{"id":"https://openalex.org/W1984894835","doi":"https://doi.org/10.1155/2011/412146","title":"A New Design of Access Control in Wireless Sensor Networks","display_name":"A New Design of Access Control in Wireless Sensor Networks","publication_year":2011,"publication_date":"2011-01-01","ids":{"openalex":"https://openalex.org/W1984894835","doi":"https://doi.org/10.1155/2011/412146","mag":"1984894835"},"language":"en","primary_location":{"id":"doi:10.1155/2011/412146","is_oa":true,"landing_page_url":"https://doi.org/10.1155/2011/412146","pdf_url":null,"source":{"id":"https://openalex.org/S64417657","display_name":"International Journal of Distributed Sensor Networks","issn_l":"1550-1329","issn":["1550-1329","1550-1477"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319869","host_organization_name":"Hindawi Publishing Corporation","host_organization_lineage":["https://openalex.org/P4310319869"],"host_organization_lineage_names":["Hindawi Publishing Corporation"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Distributed Sensor Networks","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://doi.org/10.1155/2011/412146","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5102165204","display_name":"Hui\u2010Feng Huang","orcid":null},"institutions":[{"id":"https://openalex.org/I131948415","display_name":"National Taichung University of Science and Technology","ror":"https://ror.org/05bgcav40","country_code":"TW","type":"education","lineage":["https://openalex.org/I131948415"]}],"countries":["TW"],"is_corresponding":true,"raw_author_name":"Hui-Feng Huang","raw_affiliation_strings":["Department of Computer Science and Information Engineering, National Taichung Institute of Technology, Taichung 404, Taiwan"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Information Engineering, National Taichung Institute of Technology, Taichung 404, Taiwan","institution_ids":["https://openalex.org/I131948415"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5102165204"],"corresponding_institution_ids":["https://openalex.org/I131948415"],"apc_list":{"value":2200,"currency":"USD","value_usd":2200},"apc_paid":{"value":2200,"currency":"USD","value_usd":2200},"fwci":2.8006,"has_fulltext":false,"cited_by_count":26,"citation_normalized_percentile":{"value":0.90417065,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":97},"biblio":{"volume":"7","issue":"1","first_page":"412146","last_page":"412146"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.993399977684021,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.993399977684021,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8810099363327026},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.7628860473632812},{"id":"https://openalex.org/keywords/wireless-sensor-network","display_name":"Wireless sensor network","score":0.7427844405174255},{"id":"https://openalex.org/keywords/key-distribution-in-wireless-sensor-networks","display_name":"Key distribution in wireless sensor networks","score":0.5674556493759155},{"id":"https://openalex.org/keywords/node","display_name":"Node (physics)","score":0.5611840486526489},{"id":"https://openalex.org/keywords/elliptic-curve-cryptography","display_name":"Elliptic curve cryptography","score":0.5490713715553284},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.5256401300430298},{"id":"https://openalex.org/keywords/access-control","display_name":"Access control","score":0.5082004070281982},{"id":"https://openalex.org/keywords/software-deployment","display_name":"Software deployment","score":0.48949968814849854},{"id":"https://openalex.org/keywords/mobile-wireless-sensor-network","display_name":"Mobile wireless sensor network","score":0.47465780377388},{"id":"https://openalex.org/keywords/sensor-node","display_name":"Sensor node","score":0.44965365529060364},{"id":"https://openalex.org/keywords/network-access-control","display_name":"Network Access Control","score":0.42433279752731323},{"id":"https://openalex.org/keywords/wireless-network","display_name":"Wireless network","score":0.3590603470802307},{"id":"https://openalex.org/keywords/wireless","display_name":"Wireless","score":0.3004574775695801},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.294508159160614},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.27292388677597046},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.1406521201133728},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.12147817015647888}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8810099363327026},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.7628860473632812},{"id":"https://openalex.org/C24590314","wikidata":"https://www.wikidata.org/wiki/Q336038","display_name":"Wireless sensor network","level":2,"score":0.7427844405174255},{"id":"https://openalex.org/C41971633","wikidata":"https://www.wikidata.org/wiki/Q6398155","display_name":"Key distribution in wireless sensor networks","level":4,"score":0.5674556493759155},{"id":"https://openalex.org/C62611344","wikidata":"https://www.wikidata.org/wiki/Q1062658","display_name":"Node (physics)","level":2,"score":0.5611840486526489},{"id":"https://openalex.org/C167615521","wikidata":"https://www.wikidata.org/wiki/Q1048911","display_name":"Elliptic curve cryptography","level":4,"score":0.5490713715553284},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.5256401300430298},{"id":"https://openalex.org/C527821871","wikidata":"https://www.wikidata.org/wiki/Q228502","display_name":"Access control","level":2,"score":0.5082004070281982},{"id":"https://openalex.org/C105339364","wikidata":"https://www.wikidata.org/wiki/Q2297740","display_name":"Software deployment","level":2,"score":0.48949968814849854},{"id":"https://openalex.org/C7091991","wikidata":"https://www.wikidata.org/wiki/Q17149548","display_name":"Mobile wireless sensor network","level":5,"score":0.47465780377388},{"id":"https://openalex.org/C111185680","wikidata":"https://www.wikidata.org/wiki/Q3866206","display_name":"Sensor node","level":5,"score":0.44965365529060364},{"id":"https://openalex.org/C14982408","wikidata":"https://www.wikidata.org/wiki/Q11006334","display_name":"Network Access Control","level":4,"score":0.42433279752731323},{"id":"https://openalex.org/C108037233","wikidata":"https://www.wikidata.org/wiki/Q11375","display_name":"Wireless network","level":3,"score":0.3590603470802307},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.3004574775695801},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.294508159160614},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.27292388677597046},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.1406521201133728},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.12147817015647888},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.0},{"id":"https://openalex.org/C66938386","wikidata":"https://www.wikidata.org/wiki/Q633538","display_name":"Structural engineering","level":1,"score":0.0},{"id":"https://openalex.org/C184842701","wikidata":"https://www.wikidata.org/wiki/Q370563","display_name":"Cloud computing security","level":3,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.0}],"mesh":[],"locations_count":3,"locations":[{"id":"doi:10.1155/2011/412146","is_oa":true,"landing_page_url":"https://doi.org/10.1155/2011/412146","pdf_url":null,"source":{"id":"https://openalex.org/S64417657","display_name":"International Journal of Distributed Sensor Networks","issn_l":"1550-1329","issn":["1550-1329","1550-1477"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319869","host_organization_name":"Hindawi Publishing Corporation","host_organization_lineage":["https://openalex.org/P4310319869"],"host_organization_lineage_names":["Hindawi Publishing Corporation"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Distributed Sensor Networks","raw_type":"journal-article"},{"id":"pmh:oai:RePEc:sae:intdis:v:7:y:2011:i:1:p:412146","is_oa":false,"landing_page_url":"https://journals.sagepub.com/doi/10.1155/2011/412146","pdf_url":null,"source":{"id":"https://openalex.org/S4306401271","display_name":"RePEc: Research Papers in Economics","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I77793887","host_organization_name":"Federal Reserve Bank of St. Louis","host_organization_lineage":["https://openalex.org/I77793887"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"article"},{"id":"pmh:oai:doaj.org/article:74f33de2e0b3429a97409af99b1a0b46","is_oa":true,"landing_page_url":"https://doaj.org/article/74f33de2e0b3429a97409af99b1a0b46","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by-sa","license_id":"https://openalex.org/licenses/cc-by-sa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"International Journal of Distributed Sensor Networks, Vol 7 (2011)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1155/2011/412146","is_oa":true,"landing_page_url":"https://doi.org/10.1155/2011/412146","pdf_url":null,"source":{"id":"https://openalex.org/S64417657","display_name":"International Journal of Distributed Sensor Networks","issn_l":"1550-1329","issn":["1550-1329","1550-1477"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319869","host_organization_name":"Hindawi Publishing Corporation","host_organization_lineage":["https://openalex.org/P4310319869"],"host_organization_lineage_names":["Hindawi Publishing Corporation"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Distributed Sensor Networks","raw_type":"journal-article"},"sustainable_development_goals":[{"display_name":"Affordable and clean energy","id":"https://metadata.un.org/sdg/7","score":0.9100000262260437}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":33,"referenced_works":["https://openalex.org/W647270775","https://openalex.org/W1508193711","https://openalex.org/W1520914943","https://openalex.org/W1534112425","https://openalex.org/W1549181161","https://openalex.org/W1567573409","https://openalex.org/W1646354800","https://openalex.org/W1845778744","https://openalex.org/W1940397557","https://openalex.org/W1972955838","https://openalex.org/W1996360405","https://openalex.org/W2002054891","https://openalex.org/W2009192444","https://openalex.org/W2015949596","https://openalex.org/W2036378739","https://openalex.org/W2069196751","https://openalex.org/W2114027781","https://openalex.org/W2116269350","https://openalex.org/W2117984332","https://openalex.org/W2130403046","https://openalex.org/W2141420453","https://openalex.org/W2142308804","https://openalex.org/W2150298753","https://openalex.org/W2151993488","https://openalex.org/W2153343530","https://openalex.org/W2156186849","https://openalex.org/W2468385463","https://openalex.org/W2561675875","https://openalex.org/W4206109607","https://openalex.org/W4212808947","https://openalex.org/W4232836212","https://openalex.org/W4237211407","https://openalex.org/W4300388644"],"related_works":["https://openalex.org/W1996683534","https://openalex.org/W2350037705","https://openalex.org/W3023964565","https://openalex.org/W2526209010","https://openalex.org/W2148549110","https://openalex.org/W2072517583","https://openalex.org/W1658613573","https://openalex.org/W2362468486","https://openalex.org/W1990037503","https://openalex.org/W1978526213"],"abstract_inverted_index":{"Nodes":[0],"in":[1,84,139],"a":[2,39,56,127,147],"sensor":[3,20,34,44,64,76],"network":[4],"may":[5],"be":[6,123,144],"lost":[7],"because":[8,131],"of":[9,19,101],"power":[10],"exhaustion":[11],"or":[12,152],"malicious":[13,29,72],"attacks.":[14],"To":[15,27],"extend":[16],"the":[17,33,85,90,94,102,133],"span":[18],"network,":[21],"new":[22,57,148],"nodes":[23,30,73,141],"deployment":[24],"is":[25,38,82,150,156],"necessary.":[26],"prevent":[28],"from":[31,74],"joining":[32,75],"networks,":[35,77],"access":[36,58,129],"control":[37,59],"designed":[40],"requirement":[41],"for":[42,61],"controlling":[43],"node":[45,149,155],"deployment.":[46],"Based":[47],"on":[48],"elliptic":[49],"curve":[50],"cryptography":[51],"(ECC),":[52],"this":[53],"paper":[54],"presents":[55],"protocol":[60],"secure":[62],"wireless":[63],"networks.":[65],"The":[66],"proposed":[67,92,103],"scheme":[68],"not":[69,143],"only":[70],"prevents":[71],"but":[78],"also":[79],"key":[80,99],"establishment":[81],"included":[83],"authentication":[86,95],"procedure.":[87],"Compared":[88],"to":[89],"previously":[91],"schemes,":[93],"procedure":[96],"and":[97,108,116,137],"common":[98],"generation":[100],"method":[104],"are":[105],"very":[106],"simple":[107],"efficient.":[109],"It":[110],"could":[111],"offer":[112],"computational":[113],"efficiency,":[114],"energy,":[115],"bandwidth":[117],"savings.":[118],"In":[119],"addition,":[120],"it":[121],"can":[122],"easily":[124],"implemented":[125],"as":[126],"dynamic":[128],"control,":[130],"all":[132],"old":[134,154],"secret":[135],"keys":[136],"information":[138],"existing":[140],"should":[142],"updated":[145],"once":[146],"added":[151],"an":[153],"lost.":[157]},"counts_by_year":[{"year":2024,"cited_by_count":2},{"year":2023,"cited_by_count":1},{"year":2022,"cited_by_count":4},{"year":2021,"cited_by_count":2},{"year":2020,"cited_by_count":3},{"year":2019,"cited_by_count":2},{"year":2018,"cited_by_count":2},{"year":2016,"cited_by_count":2},{"year":2014,"cited_by_count":3},{"year":2013,"cited_by_count":3},{"year":2012,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
