{"id":"https://openalex.org/W2087053535","doi":"https://doi.org/10.1109/iswpc.2013.6707446","title":"A secure temporal-credential-based mutual authentication and key agreement scheme for wireless sensor networks","display_name":"A secure temporal-credential-based mutual authentication and key agreement scheme for wireless sensor networks","publication_year":2013,"publication_date":"2013-11-01","ids":{"openalex":"https://openalex.org/W2087053535","doi":"https://doi.org/10.1109/iswpc.2013.6707446","mag":"2087053535"},"language":"en","primary_location":{"id":"doi:10.1109/iswpc.2013.6707446","is_oa":false,"landing_page_url":"https://doi.org/10.1109/iswpc.2013.6707446","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Symposium on Wireless and pervasive Computing (ISWPC)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5025668908","display_name":"Debiao He","orcid":"https://orcid.org/0000-0002-2446-7436"},"institutions":[{"id":"https://openalex.org/I37461747","display_name":"Wuhan University","ror":"https://ror.org/033vjfk17","country_code":"CN","type":"education","lineage":["https://openalex.org/I37461747"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Debiao He","raw_affiliation_strings":["School of Mathematics and Statistics, Wuhan University, Wuhan, China","Sch. of Math. .& Stat., Wuhan Univ., Wuhan, China"],"affiliations":[{"raw_affiliation_string":"School of Mathematics and Statistics, Wuhan University, Wuhan, China","institution_ids":["https://openalex.org/I37461747"]},{"raw_affiliation_string":"Sch. of Math. .& Stat., Wuhan Univ., Wuhan, China","institution_ids":["https://openalex.org/I37461747"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100409306","display_name":"Neeraj Kumar","orcid":"https://orcid.org/0000-0002-3020-3947"},"institutions":[{"id":"https://openalex.org/I162030827","display_name":"Thapar Institute of Engineering & Technology","ror":"https://ror.org/00wdq3744","country_code":"IN","type":"education","lineage":["https://openalex.org/I162030827"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Neeraj Kumar","raw_affiliation_strings":["Department of Computer Science and Engineering, Thapar University, Patiala, India","Department of Computer Science & Engineering , Thapar University , Patiala , India"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Engineering, Thapar University, Patiala, India","institution_ids":["https://openalex.org/I162030827"]},{"raw_affiliation_string":"Department of Computer Science & Engineering , Thapar University , Patiala , India","institution_ids":["https://openalex.org/I162030827"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5033056152","display_name":"Naveen Chilamkurti","orcid":"https://orcid.org/0000-0002-5396-8897"},"institutions":[{"id":"https://openalex.org/I196829312","display_name":"La Trobe University","ror":"https://ror.org/01rxfrp27","country_code":"AU","type":"education","lineage":["https://openalex.org/I196829312"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Naveen Chilamkurti","raw_affiliation_strings":["Department of Computer Science and Computer Engineering, LaTrobe University, Australia","Dept. of Comput. Sci. & Comput. Eng., LaTrobe Univ., Bundoora, VIC, Australia"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Computer Engineering, LaTrobe University, Australia","institution_ids":["https://openalex.org/I196829312"]},{"raw_affiliation_string":"Dept. of Comput. Sci. & Comput. Eng., LaTrobe Univ., Bundoora, VIC, Australia","institution_ids":["https://openalex.org/I196829312"]}]}],"institutions":[],"countries_distinct_count":3,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5025668908"],"corresponding_institution_ids":["https://openalex.org/I37461747"],"apc_list":null,"apc_paid":null,"fwci":0.3625,"has_fulltext":false,"cited_by_count":14,"citation_normalized_percentile":{"value":0.67033471,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":98},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.9976000189781189,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.9976000189781189,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":0.9904000163078308,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9757999777793884,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/mutual-authentication","display_name":"Mutual authentication","score":0.8416359424591064},{"id":"https://openalex.org/keywords/credential","display_name":"Credential","score":0.7498387694358826},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7130082845687866},{"id":"https://openalex.org/keywords/wireless-sensor-network","display_name":"Wireless sensor network","score":0.6544432640075684},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.5987370610237122},{"id":"https://openalex.org/keywords/password","display_name":"Password","score":0.5924547910690308},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.5762094259262085},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5720068216323853},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.5233970284461975},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.4880584478378296},{"id":"https://openalex.org/keywords/node","display_name":"Node (physics)","score":0.4640810489654541},{"id":"https://openalex.org/keywords/secure-communication","display_name":"Secure communication","score":0.4398340582847595},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.16368770599365234},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.12645408511161804}],"concepts":[{"id":"https://openalex.org/C2781221063","wikidata":"https://www.wikidata.org/wiki/Q6944186","display_name":"Mutual authentication","level":3,"score":0.8416359424591064},{"id":"https://openalex.org/C2777810591","wikidata":"https://www.wikidata.org/wiki/Q16861606","display_name":"Credential","level":2,"score":0.7498387694358826},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7130082845687866},{"id":"https://openalex.org/C24590314","wikidata":"https://www.wikidata.org/wiki/Q336038","display_name":"Wireless sensor network","level":2,"score":0.6544432640075684},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.5987370610237122},{"id":"https://openalex.org/C109297577","wikidata":"https://www.wikidata.org/wiki/Q161157","display_name":"Password","level":2,"score":0.5924547910690308},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.5762094259262085},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5720068216323853},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.5233970284461975},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.4880584478378296},{"id":"https://openalex.org/C62611344","wikidata":"https://www.wikidata.org/wiki/Q1062658","display_name":"Node (physics)","level":2,"score":0.4640810489654541},{"id":"https://openalex.org/C510870077","wikidata":"https://www.wikidata.org/wiki/Q7444868","display_name":"Secure communication","level":3,"score":0.4398340582847595},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.16368770599365234},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.12645408511161804},{"id":"https://openalex.org/C66938386","wikidata":"https://www.wikidata.org/wiki/Q633538","display_name":"Structural engineering","level":1,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/iswpc.2013.6707446","is_oa":false,"landing_page_url":"https://doi.org/10.1109/iswpc.2013.6707446","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Symposium on Wireless and pervasive Computing (ISWPC)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Industry, innovation and infrastructure","id":"https://metadata.un.org/sdg/9","score":0.4000000059604645}],"awards":[],"funders":[{"id":"https://openalex.org/F4320336024","display_name":"Specialized Research Fund for the Doctoral Program of Higher Education of China","ror":null}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":27,"referenced_works":["https://openalex.org/W52368823","https://openalex.org/W79790369","https://openalex.org/W1967399643","https://openalex.org/W1994248320","https://openalex.org/W2003398168","https://openalex.org/W2007287631","https://openalex.org/W2015207020","https://openalex.org/W2025700917","https://openalex.org/W2053134894","https://openalex.org/W2075933391","https://openalex.org/W2079976639","https://openalex.org/W2105114022","https://openalex.org/W2112534360","https://openalex.org/W2116392345","https://openalex.org/W2118201189","https://openalex.org/W2122126819","https://openalex.org/W2135953128","https://openalex.org/W2149259182","https://openalex.org/W2154909745","https://openalex.org/W2159574436","https://openalex.org/W2396834172","https://openalex.org/W4252595028","https://openalex.org/W4256057324","https://openalex.org/W6602124845","https://openalex.org/W6603248651","https://openalex.org/W6669548690","https://openalex.org/W6682554491"],"related_works":["https://openalex.org/W2389256677","https://openalex.org/W2013502867","https://openalex.org/W2353766896","https://openalex.org/W4285327239","https://openalex.org/W812360551","https://openalex.org/W1607245420","https://openalex.org/W137222638","https://openalex.org/W3046827176","https://openalex.org/W2006953289","https://openalex.org/W4315694784"],"abstract_inverted_index":{"With":[0],"the":[1,10,38,111,116,120,126],"development":[2],"of":[3,37],"wireless":[4,11],"communication":[5,182],"technology":[6],"and":[7,32,64,83,89,125,145],"sensor":[8,12,121],"technology,":[9],"network":[13],"(WSN)":[14],"has":[15,170],"been":[16,71],"widely":[17],"used":[18],"in":[19,43,60,98,132,159,183],"various":[20,52,95],"applications,":[21],"such":[22],"as":[23],"military":[24],"surveillance,":[25],"environment":[26],"monitoring":[27],"industry":[28],"control,":[29],"medical":[30],"monitoring,":[31],"so":[33],"on.":[34],"In":[35],"most":[36],"cases,":[39],"WSNs":[40,69,88],"are":[41,48],"deployed":[42],"unattended":[44],"environment.":[45],"So,":[46],"these":[47],"more":[49,177],"vulnerable":[50,109],"to":[51,110],"attacks":[53],"than":[54],"traditional":[55],"networks.":[56],"To":[57,129],"protect":[58],"communications":[59],"WSNs,":[61],"mutual":[62,81,143],"authentication":[63,82,144],"key":[65,84,146],"agreement":[66,85,147],"schemes":[67],"for":[68,87,149,179],"have":[70],"studied":[72],"widely.":[73],"Recently,":[74],"Xue":[75,133,160],"et":[76,134,161],"al.":[77],"proposed":[78],"a":[79,140],"temporal-credential-based":[80,142],"scheme":[86,92,107,148,155,168,175],"claimed":[90],"their":[91,106],"could":[93,156],"withstand":[94],"attacks.":[96],"However,":[97],"this":[99],"paper,":[100],"we":[101,137],"will":[102],"point":[103],"out":[104],"that":[105],"is":[108,176],"off-line":[112],"password":[113],"guessing":[114],"attack,":[115,119],"user":[117],"impersonation":[118,123],"node":[122],"attack":[124],"modification":[127],"attack.":[128],"overcome":[130,157],"weaknesses":[131,158],"al.'s":[135,162],"scheme,":[136],"also":[138,169],"propose":[139],"new":[141],"WSNs.":[150,184],"Security":[151],"analysis":[152,165],"shows":[153,166],"our":[154,167,174],"scheme.":[163],"Performance":[164],"better":[171],"performance.":[172],"Therefore,":[173],"suitable":[178],"providing":[180],"secure":[181]},"counts_by_year":[{"year":2022,"cited_by_count":1},{"year":2021,"cited_by_count":1},{"year":2020,"cited_by_count":2},{"year":2019,"cited_by_count":3},{"year":2018,"cited_by_count":2},{"year":2017,"cited_by_count":4},{"year":2015,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
