{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,28]],"date-time":"2026-04-28T10:39:59Z","timestamp":1777372799137,"version":"3.51.4"},"publisher-location":"Cham","reference-count":21,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783319678061","type":"print"},{"value":"9783319678078","type":"electronic"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-67807-8_4","type":"book-chapter","created":{"date-parts":[[2017,9,26]],"date-time":"2017-09-26T08:22:18Z","timestamp":1506414138000},"page":"49-62","source":"Crossref","is-referenced-by-count":9,"title":["An Ultra-Lightweight Authentication Scheme for Heterogeneous Wireless Sensor Networks in the Context of Internet of Things"],"prefix":"10.1007","author":[{"given":"Hamza","family":"Khemissa","sequence":"first","affiliation":[]},{"given":"Djamel","family":"Tandjaoui","sequence":"additional","affiliation":[]},{"given":"Samia","family":"Bouzefrane","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,9,27]]},"reference":[{"key":"4_CR1","unstructured":"SEC4: Elliptic Curve Qu-Vanstone Implicit Certificate Scheme (ECQV), version 0.97, August 2013. www.secg.org"},{"issue":"15","key":"4_CR2","doi-asserted-by":"crossref","first-page":"2787","DOI":"10.1016\/j.comnet.2010.05.010","volume":"54","author":"L Atzori","year":"2010","unstructured":"Atzori, L., Iera, A., Morabito, G.: The internet of things: a survey. Comput. Netw. 54(15), 2787\u20132805 (2010)","journal-title":"Comput. Netw."},{"key":"4_CR3","doi-asserted-by":"crossref","unstructured":"De Meulenaer, G., Gosset, F., Standaert, O.X., Pereira, O.: On the energy cost of communication and cryptography in wireless sensor networks. In: IEEE International Conference on Wireless and Mobile Computing Networking and Communications. WIMOB 2008, pp. 580\u2013585. IEEE (2008)","DOI":"10.1109\/WiMob.2008.16"},{"key":"4_CR4","doi-asserted-by":"crossref","unstructured":"El Maliki, T., Seigneur, J.M.: A survey of user-centric identity management technologies. In: The International Conference on Emerging Security Information, Systems, and Technologies. SecureWare 2007, pp. 12\u201317. IEEE (2007)","DOI":"10.1109\/SECUREWARE.2007.4385303"},{"key":"4_CR5","doi-asserted-by":"crossref","first-page":"152","DOI":"10.1016\/j.adhoc.2015.05.014","volume":"36","author":"MS Farash","year":"2016","unstructured":"Farash, M.S., Turkanovi\u0107, M., Kumari, S., H\u00f6lbl, M.: An efficient user authentication and key agreement scheme for heterogeneous wireless sensor network tailored for the internet of things environment. Ad Hoc Netw. 36, 152\u2013176 (2016)","journal-title":"Ad Hoc Netw."},{"key":"4_CR6","doi-asserted-by":"crossref","first-page":"7124","DOI":"10.1109\/TIE.2016.2585081","volume":"63","author":"P Gope","year":"2016","unstructured":"Gope, P., Hwang, T.: A realistic lightweight anonymous authentication protocol for securing real-time application data access in wireless sensor networks. IEEE Trans. Indust. Electron. 63, 7124\u20137132 (2016)","journal-title":"IEEE Trans. Indust. Electron."},{"key":"4_CR7","doi-asserted-by":"crossref","unstructured":"Khemissa, H., Tandjaoui, D.: A novel lightweight authentication scheme for heterogeneous wireless sensor networks in the context of internet of things. In: Wireless Telecommunications Symposium (WTS), pp. 1\u20136. IEEE (2016)","DOI":"10.1109\/WTS.2016.7482039"},{"issue":"8","key":"4_CR8","doi-asserted-by":"crossref","first-page":"2710","DOI":"10.1016\/j.adhoc.2013.05.003","volume":"11","author":"T Kothmayr","year":"2013","unstructured":"Kothmayr, T., Schmitt, C., Hu, W., Br\u00fcnig, M., Carle, G.: DTLS based security and two-way authentication for the internet of things. Ad Hoc Netw. 11(8), 2710\u20132723 (2013)","journal-title":"Ad Hoc Netw."},{"key":"4_CR9","doi-asserted-by":"crossref","unstructured":"Krawczyk, H., Canetti, R., Bellare, M.: HMAC: keyed-hashing for message authentication (1997)","DOI":"10.17487\/rfc2104"},{"issue":"17","key":"4_CR10","doi-asserted-by":"crossref","first-page":"2967","DOI":"10.1016\/j.comnet.2010.05.011","volume":"54","author":"J Lee","year":"2010","unstructured":"Lee, J., Kapitanova, K., Son, S.H.: The price of security in wireless sensor networks. Comput. Netw. 54(17), 2967\u20132978 (2010)","journal-title":"Comput. Netw."},{"key":"4_CR11","doi-asserted-by":"crossref","first-page":"17","DOI":"10.1016\/j.adhoc.2015.01.006","volume":"32","author":"KT Nguyen","year":"2015","unstructured":"Nguyen, K.T., Laurent, M., Oualha, N.: Survey on secure communication protocols for the internet of things. Ad Hoc Netw. 32, 17\u201331 (2015)","journal-title":"Ad Hoc Netw."},{"key":"4_CR12","doi-asserted-by":"crossref","first-page":"357","DOI":"10.1155\/2014\/357430","volume":"10","author":"P Porambage","year":"2014","unstructured":"Porambage, P., Schmitt, C., Kumar, P., Gurtov, A., Ylianttila, M.: Pauthkey: a pervasive authentication protocol and key establishment scheme for wireless sensor networks in distributed IoT applications. Int. J. Distrib. Sensor Netw. 10, 357\u2013430 (2014)","journal-title":"Int. J. Distrib. Sensor Netw."},{"key":"4_CR13","doi-asserted-by":"crossref","unstructured":"Porambage, P., Schmitt, C., Kumar, P., Gurtov, A., Ylianttila, M.: Two-phase authentication protocol for wireless sensor networks in distributed IoT applications. In: 2014 IEEE Wireless Communications and Networking Conference (WCNC), pp. 2728\u20132733. IEEE (2014)","DOI":"10.1109\/WCNC.2014.6952860"},{"key":"4_CR14","doi-asserted-by":"crossref","unstructured":"Rescorla, E., Modadugu, N.: Datagram transport layer security version 1.2 (2012)","DOI":"10.17487\/rfc6347"},{"key":"4_CR15","unstructured":"Safkhani, M., Bagheri, N.: Passive secret disclosure attack on an ultralightweight authentication protocol for internet of things. Technical report, Cryptology ePrint Archive, Report 2016\/838 (2016). http:\/\/eprint.iacr.org\/2016\/838"},{"key":"4_CR16","doi-asserted-by":"crossref","first-page":"146","DOI":"10.1016\/j.comnet.2014.11.008","volume":"76","author":"S Sicari","year":"2015","unstructured":"Sicari, S., Rizzardi, A., Grieco, L., Coen-Porisini, A.: Security, privacy and trust in internet of things: the road ahead. Comput. Netw. 76, 146\u2013164 (2015)","journal-title":"Comput. Netw."},{"key":"4_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"305","DOI":"10.1007\/978-3-540-77690-1_19","volume-title":"Wireless Sensor Networks","author":"P Szczechowiak","year":"2008","unstructured":"Szczechowiak, P., Oliveira, L.B., Scott, M., Collier, M., Dahab, R.: NanoECC: testing the limits of elliptic curve cryptography in sensor networks. In: Verdone, R. (ed.) EWSN 2008. LNCS, vol. 4913, pp. 305\u2013320. Springer, Heidelberg (2008). doi: 10.1007\/978-3-540-77690-1_19"},{"key":"4_CR18","first-page":"1","volume":"73","author":"A Tewari","year":"2016","unstructured":"Tewari, A., Gupta, B.: Cryptanalysis of a novel ultra-lightweight mutual authentication protocol for IoT devices using RFID tags. J. Supercomput. 73, 1\u201318 (2016)","journal-title":"J. Supercomput."},{"key":"4_CR19","doi-asserted-by":"crossref","first-page":"96","DOI":"10.1016\/j.adhoc.2014.03.009","volume":"20","author":"M Turkanovi\u0107","year":"2014","unstructured":"Turkanovi\u0107, M., Brumen, B., H\u00f6lbl, M.: A novel user authentication and key agreement scheme for heterogeneous ad hoc wireless sensor networks, based on the internet of things notion. Ad Hoc Netw. 20, 96\u2013112 (2014)","journal-title":"Ad Hoc Netw."},{"issue":"10","key":"4_CR20","doi-asserted-by":"crossref","first-page":"54","DOI":"10.1109\/MC.2002.1039518","volume":"35","author":"AD Wood","year":"2002","unstructured":"Wood, A.D., Stankovic, J., et al.: Denial of service in sensor networks. Computer 35(10), 54\u201362 (2002)","journal-title":"Computer"},{"issue":"1","key":"4_CR21","doi-asserted-by":"crossref","first-page":"316","DOI":"10.1016\/j.jnca.2012.05.010","volume":"36","author":"K Xue","year":"2013","unstructured":"Xue, K., Ma, C., Hong, P., Ding, R.: A temporal-credential-based mutual authentication and key agreement scheme for wireless sensor networks. J. Netw. Comput. Appl. 36(1), 316\u2013323 (2013)","journal-title":"J. Netw. Comput. Appl."}],"container-title":["Lecture Notes in Computer Science","Mobile, Secure, and Programmable Networking"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-67807-8_4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,3]],"date-time":"2019-10-03T19:56:07Z","timestamp":1570132567000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-67807-8_4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319678061","9783319678078"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-67807-8_4","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017]]}}}