{"id":"https://openalex.org/W2997932364","doi":"https://doi.org/10.1109/tsmc.2019.2957175","title":"An Efficient Lightweight Authentication Scheme With Adaptive Resilience of Asynchronization Attacks for Wireless Sensor Networks","display_name":"An Efficient Lightweight Authentication Scheme With Adaptive Resilience of Asynchronization Attacks for Wireless Sensor Networks","publication_year":2019,"publication_date":"2019-12-24","ids":{"openalex":"https://openalex.org/W2997932364","doi":"https://doi.org/10.1109/tsmc.2019.2957175","mag":"2997932364"},"language":"en","primary_location":{"id":"doi:10.1109/tsmc.2019.2957175","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tsmc.2019.2957175","pdf_url":null,"source":{"id":"https://openalex.org/S4210209078","display_name":"IEEE Transactions on Systems Man and Cybernetics Systems","issn_l":"2168-2216","issn":["2168-2216","2168-2232"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Systems, Man, and Cybernetics: Systems","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5088677786","display_name":"Ling Xiong","orcid":"https://orcid.org/0000-0001-9900-2978"},"institutions":[{"id":"https://openalex.org/I102345215","display_name":"Xihua University","ror":"https://ror.org/04gwtvf26","country_code":"CN","type":"education","lineage":["https://openalex.org/I102345215"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Ling Xiong","raw_affiliation_strings":["School of Computer and Software Engineering, Xihua University, Chengdu, China"],"affiliations":[{"raw_affiliation_string":"School of Computer and Software Engineering, Xihua University, Chengdu, China","institution_ids":["https://openalex.org/I102345215"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5103216531","display_name":"Naixue Xiong","orcid":"https://orcid.org/0000-0002-0394-4635"},"institutions":[{"id":"https://openalex.org/I192664086","display_name":"Northeastern State University","ror":"https://ror.org/01z7kzb45","country_code":"US","type":"education","lineage":["https://openalex.org/I192664086"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Naixue Xiong","raw_affiliation_strings":["Northeastern State University, Tahlequah, OK, USA"],"affiliations":[{"raw_affiliation_string":"Northeastern State University, Tahlequah, OK, USA","institution_ids":["https://openalex.org/I192664086"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100622769","display_name":"Changyuan Wang","orcid":"https://orcid.org/0000-0001-9038-0278"},"institutions":[{"id":"https://openalex.org/I4210131342","display_name":"Yibin University","ror":"https://ror.org/03w8m2977","country_code":"CN","type":"education","lineage":["https://openalex.org/I4210131342"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Changyuan Wang","raw_affiliation_strings":["School of Computer and Information Engineering, Yibin University, Yibin, China"],"affiliations":[{"raw_affiliation_string":"School of Computer and Information Engineering, Yibin University, Yibin, China","institution_ids":["https://openalex.org/I4210131342"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5102136530","display_name":"Xinqiao Yu","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Xinqiao Yu","raw_affiliation_strings":["Sichuan Technology and Business College, Chengdu, China"],"affiliations":[{"raw_affiliation_string":"Sichuan Technology and Business College, Chengdu, China","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5027646259","display_name":"Mengxia Shuai","orcid":"https://orcid.org/0000-0003-1911-5361"},"institutions":[{"id":"https://openalex.org/I126520041","display_name":"University of Science and Technology of China","ror":"https://ror.org/04c4dkn09","country_code":"CN","type":"education","lineage":["https://openalex.org/I126520041","https://openalex.org/I19820366"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Mengxia Shuai","raw_affiliation_strings":["University of Science and Technology of China, Hefei, China"],"affiliations":[{"raw_affiliation_string":"University of Science and Technology of China, Hefei, China","institution_ids":["https://openalex.org/I126520041"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5088677786"],"corresponding_institution_ids":["https://openalex.org/I102345215"],"apc_list":null,"apc_paid":null,"fwci":1.9452,"has_fulltext":false,"cited_by_count":33,"citation_normalized_percentile":{"value":0.87957317,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":93,"max":99},"biblio":{"volume":"51","issue":"9","first_page":"5626","last_page":"5638"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9965000152587891,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7507621049880981},{"id":"https://openalex.org/keywords/hash-chain","display_name":"Hash chain","score":0.6776346564292908},{"id":"https://openalex.org/keywords/hash-function","display_name":"Hash function","score":0.6495462656021118},{"id":"https://openalex.org/keywords/forward-secrecy","display_name":"Forward secrecy","score":0.5970059633255005},{"id":"https://openalex.org/keywords/pseudonym","display_name":"Pseudonym","score":0.5957801342010498},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5583378076553345},{"id":"https://openalex.org/keywords/resilience","display_name":"Resilience (materials science)","score":0.5177468657493591},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.501795768737793},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.49316900968551636},{"id":"https://openalex.org/keywords/wireless-sensor-network","display_name":"Wireless sensor network","score":0.45477861166000366},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.4466087818145752},{"id":"https://openalex.org/keywords/login","display_name":"Login","score":0.4117496609687805},{"id":"https://openalex.org/keywords/password","display_name":"Password","score":0.4110044538974762},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.2248278558254242},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.17579385638237}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7507621049880981},{"id":"https://openalex.org/C135783594","wikidata":"https://www.wikidata.org/wiki/Q5678864","display_name":"Hash chain","level":3,"score":0.6776346564292908},{"id":"https://openalex.org/C99138194","wikidata":"https://www.wikidata.org/wiki/Q183427","display_name":"Hash function","level":2,"score":0.6495462656021118},{"id":"https://openalex.org/C205009425","wikidata":"https://www.wikidata.org/wiki/Q935662","display_name":"Forward secrecy","level":4,"score":0.5970059633255005},{"id":"https://openalex.org/C2776021475","wikidata":"https://www.wikidata.org/wiki/Q61002","display_name":"Pseudonym","level":2,"score":0.5957801342010498},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5583378076553345},{"id":"https://openalex.org/C2779585090","wikidata":"https://www.wikidata.org/wiki/Q3457762","display_name":"Resilience (materials science)","level":2,"score":0.5177468657493591},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.501795768737793},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.49316900968551636},{"id":"https://openalex.org/C24590314","wikidata":"https://www.wikidata.org/wiki/Q336038","display_name":"Wireless sensor network","level":2,"score":0.45477861166000366},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.4466087818145752},{"id":"https://openalex.org/C113324615","wikidata":"https://www.wikidata.org/wiki/Q472302","display_name":"Login","level":2,"score":0.4117496609687805},{"id":"https://openalex.org/C109297577","wikidata":"https://www.wikidata.org/wiki/Q161157","display_name":"Password","level":2,"score":0.4110044538974762},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.2248278558254242},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.17579385638237},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0},{"id":"https://openalex.org/C97355855","wikidata":"https://www.wikidata.org/wiki/Q11473","display_name":"Thermodynamics","level":1,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tsmc.2019.2957175","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tsmc.2019.2957175","pdf_url":null,"source":{"id":"https://openalex.org/S4210209078","display_name":"IEEE Transactions on Systems Man and Cybernetics Systems","issn_l":"2168-2216","issn":["2168-2216","2168-2232"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Systems, Man, and Cybernetics: Systems","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G4781957634","display_name":null,"funder_award_id":"2019M663475","funder_id":"https://openalex.org/F4320321543","funder_display_name":"China Postdoctoral Science Foundation"},{"id":"https://openalex.org/G7588495493","display_name":null,"funder_award_id":"PSDSA201802","funder_id":"https://openalex.org/F4320324522","funder_display_name":"Civil Aviation Administration of China"}],"funders":[{"id":"https://openalex.org/F4320321543","display_name":"China Postdoctoral Science Foundation","ror":"https://ror.org/0426zh255"},{"id":"https://openalex.org/F4320324522","display_name":"Civil Aviation Administration of China","ror":"https://ror.org/05gfwht30"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":52,"referenced_works":["https://openalex.org/W77932805","https://openalex.org/W1571993157","https://openalex.org/W1598148310","https://openalex.org/W1601460119","https://openalex.org/W1929823724","https://openalex.org/W1967308747","https://openalex.org/W1968178550","https://openalex.org/W1992007967","https://openalex.org/W2000358460","https://openalex.org/W2010110700","https://openalex.org/W2010939995","https://openalex.org/W2049495124","https://openalex.org/W2054857924","https://openalex.org/W2059212242","https://openalex.org/W2067948398","https://openalex.org/W2092258731","https://openalex.org/W2120600989","https://openalex.org/W2122126819","https://openalex.org/W2144016831","https://openalex.org/W2147883419","https://openalex.org/W2402457987","https://openalex.org/W2408677707","https://openalex.org/W2410215724","https://openalex.org/W2460674452","https://openalex.org/W2474348401","https://openalex.org/W2511572254","https://openalex.org/W2514873781","https://openalex.org/W2551620606","https://openalex.org/W2562086057","https://openalex.org/W2584343393","https://openalex.org/W2585956935","https://openalex.org/W2592416275","https://openalex.org/W2734150319","https://openalex.org/W2742518803","https://openalex.org/W2744532080","https://openalex.org/W2746816686","https://openalex.org/W2770231959","https://openalex.org/W2792803853","https://openalex.org/W2799341537","https://openalex.org/W2801678809","https://openalex.org/W2802981749","https://openalex.org/W2803889994","https://openalex.org/W2805592916","https://openalex.org/W2809674292","https://openalex.org/W2905021484","https://openalex.org/W3106397135","https://openalex.org/W3184872338","https://openalex.org/W4252595028","https://openalex.org/W4285719527","https://openalex.org/W6635619154","https://openalex.org/W6713260194","https://openalex.org/W6726056446"],"related_works":["https://openalex.org/W2383706615","https://openalex.org/W2069568684","https://openalex.org/W2154676777","https://openalex.org/W4200497776","https://openalex.org/W2982222368","https://openalex.org/W2379589344","https://openalex.org/W2103058157","https://openalex.org/W2355953790","https://openalex.org/W1570074286","https://openalex.org/W3151879525"],"abstract_inverted_index":{"Until":[0],"now,":[1],"the":[2,10,36,44,60,176,189],"pseudonym":[3,45,119],"ID":[4,46],"and":[5,15,47,113,124,159,171,197],"one-time":[6,48,121],"hash":[7,49,122],"chain":[8,50,123],"as":[9],"key":[11],"technologies":[12],"solve":[13],"anonymous":[14,71],"forward":[16,75],"secrecy":[17,76],"properties,":[18],"respectively,":[19],"in":[20,195],"lightweight":[21,70],"authentication":[22,72],"protocols":[23],"for":[24,131],"wireless":[25],"sensor":[26],"networks":[27],"(WSNs)":[28],"environment.":[29,133],"However,":[30],"both":[31],"techniques":[32,126],"have":[33,78],"to":[34,54,81,88,100,109,127,150,174],"face":[35],"limitation":[37],"of":[38,57,69,95,141,154,178,180],"asynchronization":[39,142],"attack,":[40],"which":[41],"will":[42],"cause":[43],"value":[51],"between":[52],"participants":[53],"be":[55,138],"loss":[56,103],"synchronization":[58],"when":[59],"transmitted":[61],"message":[62],"is":[63,147],"blocked.":[64],"Most":[65],"recently,":[66],"a":[67,152],"serial":[68],"scheme":[73],"with":[74,184],"(LAASFS)":[77],"been":[79],"built":[80],"resolve":[82],"this":[83,90,107],"problem.":[84],"Unfortunately,":[85],"they":[86],"failed":[87],"handle":[89],"question":[91],"satisfactorily.":[92],"Besides,":[93],"most":[94],"them":[96],"are":[97,166],"still":[98],"vulnerable":[99],"smart":[101],"card":[102],"attack":[104],"(SCLA).":[105],"In":[106,144],"article,":[108],"address":[110],"these":[111],"issues":[112],"make":[114],"more":[115],"effective,":[116],"we":[117],"combine":[118],"ID,":[120],"tag":[125],"construct":[128],"an":[129],"LAASFS":[130,136,191],"WSNs":[132],"The":[134],"proposed":[135,190],"can":[137],"adaptive":[139],"resilience":[140],"attacks.":[143],"addition,":[145],"it":[146],"also":[148],"able":[149],"resist":[151],"variety":[153],"known":[155],"attacks":[156],"like":[157],"SCLA":[158],"wrong":[160],"password":[161],"login":[162],"attack.":[163],"Formal":[164],"analyses":[165],"taken":[167],"by":[168],"BAN":[169],"logic":[170],"ProVerif":[172],"tool":[173],"demonstrate":[175],"security":[177],"properties":[179],"our":[181],"LAASFS.":[182],"Compared":[183],"several":[185],"previous":[186],"related":[187],"schemes,":[188],"possesses":[192],"obvious":[193],"advantages":[194],"computation":[196],"communication":[198],"costs.":[199]},"counts_by_year":[{"year":2025,"cited_by_count":6},{"year":2024,"cited_by_count":5},{"year":2023,"cited_by_count":11},{"year":2022,"cited_by_count":6},{"year":2021,"cited_by_count":2},{"year":2020,"cited_by_count":3}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
