{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,11]],"date-time":"2026-02-11T09:18:13Z","timestamp":1770801493507,"version":"3.50.0"},"reference-count":69,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62371200"],"award-info":[{"award-number":["62371200"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Natural Science Foundation of Wuhan","award":["2025040601020215"],"award-info":[{"award-number":["2025040601020215"]}]},{"name":"Hubei Key Research and Development Program","award":["2025BCB120"],"award-info":[{"award-number":["2025BCB120"]}]},{"name":"Young Elite Scientists Sponsorship Program by the China","award":["2023QNRC001"],"award-info":[{"award-number":["2023QNRC001"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Netw. Sci. Eng."],"published-print":{"date-parts":[[2026]]},"DOI":"10.1109\/tnse.2026.3653104","type":"journal-article","created":{"date-parts":[[2026,1,12]],"date-time":"2026-01-12T22:02:43Z","timestamp":1768255363000},"page":"6010-6026","source":"Crossref","is-referenced-by-count":0,"title":["A Disconnection-Resistant Authenticated Diffie-Hellman Protocol in Wireless Weak-Link Sensor Networks"],"prefix":"10.1109","volume":"13","author":[{"ORCID":"https:\/\/orcid.org\/0009-0001-2178-476X","authenticated-orcid":false,"given":"Jia","family":"Zhang","sequence":"first","affiliation":[{"name":"Research Center of 6G Mobile Communications, School of Cyber Science and Engineering, Huazhong University of Science and Technology, Wuhan, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0460-4453","authenticated-orcid":false,"given":"Guanghua","family":"Liu","sequence":"additional","affiliation":[{"name":"Research Center of 6G Mobile Communications, School of Cyber Science and Engineering, Huazhong University of Science and Technology, Wuhan, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0003-4182-8883","authenticated-orcid":false,"given":"Chenlong","family":"Wang","sequence":"additional","affiliation":[{"name":"Research Center of 6G Mobile Communications, School of Cyber Science and Engineering, Huazhong University of Science and Technology, Wuhan, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0006-9648-2383","authenticated-orcid":false,"given":"Zhihao","family":"Liu","sequence":"additional","affiliation":[{"name":"Research Center of 6G Mobile Communications, School of Cyber Science and Engineering, Huazhong University of Science and Technology, Wuhan, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8482-1046","authenticated-orcid":false,"given":"Tao","family":"Jiang","sequence":"additional","affiliation":[{"name":"Research Center of 6G Mobile Communications, School of Cyber Science and Engineering, Huazhong University of Science and Technology, Wuhan, China"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2024.3399059"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2011.093011.110632"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.001.2000921"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2022.3199348"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2015.2471263"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2024.3418826"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TNSE.2021.3098011"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TNSE.2024.3383280"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TNSE.2023.3296329"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2023.06.017"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-28632-5_9"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/1029102.1029113"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/SAHCN.2004.1381904"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/2714576.2714608"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/ICSCN.2015.7219840"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2009.060598"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2008.04.006"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1016\/j.jpdc.2010.03.009"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/CBD.2014.39"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1049\/cp.2013.2451"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-31020-1_41"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-77690-1_19"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2014.2375555"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/NSysS.2017.7885817"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2019.2953549"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/JSEN.2020.3028872"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2025.3597949"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/CSE.2013.103"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2020.03.185"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.23919\/DATE56975.2023.10137025"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.3390\/s20185350"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1145\/2753476.2753477"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1007\/s11276-018-1704-5"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/TNSE.2024.3363004"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-25271-6_1"},{"key":"ref36","article-title":"TinyAKE: A more practicable and trustable scheme for authenticated key establishment in WSNs","author":"Sun","year":"2021"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2022.3173536"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2912998"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.4018\/IJCAC.297103"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/IEEECONF52377.2022.10013341"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3221434"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/UEMCON.2016.7777838"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/INMIC50486.2020.9318055"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1049\/iet-ifs.2012.0144"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-24712-5_2"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1080\/09540091.2021.1990212"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/IEEEGCC.2017.8447901"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2022.3219233"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0290323"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1016\/j.sysarc.2013.05.022"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.3390\/s18103569"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1007\/978-81-322-1665-0_38"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2010.05.013"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1155\/2012\/406254"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1109\/LES.2016.2630729"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1109\/IPSN.2008.47"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.2307\/2007884"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1109\/TNSE.2022.3179830"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1109\/TNSE.2020.3013064"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.3002221"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1109\/TNSE.2022.3142287"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2002.804190"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2017.2653109"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2023.3283248"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2024.103432"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1109\/RISP.1994.296595"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2022.3165580"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1145\/2700834"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2025.3600161"}],"container-title":["IEEE Transactions on Network Science and Engineering"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/6488902\/11264281\/11346012.pdf?arnumber=11346012","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,2,10]],"date-time":"2026-02-10T21:05:55Z","timestamp":1770757555000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11346012\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026]]},"references-count":69,"URL":"https:\/\/doi.org\/10.1109\/tnse.2026.3653104","relation":{},"ISSN":["2327-4697","2334-329X"],"issn-type":[{"value":"2327-4697","type":"electronic"},{"value":"2334-329X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026]]}}}