{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T12:43:18Z","timestamp":1740141798351,"version":"3.37.3"},"reference-count":23,"publisher":"SAGE Publications","issue":"4","license":[{"start":{"date-parts":[[2013,4,1]],"date-time":"2013-04-01T00:00:00Z","timestamp":1364774400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/journals.sagepub.com\/page\/policies\/text-and-data-mining-license"}],"funder":[{"DOI":"10.13039\/501100003725","name":"National Research Foundation of Korea","doi-asserted-by":"crossref","award":["2012-0008447"],"award-info":[{"award-number":["2012-0008447"]}],"id":[{"id":"10.13039\/501100003725","id-type":"DOI","asserted-by":"crossref"}]},{"DOI":"10.13039\/501100002472","name":"Dongseo University","doi-asserted-by":"publisher","award":["2012-0008447"],"award-info":[{"award-number":["2012-0008447"]}],"id":[{"id":"10.13039\/501100002472","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["journals.sagepub.com"],"crossmark-restriction":true},"short-container-title":["International Journal of Distributed Sensor Networks"],"published-print":{"date-parts":[[2013,4,1]]},"abstract":"<jats:p> The communication between cell phones and sensor networks involves strong user authentication protocols to ensure the data and network security. Generally, in order to obtain the relevant information, cell phones interact with sensor networks via gateways. In 2009, according to Arjan Durresi and Vamsi Paruchuri scheme, this unique ability is used to provide better authentication and security protocols that can be used to establish secure communications among cell phones and sensor networks. In this paper, we show that their scheme is vulnerable to known attacks such as man-in-the-middle attack and reply attack, and it does not provide mutual authentication between gateway node and cell phone. In addition, it does not establish session key after the authentication phase. To fill this security gap, we proposed security patches and improvements, which overcome the weak features in the scheme of Arjan Durresi and Vamsi Paruchuri. Finally, we came out with results which show that our improved security patch establishes trust between the cell phone and gateway in the form of mutual authentication and provides the session key establishment after the authentication phase. <\/jats:p>","DOI":"10.1155\/2013\/348783","type":"journal-article","created":{"date-parts":[[2013,4,28]],"date-time":"2013-04-28T21:01:11Z","timestamp":1367182871000},"page":"348783","update-policy":"https:\/\/doi.org\/10.1177\/sage-journals-update-policy","source":"Crossref","is-referenced-by-count":1,"title":["Improved Security Patch on Secure Communication among Cell Phones and Sensor Networks"],"prefix":"10.1177","volume":"9","author":[{"given":"Ndibanje","family":"Bruce","sequence":"first","affiliation":[{"name":"Department of Ubiquitous IT, Graduate School of Dongseo University, Sasang-Gu, Busan 617-716, Republic of Korea"}]},{"given":"Tae-Yong","family":"Kim","sequence":"additional","affiliation":[{"name":"Division of Computer and Engineering, Dongseo University, Sasang-Gu, Busan 617-716, Republic of Korea"}]},{"given":"Hoon Jae","family":"Lee","sequence":"additional","affiliation":[{"name":"Division of Computer and Engineering, Dongseo University, Sasang-Gu, Busan 617-716, Republic of Korea"}]}],"member":"179","published-online":{"date-parts":[[2013,4,28]]},"reference":[{"key":"B1-2013-348783","doi-asserted-by":"publisher","DOI":"10.1201\/9780203500705"},{"first-page":"189","volume-title":"Proceedings of the 7th Annual International Conference on Mobile Computing and Networking (MOBBICOM '01)","author":"Perrig A.","key":"B2-2013-348783"},{"first-page":"162","volume-title":"Proceedings of the 2nd International Conference on Embedded Networked Sensor Systems (SenSys '04)","author":"Karlof C.","key":"B3-2013-348783"},{"key":"B4-2013-348783","doi-asserted-by":"publisher","DOI":"10.1145\/1236360.1236421"},{"key":"B5-2013-348783","first-page":"129","volume":"8","author":"Kumar P.","year":"2010","journal-title":"International Journal of Maritime Information and Communication Sciences"},{"key":"B6-2013-348783","doi-asserted-by":"publisher","DOI":"10.1016\/S1570-8705(03)00008-8"},{"volume":"34","volume-title":"Proceedings of the Workshop on Sensor Networks Informatik","author":"Benenson Z.","key":"B7-2013-348783"},{"volume-title":"Proceedings of the Workshop on Real-World Wireless Sensor Network (REALWSN '05)","author":"Benenson Z.","key":"B8-2013-348783"},{"key":"B9-2013-348783","doi-asserted-by":"publisher","DOI":"10.1109\/SUTC.2006.1636182"},{"first-page":"986","volume-title":"Proceedings of the IEEE Global Communications Conference (GLOBECOM '07)","author":"Tseng H. R.","key":"B10-2013-348783"},{"key":"B11-2013-348783","doi-asserted-by":"publisher","DOI":"10.1023\/A:1025146013151"},{"key":"B12-2013-348783","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2009.5426002"},{"first-page":"586","volume-title":"Proceedings of the 23rd Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM '04)","author":"Du W.","key":"B13-2013-348783"},{"key":"B14-2013-348783","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2006.943"},{"key":"B15-2013-348783","doi-asserted-by":"publisher","DOI":"10.1007\/s00145-007-9001-y"},{"issue":"4","key":"B16-2013-348783","volume":"4","author":"Mojtaba A. M.","year":"2012","journal-title":"International Journal of Network Security & Its Applications (IJNSA)"},{"key":"B20-2013-348783","doi-asserted-by":"publisher","DOI":"10.4218\/etrij.10.1510.0134"},{"key":"B21-2013-348783","doi-asserted-by":"publisher","DOI":"10.3390\/s110505020"},{"first-page":"52","volume-title":"Proceedings of the 15th International Conference on Advanced Computing Technologies (ICACT '13)","author":"Bruce N.","key":"B22-2013-348783"},{"first-page":"59","volume-title":"Proceedings of the ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN '04)","author":"Watro R.","key":"B23-2013-348783"},{"key":"B17-2013-348783","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2007.190"},{"key":"B18-2013-348783","doi-asserted-by":"publisher","DOI":"10.1016\/S0167-4048(02)00415-7"},{"key":"B19-2013-348783","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2010.08.007"}],"container-title":["International Journal of Distributed Sensor Networks"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/journals.sagepub.com\/doi\/pdf\/10.1155\/2013\/348783","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/journals.sagepub.com\/doi\/full-xml\/10.1155\/2013\/348783","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/journals.sagepub.com\/doi\/pdf\/10.1155\/2013\/348783","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,16]],"date-time":"2021-05-16T21:53:34Z","timestamp":1621202014000},"score":1,"resource":{"primary":{"URL":"http:\/\/journals.sagepub.com\/doi\/10.1155\/2013\/348783"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,4,1]]},"references-count":23,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2013,4,1]]}},"alternative-id":["10.1155\/2013\/348783"],"URL":"https:\/\/doi.org\/10.1155\/2013\/348783","relation":{},"ISSN":["1550-1477","1550-1477"],"issn-type":[{"type":"print","value":"1550-1477"},{"type":"electronic","value":"1550-1477"}],"subject":[],"published":{"date-parts":[[2013,4,1]]}}}