{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,30]],"date-time":"2025-12-30T17:54:11Z","timestamp":1767117251414},"reference-count":27,"publisher":"SAGE Publications","issue":"1","license":[{"start":{"date-parts":[[2011,1,1]],"date-time":"2011-01-01T00:00:00Z","timestamp":1293840000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/journals.sagepub.com\/page\/policies\/text-and-data-mining-license"}],"content-domain":{"domain":["journals.sagepub.com"],"crossmark-restriction":true},"short-container-title":["International Journal of Distributed Sensor Networks"],"published-print":{"date-parts":[[2011,1,1]]},"abstract":"<jats:p> Nodes in a sensor network may be lost because of power exhaustion or malicious attacks. To extend the span of sensor network, new nodes deployment is necessary. To prevent malicious nodes from joining the sensor networks, access control is a designed requirement for controlling sensor node deployment. Based on elliptic curve cryptography (ECC), this paper presents a new access control protocol for secure wireless sensor networks. The proposed scheme not only prevents malicious nodes from joining sensor networks, but also key establishment is included in the authentication procedure. Compared to the previously proposed schemes, the authentication procedure and common key generation of the proposed method are very simple and efficient. It could offer computational efficiency, energy, and bandwidth savings. In addition, it can be easily implemented as a dynamic access control, because all the old secret keys and information in existing nodes should not be updated once a new node is added or an old node is lost. <\/jats:p>","DOI":"10.1155\/2011\/412146","type":"journal-article","created":{"date-parts":[[2011,5,10]],"date-time":"2011-05-10T19:33:17Z","timestamp":1305055997000},"page":"412146","update-policy":"http:\/\/dx.doi.org\/10.1177\/sage-journals-update-policy","source":"Crossref","is-referenced-by-count":14,"title":["A New Design of Access Control in Wireless Sensor Networks"],"prefix":"10.1177","volume":"7","author":[{"given":"Hui-Feng","family":"Huang","sequence":"first","affiliation":[{"name":"Department of Computer Science and Information Engineering, National Taichung Institute of Technology, Taichung 404, Taiwan"}]}],"member":"179","published-online":{"date-parts":[[2011,4,26]]},"reference":[{"key":"B1-2011-412146","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2002.1024422"},{"key":"B2-2011-412146","doi-asserted-by":"publisher","DOI":"10.1016\/j.talanta.2004.07.006"},{"key":"B3-2011-412146","first-page":"52","volume-title":"Proceedings of the 10th ACM Conference on Computer and Communications Security (CCS '03)","author":"Liu D."},{"key":"B4-2011-412146","first-page":"197","volume-title":"Proceedings of IEEE Symposium on Security and Privacy","author":"Chan H."},{"key":"B5-2011-412146","doi-asserted-by":"publisher","DOI":"10.1007\/11596042_111"},{"key":"B6-2011-412146","first-page":"41","volume-title":"Proceedings of the 9th ACM Conference on Computer and Communications Security","author":"Eschenauer L."},{"key":"B7-2011-412146","first-page":"253","volume-title":"Proceedings of the 3rd International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIHMSP '07)","author":"Huang H. F."},{"key":"B8-2011-412146","first-page":"494","volume-title":"Proceedings of the International Conference on Computational Intelligence and Security (CIS '05)","author":"Park C. W."},{"key":"B9-2011-412146","first-page":"1976","volume-title":"Proceeding of the 22nd Annual Joint Conference on the IEEE Computer and Communications Societies","author":"Hu Y. C."},{"key":"B10-2011-412146","first-page":"49","volume-title":"Proveedings of IEEE Symposium on Security and Privacy","author":"Parno B."},{"key":"B11-2011-412146","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2006.05.014"},{"key":"B12-2011-412146","first-page":"62","volume-title":"Proceedings of the 10th ACM Conference on Computer and Communications Security (CCS '03)","author":"Zhu S."},{"key":"B13-2011-412146","doi-asserted-by":"publisher","DOI":"10.1145\/1218556.1218559"},{"key":"B14-2011-412146","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2008.77"},{"key":"B15-2011-412146","doi-asserted-by":"publisher","DOI":"10.1145\/359168.359176"},{"key":"B16-2011-412146","doi-asserted-by":"publisher","DOI":"10.1145\/359340.359342"},{"key":"B17-2011-412146","doi-asserted-by":"publisher","DOI":"10.1090\/S0025-5718-1987-0866109-5"},{"key":"B18-2011-412146","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-46406-9"},{"key":"B19-2011-412146","doi-asserted-by":"crossref","first-page":"50","DOI":"10.1145\/138859.138865","volume":"35","author":"Vanstone S.","year":"1992","journal-title":"Communications of the ACM"},{"key":"B21-2011-412146","series-title":"Lecture Notes in Computer Science","first-page":"339","volume-title":"Advances in Cryptology (Crypto '89)","volume":"435","author":"Schnorr C. P."},{"key":"B22-2011-412146","volume-title":"Number Theory with Computer Applications","author":"Kumanduri R.","year":"1998"},{"key":"B23-2011-412146","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1976.1055638"},{"key":"B24-2011-412146","volume-title":"Proceedings of the 1st International Workshop on Peer-to-peer Systems (IPTPS '02)","author":"Douceur J. R."},{"key":"B25-2011-412146","first-page":"51","volume-title":"Proceedings of the ACM Workshop on Wireless Security (WiSe '04)","author":"Wang W."},{"key":"B26-2011-412146","first-page":"119","volume-title":"Proceedings of the 6th International Workshop Cryptographic Hardware and Embedded Systems (CHES '04)","author":"Gura N."},{"issue":"1","key":"B28-2011-412146","first-page":"82","volume":"78","author":"Dimitrov V.","year":"1995","journal-title":"IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences"},{"issue":"5","key":"B29-2011-412146","first-page":"818","volume":"81","author":"Fan C. I.","year":"1998","journal-title":"IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences"}],"container-title":["International Journal of Distributed Sensor Networks"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/downloads.hindawi.com\/journals\/ijdsn\/2011\/412146.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/journals.sagepub.com\/doi\/full-xml\/10.1155\/2011\/412146","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/journals.sagepub.com\/doi\/full\/10.1155\/2011\/412146","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,28]],"date-time":"2021-05-28T14:49:03Z","timestamp":1622213343000},"score":1,"resource":{"primary":{"URL":"http:\/\/journals.sagepub.com\/doi\/10.1155\/2011\/412146"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,1,1]]},"references-count":27,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2011,1,1]]}},"alternative-id":["10.1155\/2011\/412146"],"URL":"https:\/\/doi.org\/10.1155\/2011\/412146","relation":{},"ISSN":["1550-1477","1550-1477"],"issn-type":[{"value":"1550-1477","type":"print"},{"value":"1550-1477","type":"electronic"}],"subject":[],"published":{"date-parts":[[2011,1,1]]}}}