{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,28]],"date-time":"2025-10-28T00:29:27Z","timestamp":1761611367202,"version":"3.37.3"},"reference-count":27,"publisher":"SAGE Publications","issue":"4","license":[{"start":{"date-parts":[[2015,4,1]],"date-time":"2015-04-01T00:00:00Z","timestamp":1427846400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/journals.sagepub.com\/page\/policies\/text-and-data-mining-license"}],"funder":[{"DOI":"10.13039\/501100001732","name":"Danish National Research Foundation","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100001732","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["journals.sagepub.com"],"crossmark-restriction":true},"short-container-title":["International Journal of Distributed Sensor Networks"],"published-print":{"date-parts":[[2015,4,1]]},"abstract":"<jats:p> Energy Harvesting Wireless Sensor Networks (EH-WSNs) represent an interesting new paradigm where individual nodes forming a network are powered by energy sources scavenged from the surrounding environment. This technique provides numerous advantages, but also new design challenges. Securing the communications under energy constraints represents one of these key challenges. The amount of energy available is theoretically infinite in the long run but highly variable over short periods of time, and managing it is a crucial aspect. In this paper we present an adaptive approach for security in multihop EH-WSNs which allows different nodes to dynamically choose the most appropriate energy-affecting parameters such as encryption algorithm and key size, providing in this way energy savings. In order to provide evidence of the approach's feasibility in a real-world network, we have designed and implemented it as extension of on-demand medium access control (ODMAC), a receiver-initiated (RI) MAC protocol specifically designed and developed to address the foundational energy-related needs of Energy Harvesting Wireless Sensor Networks. <\/jats:p>","DOI":"10.1155\/2015\/760302","type":"journal-article","created":{"date-parts":[[2015,4,9]],"date-time":"2015-04-09T21:02:35Z","timestamp":1428613355000},"page":"760302","update-policy":"https:\/\/doi.org\/10.1177\/sage-journals-update-policy","source":"Crossref","is-referenced-by-count":12,"title":["Adaptive Security in ODMAC for Multihop Energy Harvesting Wireless Sensor Networks"],"prefix":"10.1177","volume":"11","author":[{"given":"Alessio","family":"Di Mauro","sequence":"first","affiliation":[{"name":"DTU Compute, Technical University of Denmark, Richard Petersens Plads, 2800 Kongens Lyngby, Denmark"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9871-0013","authenticated-orcid":false,"given":"Xenofon","family":"Fafoutis","sequence":"additional","affiliation":[{"name":"Department of Electrical and Electronic Engineering, University of Bristol, Woodland Road, Bristol BS8 1UB, UK"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9575-2990","authenticated-orcid":false,"given":"Nicola","family":"Dragoni","sequence":"additional","affiliation":[{"name":"DTU Compute, Technical University of Denmark, Richard Petersens Plads, 2800 Kongens Lyngby, Denmark"},{"name":"Centre for Applied Autonomous Sensor Systems, \u00d6rebro University, 701 82 \u00d6rebro, Sweden"}]}],"member":"179","published-online":{"date-parts":[[2015,4,9]]},"reference":[{"first-page":"422","volume-title":"Proceedings of the 2nd International Conference on Pervasive Embedded Computing and Communication Systems (PECCS '12)","author":"Di Mauro A.","key":"B1-2015-760302"},{"first-page":"324","volume-title":"Proceedings of the 3rd IEEE International Conference on Pervasive Computing and Communications (PerCom '05)","author":"Wander A. S.","key":"B2-2015-760302"},{"key":"B3-2015-760302","doi-asserted-by":"publisher","DOI":"10.1145\/2069063.2069072"},{"first-page":"407","volume-title":"Proceedings of the 4th Workshop on Energy Efficiency in Wireless Networks and Wireless Networks for Energy Efficiency (E2Nets '13)","author":"Fafoutis X.","key":"B4-2015-760302"},{"key":"B5-2015-760302","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2014.11.002"},{"key":"B6-2015-760302","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2004.1313259"},{"key":"B7-2015-760302","doi-asserted-by":"publisher","DOI":"10.1145\/1274858.1274870"},{"key":"B8-2015-760302","doi-asserted-by":"publisher","DOI":"10.1145\/2487166.2487200"},{"key":"B9-2015-760302","doi-asserted-by":"publisher","DOI":"10.1155\/2014\/576401"},{"first-page":"162","volume-title":"Proceedings of the 2nd ACM International Conference on Embedded Networked Sensor Systems (SenSys '04)","author":"Karlof C.","key":"B10-2015-760302"},{"key":"B11-2015-760302","volume":"177","author":"Kohno T.","year":"2003","journal-title":"IACR Cryptology ePrint Archive"},{"key":"B13-2015-760302","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-02617-1_38"},{"key":"B14-2015-760302","doi-asserted-by":"publisher","DOI":"10.1007\/s00145-005-0129-3"},{"key":"B15-2015-760302","doi-asserted-by":"publisher","DOI":"10.1145\/1138127.1138130"},{"key":"B16-2015-760302","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-23951-9_23"},{"first-page":"339","volume-title":"Proceedings of the 19th International Conference on Selected Areas in Cryptography (SAC '13)","author":"Suzaki T.","key":"B17-2015-760302"},{"key":"B18-2015-760302","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-74735-2_31"},{"volume-title":"Information Technology\u2014Security Techniques\u2014Lightweight Cryptography\u2014Part 2: Block Ciphers","year":"2012","author":"International Organization for Standardization (ISO)","key":"B19-2015-760302"},{"key":"B20-2015-760302","doi-asserted-by":"publisher","DOI":"10.1145\/1236360.1236421"},{"key":"B21-2015-760302","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-21702-9_18"},{"key":"B22-2015-760302","doi-asserted-by":"publisher","DOI":"10.5121\/ijnsa.2010.2405"},{"first-page":"1","volume-title":"Proceedings of the 7th International Conference on Security and Cryptography (SECRYPT '10)","author":"Taddeo A. V.","key":"B23-2015-760302"},{"volume-title":"IEEE Standard for Information Technology\u2014Telecommunications and Information Exchange Between Systems\u2014Local and Metropolitan Area Networks Specific Requirements Part 15.4: Wireless Medium Access Control (MAC) and Physical Layer (PHY) Specifications for Low-Rate Wireless Personal Area Networks (LR-WPANs)","year":"2003","author":"IEEE","key":"B24-2015-760302"},{"key":"B25-2015-760302","doi-asserted-by":"publisher","DOI":"10.1109\/tit.1983.1056650"},{"key":"B26-2015-760302","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-41488-6_1"},{"key":"B27-2015-760302","doi-asserted-by":"publisher","DOI":"10.1109\/icton.2012.6253913"},{"first-page":"1","volume-title":"Proceedings of the 28th Meeting of the Wireless World Research Forum (WWRF '12)","author":"Fotiou N.","key":"B28-2015-760302"}],"container-title":["International Journal of Distributed Sensor Networks"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/journals.sagepub.com\/doi\/pdf\/10.1155\/2015\/760302","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/journals.sagepub.com\/doi\/full-xml\/10.1155\/2015\/760302","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/journals.sagepub.com\/doi\/pdf\/10.1155\/2015\/760302","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,6]],"date-time":"2021-05-06T06:34:39Z","timestamp":1620282879000},"score":1,"resource":{"primary":{"URL":"http:\/\/journals.sagepub.com\/doi\/10.1155\/2015\/760302"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,4,1]]},"references-count":27,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2015,4,1]]}},"alternative-id":["10.1155\/2015\/760302"],"URL":"https:\/\/doi.org\/10.1155\/2015\/760302","relation":{},"ISSN":["1550-1477","1550-1477"],"issn-type":[{"type":"print","value":"1550-1477"},{"type":"electronic","value":"1550-1477"}],"subject":[],"published":{"date-parts":[[2015,4,1]]}}}