{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T12:43:19Z","timestamp":1740141799955,"version":"3.37.3"},"reference-count":13,"publisher":"SAGE Publications","issue":"7","license":[{"start":{"date-parts":[[2015,7,1]],"date-time":"2015-07-01T00:00:00Z","timestamp":1435708800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/journals.sagepub.com\/page\/policies\/text-and-data-mining-license"}],"funder":[{"DOI":"10.13039\/501100001868","name":"National Science Council Taiwan","doi-asserted-by":"publisher","award":["103-2632-E-366-001"],"award-info":[{"award-number":["103-2632-E-366-001"]}],"id":[{"id":"10.13039\/501100001868","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["journals.sagepub.com"],"crossmark-restriction":true},"short-container-title":["International Journal of Distributed Sensor Networks"],"published-print":{"date-parts":[[2015,7,1]]},"abstract":"<jats:p> Wireless sensor networks (WSNs) contain a large number of resource-constrained and energy-limited sensor nodes that are generally deployed in an open environment. Those sensor nodes communicate with each other or with a base station via wireless channels. Therefore, secure access control is an important issue in WSNs because sensor nodes are susceptible to various malicious attacks during the authentication and key establishment phase and the new node addition phase. In this study, we propose a new access control method based on elliptic curve cryptography and the chameleon hash function. This method addresses the security problems in the existing research. It also has additional advantages since it does not require time synchronization between communication nodes, nor does it require node verification tables. In addition to our proposal, the correctness, security, resistance to possible attacks, and the performance of the proposed method are analyzed and evaluated. The results of our study demonstrate that the proposed method has an outstanding performance and fulfills all the requirements for secure communication in WSNs. <\/jats:p>","DOI":"10.1155\/2015\/261906","type":"journal-article","created":{"date-parts":[[2015,7,1]],"date-time":"2015-07-01T21:17:29Z","timestamp":1435785449000},"page":"261906","update-policy":"https:\/\/doi.org\/10.1177\/sage-journals-update-policy","source":"Crossref","is-referenced-by-count":8,"title":["Secure Access Control Method for Wireless Sensor Networks"],"prefix":"10.1177","volume":"11","author":[{"given":"Cheng-Yeh","family":"Chen","sequence":"first","affiliation":[{"name":"Department of Computer Science and Engineering, National Sun Yat-sen University, Kaohsiung 80424, Taiwan"}]},{"given":"Alan Dahgwo","family":"Yein","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Information Engineering, Shu-Te University, Kaohsiung 82445, Taiwan"}]},{"given":"Te-Cheng","family":"Hsu","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Information Engineering, Shu-Te University, Kaohsiung 82445, Taiwan"}]},{"given":"John Y.","family":"Chiang","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Engineering, National Sun Yat-sen University, Kaohsiung 80424, Taiwan"},{"name":"Department of Healthcare Administration and Medical Informatics, Kaohsiung Medical University, Taiwan"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5631-7782","authenticated-orcid":false,"given":"Wen-Shyong","family":"Hsieh","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Engineering, National Sun Yat-sen University, Kaohsiung 80424, Taiwan"},{"name":"Department of Computer Science and Information Engineering, Shu-Te University, Kaohsiung 82445, Taiwan"}]}],"member":"179","published-online":{"date-parts":[[2015,7,1]]},"reference":[{"key":"B1-2015-261906","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2002.1024422"},{"key":"B2-2015-261906","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2006.05.014"},{"key":"B3-2015-261906","doi-asserted-by":"publisher","DOI":"10.1016\/j.csi.2008.05.014"},{"key":"B4-2015-261906","doi-asserted-by":"publisher","DOI":"10.1109\/TCE.2009.5174412"},{"key":"B5-2015-261906","doi-asserted-by":"publisher","DOI":"10.1109\/TCE.2010.5606360"},{"key":"B6-2015-261906","doi-asserted-by":"publisher","DOI":"10.1109\/TCE.2010.5505971"},{"key":"B7-2015-261906","doi-asserted-by":"publisher","DOI":"10.1109\/TCE.2012.6227452"},{"issue":"1","key":"B8-2015-261906","volume":"4","author":"Molavi B.","year":"2013","journal-title":"International Journal of Computer Science and Business Informatics"},{"key":"B9-2015-261906","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-72738-5_2"},{"key":"B10-2015-261906","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2008.06.022"},{"key":"B11-2015-261906","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2010.07.001"},{"key":"B12-2015-261906","first-page":"143","author":"Krawczyk H.","year":"2000","journal-title":"Proceedings of the Internet Society Symposium on Network and Distributed System Security (NDSS \u203200)"},{"key":"B13-2015-261906","doi-asserted-by":"publisher","DOI":"10.1109\/WiMob.2008.16"}],"container-title":["International Journal of Distributed Sensor Networks"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/journals.sagepub.com\/doi\/pdf\/10.1155\/2015\/261906","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/journals.sagepub.com\/doi\/full-xml\/10.1155\/2015\/261906","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/journals.sagepub.com\/doi\/pdf\/10.1155\/2015\/261906","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,9]],"date-time":"2021-05-09T06:15:52Z","timestamp":1620540952000},"score":1,"resource":{"primary":{"URL":"http:\/\/journals.sagepub.com\/doi\/10.1155\/2015\/261906"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,7,1]]},"references-count":13,"journal-issue":{"issue":"7","published-print":{"date-parts":[[2015,7,1]]}},"alternative-id":["10.1155\/2015\/261906"],"URL":"https:\/\/doi.org\/10.1155\/2015\/261906","relation":{},"ISSN":["1550-1477","1550-1477"],"issn-type":[{"type":"print","value":"1550-1477"},{"type":"electronic","value":"1550-1477"}],"subject":[],"published":{"date-parts":[[2015,7,1]]}}}