{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,6,14]],"date-time":"2024-06-14T14:37:40Z","timestamp":1718375860092},"reference-count":18,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2015,10,20]],"date-time":"2015-10-20T00:00:00Z","timestamp":1445299200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Wireless Pers Commun"],"published-print":{"date-parts":[[2017,6]]},"DOI":"10.1007\/s11277-015-3096-5","type":"journal-article","created":{"date-parts":[[2015,10,20]],"date-time":"2015-10-20T04:26:43Z","timestamp":1445315203000},"page":"467-479","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["IA-CTR: Integrity-Aware Conventional Counter Mode for Secure and Efficient Communication in Wireless Sensor Networks"],"prefix":"10.1007","volume":"94","author":[{"given":"Tzonelih","family":"Hwang","sequence":"first","affiliation":[]},{"given":"Prosanta","family":"Gope","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,10,20]]},"reference":[{"issue":"10","key":"3096_CR1","doi-asserted-by":"crossref","first-page":"103","DOI":"10.1109\/MC.2003.1236475","volume":"36","author":"H Chen","year":"2003","unstructured":"Chen, H., & Perrig, A. (2003). Security and privacy in sensor networks. IEEE communications Magazine, 36(10), 103\u2013105.","journal-title":"IEEE communications Magazine"},{"issue":"8","key":"3096_CR2","doi-asserted-by":"crossref","first-page":"102","DOI":"10.1109\/MCOM.2002.1024422","volume":"40","author":"E Shi","year":"2002","unstructured":"Shi, E., &  Perrig, A. (2002). Designing secure sensor networks. IEEE communications Magazine, 40(8), 102\u2013114.","journal-title":"IEEE communications Magazine"},{"key":"3096_CR3","doi-asserted-by":"crossref","unstructured":"Karlof, C., Sastry, N., & Wagner, D. (2004). TinySec: a link layer security architecture for wireless sensor networks. In Proceedings of the 2nd international conference on embedded networked sensor systems (pp. 162\u2013175). ACM.","DOI":"10.1145\/1031495.1031515"},{"key":"3096_CR4","doi-asserted-by":"crossref","unstructured":"Tobarra, L., Cazorla, D., & Cuartero, F. (2007). Formal analysis of sensor network encryption protocol (SNEP). In IEEE international conference  on mobile adhoc and sensor systems, 8\u201311 Oct 2007 (pp. 1\u20136). IEEE.","DOI":"10.1109\/MOBHOC.2007.4428763"},{"key":"3096_CR5","unstructured":"Alliance, Z. B. (2005). ZigBee specification. Technical Report Document 053474r06, version1.0."},{"key":"3096_CR6","doi-asserted-by":"crossref","unstructured":"Luk, M., Mezzour, G., Perrig, A., & Gligor, V. (2007). MiniSec: A secure sensor network communication architecture. ACM 978-1-59593-638-7\/07\/0004IPSN\u201907.","DOI":"10.1145\/1236360.1236421"},{"key":"3096_CR7","doi-asserted-by":"crossref","unstructured":"Bellare, M., Desai, A., Jokipii, E., & Rogaway, P. (1997). A concrete security treatment of symmetric encryption. In IEEE Proceeding of the 38th Symposium on Foundations of Computer Science (pp. 394\u2013403).","DOI":"10.1109\/SFCS.1997.646128"},{"issue":"4","key":"3096_CR8","doi-asserted-by":"crossref","first-page":"469","DOI":"10.1007\/s00145-008-9026-x","volume":"21","author":"M Bellare","year":"2008","unstructured":"Bellare, M., & Namprempre, C. (2008). Authenticated encryption: relations among notions and analysis of the generic composition paradigm. Journal of Cryptology, 21(4), 469\u2013491.","journal-title":"Journal of Cryptology"},{"key":"3096_CR9","unstructured":"ISO\/IEC 9797. (1989). Data cryptographic techniques\u2014Data integrity mechanism using a cryptographic check function employing a block cipher algorithm.  BSI"},{"key":"3096_CR10","volume-title":"Cryptography: A new dimension in computer data security","author":"CH Meyer","year":"1982","unstructured":"Meyer, C. H., & Matyas, S. M. (1982). Cryptography: A new dimension in computer data security. New York: Wiley."},{"issue":"3","key":"3096_CR11","doi-asserted-by":"crossref","first-page":"365","DOI":"10.1145\/937527.937529","volume":"6","author":"P Rogaway","year":"2003","unstructured":"Rogaway, P., Bellare, M., & Black, J. (2003). OCB: A block-cipher mode of operation for efficient authenticated encryption. ACM Transactions on Information and System Security (TISSEC), 6(3), 365\u2013403.","journal-title":"ACM Transactions on Information and System Security (TISSEC)"},{"key":"3096_CR12","unstructured":"Rogaway, P. (2004). Efficient instantiations of tweakable block-ciphers and refinements to modes OCB and PMAC. In Proceeding of the ASIACRYPT 2004, LNCS, 3329, Springer, Heidelberg (pp. 16\u201331)."},{"key":"3096_CR13","unstructured":"Ferguson, N. (2002). Collision attacks on OCB. NIST CSRC website."},{"key":"3096_CR14","unstructured":"Crypto++ Library. \n                        http:\/\/www.cryptopp.com"},{"key":"3096_CR15","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2015.2416396","author":"P Gope","year":"2015","unstructured":"Gope, P., & Hwang, T. (2015). Lightweight and energy efficient mutual authentication and key agreement scheme with user anonymity for secure communication in global mobility networks. IEEE Systems Journal. doi:\n                        10.1109\/JSYST.2015.2416396\n                        \n                    .","journal-title":"IEEE Transactions on Consumer Electronics"},{"issue":"4","key":"3096_CR16","doi-asserted-by":"crossref","first-page":"2231","DOI":"10.1007\/s11277-015-2344-z","volume":"82","author":"P Gope","year":"2015","unstructured":"Gope, P., & Hwang, T. (2015). Enhanced secure mutual authentication, and key agreement scheme preserving user anonymity in global mobile networks. Wireless Personal Communications, 82(4), 2231\u20132245.","journal-title":"Wireless Personal Communications"},{"key":"3096_CR17","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-013-1501-5","author":"T Hwang","year":"2013","unstructured":"Hwang, T., & Gope, P. (2013). Provably secure mutual authentication and key exchange scheme for expeditious mobile communication through synchronously one-time Secrets. Wireless Personal Communications,. doi:\n                        10.1007\/s11277-013-1501-5\n                        \n                    .","journal-title":"Wireless Personal Communications"},{"key":"3096_CR18","doi-asserted-by":"crossref","unstructured":"Ristenpart, T., Tromer, E., Shacham, H., & Savage, S. (2009). Hey, you, get off of my cloud: exploring information leakage in third-party compute clouds. In Proceedings of the 16th ACM conference on Computer and communications security (CCS \u201809), ACM, New York, NY, USA (pp. 199\u2013212).","DOI":"10.1145\/1653662.1653687"}],"container-title":["Wireless Personal Communications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-015-3096-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11277-015-3096-5\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-015-3096-5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-015-3096-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T09:18:30Z","timestamp":1559380710000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11277-015-3096-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,10,20]]},"references-count":18,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2017,6]]}},"alternative-id":["3096"],"URL":"https:\/\/doi.org\/10.1007\/s11277-015-3096-5","relation":{},"ISSN":["0929-6212","1572-834X"],"issn-type":[{"value":"0929-6212","type":"print"},{"value":"1572-834X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2015,10,20]]}}}