{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,30]],"date-time":"2025-12-30T17:51:03Z","timestamp":1767117063821},"reference-count":28,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"3","license":[{"start":{"date-parts":[[2013,5,1]],"date-time":"2013-05-01T00:00:00Z","timestamp":1367366400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE J. Biomed. Health Inform."],"published-print":{"date-parts":[[2013,5]]},"DOI":"10.1109\/jbhi.2012.2235180","type":"journal-article","created":{"date-parts":[[2012,12,21]],"date-time":"2012-12-21T19:05:12Z","timestamp":1356116712000},"page":"664-674","source":"Crossref","is-referenced-by-count":46,"title":["Secure and Lightweight Network Admission and Transmission Protocol for Body Sensor Networks"],"prefix":"10.1109","volume":"17","author":[{"given":"Daojing","family":"He","sequence":"first","affiliation":[]},{"given":"Chun","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Sammy","family":"Chan","sequence":"additional","affiliation":[]},{"given":"Jiajun","family":"Bu","sequence":"additional","affiliation":[]},{"given":"Pingxin","family":"Zhang","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TIE.2011.2178214"},{"key":"ref11","doi-asserted-by":"crossref","first-page":"140","DOI":"10.1109\/TIFS.2008.2009601","article-title":"SMOCK: A scalable method of cryptographic key management for mission-critical wireless ad-hoc networks","volume":"4","author":"he","year":"2009","journal-title":"IEEE Trans Inf Forensics Security"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2011.020211.00045"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/1248054.1248058"},{"key":"ref14","doi-asserted-by":"crossref","first-page":"772","DOI":"10.1109\/TITB.2008.926434","article-title":"Using the timing information of heartbeats as an entity identifier to secure body sensor network","volume":"12","author":"bao","year":"2008","journal-title":"IEEE Trans Inf Technol Biomed"},{"key":"ref15","year":"0"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/TITB.2009.2033055"},{"key":"ref17","doi-asserted-by":"crossref","first-page":"1164","DOI":"10.1109\/TITB.2012.2199996","article-title":"A distributed trust evaluation model and its application scenarios for medical sensor networks","volume":"16","author":"he","year":"2012","journal-title":"IEEE Trans Inf Technol Biomed"},{"key":"ref18","doi-asserted-by":"crossref","first-page":"623","DOI":"10.1109\/TITB.2012.2194788","article-title":"ReTrust: Attack-resistant and lightweight trust management for medical sensor networks","volume":"16","author":"he","year":"2012","journal-title":"IEEE Trans Inf Technol Biomed"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1016\/j.sna.2011.10.016"},{"key":"ref28","year":"0"},{"key":"ref4","year":"0"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/1031495.1031515"},{"key":"ref3","year":"0"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.3390\/s90806273"},{"key":"ref5","year":"0"},{"key":"ref8","doi-asserted-by":"crossref","first-page":"519","DOI":"10.1007\/11935308_37","article-title":"Efficient implementation of public key cryptosystems on mote sensors","author":"wang","year":"2006","journal-title":"Proc Int Conf Inf Commun Security"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.4108\/bodynets.2007.140"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1155\/2008\/291365"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/1065545.1065548"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/MPRV.2004.18"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/TCOM.1982.1095533"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/1151690.1151692"},{"key":"ref21","first-page":"471","article-title":"Perfectly-secure key distribution for dynamic conferences","volume":"lncs 740","author":"blundo","year":"1993","journal-title":"Proc Adv Cryptol"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2010.05.011"},{"key":"ref23","year":"0"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/IPSN.2008.47"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/1180345.1180366"}],"container-title":["IEEE Journal of Biomedical and Health Informatics"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/6221020\/6511984\/06392182.pdf?arnumber=6392182","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,11,29]],"date-time":"2021-11-29T20:24:44Z","timestamp":1638217484000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6392182\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,5]]},"references-count":28,"journal-issue":{"issue":"3"},"URL":"https:\/\/doi.org\/10.1109\/jbhi.2012.2235180","relation":{},"ISSN":["2168-2194","2168-2208"],"issn-type":[{"value":"2168-2194","type":"print"},{"value":"2168-2208","type":"electronic"}],"subject":[],"published":{"date-parts":[[2013,5]]}}}