{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T10:07:30Z","timestamp":1767262050221,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":21,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,3,24]],"date-time":"2019-03-24T00:00:00Z","timestamp":1553385600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,3,24]]},"DOI":"10.1145\/3361570.3361605","type":"proceedings-article","created":{"date-parts":[[2019,11,8]],"date-time":"2019-11-08T13:40:33Z","timestamp":1573220433000},"page":"1-4","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["New Node Distributed Access Control Scheme for Wireless Sensor Network"],"prefix":"10.1145","author":[{"given":"Youssou","family":"Faye","sequence":"first","affiliation":[{"name":"Department of Computer Sciences, University Assane Seck of Ziguinchor, Ziguinchor, Senegal"}]},{"given":"Ibrahima","family":"Niang","sequence":"additional","affiliation":[{"name":"Department of Computer Sciences, University Cheikh Anta Diop, Dakar, Senegal"}]},{"given":"Herve","family":"Guyennet","sequence":"additional","affiliation":[{"name":"Femto-st DISC, Universit\u00e9 de Franche Comte, Besancon, France"}]}],"member":"320","published-online":{"date-parts":[[2019,3,24]]},"reference":[{"key":"e_1_3_2_1_1_1","first-page":"197","volume-title":"IEEE Symposium on Security and Privacy","author":"Chan A.","year":"2003","unstructured":"H. Chan , A. Perrig , D. Song, Random key pre-distribution shemes for sensor networks , IEEE Symposium on Security and Privacy , 2003 , pp. 197 -- 213 . H. Chan, A. Perrig, D. Song, Random key pre-distribution shemes for sensor networks, IEEE Symposium on Security and Privacy, 2003, pp.197--213."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1007\/11596042_111"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/586110.586117"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"crossref","first-page":"494","DOI":"10.1007\/11596981_73","volume-title":"International Con- ference on Computational Intelligence and Security (CIS","author":"Park S.J.","year":"2005","unstructured":"C.W. Park , S.J. Choi , H.Y. Youn , A novel key pre- distribution scheme with LU matrix for secure wireless sensor networks , International Con- ference on Computational Intelligence and Security (CIS 2005 ), Springer- Verlag , Germany , 2005, pp. 494 -- 499 , LNAI. 3801, Part I, Dec.networks - revisited. In ESAS, pages 2{18, 2004}. C.W. Park, S.J. Choi, H.Y. Youn, A novel key pre- distribution scheme with LU matrix for secure wireless sensor networks, International Con- ference on Computational Intelligence and Security (CIS 2005), Springer- Verlag, Germany, 2005, pp. 494--499, LNAI. 3801, Part I, Dec.networks - revisited. In ESAS, pages 2{18, 2004}."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.csi.2008.05.014"},{"key":"e_1_3_2_1_6_1","volume-title":"2008 IEEE Asia-Pacific Services Computing Conference, DOI 10","author":"Huang K.","year":"2008","unstructured":"H. Huang , K. Liu , A New Dynamic Access Control in Wireless Sensor Networks , 2008 IEEE Asia-Pacific Services Computing Conference, DOI 10 .1109\/APSCC. 2008 .116 H. Huang, K. Liu, A New Dynamic Access Control in Wireless Sensor Networks, 2008 IEEE Asia-Pacific Services Computing Conference, DOI 10.1109\/APSCC.2008.116"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCE.2009.5174412"},{"volume-title":"The 13th IEEE International Symposium on Consumer Electronics (ISCE2009)","author":"Lee K.","key":"e_1_3_2_1_8_1","unstructured":"H. Lee , K. Shin , D. Lee , Practical Access Control Protocol for Secure Sensor Networks , The 13th IEEE International Symposium on Consumer Electronics (ISCE2009) H. Lee, K. Shin, D. Lee, Practical Access Control Protocol for Secure Sensor Networks, The 13th IEEE International Symposium on Consumer Electronics (ISCE2009)"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCE.2010.5505971"},{"key":"e_1_3_2_1_10_1","volume-title":"2017 19th International Conference on Advanced Communication Technology (ICACT) (pp. 822--826)","author":"Sain M.","year":"2017","unstructured":"Sain , M. , Kim , H. H. , & Lee , H. J. ( 2017 , February). Practical access control protocols (PACPs) for wireless sensor networks: Analysis of security pitfalls . In 2017 19th International Conference on Advanced Communication Technology (ICACT) (pp. 822--826) . IEEE. Sain, M., Kim, H. H., & Lee, H. J. (2017, February). Practical access control protocols (PACPs) for wireless sensor networks: Analysis of security pitfalls. In 2017 19th International Conference on Advanced Communication Technology (ICACT) (pp. 822--826). IEEE."},{"key":"e_1_3_2_1_11_1","volume-title":"Implementation of node authentication for wsn using hash chains. Procedia Computer Science, 89, 90--98","author":"Moon A. H.","year":"2016","unstructured":"Moon , A. H. , Iqbal , U. , & Bhat , G. M. ( 2016 ). Implementation of node authentication for wsn using hash chains. Procedia Computer Science, 89, 90--98 . Moon, A. H., Iqbal, U., & Bhat, G. M. (2016). Implementation of node authentication for wsn using hash chains. Procedia Computer Science, 89, 90--98."},{"key":"e_1_3_2_1_12_1","volume-title":"International Journal of Ad Hoc and Ubiquitous Computing, 27(1), 1--18.","author":"Chatterjee S.","year":"2018","unstructured":"Chatterjee , S. , & Roy , S. ( 2018 ). An efficient dynamic access control scheme for distributed wireless sensor networks . International Journal of Ad Hoc and Ubiquitous Computing, 27(1), 1--18. Chatterjee, S., & Roy, S. (2018). An efficient dynamic access control scheme for distributed wireless sensor networks. International Journal of Ad Hoc and Ubiquitous Computing, 27(1), 1--18."},{"key":"e_1_3_2_1_13_1","volume-title":"Workshop on Real-World Wireless Sensor Networks (REALWSN)","author":"Benenson N.","year":"2005","unstructured":"Z. Benenson , N. Gedicke and O. Raivio , Realizing Robust User Authen- tication in Sensor Networks , Workshop on Real-World Wireless Sensor Networks (REALWSN) , Stockholm, Sweden , June 2005 . Z.Benenson, N. Gedicke and O. Raivio, Realizing Robust User Authen- tication in Sensor Networks, Workshop on Real-World Wireless Sensor Networks (REALWSN), Stockholm, Sweden, June 2005."},{"key":"e_1_3_2_1_14_1","first-page":"362","volume-title":"PEI Qing-qi: An Access Control Scheme in Wireless Sensor Networks. In: Proceedings of 2007 IFIP In- ternational Conference on Network and Parallel Computing - Workshops","author":"Yu","unstructured":"SHEN Yu -long, MA Jian -feng , PEI Qing-qi: An Access Control Scheme in Wireless Sensor Networks. In: Proceedings of 2007 IFIP In- ternational Conference on Network and Parallel Computing - Workshops , pp. 362 -- 367 SHEN Yu-long, MA Jian-feng, PEI Qing-qi: An Access Control Scheme in Wireless Sensor Networks. In: Proceedings of 2007 IFIP In- ternational Conference on Network and Parallel Computing - Workshops, pp. 362--367"},{"key":"e_1_3_2_1_15_1","first-page":"9","volume":"16","author":"An Liu R.","year":"2009","unstructured":"K. An Liu , R. Peng Ning , D. Maughan , Securing Network Access in Wire- less Sensor Networks, WiSec' 09 , March 16 9 , 2009 , Zurich, Switzerland. Copyright 2009 ACM 978-1-60558-460-7\/09\/03 K. An Liu, R. Peng Ning, D. Maughan, Securing Network Access in Wire- less Sensor Networks, WiSec'09, March 16 9, 2009, Zurich, Switzerland. Copyright 2009 ACM 978-1-60558-460-7\/09\/03","journal-title":"March"},{"key":"e_1_3_2_1_16_1","volume-title":"Proceedings of the IEEE P1363 Study Group for Future Public-Key Cryptography Standards. [4] Donggang Liu, Peng Ning, \"Establishing Pairwise Keys in Distributed","author":"Arazi B.","year":"1999","unstructured":"Arazi , B. ( 1999 ). Certification of dl\/ec keys . In Proceedings of the IEEE P1363 Study Group for Future Public-Key Cryptography Standards. [4] Donggang Liu, Peng Ning, \"Establishing Pairwise Keys in Distributed Arazi, B. (1999). Certification of dl\/ec keys. In Proceedings of the IEEE P1363 Study Group for Future Public-Key Cryptography Standards. [4] Donggang Liu, Peng Ning, \"Establishing Pairwise Keys in Distributed"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-28632-5_9"},{"key":"e_1_3_2_1_18_1","first-page":"61","volume-title":"CCS '03: Proceedings of the 10th ACM conference on Computer and communications security","author":"Liu P.","unstructured":"D. Liu and P. Ning . Establishing pairwise keys in distributedsensor networks . In CCS '03: Proceedings of the 10th ACM conference on Computer and communications security , pages 52{ 61 . ACM Press, 2003}. D. Liu and P. Ning. Establishing pairwise keys in distributedsensor networks. In CCS '03: Proceedings of the 10th ACM conference on Computer and communications security, pages 52{61. ACM Press, 2003}."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2006.05.014"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/359340.359342"},{"key":"e_1_3_2_1_21_1","volume-title":"InterSense '06, Proceedings of the First International Conference on Integrated Internet Ad hoc and Sensor Networks","author":"Banerjee D.","year":"2006","unstructured":"S. Banerjee , D. Mukhopadhyay , \"Symmetric Key Based Authenticated Querying in Wireless Sensor Networks\" , InterSense '06, Proceedings of the First International Conference on Integrated Internet Ad hoc and Sensor Networks , May 2006 , Nice France. S. Banerjee, D. Mukhopadhyay, \"Symmetric Key Based Authenticated Querying in Wireless Sensor Networks\", InterSense '06, Proceedings of the First International Conference on Integrated Internet Ad hoc and Sensor Networks, May 2006, Nice France."}],"event":{"name":"icist 2019: 9th International Conference on Information Systems and Technologies","acronym":"icist 2019","location":"Cairo Egypt"},"container-title":["Proceedings of the 9th International Conference on Information Systems and Technologies"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3361570.3361605","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3361570.3361605","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T17:49:27Z","timestamp":1750268967000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3361570.3361605"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,3,24]]},"references-count":21,"alternative-id":["10.1145\/3361570.3361605","10.1145\/3361570"],"URL":"https:\/\/doi.org\/10.1145\/3361570.3361605","relation":{},"subject":[],"published":{"date-parts":[[2019,3,24]]},"assertion":[{"value":"2019-03-24","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}