{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,28]],"date-time":"2025-10-28T15:05:40Z","timestamp":1761663940301,"version":"3.37.3"},"reference-count":18,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2019,5,16]],"date-time":"2019-05-16T00:00:00Z","timestamp":1557964800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2019,5,16]],"date-time":"2019-05-16T00:00:00Z","timestamp":1557964800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61662046"],"award-info":[{"award-number":["61662046"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Wireless Pers Commun"],"published-print":{"date-parts":[[2019,11]]},"DOI":"10.1007\/s11277-019-06576-8","type":"journal-article","created":{"date-parts":[[2019,5,16]],"date-time":"2019-05-16T09:20:56Z","timestamp":1557998456000},"page":"505-519","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":17,"title":["Practical Data Transmission Scheme for Wireless Sensor Networks in Heterogeneous IoT Environment"],"prefix":"10.1007","volume":"109","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-2231-3775","authenticated-orcid":false,"given":"Ming","family":"Luo","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Yulang","family":"Wen","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Xingtong","family":"Hu","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2019,5,16]]},"reference":[{"issue":"3","key":"6576_CR1","doi-asserted-by":"publisher","first-page":"10","DOI":"10.1109\/MWC.2017.1600421","volume":"24","author":"I Yaqoob","year":"2017","unstructured":"Yaqoob, I., Ahmed, E., Abaker, I., et al. (2017). Internet of things architecture: Recent advances, taxonomy, requirements, and open challenges. IEEE Wireless Communications,\n                           24(3), 10\u201316.","journal-title":"IEEE Wireless Communications"},{"key":"6576_CR2","doi-asserted-by":"publisher","DOI":"10.1155\/2017\/9324035","author":"P Sethi","year":"2017","unstructured":"Sethi, P., & Sarangi, S. R. (2017). Internet of things:architectures, protocols, and applications. Journal of Electrical and Computer Engineering. \n                    https:\/\/doi.org\/10.1155\/2017\/9324035\n                    \n                  .","journal-title":"Journal of Electrical and Computer Engineering"},{"issue":"5","key":"6576_CR3","doi-asserted-by":"publisher","first-page":"1125","DOI":"10.1109\/JIOT.2017.2683200","volume":"4","author":"J Lin","year":"2017","unstructured":"Lin, J., Yu, W., Zhang, N., Yang, X., Zhang, H., & Zhao, W. (2017). A survey on internet of things: architecture, enabling technologies, security and privacy, and applications. IEEE Internet of Things Journal,\n                           4(5), 1125\u20131142.","journal-title":"IEEE Internet of Things Journal"},{"key":"6576_CR4","doi-asserted-by":"publisher","first-page":"544","DOI":"10.1016\/j.future.2017.07.060","volume":"78","author":"M Conti","year":"2018","unstructured":"Conti, M., Dehghantanha, A., Franke, K., & Watson, S. (2018). Internet of things security and forensics: Challenges and opportunities. Future Generation Computer Systems,\n                           78, 544\u2013546.","journal-title":"Future Generation Computer Systems"},{"key":"6576_CR5","doi-asserted-by":"publisher","first-page":"199","DOI":"10.1016\/j.comnet.2018.03.012","volume":"141","author":"DE Kouicem","year":"2018","unstructured":"Kouicem, D. E., Bouabdallah, A., & Lakhlef, H. (2018). Internet of things security: A top-down survey. Computer Networks,\n                           141, 199\u2013221.","journal-title":"Computer Networks"},{"key":"6576_CR6","doi-asserted-by":"crossref","unstructured":"Huang, X., Susilo, W., Mu, Y., & Zhang, F. (2005). Identity-based ring signcryption schemes: Cryptographic primitives for preserving privacy and authenticity in the ubiquitous world. In Advanced Information Networking and Applications-AINA. (pp. 649\u2013654). Taiwan, Taipei.","DOI":"10.1109\/AINA.2005.205"},{"issue":"1","key":"6576_CR7","doi-asserted-by":"publisher","first-page":"1185","DOI":"10.1007\/s11277-017-4560-1","volume":"97","author":"G Sharma","year":"2017","unstructured":"Sharma, G., Bala, S., & Verma, A. K. (2017). PF-IBS: pairing-free identity based digital signature algorithm for wireless sensor networks. Wireless Personal Communications,\n                           97(1), 1185\u20131196.","journal-title":"Wireless Personal Communications"},{"issue":"1","key":"6576_CR8","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1504\/IJSNET.2018.088365","volume":"26","author":"H Khan","year":"2018","unstructured":"Khan, H. (2018). An identity based routing path verification scheme for wireless sensor networks. International Journal of Sensor Networks,\n                           26(1), 1\u201315.","journal-title":"International Journal of Sensor Networks"},{"issue":"5","key":"6576_CR9","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/JSEN.2018.2792879","volume":"18","author":"HF Zhu","year":"2018","unstructured":"Zhu, H. F., Tan, Y. A., Zhu, L. H., et al. (2018). An identity-based anti-quantum privacy-preserving blind authentication in wireless sensor networks. Sensors,\n                           18(5), 1\u201315.","journal-title":"Sensors"},{"key":"6576_CR10","doi-asserted-by":"crossref","unstructured":"Al-Riyami, S. S., & Paterson, K. G. (2003). Certificateless public key cryptography. In International Conference on the Theory and Application of Cryptology and Information Security (pp. 452\u2013473). Springer Berlin Heidelberg.","DOI":"10.1007\/978-3-540-40061-5_29"},{"key":"6576_CR11","doi-asserted-by":"crossref","unstructured":"Wang, L., Zhang, G., & Ma, C. (2007). A secure ring signcryption scheme for private and anonymous communication. In Proceedings of the IFIP international conference on network and parallel computing workshops, NPC\u201907, (pp. 107\u2013111).","DOI":"10.1109\/NPC.2007.8"},{"key":"6576_CR12","doi-asserted-by":"crossref","unstructured":"Zhu, L.J., Zhang, F., & Miao, S. (2010). A provably secure parallel certificatelesss ring signcryption scheme. In Proceedings of the international conference on multimedia information networking and security, MINES\u201910, (pp. 423\u2013427).","DOI":"10.1109\/MINES.2010.94"},{"issue":"3","key":"6576_CR13","first-page":"99","volume":"8","author":"ZH Qi","year":"2011","unstructured":"Qi, Z. H., Yang, G., & Ren, X. Y. (2011). Provably secure certificateless ring signcryption scheme. China Communications,\n                           8(3), 99\u2013106.","journal-title":"China Communications"},{"key":"6576_CR14","doi-asserted-by":"publisher","first-page":"1469","DOI":"10.1007\/s11277-015-2698-2","volume":"84","author":"G Sharma","year":"2015","unstructured":"Sharma, G., Bala, S., & Verma, A. K. (2015). Pairing-free certificateless ring signcryption (PF-CLRSC) scheme for wireless sensor networks. Wireless Personal Communications,\n                           84, 1469\u20131485.","journal-title":"Wireless Personal Communications"},{"key":"6576_CR15","doi-asserted-by":"publisher","first-page":"5635","DOI":"10.1007\/s11277-017-4438-2","volume":"96","author":"H Shen","year":"2017","unstructured":"Shen, H., Chen, J. H., He, D. B., & Shen, J. (2017). Insecurity of a pairing-free certificateless ring signcryption scheme. Wireless Personal Communications,\n                           96, 5635\u20135641.","journal-title":"Wireless Personal Communications"},{"issue":"1","key":"6576_CR16","doi-asserted-by":"publisher","first-page":"111","DOI":"10.1007\/s11235-015-0065-y","volume":"62","author":"F Li","year":"2016","unstructured":"Li, F., Zheng, Z., & Jin, C. (2016). Secure and efficient data transmission in the internet of things. Telecommunication Systems,\n                           62(1), 111\u2013122.","journal-title":"Telecommunication Systems"},{"issue":"6","key":"6576_CR17","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s10916-018-0964-z","volume":"42","author":"AA Omala","year":"2018","unstructured":"Omala, A. A., Mbandu, A. S., Mutiria, K. D., Jin, C., & Li, F. (2018). Provably secure heterogeneous access control scheme for wireless body area network. Journal of Medical Systems,\n                           42(6), 1\u201314.","journal-title":"Journal of Medical Systems"},{"key":"6576_CR18","doi-asserted-by":"publisher","DOI":"10.1155\/2018\/6140978","author":"M Luo","year":"2018","unstructured":"Luo, M., Luo, Y., Wan, Y. W., & Wang, Z. (2018). Secure and efficient access control scheme for wireless sensor networks in the cross-domain context of the IoT. Security and Communication Networks. \n                    https:\/\/doi.org\/10.1155\/2018\/6140978\n                    \n                  .","journal-title":"Security and Communication Networks"}],"container-title":["Wireless Personal Communications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-019-06576-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11277-019-06576-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-019-06576-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,5,14]],"date-time":"2020-05-14T23:30:55Z","timestamp":1589499055000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11277-019-06576-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,5,16]]},"references-count":18,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2019,11]]}},"alternative-id":["6576"],"URL":"https:\/\/doi.org\/10.1007\/s11277-019-06576-8","relation":{},"ISSN":["0929-6212","1572-834X"],"issn-type":[{"type":"print","value":"0929-6212"},{"type":"electronic","value":"1572-834X"}],"subject":[],"published":{"date-parts":[[2019,5,16]]},"assertion":[{"value":"16 May 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}