{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2023,9,24]],"date-time":"2023-09-24T15:49:36Z","timestamp":1695570576980},"reference-count":39,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2015,6,30]],"date-time":"2015-06-30T00:00:00Z","timestamp":1435622400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Wireless Pers Commun"],"published-print":{"date-parts":[[2015,12]]},"DOI":"10.1007\/s11277-015-2866-4","type":"journal-article","created":{"date-parts":[[2015,6,29]],"date-time":"2015-06-29T02:50:23Z","timestamp":1435546223000},"page":"1765-1788","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":10,"title":["A Secure and Scalable Group Access Control Scheme for Wireless Sensor Networks"],"prefix":"10.1007","volume":"85","author":[{"given":"Vanga","family":"Odelu","sequence":"first","affiliation":[]},{"given":"Ashok Kumar","family":"Das","sequence":"additional","affiliation":[]},{"given":"Adrijit","family":"Goswami","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,6,30]]},"reference":[{"issue":"4","key":"2866_CR1","doi-asserted-by":"crossref","first-page":"393","DOI":"10.1016\/S1389-1286(01)00302-4","volume":"38","author":"IF Akyildiz","year":"2002","unstructured":"Akyildiz, I. F., Su, W., Sankarasubramaniam, Y., & Cayirci, E. (2002). Wireless sensor networks: A survey. Computer Networks, 38(4), 393\u2013422.","journal-title":"Computer Networks"},{"key":"2866_CR2","doi-asserted-by":"crossref","unstructured":"Das, A. K. (2005). A key reshuffling scheme for wireless sensor networks. In International conference on information systems security (ICISS 2005), Kolkata, India, pp. 205\u2013216. Springer.","DOI":"10.1007\/11593980_15"},{"key":"2866_CR3","doi-asserted-by":"crossref","unstructured":"Das, A. K. (2009). An unconditionally secure key management scheme for large-scale heterogeneous wireless sensor networks. In International conference on communication systems and networks and workshops (COMSNETS 2009), Bangalore, India, pp. 1\u201310. IEEE.","DOI":"10.1109\/COMSNETS.2009.4808919"},{"key":"2866_CR4","doi-asserted-by":"crossref","unstructured":"Das, A. K. (2015). A secure and efficient user anonymity-preserving three-factor authentication protocol for large-scale distributed wireless sensor networks. Wireless Personal Communications. doi: 10.1007\/s11277-015-2288-3 .","DOI":"10.1007\/s11277-015-2288-3"},{"issue":"3","key":"2866_CR5","doi-asserted-by":"crossref","first-page":"429","DOI":"10.1109\/SURV.2011.061710.00109","volume":"13","author":"E Klaoudatou","year":"2011","unstructured":"Klaoudatou, E., Konstantinou, E., Kambourakis, G., & Gritzalis, S. (2011). A survey on cluster-based group key agreement protocols for WSNs. IEEE Communications Surveys & Tutorials, 13(3), 429\u2013442.","journal-title":"IEEE Communications Surveys & Tutorials"},{"issue":"3\u20134","key":"2866_CR6","doi-asserted-by":"crossref","first-page":"455","DOI":"10.1007\/s11277-006-9044-7","volume":"37","author":"NR Prasad","year":"2006","unstructured":"Prasad, N. R., & Alam, M. (2006). Security framework for wireless sensor networks. Wireless Personal Communications, 37(3\u20134), 455\u2013469.","journal-title":"Wireless Personal Communications"},{"issue":"2","key":"2866_CR7","doi-asserted-by":"crossref","first-page":"144","DOI":"10.1016\/j.tele.2012.03.011","volume":"30","author":"F Wu","year":"2013","unstructured":"Wu, F., Pai, H. T., Zhu, X., Hsueh, P. Y., & Hu, Y. H. (2013). An adaptable and scalable group access control scheme for managing wireless sensor networks. Telematics and Informatics, 30(2), 144\u2013157.","journal-title":"Telematics and Informatics"},{"issue":"1","key":"2866_CR8","first-page":"33","volume":"8","author":"S Chatterjee","year":"2013","unstructured":"Chatterjee, S., Das, A. K., & Sing, J. K. (2013). Analysis and formal security verification of access control schemes in wireless sensor networks: A critical survey. Journal of Information Assurance and Security, 8(1), 33\u201357.","journal-title":"Journal of Information Assurance and Security"},{"issue":"5","key":"2866_CR9","first-page":"526","volume":"5","author":"AK Das","year":"2010","unstructured":"Das, A. K. (2010). A survey on analytic studies of key distribution mechanisms in wireless sensor networks. Journal of Information Assurance and Security, 5(5), 526\u2013553.","journal-title":"Journal of Information Assurance and Security"},{"issue":"4","key":"2866_CR10","doi-asserted-by":"crossref","first-page":"60","DOI":"10.1109\/MWC.2008.4599222","volume":"15","author":"X Du","year":"2008","unstructured":"Du, X., & Chen, H. H. (2008). Security in wireless sensor networks. IEEE Wireless Communications, 15(4), 60\u201366.","journal-title":"IEEE Wireless Communications"},{"issue":"2","key":"2866_CR11","doi-asserted-by":"crossref","first-page":"272","DOI":"10.1016\/j.csi.2008.05.014","volume":"31","author":"HF Huang","year":"2009","unstructured":"Huang, H. F. (2009). A novel access control protocol for secure sensor networks. Computer Standards & Interfaces, 31(2), 272\u2013276.","journal-title":"Computer Standards & Interfaces"},{"issue":"6","key":"2866_CR12","doi-asserted-by":"crossref","first-page":"53","DOI":"10.1145\/990680.990707","volume":"47","author":"A Perrig","year":"2004","unstructured":"Perrig, A., Stankovic, J., & Wagner, D. (2004). Security in wireless sensor networks. Communications of the ACM, 47(6), 53\u201357.","journal-title":"Communications of the ACM"},{"issue":"11","key":"2866_CR13","doi-asserted-by":"crossref","first-page":"612","DOI":"10.1145\/359168.359176","volume":"22","author":"A Shamir","year":"1979","unstructured":"Shamir, A. (1979). How to share a secret. Communications of the ACM, 22(11), 612\u2013613.","journal-title":"Communications of the ACM"},{"issue":"6","key":"2866_CR14","first-page":"700","volume":"84","author":"WU Kuen-Pin","year":"2001","unstructured":"Kuen-Pin, W. U., Tseng, C. K., & Feipei, L. (2001). Hierarchical access control using the secure filter. IEICE Transactions on Information and Systems, 84(6), 700\u2013708.","journal-title":"IEICE Transactions on Information and Systems"},{"issue":"8","key":"2866_CR15","doi-asserted-by":"crossref","first-page":"1161","DOI":"10.1016\/j.jss.2006.01.018","volume":"79","author":"FG Jeng","year":"2006","unstructured":"Jeng, F. G., & Wang, C. M. (2006). An efficient key-management scheme for hierarchical access control based on elliptic curve cryptosystem. Journal of Systems and Software, 79(8), 1161\u20131167.","journal-title":"Journal of Systems and Software"},{"key":"2866_CR16","doi-asserted-by":"crossref","unstructured":"Tsaur, W. J., & Pai, H. T. (2007). Dynamic key management schemes for secure group communication based on hierarchical clustering in mobile adhocnetworks. In Frontiers of high performance computing and networking ISPA 2007 workshops, Niagara Falls, Canada, pp. 475\u2013484. Springer.","DOI":"10.1007\/978-3-540-74767-3_49"},{"issue":"5","key":"2866_CR17","doi-asserted-by":"crossref","first-page":"1646","DOI":"10.1016\/j.jnca.2012.03.011","volume":"35","author":"AK Das","year":"2012","unstructured":"Das, A. K., Sharma, P., Chatterjee, S., & Sing, J. K. (2012). A dynamic password-based user authentication scheme for hierarchical wireless sensor networks. Journal of Network and Computer Applications, 35(5), 1646\u20131656.","journal-title":"Journal of Network and Computer Applications"},{"issue":"3","key":"2866_CR18","doi-asserted-by":"crossref","first-page":"165","DOI":"10.1007\/s10776-009-0102-4","volume":"16","author":"A Sorniotti","year":"2009","unstructured":"Sorniotti, A., Molva, R., Gomez, l, Trefois, C., Laube, A., & Scaglioso, P. (2009). Efficient access control for wireless sensor data. International Journal of Wireless Information Networks, 16(3), 165\u2013174.","journal-title":"International Journal of Wireless Information Networks"},{"key":"2866_CR19","unstructured":"Wu, F., Pai, H. T., Zhu, X., Hsueh, P. Y., & Hu, Y. H. (2011). Dynamic access control for secure group communication in wireless sensor networks. In 8th international conference on electrical engineering\/electronics, computer, telecommunications and information technology (ECTI-CON), Khon Kaen, Thailand, pp 288\u2013291. IEEE."},{"key":"2866_CR20","doi-asserted-by":"crossref","unstructured":"Zou, X., Dai, Y. S., & Bertino, E. (2008). A practical and flexible key management mechanism for trusted collaborative computing. In 27th IEEE Conference on computer communications (INFOCOM 2008), Phoenix, AZ, USA. IEEE.","DOI":"10.1109\/INFOCOM.2008.102"},{"issue":"1","key":"2866_CR21","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1016\/j.adhoc.2006.05.014","volume":"5","author":"Y Zhou","year":"2007","unstructured":"Zhou, Y., Zhang, Y., & Fang, Y. (2007). Access control in wireless sensor networks. Ad Hoc Networks, 5(1), 3\u201313.","journal-title":"Ad Hoc Networks"},{"issue":"2","key":"2866_CR22","doi-asserted-by":"crossref","first-page":"272","DOI":"10.1016\/j.csi.2008.05.014","volume":"31","author":"HF Huang","year":"2009","unstructured":"Huang, H. F. (2009). A novel access control protocol for secure sensor networks. Computer Standards & Interfaces, 31(2), 272\u2013276.","journal-title":"Computer Standards & Interfaces"},{"issue":"2","key":"2866_CR23","doi-asserted-by":"crossref","first-page":"492","DOI":"10.1109\/TCE.2009.5174412","volume":"55","author":"HS Kim","year":"2009","unstructured":"Kim, H. S., & Lee, S. W. (2009). Enhanced novel access control protocol over wireless sensor networks. IEEE Transactions on Consumer Electronics, 55(2), 492\u2013498.","journal-title":"IEEE Transactions on Consumer Electronics"},{"issue":"7","key":"2866_CR24","doi-asserted-by":"crossref","first-page":"905","DOI":"10.1109\/TC.2004.31","volume":"53","author":"Y Kim","year":"2004","unstructured":"Kim, Y., Perrig, A., & Tsudik, G. (2004). Group key agreement efficient in communication. IEEE Transactions on Computers, 53(7), 905\u2013921.","journal-title":"IEEE Transactions on Computers"},{"key":"2866_CR25","doi-asserted-by":"crossref","unstructured":"Chatterjee, S., & Das, A. K. (2014). An effective ECC-based user access control scheme with attribute-based encryption for wireless sensor networks. Security and Communication Networks. doi: 10.1002\/sec.1140 .","DOI":"10.1002\/sec.1140"},{"key":"2866_CR26","doi-asserted-by":"crossref","unstructured":"Das, A. K. (2014). A secure and robust temporal credential-based three-factor user authentication scheme for wireless sensor networks. Peer-to-Peer Networking and Applications, pp. 1\u201322. doi: 10.1007\/s12083-014-0324-9 .","DOI":"10.1007\/s12083-014-0324-9"},{"key":"2866_CR27","doi-asserted-by":"crossref","unstructured":"Kocher, P., Jaffe, J., & Jun, B. (1999). Differential power analysis. In Proceedings of advances in cryptology\u2014CRYPTO\u201999, Santa Barbara, California, USA, LNCS, vol. 1666, pp. 388\u2013397.","DOI":"10.1007\/3-540-48405-1_25"},{"issue":"5","key":"2866_CR28","doi-asserted-by":"crossref","first-page":"541","DOI":"10.1109\/TC.2002.1004593","volume":"51","author":"TS Messerges","year":"2002","unstructured":"Messerges, T. S., Dabbish, E. A., & Sloan, R. H. (2002). Examining smart-card security under the threat of power analysis attacks. IEEE Transactions on Computers, 51(5), 541\u2013552.","journal-title":"IEEE Transactions on Computers"},{"issue":"2","key":"2866_CR29","doi-asserted-by":"crossref","first-page":"198","DOI":"10.1109\/TIT.1983.1056650","volume":"29","author":"D Dolev","year":"1983","unstructured":"Dolev, D., & Yao, A. C. (1983). On the security of public key protocols. IEEE Transactions on Information Theory, 29(2), 198\u2013208.","journal-title":"IEEE Transactions on Information Theory"},{"key":"2866_CR30","doi-asserted-by":"crossref","unstructured":"Ben-Or, M. (1981). Probabilistic algorithms in finite fields. In Proceedings of 22nd annual symposium on foundations of computer science (IEEE FOCS\u201981), Nashville, Tennessee, USA, pp. 394\u2013398.","DOI":"10.1109\/SFCS.1981.37"},{"issue":"C","key":"2866_CR31","doi-asserted-by":"crossref","first-page":"80","DOI":"10.1016\/j.ins.2012.04.036","volume":"209","author":"AK Das","year":"2012","unstructured":"Das, A. K., Paul, N. R., & Tripathy, L. (2012). Cryptanalysis and improvement of an access control in user hierarchy based on elliptic curve cryptosystem. Information Sciences, 209(C), 80\u201392.","journal-title":"Information Sciences"},{"key":"2866_CR32","volume-title":"The art of computer programming, semi-numerical algorithms","author":"DE Knuth","year":"1998","unstructured":"Knuth, D. E. (1998). The art of computer programming, semi-numerical algorithms (3rd ed., Vol. 2). Reading, MA: Addison-Wesley.","edition":"3"},{"issue":"C","key":"2866_CR33","doi-asserted-by":"crossref","first-page":"270","DOI":"10.1016\/j.ins.2013.10.022","volume":"269","author":"V Odelu","year":"2014","unstructured":"Odelu, V., Das, A. K., & Goswami, A. (2014). A secure effective key management scheme for dynamic access control in a large leaf class hierarchy. Information Sciences, 269(C), 270\u2013285.","journal-title":"Information Sciences"},{"key":"2866_CR34","unstructured":"Goldwasser, S., & Bellare, K. (2015). Lecture notes on cryptography 2008. https:\/\/cseweb.ucsd.edu\/~mihir\/papers\/gb . Accessed January 2015."},{"key":"2866_CR35","unstructured":"Advanced Encryption Standard. FIPS PUB 197, National Institute of Standards and Technology (NIST), U.S. Department of Commerce, November 2001. http:\/\/csrc.nist.gov\/publications\/fips\/fips197\/fips-197 . Accessed November 2010."},{"issue":"4","key":"2866_CR36","doi-asserted-by":"crossref","first-page":"33","DOI":"10.1145\/1880022.1880027","volume":"13","author":"P Sarkar","year":"2010","unstructured":"Sarkar, P. (2010). A simple and generic construction of authenticated encryption with associated data. ACM Transactions on Information and System Security, 13(4), 33.","journal-title":"ACM Transactions on Information and System Security"},{"issue":"1","key":"2866_CR37","doi-asserted-by":"crossref","first-page":"36","DOI":"10.1007\/s102070100002","volume":"1","author":"D Johnson","year":"2001","unstructured":"Johnson, D., Menezes, A., & Vanstone, S. (2001). The elliptic curve digital signature algorithm (ECDSA). International Journal of Information Security, 1(1), 36\u201363.","journal-title":"International Journal of Information Security"},{"key":"2866_CR38","doi-asserted-by":"crossref","unstructured":"Odelu, V., Das, A. K., & Goswami, A. (2014). Security analysis of an adaptable and scalable group access control scheme for managing wireless sensor networks. In Security in computing and communications (SSCC 2014), Delhi, India, Communications in Computer and Information Science Series (CCIS), vol. 467, pp 10\u201319. Springer.","DOI":"10.1007\/978-3-662-44966-0_2"},{"issue":"1","key":"2866_CR39","doi-asserted-by":"crossref","first-page":"18","DOI":"10.1145\/77648.77649","volume":"8","author":"M Burrows","year":"1990","unstructured":"Burrows, M., Abadi, M., & Needham, R. (1990). A logic of authentication. ACM Transactions on Computer Systems, 8(1), 18\u201336.","journal-title":"ACM Transactions on Computer Systems"}],"container-title":["Wireless Personal Communications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-015-2866-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11277-015-2866-4\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-015-2866-4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,27]],"date-time":"2019-08-27T19:48:56Z","timestamp":1566935336000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11277-015-2866-4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,6,30]]},"references-count":39,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2015,12]]}},"alternative-id":["2866"],"URL":"https:\/\/doi.org\/10.1007\/s11277-015-2866-4","relation":{},"ISSN":["0929-6212","1572-834X"],"issn-type":[{"value":"0929-6212","type":"print"},{"value":"1572-834X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2015,6,30]]}}}