{"id":"https://openalex.org/W1967399643","doi":"https://doi.org/10.3390/s110504767","title":"A Secured Authentication Protocol for Wireless Sensor Networks Using Elliptic Curves Cryptography","display_name":"A Secured Authentication Protocol for Wireless Sensor Networks Using Elliptic Curves Cryptography","publication_year":2011,"publication_date":"2011-05-02","ids":{"openalex":"https://openalex.org/W1967399643","doi":"https://doi.org/10.3390/s110504767","mag":"1967399643","pmid":"https://pubmed.ncbi.nlm.nih.gov/22163874"},"language":"en","primary_location":{"id":"doi:10.3390/s110504767","is_oa":true,"landing_page_url":"https://doi.org/10.3390/s110504767","pdf_url":"https://www.mdpi.com/1424-8220/11/5/4767/pdf?version=1403314846","source":{"id":"https://openalex.org/S101949793","display_name":"Sensors","issn_l":"1424-8220","issn":["1424-8220"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Sensors","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj","pubmed"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://www.mdpi.com/1424-8220/11/5/4767/pdf?version=1403314846","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5007656734","display_name":"Hsiu\u2010Lien Yeh","orcid":"https://orcid.org/0000-0001-7267-6868"},"institutions":[{"id":"https://openalex.org/I25846049","display_name":"National Tsing Hua University","ror":"https://ror.org/00zdnkx70","country_code":"TW","type":"education","lineage":["https://openalex.org/I25846049"]}],"countries":["TW"],"is_corresponding":true,"raw_author_name":"Hsiu-Lien Yeh","raw_affiliation_strings":["Institute of Information System and Applications, National Tsing Hua University, No. 101, Section 2, Kuang-Fu Road, HsinChu, 30013, Taiwan"],"affiliations":[{"raw_affiliation_string":"Institute of Information System and Applications, National Tsing Hua University, No. 101, Section 2, Kuang-Fu Road, HsinChu, 30013, Taiwan","institution_ids":["https://openalex.org/I25846049"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5081525033","display_name":"Tien\u2010Ho Chen","orcid":null},"institutions":[{"id":"https://openalex.org/I25846049","display_name":"National Tsing Hua University","ror":"https://ror.org/00zdnkx70","country_code":"TW","type":"education","lineage":["https://openalex.org/I25846049"]}],"countries":["TW"],"is_corresponding":false,"raw_author_name":"Tien-Ho Chen","raw_affiliation_strings":["Department of Computer Science , National Tsing Hua University, No. 101, Section 2, Kuang-Fu Road, HsinChu, 30013, Taiwan"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science , National Tsing Hua University, No. 101, Section 2, Kuang-Fu Road, HsinChu, 30013, Taiwan","institution_ids":["https://openalex.org/I25846049"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5011280321","display_name":"Pin-Chuan Liu","orcid":null},"institutions":[{"id":"https://openalex.org/I25846049","display_name":"National Tsing Hua University","ror":"https://ror.org/00zdnkx70","country_code":"TW","type":"education","lineage":["https://openalex.org/I25846049"]}],"countries":["TW"],"is_corresponding":false,"raw_author_name":"Pin-Chuan Liu","raw_affiliation_strings":["Department of Computer Science , National Tsing Hua University, No. 101, Section 2, Kuang-Fu Road, HsinChu, 30013, Taiwan"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science , National Tsing Hua University, No. 101, Section 2, Kuang-Fu Road, HsinChu, 30013, Taiwan","institution_ids":["https://openalex.org/I25846049"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5032373220","display_name":"Tai-Hoo Kim","orcid":null},"institutions":[{"id":"https://openalex.org/I112728665","display_name":"Hannam University","ror":"https://ror.org/01cwbae71","country_code":"KR","type":"education","lineage":["https://openalex.org/I112728665"]}],"countries":["KR"],"is_corresponding":false,"raw_author_name":"Tai-Hoo Kim","raw_affiliation_strings":["Department of Multimedia Engineering, Hannam University, No.133 Ojeong-dong, Daeduk-gu, Daejeon 306-791, Korea"],"affiliations":[{"raw_affiliation_string":"Department of Multimedia Engineering, Hannam University, No.133 Ojeong-dong, Daeduk-gu, Daejeon 306-791, Korea","institution_ids":["https://openalex.org/I112728665"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5042091403","display_name":"Hsin\u2010Wen Wei","orcid":"https://orcid.org/0000-0001-5249-379X"},"institutions":[{"id":"https://openalex.org/I4210098366","display_name":"Institute of Information Science, Academia Sinica","ror":"https://ror.org/00z83z196","country_code":"TW","type":"facility","lineage":["https://openalex.org/I4210098366","https://openalex.org/I84653119"]}],"countries":["TW"],"is_corresponding":false,"raw_author_name":"Hsin-Wen Wei","raw_affiliation_strings":["Institute of Information Science, Academia Sinica Taipei, Taiwan"],"affiliations":[{"raw_affiliation_string":"Institute of Information Science, Academia Sinica Taipei, Taiwan","institution_ids":["https://openalex.org/I4210098366"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5007656734"],"corresponding_institution_ids":["https://openalex.org/I25846049"],"apc_list":{"value":2400,"currency":"CHF","value_usd":2598},"apc_paid":{"value":2400,"currency":"CHF","value_usd":2598},"fwci":15.5243,"has_fulltext":false,"cited_by_count":347,"citation_normalized_percentile":{"value":0.99238326,"is_in_top_1_percent":true,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":96,"max":100},"biblio":{"volume":"11","issue":"5","first_page":"4767","last_page":"4779"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":0.9990000128746033,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9975000023841858,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/elliptic-curve-cryptography","display_name":"Elliptic curve cryptography","score":0.8036627173423767},{"id":"https://openalex.org/keywords/authentication-protocol","display_name":"Authentication protocol","score":0.6102870106697083},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.5941796898841858},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.5878065228462219},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.5674523711204529},{"id":"https://openalex.org/keywords/protocol","display_name":"Protocol (science)","score":0.5464438796043396},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.5408580303192139},{"id":"https://openalex.org/keywords/elliptic-curve","display_name":"Elliptic curve","score":0.5388028621673584},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.43893057107925415},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.3281601071357727},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.18972831964492798},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.14451110363006592},{"id":"https://openalex.org/keywords/medicine","display_name":"Medicine","score":0.105368971824646}],"concepts":[{"id":"https://openalex.org/C167615521","wikidata":"https://www.wikidata.org/wiki/Q1048911","display_name":"Elliptic curve cryptography","level":4,"score":0.8036627173423767},{"id":"https://openalex.org/C21564112","wikidata":"https://www.wikidata.org/wiki/Q4825885","display_name":"Authentication protocol","level":3,"score":0.6102870106697083},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.5941796898841858},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.5878065228462219},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.5674523711204529},{"id":"https://openalex.org/C2780385302","wikidata":"https://www.wikidata.org/wiki/Q367158","display_name":"Protocol (science)","level":3,"score":0.5464438796043396},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5408580303192139},{"id":"https://openalex.org/C179603306","wikidata":"https://www.wikidata.org/wiki/Q268493","display_name":"Elliptic curve","level":2,"score":0.5388028621673584},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.43893057107925415},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.3281601071357727},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.18972831964492798},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.14451110363006592},{"id":"https://openalex.org/C71924100","wikidata":"https://www.wikidata.org/wiki/Q11190","display_name":"Medicine","level":0,"score":0.105368971824646},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C204787440","wikidata":"https://www.wikidata.org/wiki/Q188504","display_name":"Alternative medicine","level":2,"score":0.0},{"id":"https://openalex.org/C142724271","wikidata":"https://www.wikidata.org/wiki/Q7208","display_name":"Pathology","level":1,"score":0.0}],"mesh":[{"descriptor_ui":"D003195","descriptor_name":"Computer Communication Networks","qualifier_ui":"Q000295","qualifier_name":"instrumentation","is_major_topic":false},{"descriptor_ui":"D003195","descriptor_name":"Computer Communication Networks","qualifier_ui":"Q000295","qualifier_name":"instrumentation","is_major_topic":false},{"descriptor_ui":"D003195","descriptor_name":"Computer Communication Networks","qualifier_ui":"Q000295","qualifier_name":"instrumentation","is_major_topic":false},{"descriptor_ui":"D016494","descriptor_name":"Computer Security","qualifier_ui":"Q000295","qualifier_name":"instrumentation","is_major_topic":false},{"descriptor_ui":"D016494","descriptor_name":"Computer Security","qualifier_ui":"Q000295","qualifier_name":"instrumentation","is_major_topic":false},{"descriptor_ui":"D016494","descriptor_name":"Computer Security","qualifier_ui":"Q000295","qualifier_name":"instrumentation","is_major_topic":false},{"descriptor_ui":"D059015","descriptor_name":"Wireless Technology","qualifier_ui":"Q000295","qualifier_name":"instrumentation","is_major_topic":false},{"descriptor_ui":"D059015","descriptor_name":"Wireless Technology","qualifier_ui":"Q000295","qualifier_name":"instrumentation","is_major_topic":false},{"descriptor_ui":"D059015","descriptor_name":"Wireless Technology","qualifier_ui":"Q000295","qualifier_name":"instrumentation","is_major_topic":false}],"locations_count":6,"locations":[{"id":"doi:10.3390/s110504767","is_oa":true,"landing_page_url":"https://doi.org/10.3390/s110504767","pdf_url":"https://www.mdpi.com/1424-8220/11/5/4767/pdf?version=1403314846","source":{"id":"https://openalex.org/S101949793","display_name":"Sensors","issn_l":"1424-8220","issn":["1424-8220"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Sensors","raw_type":"journal-article"},{"id":"pmid:22163874","is_oa":false,"landing_page_url":"https://pubmed.ncbi.nlm.nih.gov/22163874","pdf_url":null,"source":{"id":"https://openalex.org/S4306525036","display_name":"PubMed","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I1299303238","host_organization_name":"National Institutes of Health","host_organization_lineage":["https://openalex.org/I1299303238"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Sensors (Basel, Switzerland)","raw_type":null},{"id":"pmh:oai:doaj.org/article:63e366d3c8bd4953aa52116b897b1167","is_oa":true,"landing_page_url":"https://doaj.org/article/63e366d3c8bd4953aa52116b897b1167","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by-sa","license_id":"https://openalex.org/licenses/cc-by-sa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Sensors, Vol 11, Iss 5, Pp 4767-4779 (2011)","raw_type":"article"},{"id":"pmh:oai:europepmc.org:2240536","is_oa":true,"landing_page_url":"https://www.ncbi.nlm.nih.gov/pmc/articles/3231356","pdf_url":null,"source":{"id":"https://openalex.org/S4306400806","display_name":"Europe PMC (PubMed Central)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I1303153112","host_organization_name":"European Bioinformatics Institute","host_organization_lineage":["https://openalex.org/I1303153112"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"Text"},{"id":"pmh:oai:mdpi.com:/1424-8220/11/5/4767/","is_oa":true,"landing_page_url":"https://dx.doi.org/10.3390/s110504767","pdf_url":null,"source":{"id":"https://openalex.org/S4306400947","display_name":"MDPI (MDPI AG)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I4210097602","host_organization_name":"Multidisciplinary Digital Publishing Institute (Switzerland)","host_organization_lineage":["https://openalex.org/I4210097602"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Sensors; Volume 11; Issue 5; Pages: 4767-4779","raw_type":"Text"},{"id":"pmh:oai:tkuir.lib.tku.edu.tw:987654321/95208","is_oa":false,"landing_page_url":"https://tkuir.lib.tku.edu.tw/dspace/handle/987654321/95208","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":null}],"best_oa_location":{"id":"doi:10.3390/s110504767","is_oa":true,"landing_page_url":"https://doi.org/10.3390/s110504767","pdf_url":"https://www.mdpi.com/1424-8220/11/5/4767/pdf?version=1403314846","source":{"id":"https://openalex.org/S101949793","display_name":"Sensors","issn_l":"1424-8220","issn":["1424-8220"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Sensors","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[{"id":"https://openalex.org/F4320321040","display_name":"National Science Council","ror":"https://ror.org/02kv4zf79"},{"id":"https://openalex.org/F4320337392","display_name":"Division of Electrical, Communications and Cyber Systems","ror":"https://ror.org/01krpsy48"}],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W1967399643.pdf","grobid_xml":"https://content.openalex.org/works/W1967399643.grobid-xml"},"referenced_works_count":21,"referenced_works":["https://openalex.org/W592639539","https://openalex.org/W1521189389","https://openalex.org/W1660562555","https://openalex.org/W1767031616","https://openalex.org/W2003736153","https://openalex.org/W2007287631","https://openalex.org/W2015207020","https://openalex.org/W2018093989","https://openalex.org/W2036378739","https://openalex.org/W2053134894","https://openalex.org/W2109355501","https://openalex.org/W2112534360","https://openalex.org/W2116392345","https://openalex.org/W2121840937","https://openalex.org/W2122126819","https://openalex.org/W2130403046","https://openalex.org/W2144016831","https://openalex.org/W2144576616","https://openalex.org/W2168933654","https://openalex.org/W2170239483","https://openalex.org/W3106397135"],"related_works":["https://openalex.org/W2034419863","https://openalex.org/W4226182343","https://openalex.org/W2296396257","https://openalex.org/W3007106793","https://openalex.org/W2031177322","https://openalex.org/W4226476440","https://openalex.org/W1556944867","https://openalex.org/W2132505069","https://openalex.org/W1577956677","https://openalex.org/W2164478452"],"abstract_inverted_index":{"User":[0],"authentication":[1,53,75,104],"is":[2,12,121,149],"a":[3,62,78,87,132],"crucial":[4],"service":[5],"in":[6,16,25,43,61],"wireless":[7,19,38],"sensor":[8,20,39],"networks":[9],"(WSNs)":[10],"that":[11,92,106],"becoming":[13],"increasingly":[14],"common":[15],"WSNs":[17],"because":[18],"nodes":[21,40],"are":[22,41],"typically":[23],"deployed":[24],"an":[26,101],"unattended":[27],"environment,":[28],"leaving":[29],"them":[30],"open":[31],"to":[32,58,111,151],"possible":[33],"hostile":[34],"network":[35],"attack.":[36],"Because":[37],"limited":[42],"computing":[44],"power,":[45],"data":[46],"storage":[47],"and":[48,86,137,140],"communication":[49,138],"capabilities,":[50],"any":[51],"user":[52,74,103],"protocol":[54,85,91,105,148],"must":[55],"be":[56,152],"designed":[57],"operate":[59],"efficiently":[60],"resource":[63],"constrained":[64],"environment.":[65],"In":[66],"this":[67,98],"paper,":[68],"we":[69,130],"review":[70,80],"several":[71,94],"proposed":[72,144],"WSN":[73],"protocols,":[76],"with":[77,125],"detailed":[79],"of":[81,89,114,116,134],"the":[82,117,143],"M.L":[83],"Das":[84],"cryptanalysis":[88],"Das'":[90],"shows":[93],"security":[95,115,127,156],"weaknesses.":[96,109],"Furthermore,":[97],"paper":[99],"proposes":[100],"ECC-based":[102,118,147],"resolves":[107],"these":[108],"According":[110],"our":[112],"analysis":[113],"protocol,":[119],"it":[120],"suitable":[122,153],"for":[123,142,154],"applications":[124],"higher":[126,155],"requirements.":[128],"Finally,":[129],"present":[131],"comparison":[133],"security,":[135],"computation,":[136],"costs":[139],"performances":[141],"protocols.":[145],"The":[146],"shown":[150],"WSNs.":[157]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":9},{"year":2024,"cited_by_count":11},{"year":2023,"cited_by_count":29},{"year":2022,"cited_by_count":35},{"year":2021,"cited_by_count":30},{"year":2020,"cited_by_count":39},{"year":2019,"cited_by_count":42},{"year":2018,"cited_by_count":34},{"year":2017,"cited_by_count":34},{"year":2016,"cited_by_count":21},{"year":2015,"cited_by_count":20},{"year":2014,"cited_by_count":19},{"year":2013,"cited_by_count":13},{"year":2012,"cited_by_count":9}],"updated_date":"2026-03-27T14:29:43.386196","created_date":"2025-10-10T00:00:00"}
