{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,17]],"date-time":"2025-11-17T14:14:01Z","timestamp":1763388841034,"version":"3.37.3"},"reference-count":23,"publisher":"SAGE Publications","issue":"5","license":[{"start":{"date-parts":[[2013,5,1]],"date-time":"2013-05-01T00:00:00Z","timestamp":1367366400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/journals.sagepub.com\/page\/policies\/text-and-data-mining-license"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61202474","BK2011464"],"award-info":[{"award-number":["61202474","BK2011464"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100004608","name":"Natural Science Foundation of Jiangsu Province","doi-asserted-by":"crossref","award":["61202474","BK2011464"],"award-info":[{"award-number":["61202474","BK2011464"]}],"id":[{"id":"10.13039\/501100004608","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["journals.sagepub.com"],"crossmark-restriction":true},"short-container-title":["International Journal of Distributed Sensor Networks"],"published-print":{"date-parts":[[2013,5,1]]},"abstract":"<jats:p> The mobile wireless sensor network (MWSN) is a new style WSN with mobile sinks or sensors in the network. MWSN has advantages over static WSN in the aspect of better energy efficiency, improved coverage, and superior channel capacity. However, mobile nodes also bring some security problems. For example, it is difficult to ensure secure communications among the mobile nodes and static nodes. In this paper, we design a lightweight mobile reauthentication protocol for mobile nodes. The designed protocol provides forward secure pairwise key for the mobile node when it moves from one cluster to another. Thus, the mobile sensor node can be authenticated by the new cluster head, and the privacy of his origin area is protected. In addition, the security and performance analysis shows that our scheme meets the need of lower communication and computation overhead, while achieving security requirement for mobile sensor node application in MWSN. <\/jats:p>","DOI":"10.1155\/2013\/913782","type":"journal-article","created":{"date-parts":[[2013,5,26]],"date-time":"2013-05-26T21:00:41Z","timestamp":1369602041000},"page":"913782","update-policy":"https:\/\/doi.org\/10.1177\/sage-journals-update-policy","source":"Crossref","is-referenced-by-count":7,"title":["A Privacy-Preserving Reauthentication Scheme for Mobile Wireless Sensor Networks"],"prefix":"10.1177","volume":"9","author":[{"given":"Shunrong","family":"Jiang","sequence":"first","affiliation":[{"name":"The Department of Internet of Things, Jiangsu University, Zhenjiang 212013, China"}]},{"given":"Jiapeng","family":"Zhang","sequence":"additional","affiliation":[{"name":"The Department of Internet of Things, Jiangsu University, Zhenjiang 212013, China"}]},{"given":"JingJun","family":"Miao","sequence":"additional","affiliation":[{"name":"The Department of Internet of Things, Jiangsu University, Zhenjiang 212013, China"}]},{"given":"Conghua","family":"Zhou","sequence":"additional","affiliation":[{"name":"The Department of Internet of Things, Jiangsu University, Zhenjiang 212013, China"}]}],"member":"179","published-online":{"date-parts":[[2013,5,26]]},"reference":[{"key":"B1-2013-913782","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2006.106"},{"key":"B2-2013-913782","doi-asserted-by":"publisher","DOI":"10.1023\/B:JONS.0000015697.38671.ec"},{"key":"B3-2013-913782","doi-asserted-by":"publisher","DOI":"10.1145\/1280940.1281023"},{"key":"B4-2013-913782","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2006.05.012"},{"first-page":"113","volume-title":"in Proceedings of the 21st International Conference on Advanced Information Networking and Applications Workshops","author":"Munir S. A.","key":"B5-2013-913782"},{"first-page":"19","volume-title":"Proceedings of the IEEE International Conference on Robotics and Automation (ICRA \u203203)","author":"Rahimi M.","key":"B6-2013-913782"},{"first-page":"878","volume-title":"Proceedings of the IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies (NFOCOM \u203205)","author":"Yarvis M.","key":"B7-2013-913782"},{"first-page":"270","volume-title":"Proceedings of the 11th Annual International Conference on Mobile Computing and Networking (MobiCom \u203205)","author":"Wang W.","key":"B8-2013-913782"},{"first-page":"300","volume-title":"Proceedings of the 6th ACM International Symposium on Mobile Ad Hoc Networking and Computing (MOBIHOC \u203205)","author":"Liu B.","key":"B9-2013-913782"},{"first-page":"237","volume-title":"Proceedings of the 2nd ACM Conference on Wireless Network Security (WiSec \u203209)","author":"Pietro R. D.","key":"B10-2013-913782"},{"key":"B11-2013-913782","doi-asserted-by":"publisher","DOI":"10.1023\/A:1016598314198"},{"first-page":"58","volume-title":"Proceedings of the 6th ACM International Symposium on Mobile ad hoc Networking and Computing (MobiHoc \u203205)","author":"Du W.","key":"B12-2013-913782"},{"key":"B13-2013-913782","doi-asserted-by":"publisher","DOI":"10.1109\/AINA.2007.14"},{"first-page":"378","volume-title":"Proceedings of the 6th ACM International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc \u203205)","author":"Zhang W.","key":"B14-2013-913782"},{"key":"B15-2013-913782","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2010.100505"},{"key":"B16-2013-913782","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"194","DOI":"10.1007\/978-3-642-35130-3_14","volume-title":"Proceedings of the 8th International Conference on Information Systems Security (ICISS \u203212)","volume":"7671","author":"Agrawal S."},{"key":"B17-2013-913782","doi-asserted-by":"publisher","DOI":"10.3390\/s100504410"},{"key":"B18-2013-913782","doi-asserted-by":"publisher","DOI":"10.3390\/s100403718"},{"first-page":"41","volume-title":"Proceedings of the 9th ACM Conference on Computer and Communications Security (CCS \u203202)","author":"Eschenauer L.","key":"B19-2013-913782"},{"volume-title":"Proceedings of the Wireless Communications and Networking Conference (WCNC \u203213)","author":"Jiang S.","key":"B20-2013-913782"},{"key":"B21-2013-913782","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2010.2051468"},{"first-page":"580","volume-title":"Proceedings of the 4th IEEE International Conference on Wireless and Mobile Computing, Networking and Communications (WIMOB \u203208)","author":"Zheng J.","key":"B22-2013-913782"},{"key":"B23-2013-913782","first-page":"218","volume-title":"Sensor Network Operations","author":"Meulenaer G. D.","year":"2006"}],"container-title":["International Journal of Distributed Sensor Networks"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/journals.sagepub.com\/doi\/pdf\/10.1155\/2013\/913782","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/journals.sagepub.com\/doi\/full-xml\/10.1155\/2013\/913782","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/journals.sagepub.com\/doi\/pdf\/10.1155\/2013\/913782","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,16]],"date-time":"2021-05-16T22:28:39Z","timestamp":1621204119000},"score":1,"resource":{"primary":{"URL":"http:\/\/journals.sagepub.com\/doi\/10.1155\/2013\/913782"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,5,1]]},"references-count":23,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2013,5,1]]}},"alternative-id":["10.1155\/2013\/913782"],"URL":"https:\/\/doi.org\/10.1155\/2013\/913782","relation":{},"ISSN":["1550-1477","1550-1477"],"issn-type":[{"type":"print","value":"1550-1477"},{"type":"electronic","value":"1550-1477"}],"subject":[],"published":{"date-parts":[[2013,5,1]]}}}