A Realistic Lightweight Anonymous Authentication Protocol for Securing Real-Time Application Data Access in Wireless Sensor Networks

User authentication in wireless sensor networks (WSN) is a critical security issue due to their unattended and hostile deployment in the field. Since the sensor nodes are equipped with limited computing power, storage, and communication modules, authenticating remote users in such resource-constrain...

Celý popis

Uloženo v:
Podrobná bibliografie
Vydáno v:IEEE transactions on industrial electronics (1982) Ročník 63; číslo 11; s. 7124 - 7132
Hlavní autoři: Gope, Prosanta, Tzonelih Hwang
Médium: Journal Article
Jazyk:angličtina
Vydáno: New York IEEE 01.11.2016
The Institute of Electrical and Electronics Engineers, Inc. (IEEE)
Témata:
ISSN:0278-0046, 1557-9948
On-line přístup:Získat plný text
Tagy: Přidat tag
Žádné tagy, Buďte první, kdo vytvoří štítek k tomuto záznamu!
Abstract User authentication in wireless sensor networks (WSN) is a critical security issue due to their unattended and hostile deployment in the field. Since the sensor nodes are equipped with limited computing power, storage, and communication modules, authenticating remote users in such resource-constrained environment is a paramount security concern. Until now, impressive efforts have been made for designing authentication schemes with user anonymity by using only the lightweight cryptographic primitives, such as symmetric key encryption/decryption and hash functions. However, to the best of our knowledge, none has succeeded so far. In this paper, we take an initial step to shed light on the rationale underlying this prominent issue. In order to do that here at first, we demonstrate that the existing solutions for anonymous user authentication in WSN are impractical. Subsequently, we propose a realistic authentication protocol for WSN, which can ensure various imperative security properties like user anonymity, untraceability, forward/backward secrecy, perfect forward secrecy, etc.
AbstractList User authentication in wireless sensor networks (WSN) is a critical security issue due to their unattended and hostile deployment in the field. Since the sensor nodes are equipped with limited computing power, storage, and communication modules, authenticating remote users in such resource-constrained environment is a paramount security concern. Until now, impressive efforts have been made for designing authentication schemes with user anonymity by using only the lightweight cryptographic primitives, such as symmetric key encryption/decryption and hash functions. However, to the best of our knowledge, none has succeeded so far. In this paper, we take an initial step to shed light on the rationale underlying this prominent issue. In order to do that here at first, we demonstrate that the existing solutions for anonymous user authentication in WSN are impractical. Subsequently, we propose a realistic authentication protocol for WSN, which can ensure various imperative security properties like user anonymity, untraceability, forward/backward secrecy, perfect forward secrecy, etc.
Author Tzonelih Hwang
Gope, Prosanta
Author_xml – sequence: 1
  givenname: Prosanta
  surname: Gope
  fullname: Gope, Prosanta
  email: prosanta.nitdgp@gmail.com
  organization: Centre for Res. in Cyber Security, Singapore Univ. of Technol. & Design, Singapore, Singapore
– sequence: 2
  surname: Tzonelih Hwang
  fullname: Tzonelih Hwang
  email: hwangtl@ismail.csie.ncku.edu.tw
  organization: Dept. of Comput. Sci. & Inf. Eng., Nat. Cheng Kung Univ., Tainan, Taiwan
BookMark eNp9kEtLxDAURoMoOD72gpuA6443adOky-IbBhUdcVnSeKvRTjMmKeLeH27noQsXbpJAvvNd7tkhm53rkJADBmPGoDieXp2NObB8zIUSoNgGGTEhZFIUmdokI-BSJQBZvk12QngFYJlgYkS-SnqHurUhWkMn9vklfuDipOXQ_zlzfaBlH1-wG_51tK6jt95FZ1xLG-fpPZre2-55WZJM7QxpOZ-3P9lTHTUtjcEQqO3oo_XYLt732IWBvsb44fxb2CNbjW4D7q_vXfJwfjY9uUwmNxdXJ-UkMamQMSlqyVPMFGu4EJoxhPpJFVygzEUjhSrSvJHaCExTU_O81gIzI7KmzrHInsCku-Ro1Tv37r3HEKtX1_tuGFkxlTLgHJQcUrBKGe9C8NhUc29n2n9WDKqF62pwXS1cV2vXA5L_QYyNSwXRa9v-Bx6uQIuIv3OkAIBh12_0Ao9u
CODEN ITIED6
CitedBy_id crossref_primary_10_1007_s11276_020_02491_0
crossref_primary_10_1007_s11276_025_03980_w
crossref_primary_10_1007_s12083_020_01063_5
crossref_primary_10_1109_TETC_2017_2759306
crossref_primary_10_1007_s10207_022_00619_1
crossref_primary_10_1007_s12083_021_01190_7
crossref_primary_10_1007_s11042_024_19898_y
crossref_primary_10_1016_j_cose_2024_104310
crossref_primary_10_1016_j_jisa_2021_102798
crossref_primary_10_1016_j_sysarc_2018_12_005
crossref_primary_10_1007_s10796_021_10139_3
crossref_primary_10_1007_s11036_020_01706_0
crossref_primary_10_1109_TII_2022_3204692
crossref_primary_10_1155_2021_1680866
crossref_primary_10_1016_j_comnet_2018_11_021
crossref_primary_10_1007_s10207_021_00545_8
crossref_primary_10_1007_s00521_021_05990_z
crossref_primary_10_1016_j_jksuci_2023_101785
crossref_primary_10_1109_ACCESS_2019_2926578
crossref_primary_10_1109_ACCESS_2019_2941575
crossref_primary_10_1109_TNSM_2022_3173975
crossref_primary_10_1016_j_future_2019_12_028
crossref_primary_10_1016_j_comcom_2023_06_017
crossref_primary_10_32604_cmc_2024_049017
crossref_primary_10_1109_TVT_2022_3188769
crossref_primary_10_1080_1206212X_2020_1825159
crossref_primary_10_3390_s20051357
crossref_primary_10_3390_sym14071483
crossref_primary_10_1007_s12046_020_1319_2
crossref_primary_10_3233_JIFS_179936
crossref_primary_10_1109_TII_2022_3179728
crossref_primary_10_1002_ett_3813
crossref_primary_10_1007_s11845_020_02425_x
crossref_primary_10_1109_TMC_2025_3526076
crossref_primary_10_1109_JIOT_2023_3317292
crossref_primary_10_1002_ett_4747
crossref_primary_10_1109_TNSE_2022_3151843
crossref_primary_10_26636_jtit_2019_134019
crossref_primary_10_3390_s20247136
crossref_primary_10_1109_JSAC_2020_3020599
crossref_primary_10_1109_JSYST_2021_3101201
crossref_primary_10_1002_dac_4823
crossref_primary_10_1007_s11042_024_18114_1
crossref_primary_10_1007_s11334_023_00532_3
crossref_primary_10_1016_j_micpro_2022_104722
crossref_primary_10_1007_s11042_025_20738_w
crossref_primary_10_1109_JIOT_2019_2923373
crossref_primary_10_1007_s11227_020_03415_7
crossref_primary_10_1007_s12652_024_04810_1
crossref_primary_10_1109_ACCESS_2023_3255646
crossref_primary_10_1016_j_compeleceng_2017_03_008
crossref_primary_10_1016_j_jksuci_2023_101601
crossref_primary_10_3390_s19051141
crossref_primary_10_1109_JIOT_2024_3367799
crossref_primary_10_1109_ACCESS_2019_2910859
crossref_primary_10_1186_s13638_021_02000_7
crossref_primary_10_1177_1550147717709460
crossref_primary_10_1016_j_future_2017_06_023
crossref_primary_10_3390_s18113663
crossref_primary_10_1007_s12083_017_0627_8
crossref_primary_10_3390_s25175594
crossref_primary_10_1109_JIOT_2024_3483275
crossref_primary_10_3390_cryptography3030020
crossref_primary_10_3390_app6120418
crossref_primary_10_1109_TSMC_2019_2957175
crossref_primary_10_1002_dac_4139
crossref_primary_10_1016_j_asej_2025_103605
crossref_primary_10_1016_j_future_2025_107711
crossref_primary_10_1016_j_jisa_2022_103259
crossref_primary_10_3390_math11132951
crossref_primary_10_1007_s11042_023_14539_2
crossref_primary_10_1109_TIFS_2018_2832849
crossref_primary_10_1007_s12083_024_01806_8
crossref_primary_10_1109_TII_2020_3043802
crossref_primary_10_1016_j_iot_2023_100782
crossref_primary_10_1109_ACCESS_2020_2980739
crossref_primary_10_1007_s11277_020_07527_4
crossref_primary_10_1088_2631_8695_ade75d
crossref_primary_10_1002_dac_5992
crossref_primary_10_1109_ACCESS_2020_2978303
crossref_primary_10_1016_j_future_2017_08_006
crossref_primary_10_1109_JSEN_2019_2931932
crossref_primary_10_1002_dac_4724
crossref_primary_10_1007_s12083_020_00973_8
crossref_primary_10_1016_j_comnet_2021_108476
crossref_primary_10_1109_TDSC_2022_3148825
crossref_primary_10_1111_exsy_13579
crossref_primary_10_1016_j_comnet_2019_04_031
crossref_primary_10_1109_TIE_2020_2979567
crossref_primary_10_1109_TCC_2022_3216580
crossref_primary_10_1016_j_csi_2023_103735
crossref_primary_10_1007_s12652_018_0712_8
crossref_primary_10_1109_TDSC_2025_3563552
crossref_primary_10_1109_ACCESS_2019_2942987
crossref_primary_10_1049_iet_ifs_2019_0491
crossref_primary_10_1371_journal_pone_0298276
crossref_primary_10_1002_dac_3242
crossref_primary_10_1007_s11704_023_2595_x
crossref_primary_10_1016_j_comcom_2020_02_011
crossref_primary_10_1109_TCE_2018_2811260
crossref_primary_10_1109_JSYST_2022_3152561
crossref_primary_10_1109_TII_2019_2895030
crossref_primary_10_3390_s23125703
crossref_primary_10_1109_TII_2018_2834351
crossref_primary_10_3390_s25072013
crossref_primary_10_1109_JSEN_2016_2628413
crossref_primary_10_1109_JIOT_2023_3279035
crossref_primary_10_1109_TIE_2017_2716863
crossref_primary_10_1007_s10916_017_0699_2
crossref_primary_10_1109_ACCESS_2024_3424418
crossref_primary_10_1016_j_jnca_2021_103281
crossref_primary_10_1109_ACCESS_2019_2941701
crossref_primary_10_1109_TDSC_2020_2974220
crossref_primary_10_1016_j_mejo_2021_105265
crossref_primary_10_1109_JIOT_2017_2723915
crossref_primary_10_1016_j_future_2019_06_020
crossref_primary_10_2298_SJEE2502223D
crossref_primary_10_3390_s17112681
crossref_primary_10_1007_s11042_021_10950_9
crossref_primary_10_1007_s11277_020_07385_0
crossref_primary_10_32604_cmc_2025_060372
crossref_primary_10_3390_s16111908
crossref_primary_10_1007_s12652_018_0710_x
crossref_primary_10_1109_TIFS_2022_3227753
crossref_primary_10_1109_ACCESS_2020_2985719
crossref_primary_10_1109_ACCESS_2021_3096188
crossref_primary_10_1109_JIOT_2023_3285992
crossref_primary_10_1109_TGCN_2021_3077318
crossref_primary_10_1016_j_sysarc_2022_102650
crossref_primary_10_1007_s11276_018_1841_x
crossref_primary_10_1016_j_jisa_2020_102683
crossref_primary_10_1016_j_sysarc_2021_102296
crossref_primary_10_1108_IJPCC_06_2021_0144
crossref_primary_10_3390_s24041243
crossref_primary_10_1016_j_comcom_2024_04_011
crossref_primary_10_1002_dac_4194
crossref_primary_10_1051_matecconf_201817303019
crossref_primary_10_1016_j_comnet_2020_107333
crossref_primary_10_1007_s42452_020_04089_9
crossref_primary_10_1002_dac_5028
crossref_primary_10_3390_sym14010046
crossref_primary_10_1007_s11128_022_03717_0
crossref_primary_10_1016_j_future_2017_08_042
crossref_primary_10_1016_j_future_2020_11_010
crossref_primary_10_4108_eetpht_9_3114
crossref_primary_10_1109_TSC_2020_2964537
crossref_primary_10_1109_TII_2017_2773666
crossref_primary_10_1016_j_egyr_2022_02_061
crossref_primary_10_1109_JIOT_2022_3142084
crossref_primary_10_1145_3474554
crossref_primary_10_3390_electronics13173385
crossref_primary_10_1016_j_iot_2023_101037
crossref_primary_10_1007_s11042_022_12946_5
crossref_primary_10_1145_3325130
crossref_primary_10_1016_j_comcom_2020_06_010
crossref_primary_10_1109_TII_2019_2944678
crossref_primary_10_1109_TII_2024_3414443
Cites_doi 10.1145/1182807.1182823
10.3390/s130809589
10.1007/s12083-014-0285-z
10.1109/JSEN.2015.2502401
10.1109/MCOM.2002.1024422
10.1109/ICECC.2011.6067856
10.1016/j.jnca.2015.12.003
10.1109/TMC.2011.126
10.1631/jzus.C1000377
10.1016/j.cose.2015.05.004
10.1007/BF00124891
10.1007/BF01388651
10.1002/dac.2933
10.1109/TWC.2008.080128
10.1109/TIT.1983.1056650
10.4218/etrij.10.1510.0134
10.1016/j.jnca.2012.05.010
10.1007/s11277-015-2288-3
10.1109/JSEN.2015.2441113
10.1109/SUTC.2006.1636182
10.3390/s110505020
10.1007/s12083-014-0324-9
10.1007/3-540-48405-1_25
10.1109/JSYST.2015.2416396
10.1016/j.comnet.2014.07.010
10.3390/s110504767
ContentType Journal Article
Copyright Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2016
Copyright_xml – notice: Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2016
DBID 97E
RIA
RIE
AAYXX
CITATION
7SP
8FD
L7M
DOI 10.1109/TIE.2016.2585081
DatabaseName IEEE All-Society Periodicals Package (ASPP) 2005-present
IEEE All-Society Periodicals Package (ASPP) 1998–Present
IEEE Electronic Library (IEL)
CrossRef
Electronics & Communications Abstracts
Technology Research Database
Advanced Technologies Database with Aerospace
DatabaseTitle CrossRef
Technology Research Database
Advanced Technologies Database with Aerospace
Electronics & Communications Abstracts
DatabaseTitleList Technology Research Database

Database_xml – sequence: 1
  dbid: RIE
  name: IEEE Electronic Library (IEL)
  url: https://ieeexplore.ieee.org/
  sourceTypes: Publisher
DeliveryMethod fulltext_linktorsrc
Discipline Engineering
EISSN 1557-9948
EndPage 7132
ExternalDocumentID 4224039951
10_1109_TIE_2016_2585081
7500072
Genre orig-research
GroupedDBID -~X
.DC
0R~
29I
4.4
5GY
5VS
6IK
97E
9M8
AAJGR
AARMG
AASAJ
AAWTH
ABAZT
ABQJQ
ABVLG
ACGFO
ACGFS
ACIWK
ACKIV
ACNCT
AENEX
AETIX
AGQYO
AGSQL
AHBIQ
AI.
AIBXA
AKJIK
AKQYR
ALLEH
ALMA_UNASSIGNED_HOLDINGS
ASUFR
ATWAV
BEFXN
BFFAM
BGNUA
BKEBE
BPEOZ
CS3
DU5
EBS
EJD
HZ~
H~9
IBMZZ
ICLAB
IFIPE
IFJZH
IPLJI
JAVBF
LAI
M43
MS~
O9-
OCL
P2P
RIA
RIE
RNS
TAE
TN5
TWZ
VH1
VJK
AAYXX
CITATION
7SP
8FD
L7M
ID FETCH-LOGICAL-c357t-9b723e481f255a11e0bd8925e765f758936f7ac5e33cb26ba5e4c54fb6e94d0c3
IEDL.DBID RIE
ISICitedReferencesCount 189
ISICitedReferencesURI http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=000388622100048&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
ISSN 0278-0046
IngestDate Wed Oct 15 13:15:01 EDT 2025
Sat Nov 29 01:31:32 EST 2025
Tue Nov 18 22:22:14 EST 2025
Tue Aug 26 16:42:46 EDT 2025
IsPeerReviewed true
IsScholarly true
Issue 11
Language English
License https://ieeexplore.ieee.org/Xplorehelp/downloads/license-information/IEEE.html
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c357t-9b723e481f255a11e0bd8925e765f758936f7ac5e33cb26ba5e4c54fb6e94d0c3
Notes ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 14
ORCID 0000-0001-5636-8726
PQID 1831022087
PQPubID 85464
PageCount 9
ParticipantIDs proquest_journals_1831022087
crossref_primary_10_1109_TIE_2016_2585081
ieee_primary_7500072
crossref_citationtrail_10_1109_TIE_2016_2585081
PublicationCentury 2000
PublicationDate 2016-Nov.
2016-11-00
20161101
PublicationDateYYYYMMDD 2016-11-01
PublicationDate_xml – month: 11
  year: 2016
  text: 2016-Nov.
PublicationDecade 2010
PublicationPlace New York
PublicationPlace_xml – name: New York
PublicationTitle IEEE transactions on industrial electronics (1982)
PublicationTitleAbbrev TIE
PublicationYear 2016
Publisher IEEE
The Institute of Electrical and Electronics Engineers, Inc. (IEEE)
Publisher_xml – name: IEEE
– name: The Institute of Electrical and Electronics Engineers, Inc. (IEEE)
References ref13
ref12
ref15
ref11
ref10
ref2
ref1
ref17
ref16
ref19
ref18
nguyen (ref5) 0
ref24
ref23
ref26
ref25
ref20
ref21
he (ref9) 2010; 10
ref28
(ref30) 2016
ref27
jiang (ref14) 2012; 9
ref29
ref8
ref7
ref4
ref3
ref6
dovel (ref22) 1983; 29
References_xml – ident: ref2
  doi: 10.1145/1182807.1182823
– ident: ref17
  doi: 10.3390/s130809589
– ident: ref20
  doi: 10.1007/s12083-014-0285-z
– ident: ref4
  doi: 10.1109/JSEN.2015.2502401
– ident: ref1
  doi: 10.1109/MCOM.2002.1024422
– start-page: 248
  year: 0
  ident: ref5
  article-title: A dynamic ID-based authentication scheme
  publication-title: Proc 6th Int Conf Netw Comput Adv Inf Manage
– ident: ref24
  doi: 10.1109/ICECC.2011.6067856
– ident: ref27
  doi: 10.1016/j.jnca.2015.12.003
– ident: ref3
  doi: 10.1109/TMC.2011.126
– ident: ref11
  doi: 10.1631/jzus.C1000377
– ident: ref25
  doi: 10.1016/j.cose.2015.05.004
– ident: ref28
  doi: 10.1007/BF00124891
– ident: ref29
  doi: 10.1007/BF01388651
– ident: ref19
  doi: 10.1002/dac.2933
– ident: ref8
  doi: 10.1109/TWC.2008.080128
– volume: 29
  start-page: 198
  year: 1983
  ident: ref22
  article-title: On the security of public key protocols
  publication-title: IEEE Trans Inf Theory
  doi: 10.1109/TIT.1983.1056650
– ident: ref15
  doi: 10.4218/etrij.10.1510.0134
– ident: ref16
  doi: 10.1016/j.jnca.2012.05.010
– ident: ref18
  doi: 10.1007/s11277-015-2288-3
– ident: ref6
  doi: 10.1109/JSEN.2015.2441113
– volume: 10
  start-page: 361
  year: 2010
  ident: ref9
  article-title: An enhanced two-factor user authentication scheme in wireless sensor networks
  publication-title: Wireless Adhoc and Sensor Networks
– ident: ref7
  doi: 10.1109/SUTC.2006.1636182
– ident: ref13
  doi: 10.3390/s110505020
– ident: ref21
  doi: 10.1007/s12083-014-0324-9
– ident: ref23
  doi: 10.1007/3-540-48405-1_25
– ident: ref26
  doi: 10.1109/JSYST.2015.2416396
– ident: ref12
  doi: 10.1016/j.comnet.2014.07.010
– volume: 9
  start-page: 103
  year: 2012
  ident: ref14
  article-title: Security enhancement of robust user authentication framework for wireless sensor networks
  publication-title: China Commun
– year: 2016
  ident: ref30
– ident: ref10
  doi: 10.3390/s110504767
SSID ssj0014515
Score 2.589504
Snippet User authentication in wireless sensor networks (WSN) is a critical security issue due to their unattended and hostile deployment in the field. Since the...
SourceID proquest
crossref
ieee
SourceType Aggregation Database
Enrichment Source
Index Database
Publisher
StartPage 7124
SubjectTerms Authentication
Cryptography
Logic gates
Mutual authentication
Protocols
Real-time systems
user anonymity
wireless sensor network (WSN)
Wireless sensor networks
Title A Realistic Lightweight Anonymous Authentication Protocol for Securing Real-Time Application Data Access in Wireless Sensor Networks
URI https://ieeexplore.ieee.org/document/7500072
https://www.proquest.com/docview/1831022087
Volume 63
WOSCitedRecordID wos000388622100048&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
journalDatabaseRights – providerCode: PRVIEE
  databaseName: IEEE Electronic Library (IEL)
  customDbUrl:
  eissn: 1557-9948
  dateEnd: 99991231
  omitProxy: false
  ssIdentifier: ssj0014515
  issn: 0278-0046
  databaseCode: RIE
  dateStart: 19820101
  isFulltext: true
  titleUrlDefault: https://ieeexplore.ieee.org/
  providerName: IEEE
link http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV1JS8QwFA6jeNCDuzhu5OBFsE6TLmmOgwsKMgxueCtJ-iIDw4zMVP0D_nDz0k5VFMFbD0lo-dLkfW_5HiGHqBCeuXs5kNqKIDYCgozrIrCFZIkCYavysYdr0etlj4-y3yLHTS0MAPjkMzjBRx_LL8bmBV1lHYHq_cIduHNCiKpWq4kYxEnVrYCjYqwjfbOQZCg7d1fnmMOVnnBnG4cZ-3YF-Z4qPw5if7tcrPzvvVbJcm1F0m4F-xppwWidLH3RFtwg7116A6hu6IbQa6Tgb94LShvCT9E9hslCldeO9ifjcuz2BXV2LK398E9-kQALRWj3M9ZNz1SpaNc3W6SDEcUc2iE-3zpW7Gb3quTy6Sa5vzi_O70M6pYLgYkSUTrEBI8gzph1VEMxBqEuMskTEGliHbWQUWqFMglEkdE81SqB2CSx1SnIuAhNtEXm3VfANqFWKwtSaGcjiNhopsFZlgw4U3FaSAVt0pmhkJtajxzbYgxzz0tCmTvccsQtr3Frk6NmxnOlxfHH2A3EqRlXQ9QmezOg8_pnneYMm61xHmZi5_dZu2QR165KEPfIfDl5gX2yYF7LwXRy4PfhB41F3Kk
linkProvider IEEE
linkToHtml http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV1Nb9QwEB1VpRJwgEJBLJTiAxck0o0dO46PK2jVqsuqKgvqLbKdMapUddFuCn-AH47HyaYgUKXecrDzoefY8-bjDcBbUgiv4rmcGRd0Jr3GrBKuyUJjuLKoQ1c-9nWqZ7Pq_NycbsD7oRYGEVPyGe7TZYrlNwt_Ta6ysSb1fh033HtKSsG7aq0hZiBV169AkGZspH3roGRuxvPjA8riKvdFtI7ziv91CKWuKv9sxel8OXx8tzfbhke9HckmHfBPYAOvnsLDP9QFd-DXhJ0h6RvGIWxKJPxn8oOygfIzcpBRulDnt2Ony0W7iCuDRUuW9Z74b-kmGZWKsMlNtJt9tK1lk9RukV1cMcqivaTrz5EXx9mzLr189Qy-HB7MPxxlfdOFzBdKtxEzLQqUFQ-RbFjOMXdNZYRCXaoQyYUpyqCtV1gU3onSWYXSKxlciUY2uS-ew2b8CnwBLDgb0GgXrQQtveMOo23JUXAry8ZYHMF4jULte0VyaoxxWSdmkps64lYTbnWP2wjeDTO-d2oct4zdIZyGcT1EI9hdA133v-uq5tRuTYi80i__P-sN3D-af5rW0-PZySt4QM_pChJ3YbNdXuNr2PI_2ovVci-tyd8rq9_w
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=A+Realistic+Lightweight+Anonymous+Authentication+Protocol+for+Securing+Real-Time+Application+Data+Access+in+Wireless+Sensor+Networks&rft.jtitle=IEEE+transactions+on+industrial+electronics+%281982%29&rft.au=Gope%2C+Prosanta&rft.au=Hwang%2C+Tzonelih&rft.date=2016-11-01&rft.issn=0278-0046&rft.eissn=1557-9948&rft.volume=63&rft.issue=11&rft.spage=7124&rft.epage=7132&rft_id=info:doi/10.1109%2FTIE.2016.2585081&rft.externalDBID=n%2Fa&rft.externalDocID=10_1109_TIE_2016_2585081
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=0278-0046&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=0278-0046&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=0278-0046&client=summon