{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T12:43:09Z","timestamp":1740141789166,"version":"3.37.3"},"reference-count":39,"publisher":"SAGE Publications","issue":"4","license":[{"start":{"date-parts":[[2015,4,1]],"date-time":"2015-04-01T00:00:00Z","timestamp":1427846400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/journals.sagepub.com\/page\/policies\/text-and-data-mining-license"}],"funder":[{"name":"EU Structural Funds"}],"content-domain":{"domain":["journals.sagepub.com"],"crossmark-restriction":true},"short-container-title":["International Journal of Distributed Sensor Networks"],"published-print":{"date-parts":[[2015,4,1]]},"abstract":"<jats:p> Technological advances within the area of wireless sensor technology allow WSNs to be used in a increasing number of measurement scenarios. As new application areas are emerging, such as infrastructure monitoring and smart cities, the need for sensor mobility handling requires efficient and secure authentication protocols. This paper presents EAP-Swift, a novel EAP based authentication protocol with a focus on lightweight processing and faster response. It supports end-to-end session encryption key generation and mutual authentication. By utilizing lightweight hashing algorithms, the challenge-response authentication mechanism uses only two round trips to the AAA server for the complete authentication procedure leading to the reduction of latency by 33% compared to the baseline protocols. Further, using extensive experimentation, we validate that the authentication time can be kept below 250\u2009ms and the power consumption can be kept below 15\u2009mJ. Furthermore, we show that a battery lifetime of more than four years can be achieved when running the system on a regular button cell battery. Finally, the protocol was verified in terms of security using the AVISPA tool. <\/jats:p>","DOI":"10.1155\/2015\/460914","type":"journal-article","created":{"date-parts":[[2015,4,8]],"date-time":"2015-04-08T15:43:36Z","timestamp":1428507816000},"page":"460914","update-policy":"https:\/\/doi.org\/10.1177\/sage-journals-update-policy","source":"Crossref","is-referenced-by-count":5,"title":["EAP-Swift: An Efficient Authentication and Key Generation Mechanism for Resource Constrained WSNs"],"prefix":"10.1177","volume":"11","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-9909-6273","authenticated-orcid":false,"given":"Daniel","family":"Granlund","sequence":"first","affiliation":[{"name":"Division of Pervasive and Mobile Computing, Lule\u00e5 University of Technology, 931 87 Skellefte\u00e5, Sweden"}]},{"given":"Christer","family":"\u00c5hlund","sequence":"additional","affiliation":[{"name":"Division of Pervasive and Mobile Computing, Lule\u00e5 University of Technology, 931 87 Skellefte\u00e5, Sweden"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5193-5648","authenticated-orcid":false,"given":"Patrik","family":"Holmlund","sequence":"additional","affiliation":[{"name":"Division of Pervasive and Mobile Computing, Lule\u00e5 University of Technology, 931 87 Skellefte\u00e5, Sweden"}]}],"member":"179","published-online":{"date-parts":[[2015,4,7]]},"reference":[{"key":"B1-2015-460914","doi-asserted-by":"publisher","DOI":"10.1109\/lcnw.2012.6424074"},{"first-page":"797","volume-title":"Proceedings of the 36th IEEE Conference on Local Computer Networks (LCN): 5th IEEE Workshop on User Mobility and Vehicular Networks. IEEE Communications Society (LCN '11)","author":"Br\u00e4nnstr\u00f6m R.","key":"B2-2015-460914"},{"issue":"1","key":"B3-2015-460914","volume":"1","author":"Kalinta H. K.","year":"2009","journal-title":"International Journal of Next-Generation Networks"},{"key":"B4-2015-460914","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-04722-4"},{"key":"B5-2015-460914","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9781107360211"},{"volume-title":"Symmetric Key Cryptography","year":"2007","author":"Daswani N.","key":"B7-2015-460914"},{"volume-title":"ZigBee Specifications, Version 1.0","year":"2005","author":"ZigBee Alliance","key":"B8-2015-460914"},{"key":"B12-2015-460914","doi-asserted-by":"publisher","DOI":"10.1109\/mwc.2010.5675777"},{"key":"B13-2015-460914","doi-asserted-by":"publisher","DOI":"10.1109\/jiot.2014.2306328"},{"key":"B14-2015-460914","doi-asserted-by":"publisher","DOI":"10.1109\/JSEN.2013.2272099"},{"key":"B29-2015-460914","doi-asserted-by":"publisher","DOI":"10.4108\/icst.wicon2008.4827"},{"key":"B31-2015-460914","doi-asserted-by":"publisher","DOI":"10.1007\/s12243-009-0135-9"},{"key":"B15-2015-460914","series-title":"RFC6282","volume-title":"Compression Format for IPv6 Datagrams over IEEE 802.15.4\u2014Based Networks","author":"Hui J.","year":"2011"},{"key":"B16-2015-460914","series-title":"edited by S. Gundavelli","volume-title":"Proxy Mobile IPv6, IETF, RFC 5213","author":"Leung K.","year":"2008"},{"key":"B17-2015-460914","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2011.240"},{"key":"B18-2015-460914","doi-asserted-by":"publisher","DOI":"10.3390\/s110201865"},{"key":"B19-2015-460914","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2012.03.005"},{"key":"B20-2015-460914","doi-asserted-by":"publisher","DOI":"10.3390\/s110504767"},{"key":"B21-2015-460914","doi-asserted-by":"publisher","DOI":"10.1109\/EMTC.2014.6996650"},{"key":"B22-2015-460914","doi-asserted-by":"publisher","DOI":"10.17487\/rfc2865"},{"key":"B23-2015-460914","doi-asserted-by":"publisher","DOI":"10.17487\/rfc3588"},{"key":"B24-2015-460914","doi-asserted-by":"publisher","DOI":"10.17487\/rfc3748"},{"key":"B25-2015-460914","doi-asserted-by":"publisher","DOI":"10.17487\/rfc5216"},{"key":"B26-2015-460914","doi-asserted-by":"publisher","DOI":"10.17487\/rfc5281"},{"key":"B27-2015-460914","doi-asserted-by":"publisher","DOI":"10.17487\/rfc4186"},{"key":"B28-2015-460914","doi-asserted-by":"publisher","DOI":"10.17487\/rfc5448"},{"key":"B30-2015-460914","series-title":"RFC 5433","volume-title":"EAP Generalized Pre-Shared Key","author":"Clancy T.","year":"2009"},{"key":"B32-2015-460914","doi-asserted-by":"publisher","DOI":"10.17487\/rfc1321"},{"key":"B33-2015-460914","series-title":"RFC 3174","volume-title":"US Secure Hashing Algorithm 1 (SHA1)","author":"Eastlake D.","year":"2001"},{"key":"B34-2015-460914","doi-asserted-by":"publisher","DOI":"10.1145\/1980022.1980212"},{"key":"B35-2015-460914","doi-asserted-by":"publisher","DOI":"10.1155\/2014\/925479"},{"key":"B37-2015-460914","doi-asserted-by":"publisher","DOI":"10.1007\/s10207-004-0055-7"},{"volume-title":"Proceedings of the 17th International Conference on Term Rewriting and Applications","author":"Turuani M.","key":"B38-2015-460914"},{"first-page":"730","volume-title":"Proceedings of the 9th International Conference on Logics in Artificial Intelligence (JELIA '04)","author":"Armando A.","key":"B39-2015-460914"},{"volume-title":"Proceedings of the 9th International Workshop on Verification of Infinite-State Systems","author":"Boichut Y.","key":"B40-2015-460914"},{"key":"B42-2015-460914","doi-asserted-by":"publisher","DOI":"10.1109\/TrustCom.2011.63"},{"key":"B43-2015-460914","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-27139-2_7"},{"volume-title":"Independent Implementation of MD5 (RFC1321)","year":"2002","author":"Deutsch L. P.","key":"B44-2015-460914"},{"key":"B49-2015-460914","doi-asserted-by":"publisher","DOI":"10.1109\/icc.2013.6655128"}],"container-title":["International Journal of Distributed Sensor Networks"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/journals.sagepub.com\/doi\/pdf\/10.1155\/2015\/460914","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/journals.sagepub.com\/doi\/full-xml\/10.1155\/2015\/460914","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/journals.sagepub.com\/doi\/pdf\/10.1155\/2015\/460914","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,6]],"date-time":"2021-05-06T06:32:32Z","timestamp":1620282752000},"score":1,"resource":{"primary":{"URL":"http:\/\/journals.sagepub.com\/doi\/10.1155\/2015\/460914"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,4,1]]},"references-count":39,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2015,4,1]]}},"alternative-id":["10.1155\/2015\/460914"],"URL":"https:\/\/doi.org\/10.1155\/2015\/460914","relation":{},"ISSN":["1550-1477","1550-1477"],"issn-type":[{"type":"print","value":"1550-1477"},{"type":"electronic","value":"1550-1477"}],"subject":[],"published":{"date-parts":[[2015,4,1]]}}}