databaseCode: RIE dateStart: 19820101 isFulltext: true titleUrlDefault: https://ieeexplore.ieee.org/ providerName: IEEE |
| link | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV1JS8QwFA6jeNCDuzhu5OBFsE6TLmmOgwsKMgxueCtJ-iIDw4zMVP0D_nDz0k5VFMFbD0lo-dLkfW_5HiGHqBCeuXs5kNqKIDYCgozrIrCFZIkCYavysYdr0etlj4-y3yLHTS0MAPjkMzjBRx_LL8bmBV1lHYHq_cIduHNCiKpWq4kYxEnVrYCjYqwjfbOQZCg7d1fnmMOVnnBnG4cZ-3YF-Z4qPw5if7tcrPzvvVbJcm1F0m4F-xppwWidLH3RFtwg7116A6hu6IbQa6Tgb94LShvCT9E9hslCldeO9ifjcuz2BXV2LK398E9-kQALRWj3M9ZNz1SpaNc3W6SDEcUc2iE-3zpW7Gb3quTy6Sa5vzi_O70M6pYLgYkSUTrEBI8gzph1VEMxBqEuMskTEGliHbWQUWqFMglEkdE81SqB2CSx1SnIuAhNtEXm3VfANqFWKwtSaGcjiNhopsFZlgw4U3FaSAVt0pmhkJtajxzbYgxzz0tCmTvccsQtr3Frk6NmxnOlxfHH2A3EqRlXQ9QmezOg8_pnneYMm61xHmZi5_dZu2QR165KEPfIfDl5gX2yYF7LwXRy4PfhB41F3Kk |
| linkProvider | IEEE |
| linkToHtml | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV1Nb9QwEB1VpRJwgEJBLJTiAxck0o0dO46PK2jVqsuqKgvqLbKdMapUddFuCn-AH47HyaYgUKXecrDzoefY8-bjDcBbUgiv4rmcGRd0Jr3GrBKuyUJjuLKoQ1c-9nWqZ7Pq_NycbsD7oRYGEVPyGe7TZYrlNwt_Ta6ysSb1fh033HtKSsG7aq0hZiBV169AkGZspH3roGRuxvPjA8riKvdFtI7ziv91CKWuKv9sxel8OXx8tzfbhke9HckmHfBPYAOvnsLDP9QFd-DXhJ0h6RvGIWxKJPxn8oOygfIzcpBRulDnt2Ony0W7iCuDRUuW9Z74b-kmGZWKsMlNtJt9tK1lk9RukV1cMcqivaTrz5EXx9mzLr189Qy-HB7MPxxlfdOFzBdKtxEzLQqUFQ-RbFjOMXdNZYRCXaoQyYUpyqCtV1gU3onSWYXSKxlciUY2uS-ew2b8CnwBLDgb0GgXrQQtveMOo23JUXAry8ZYHMF4jULte0VyaoxxWSdmkps64lYTbnWP2wjeDTO-d2oct4zdIZyGcT1EI9hdA133v-uq5tRuTYi80i__P-sN3D-af5rW0-PZySt4QM_pChJ3YbNdXuNr2PI_2ovVci-tyd8rq9_w |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=A+Realistic+Lightweight+Anonymous+Authentication+Protocol+for+Securing+Real-Time+Application+Data+Access+in+Wireless+Sensor+Networks&rft.jtitle=IEEE+transactions+on+industrial+electronics+%281982%29&rft.au=Gope%2C+Prosanta&rft.au=Hwang%2C+Tzonelih&rft.date=2016-11-01&rft.issn=0278-0046&rft.eissn=1557-9948&rft.volume=63&rft.issue=11&rft.spage=7124&rft.epage=7132&rft_id=info:doi/10.1109%2FTIE.2016.2585081&rft.externalDBID=n%2Fa&rft.externalDocID=10_1109_TIE_2016_2585081 |
| thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=0278-0046&client=summon |
| thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=0278-0046&client=summon |
| thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=0278-0046&client=summon |