{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,5]],"date-time":"2026-03-05T16:10:33Z","timestamp":1772727033299,"version":"3.50.1"},"reference-count":43,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2016,2,3]],"date-time":"2016-02-03T00:00:00Z","timestamp":1454457600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Wireless Netw"],"published-print":{"date-parts":[[2017,5]]},"DOI":"10.1007\/s11276-016-1208-0","type":"journal-article","created":{"date-parts":[[2016,2,3]],"date-time":"2016-02-03T15:59:10Z","timestamp":1454515150000},"page":"1113-1131","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":18,"title":["On security of wireless sensor networks: a data authentication protocol using digital signature"],"prefix":"10.1007","volume":"23","author":[{"given":"Huei-Wen","family":"Ferng","sequence":"first","affiliation":[]},{"given":"Nguyen Minh","family":"Khoa","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,2,3]]},"reference":[{"issue":"2","key":"1208_CR1","doi-asserted-by":"crossref","first-page":"10","DOI":"10.1145\/2140522.2140523","volume":"8","author":"E Ayday","year":"2012","unstructured":"Ayday, E., Delgosha, F., & Fekri, F. (2012). Data authenticity and availability in multihop wireless sensor networks. ACM Transactions on Sensor Networks (TOSN), 8(2), 10\u201326.","journal-title":"ACM Transactions on Sensor Networks (TOSN)"},{"issue":"4","key":"1208_CR2","doi-asserted-by":"crossref","first-page":"659","DOI":"10.1016\/j.comcom.2007.10.017","volume":"31","author":"X Cao","year":"2008","unstructured":"Cao, X., Kou, W., Dang, L., & Zhao, B. (2008). IMBAS: Identity-based multi-user broadcast authentication in wireless sensor networks. Computer Communications, 31(4), 659\u2013667.","journal-title":"Computer Communications"},{"key":"1208_CR3","unstructured":"Chan, H., Perrig, A., & Song, D. (2003, May). Random key pre-distribution schemes for sensor networks. In Proceedings of IEEE symposium on security and privacy (SP\u201903) (pp. 197\u2013213)."},{"issue":"10","key":"1208_CR4","doi-asserted-by":"crossref","first-page":"103","DOI":"10.1109\/MC.2003.1236475","volume":"36","author":"H Chan","year":"2003","unstructured":"Chan, H., & Perrig, A. (2003). Security and privacy in sensor networks. IEEE Computer Magazine, 36(10), 103\u2013105.","journal-title":"IEEE Computer Magazine"},{"key":"1208_CR5","doi-asserted-by":"crossref","unstructured":"Drissi, J., & Gu, Q. (2006, July). Localized broadcast authentication in large sensor networks. In Proceedings of IEEE international conference on networking and services (ICNS\u201906).","DOI":"10.1109\/ICNS.2006.72"},{"issue":"2","key":"1208_CR6","doi-asserted-by":"crossref","first-page":"228","DOI":"10.1145\/1065545.1065548","volume":"8","author":"W Du","year":"2005","unstructured":"Du, W., Deng, J., Han, Y. S., & Varshney, P. K. (2005). A pairwise key pre-distribution scheme for wireless sensor networks. ACM Transactions on Information and System Security, 8(2), 228\u2013258.","journal-title":"ACM Transactions on Information and System Security"},{"key":"1208_CR7","doi-asserted-by":"crossref","unstructured":"Eschenauer, L., & Gligor, V. D. (2002, November). A key-management scheme for distributed sensor networks. In Proceedings of ACM conference on computer and communications security (CCS\u201902) (pp. 41\u201347).","DOI":"10.1145\/586110.586117"},{"issue":"1","key":"1208_CR8","doi-asserted-by":"crossref","first-page":"35","DOI":"10.1007\/BF02254791","volume":"9","author":"S Even","year":"1996","unstructured":"Even, S., Goldreich, O., & Micali, S. (1996). On-line\/off-line digital signatures. Journal of Cryptology, 9(1), 35\u201367.","journal-title":"Journal of Cryptology"},{"issue":"4","key":"1208_CR9","doi-asserted-by":"crossref","first-page":"625","DOI":"10.1007\/s11276-013-0627-4","volume":"20","author":"HW Ferng","year":"2014","unstructured":"Ferng, H. W., Nurhakim, J., & Horng, S. J. (2014). Key management protocol with end-to-end data security and key revocation for a multi-BS wireless sensor network. Wireless Networks, 20(4), 625\u2013637.","journal-title":"Wireless Networks"},{"issue":"3","key":"1208_CR10","doi-asserted-by":"crossref","first-page":"205","DOI":"10.1109\/TNSM.2011.072611.100080","volume":"8","author":"W Gu","year":"2011","unstructured":"Gu, W., Dutta, N., Chellappan, S., & Bai, X. (2011). Providing end-to-end secure communications in wireless sensor networks. IEEE Transactions on Network and Service Management, 8(3), 205\u2013218.","journal-title":"IEEE Transactions on Network and Service Management"},{"key":"1208_CR11","volume-title":"Guide to elliptic curve cryptography","author":"D Hankerson","year":"2004","unstructured":"Hankerson, D., Menezes, A., & Vanstone, S. (2004). Guide to elliptic curve cryptography. New York: Springer."},{"key":"1208_CR12","unstructured":"IEEE. (2000, May). Standard specifications for public key cryptography, IEEE P1363a\/D4. http:\/\/grouper.ieee.org\/groups\/1363\/index.html ."},{"key":"1208_CR13","doi-asserted-by":"crossref","unstructured":"Krontiris, I., & Dimitriou, T. (2006, June). A practical authentication scheme for in-network programming in wireless sensor networks. In Proceedings of ACM REALWSN\u201906.","DOI":"10.1142\/9789812770103_0012"},{"key":"1208_CR14","doi-asserted-by":"crossref","unstructured":"Lee, S., & Kim, K. (2010, November). Sensor authentication scheme for clustering routing protocols in wireless sensor networks. In Proceedings of IEEE sensors (pp. 1819\u20131822).","DOI":"10.1109\/ICSENS.2010.5689998"},{"issue":"6","key":"1208_CR15","doi-asserted-by":"crossref","first-page":"637","DOI":"10.1109\/WCL.2012.091312.120488","volume":"1","author":"F Li","year":"2012","unstructured":"Li, F., Zhong, D., & Takagi, T. (2012). Practical identity-based signature for wireless sensor networks. IEEE Wireless Communications Letters, 1(6), 637\u2013640.","journal-title":"IEEE Wireless Communications Letters"},{"issue":"6","key":"1208_CR16","doi-asserted-by":"crossref","first-page":"924","DOI":"10.1109\/TIFS.2013.2240299","volume":"8","author":"X Li","year":"2013","unstructured":"Li, X., Zhou, F., & Du, J. (2013). LDTS: A lightweight and dependable trust system for clustered wireless sensor networks. IEEE Transactions on Information Forensics and Security, 8(6), 924\u2013935.","journal-title":"IEEE Transactions on Information Forensics and Security"},{"key":"1208_CR17","unstructured":"Liu, D., & Ning, P. (2003). Efficient distribution of key chain commitments for broadcast authentication in distributed sensor networks. In Proceedings of network and distributed system security symposium (NDSS\u201903)."},{"issue":"1","key":"1208_CR18","doi-asserted-by":"crossref","first-page":"41","DOI":"10.1145\/1053283.1053287","volume":"8","author":"D Liu","year":"2005","unstructured":"Liu, D., Ning, P., & Li, R. (2005). Establishing pairwise keys in distributed sensor networks. ACM Transactions on Information and System Security, 8(1), 41\u201377.","journal-title":"ACM Transactions on Information and System Security"},{"issue":"4","key":"1208_CR19","doi-asserted-by":"crossref","first-page":"800","DOI":"10.1145\/1027794.1027800","volume":"3","author":"D Liu","year":"2004","unstructured":"Liu, D., & Ning, P. (2004). Multilevel $$\\mu $$ \u03bc TESLA: Broadcast authentication for distributed sensor networks. ACM Transactions on Embeded Computing Systems, 3(4), 800\u2013836.","journal-title":"ACM Transactions on Embeded Computing Systems"},{"key":"1208_CR20","doi-asserted-by":"crossref","unstructured":"Liu, D., Ning, P., Zhu, S., & Jajodia, S. (2005, July). Practical broadcast authentication in sensor networks. In Proceedings of IEEE international conference on mobile and ubiquitous systems: Networking and services (MobiQuitous\u201905) (pp. 118\u2013129).","DOI":"10.1109\/MOBIQUITOUS.2005.49"},{"key":"1208_CR21","doi-asserted-by":"crossref","unstructured":"Liu, A., & Ning, P. (2008, April). TinyECC: A configurable library for elliptic curve cryptography in wireless sensor networks. In Proceedings of IEEE international conference on information processing in sensor networks (IPSN \u201908) (pp. 245\u2013256).","DOI":"10.1109\/IPSN.2008.47"},{"key":"1208_CR22","doi-asserted-by":"crossref","unstructured":"Liu, Z., Wang, J., & Zhang, X. (2011, June). A false data filtering scheme using cluster-based organization in sensor networks. In Proceedings of IEEE international conference on communications (ICC\u201911) (pp. 1\u20135).","DOI":"10.1109\/icc.2011.5962645"},{"issue":"6","key":"1208_CR23","doi-asserted-by":"crossref","first-page":"2106","DOI":"10.1109\/TWC.2012.032812.110433","volume":"11","author":"Y Liu","year":"2012","unstructured":"Liu, Y., Li, J., & Guizani, M. (2012). PKC based broadcast authentication using signature amortization for WSNs. IEEE Transactions on Wireless Communications, 11(6), 2106\u20132115.","journal-title":"IEEE Transactions on Wireless Communications"},{"issue":"5","key":"1208_CR24","doi-asserted-by":"crossref","first-page":"604","DOI":"10.1109\/TNET.2002.803864","volume":"10","author":"M Mitzenmacher","year":"2002","unstructured":"Mitzenmacher, M. (2002). Compressed bloom filters. IEEE\/ACM Transactions on Networking, 10(5), 604\u2013612.","journal-title":"IEEE\/ACM Transactions on Networking"},{"key":"1208_CR25","unstructured":"Moog Crossbow. (2008). Mica2\/Imote2 Mote datasheet. http:\/\/www.xbow.com ."},{"key":"1208_CR26","doi-asserted-by":"crossref","unstructured":"Naccache, D., & Stern, J. (2001). Signing on a postcard. In Proceedings of international conference on financial cryptography (FC \u201901) (pp. 121\u2013135).","DOI":"10.1007\/3-540-45472-1_9"},{"key":"1208_CR27","unstructured":"National Institute of Standards and Technology. (2002, March). Keyed-hashing for message authentication (HMAC). Federal Information processing Standards Publication."},{"issue":"5","key":"1208_CR28","doi-asserted-by":"crossref","first-page":"521","DOI":"10.1023\/A:1016598314198","volume":"8","author":"A Perrig","year":"2002","unstructured":"Perrig, A., Szewczyk, R., Tygar, J. D., Wen, V., & Culler, D. E. (2002). SPINS: Security protocols for sensor networks. Wireless Networks, 8(5), 521\u2013534.","journal-title":"Wireless Networks"},{"issue":"1","key":"1208_CR29","doi-asserted-by":"crossref","first-page":"367","DOI":"10.1109\/TVT.2008.921621","volume":"58","author":"DR Raymond","year":"2009","unstructured":"Raymond, D. R., Marchany, R. C., Brownfield, M. I., & Midkiff, S. F. (2009). Effects of denial-of-sleep attacks on wireless sensor network MAC protocols. IEEE Transactions on Vehicular Technology, 58(1), 367\u2013380.","journal-title":"IEEE Transactions on Vehicular Technology"},{"issue":"11","key":"1208_CR30","doi-asserted-by":"crossref","first-page":"4136","DOI":"10.1109\/TWC.2007.060255","volume":"6","author":"K Ren","year":"2007","unstructured":"Ren, K., Lou, W., Zeng, K., & Moran, P. J. (2007). On broadcast authentication in wireless sensor networks. IEEE Transactions on Wireless Communications, 6(11), 4136\u20134144.","journal-title":"IEEE Transactions on Wireless Communications"},{"issue":"5","key":"1208_CR31","doi-asserted-by":"crossref","first-page":"585","DOI":"10.1109\/TMC.2007.70753","volume":"7","author":"K Ren","year":"2008","unstructured":"Ren, K., Lou, W., & Zhang, Y. (2008). LEDS: Providing location-aware end-to-end data security in wireless sensor networks. IEEE Transactions on Mobile Computing, 7(5), 585\u2013598.","journal-title":"IEEE Transactions on Mobile Computing"},{"issue":"8","key":"1208_CR32","doi-asserted-by":"crossref","first-page":"4554","DOI":"10.1109\/TVT.2009.2019663","volume":"58","author":"K Ren","year":"2009","unstructured":"Ren, K., Lou, W., & Zhang, Y. (2009). Multi-user broadcast authentication in wireless sensor networks. IEEE Transactions on Vehicular Technology, 58(8), 4554\u20134564.","journal-title":"IEEE Transactions on Vehicular Technology"},{"issue":"11","key":"1208_CR33","doi-asserted-by":"crossref","first-page":"612","DOI":"10.1145\/359168.359176","volume":"22","author":"A Shamir","year":"1979","unstructured":"Shamir, A. (1979). How to share a secret. Communications of the ACM, 22(11), 612\u2013613.","journal-title":"Communications of the ACM"},{"key":"1208_CR34","unstructured":"Shamir, A. (1984). Identity-based cryptosystems and signature schemes. In Proceedings of CRYPTO\u201984."},{"issue":"6","key":"1208_CR35","doi-asserted-by":"crossref","first-page":"38","DOI":"10.1109\/MWC.2004.1368895","volume":"11","author":"E Shi","year":"2004","unstructured":"Shi, E., & Perrig, A. (2004). Designing secure sensor networks. IEEE Wireless Communications Magazine, 11(6), 38\u201343.","journal-title":"IEEE Wireless Communications Magazine"},{"key":"1208_CR36","doi-asserted-by":"crossref","unstructured":"Wander, A. S., Gura, N., Eberle, H., Gupta, V., & Shantz, S. C. (2005, March). Energy analysis of public-key cryptography on small wireless devices. In Proceedings of IEEE international conference on pervasive computing and communications (PerCom\u201905) (pp. 324\u2013328).","DOI":"10.1109\/PERCOM.2005.18"},{"key":"1208_CR37","doi-asserted-by":"crossref","unstructured":"Yang, H., Ye, F., Yuan, Y., Lu, S., & Arbaugh, W. (2005, May). Toward resilient security in wireless sensor networks. In Proceedings of ACM international symposium on mobile ad hoc networking and computing (MobiHoc\u201905) (pp. 34\u201345).","DOI":"10.1145\/1062689.1062696"},{"issue":"1","key":"1208_CR38","doi-asserted-by":"crossref","first-page":"4","DOI":"10.1109\/TC.2013.177","volume":"64","author":"X Yang","year":"2015","unstructured":"Yang, X., Lin, J., Yu, W., Moulema, P., Fu, X., & Zhao, W. (2015). A novel en-route filtering scheme against false data injection attacks in cyber-physical networked systems. IEEE Transactions on Computers, 64(1), 4\u201318.","journal-title":"IEEE Transactions on Computers"},{"issue":"2","key":"1208_CR39","doi-asserted-by":"crossref","first-page":"283","DOI":"10.1109\/TIFS.2012.2232653","volume":"8","author":"AC-C Yao","year":"2013","unstructured":"Yao, A. C.-C., & Zhao, Y. (2013). Online\/offline signatures for low-power devices. IEEE Transactions on Information Forensics and Security, 8(2), 283\u2013294.","journal-title":"IEEE Transactions on Information Forensics and Security"},{"key":"1208_CR40","doi-asserted-by":"crossref","unstructured":"Yasmin, R., Ritter, E., & Wang, G. (2010, June\u2013July). An authentication framework for wireless sensor networks using identity-based signatures. In Proceedings of IEEE international conference on computer and information technology (CIT\u201910) (pp. 882\u2013889).","DOI":"10.1109\/CIT.2010.165"},{"key":"1208_CR41","unstructured":"Ye, F., Luo, H., Lu, S., & Zhang, L. (2004). Statiscal enroute filtering of injected false data in sensor networks. In Proceedings of IEEE INFOCOM\u201904."},{"issue":"4","key":"1208_CR42","doi-asserted-by":"crossref","first-page":"500","DOI":"10.1145\/1218556.1218559","volume":"2","author":"S Zhu","year":"2006","unstructured":"Zhu, S., Setia, S., & Jajodia, S. (2006). LEAP+: Efficient security mechanisms for large-scale distributed sensor networks. ACM Transactions on Sensor Networks, 2(4), 500\u2013528.","journal-title":"ACM Transactions on Sensor Networks"},{"key":"1208_CR43","unstructured":"Zhu, S., Setia, S., Jajodia, S., & Ning, P. (2004, May). An interleaved hop-by-hop authentication scheme for filtering of injected false data in sensor networks. In Proceedings of IEEE symposium on security and privacy (SP\u201904) (pp. 259\u2013271)."}],"container-title":["Wireless Networks"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11276-016-1208-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11276-016-1208-0\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11276-016-1208-0","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11276-016-1208-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,1]],"date-time":"2025-06-01T08:59:17Z","timestamp":1748768357000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11276-016-1208-0"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,2,3]]},"references-count":43,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2017,5]]}},"alternative-id":["1208"],"URL":"https:\/\/doi.org\/10.1007\/s11276-016-1208-0","relation":{},"ISSN":["1022-0038","1572-8196"],"issn-type":[{"value":"1022-0038","type":"print"},{"value":"1572-8196","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016,2,3]]}}}