{"id":"https://openalex.org/W2883553366","doi":"https://doi.org/10.1155/2018/2484268","title":"A Provably Secure Anonymous Authenticated Key Exchange Protocol Based on ECC for Wireless Sensor Networks","display_name":"A Provably Secure Anonymous Authenticated Key Exchange Protocol Based on ECC for Wireless Sensor Networks","publication_year":2018,"publication_date":"2018-01-01","ids":{"openalex":"https://openalex.org/W2883553366","doi":"https://doi.org/10.1155/2018/2484268","mag":"2883553366"},"language":"en","primary_location":{"id":"doi:10.1155/2018/2484268","is_oa":true,"landing_page_url":"https://doi.org/10.1155/2018/2484268","pdf_url":"http://downloads.hindawi.com/journals/wcmc/2018/2484268.pdf","source":{"id":"https://openalex.org/S235346","display_name":"Wireless Communications and Mobile Computing","issn_l":"1530-8669","issn":["1530-8669","1530-8677"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320595","host_organization_name":"Wiley","host_organization_lineage":["https://openalex.org/P4310320595"],"host_organization_lineage_names":["Wiley"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Wireless Communications and Mobile Computing","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"hybrid","oa_url":"http://downloads.hindawi.com/journals/wcmc/2018/2484268.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5101488116","display_name":"Ke Zhang","orcid":"https://orcid.org/0000-0001-5863-1014"},"institutions":[{"id":"https://openalex.org/I88830068","display_name":"Shaanxi Normal University","ror":"https://ror.org/0170z8493","country_code":"CN","type":"education","lineage":["https://openalex.org/I88830068"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Ke Zhang","raw_affiliation_strings":["Network Information Center, Shaanxi Normal University, Xi' an 710062, China","State Key Laboratory of Mathematical Engineering and Advanced Computing, Zhengzhou 450002, China","State Key Laboratory of Mathematical Engineering and Advanced Computing, Zhengzhou 450002","Network Information Center, Shaanxi Normal University, Xi'an 710062"],"affiliations":[{"raw_affiliation_string":"Network Information Center, Shaanxi Normal University, Xi' an 710062, China","institution_ids":["https://openalex.org/I88830068"]},{"raw_affiliation_string":"State Key Laboratory of Mathematical Engineering and Advanced Computing, Zhengzhou 450002, China","institution_ids":[]},{"raw_affiliation_string":"State Key Laboratory of Mathematical Engineering and Advanced Computing, Zhengzhou 450002","institution_ids":[]},{"raw_affiliation_string":"Network Information Center, Shaanxi Normal University, Xi'an 710062","institution_ids":["https://openalex.org/I88830068"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5013945783","display_name":"Kai Kuo Xu","orcid":null},"institutions":[{"id":"https://openalex.org/I110440473","display_name":"Xi'an University of Science and Technology","ror":"https://ror.org/046fkpt18","country_code":"CN","type":"education","lineage":["https://openalex.org/I110440473"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Kai Xu","raw_affiliation_strings":["School of Computer Science and Technology, Xi' an University of Science and Technology, Xi' an 710054, China","School of Computer Science and Technology, Xi'an University of Science and Technology, Xi'an 710054"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Technology, Xi' an University of Science and Technology, Xi' an 710054, China","institution_ids":["https://openalex.org/I110440473"]},{"raw_affiliation_string":"School of Computer Science and Technology, Xi'an University of Science and Technology, Xi'an 710054","institution_ids":["https://openalex.org/I110440473"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5013264576","display_name":"Fushan Wei","orcid":"https://orcid.org/0000-0003-2790-7254"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Fushan Wei","raw_affiliation_strings":["State Key Laboratory of Mathematical Engineering and Advanced Computing, Zhengzhou 450002, China","State Key Laboratory of Mathematical Engineering and Advanced Computing, Zhengzhou 450002"],"affiliations":[{"raw_affiliation_string":"State Key Laboratory of Mathematical Engineering and Advanced Computing, Zhengzhou 450002, China","institution_ids":[]},{"raw_affiliation_string":"State Key Laboratory of Mathematical Engineering and Advanced Computing, Zhengzhou 450002","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5101488116"],"corresponding_institution_ids":["https://openalex.org/I88830068"],"apc_list":{"value":2300,"currency":"USD","value_usd":2300},"apc_paid":{"value":2300,"currency":"USD","value_usd":2300},"fwci":1.9508,"has_fulltext":true,"cited_by_count":16,"citation_normalized_percentile":{"value":0.87608337,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":98},"biblio":{"volume":"2018","issue":"1","first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":0.9986000061035156,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9980000257492065,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8947640061378479},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.7600036859512329},{"id":"https://openalex.org/keywords/wireless-sensor-network","display_name":"Wireless sensor network","score":0.6656128764152527},{"id":"https://openalex.org/keywords/authenticated-key-exchange","display_name":"Authenticated Key Exchange","score":0.6256990432739258},{"id":"https://openalex.org/keywords/protocol","display_name":"Protocol (science)","score":0.553041398525238},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.5392917394638062},{"id":"https://openalex.org/keywords/key-exchange","display_name":"Key exchange","score":0.5324825644493103},{"id":"https://openalex.org/keywords/oakley-protocol","display_name":"Oakley protocol","score":0.5125701427459717},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4939129948616028},{"id":"https://openalex.org/keywords/key-distribution-in-wireless-sensor-networks","display_name":"Key distribution in wireless sensor networks","score":0.4618794620037079},{"id":"https://openalex.org/keywords/wireless","display_name":"Wireless","score":0.3391069769859314},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.3129383325576782},{"id":"https://openalex.org/keywords/wireless-network","display_name":"Wireless network","score":0.2577572464942932},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.1427149474620819},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.13076305389404297}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8947640061378479},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.7600036859512329},{"id":"https://openalex.org/C24590314","wikidata":"https://www.wikidata.org/wiki/Q336038","display_name":"Wireless sensor network","level":2,"score":0.6656128764152527},{"id":"https://openalex.org/C2777572472","wikidata":"https://www.wikidata.org/wiki/Q4825878","display_name":"Authenticated Key Exchange","level":5,"score":0.6256990432739258},{"id":"https://openalex.org/C2780385302","wikidata":"https://www.wikidata.org/wiki/Q367158","display_name":"Protocol (science)","level":3,"score":0.553041398525238},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.5392917394638062},{"id":"https://openalex.org/C99674996","wikidata":"https://www.wikidata.org/wiki/Q1414155","display_name":"Key exchange","level":4,"score":0.5324825644493103},{"id":"https://openalex.org/C126266803","wikidata":"https://www.wikidata.org/wiki/Q7074169","display_name":"Oakley protocol","level":5,"score":0.5125701427459717},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4939129948616028},{"id":"https://openalex.org/C41971633","wikidata":"https://www.wikidata.org/wiki/Q6398155","display_name":"Key distribution in wireless sensor networks","level":4,"score":0.4618794620037079},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.3391069769859314},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.3129383325576782},{"id":"https://openalex.org/C108037233","wikidata":"https://www.wikidata.org/wiki/Q11375","display_name":"Wireless network","level":3,"score":0.2577572464942932},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.1427149474620819},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.13076305389404297},{"id":"https://openalex.org/C142724271","wikidata":"https://www.wikidata.org/wiki/Q7208","display_name":"Pathology","level":1,"score":0.0},{"id":"https://openalex.org/C71924100","wikidata":"https://www.wikidata.org/wiki/Q11190","display_name":"Medicine","level":0,"score":0.0},{"id":"https://openalex.org/C204787440","wikidata":"https://www.wikidata.org/wiki/Q188504","display_name":"Alternative medicine","level":2,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1155/2018/2484268","is_oa":true,"landing_page_url":"https://doi.org/10.1155/2018/2484268","pdf_url":"http://downloads.hindawi.com/journals/wcmc/2018/2484268.pdf","source":{"id":"https://openalex.org/S235346","display_name":"Wireless Communications and Mobile Computing","issn_l":"1530-8669","issn":["1530-8669","1530-8677"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320595","host_organization_name":"Wiley","host_organization_lineage":["https://openalex.org/P4310320595"],"host_organization_lineage_names":["Wiley"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Wireless Communications and Mobile Computing","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:e430ff7411e64807bfdcd9af711082ab","is_oa":true,"landing_page_url":"https://doaj.org/article/e430ff7411e64807bfdcd9af711082ab","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by-sa","license_id":"https://openalex.org/licenses/cc-by-sa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Wireless Communications and Mobile Computing, Vol 2018 (2018)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1155/2018/2484268","is_oa":true,"landing_page_url":"https://doi.org/10.1155/2018/2484268","pdf_url":"http://downloads.hindawi.com/journals/wcmc/2018/2484268.pdf","source":{"id":"https://openalex.org/S235346","display_name":"Wireless Communications and Mobile Computing","issn_l":"1530-8669","issn":["1530-8669","1530-8677"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320595","host_organization_name":"Wiley","host_organization_lineage":["https://openalex.org/P4310320595"],"host_organization_lineage_names":["Wiley"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Wireless Communications and Mobile Computing","raw_type":"journal-article"},"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16","score":0.4000000059604645}],"awards":[],"funders":[],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W2883553366.pdf","grobid_xml":"https://content.openalex.org/works/W2883553366.grobid-xml"},"referenced_works_count":25,"referenced_works":["https://openalex.org/W1747872978","https://openalex.org/W1967399643","https://openalex.org/W2007287631","https://openalex.org/W2025700917","https://openalex.org/W2055473620","https://openalex.org/W2075933391","https://openalex.org/W2095708839","https://openalex.org/W2116392345","https://openalex.org/W2262017117","https://openalex.org/W2497816424","https://openalex.org/W2514873781","https://openalex.org/W2524195644","https://openalex.org/W2535033158","https://openalex.org/W2560195950","https://openalex.org/W2592416275","https://openalex.org/W2605204252","https://openalex.org/W2609102187","https://openalex.org/W2616646314","https://openalex.org/W2618661755","https://openalex.org/W2622566391","https://openalex.org/W2734150319","https://openalex.org/W2734490561","https://openalex.org/W2734893110","https://openalex.org/W2780340923","https://openalex.org/W2789659149"],"related_works":["https://openalex.org/W2025784089","https://openalex.org/W2041428801","https://openalex.org/W2990233860","https://openalex.org/W2399511907","https://openalex.org/W2387820617","https://openalex.org/W208013005","https://openalex.org/W4310479289","https://openalex.org/W2055761778","https://openalex.org/W2132206706","https://openalex.org/W2950358711"],"abstract_inverted_index":{"In":[0,45],"wireless":[1,163],"sensor":[2,14,80,164],"networks,":[3],"users":[4],"sometimes":[5],"need":[6],"to":[7,21,40,47,137,144],"retrieve":[8],"real\u2010time":[9],"data":[10],"directly":[11],"from":[12],"the":[13,23,75,79,85,89,94,105,138],"nodes.":[15],"Many":[16],"authentication":[17],"protocols":[18,33],"are":[19],"proposed":[20,95],"address":[22],"security":[24,36,92,102,161],"and":[25,38,78,121,159],"privacy":[26],"aspects":[27],"of":[28,88,93,119,140],"this":[29],"scenario.":[30],"However,":[31],"these":[32,49],"still":[34],"have":[35],"loopholes":[37],"fail":[39],"provide":[41],"strong":[42,69,146,157],"user":[43,70],"anonymity.":[44,147],"order":[46],"overcome":[48],"shortcomings,":[50],"we":[51],"propose":[52],"an":[53],"anonymous":[54],"authenticated":[55],"key":[56],"exchange":[57],"protocol":[58,67,96,114,131,150],"based":[59],"on":[60],"Elliptic":[61],"Curves":[62],"Cryptography":[63],"(ECC).":[64],"The":[65,91,125],"novel":[66],"provides":[68],"anonymity":[71,158],"such":[72],"that":[73,129],"even":[74],"gateway":[76],"node":[77],"nodes":[81],"do":[82],"not":[83],"know":[84],"real":[86],"identity":[87],"user.":[90],"is":[97,115,128,151],"conducted":[98],"in":[99,117,162],"a":[100],"well\u2010defined":[101],"model":[103],"under":[104],"CDH":[106],"assumption.":[107],"Compared":[108],"with":[109],"other":[110],"related":[111],"protocols,":[112],"our":[113,130,149],"efficient":[116],"terms":[118],"communication":[120],"enjoys":[122],"stronger":[123],"security.":[124],"only":[126],"disadvantage":[127],"consumes":[132],"more":[133],"computation":[134],"resources":[135],"due":[136],"usage":[139],"asymmetric":[141],"cryptography":[142],"mechanisms":[143],"realize":[145],"Consequently,":[148],"suitable":[152],"for":[153],"applications":[154],"which":[155],"require":[156],"high":[160],"networks.":[165]},"counts_by_year":[{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":3},{"year":2022,"cited_by_count":2},{"year":2021,"cited_by_count":2},{"year":2020,"cited_by_count":4},{"year":2019,"cited_by_count":4}],"updated_date":"2026-03-27T14:29:43.386196","created_date":"2025-10-10T00:00:00"}
