{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T14:35:27Z","timestamp":1740148527281,"version":"3.37.3"},"reference-count":21,"publisher":"Wiley","license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/3.0\/"}],"funder":[{"DOI":"10.13039\/501100001868","name":"National Science Council","doi-asserted-by":"publisher","award":["MOST 103-2632-E-324-001-MY3","MOST 103-2622-E-212-009-CC2","MOST 103-2221-E-324-023","MOST 104-2221-E-324-012"],"award-info":[{"award-number":["MOST 103-2632-E-324-001-MY3","MOST 103-2622-E-212-009-CC2","MOST 103-2221-E-324-023","MOST 104-2221-E-324-012"]}],"id":[{"id":"10.13039\/501100001868","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001868","name":"National Science Council","doi-asserted-by":"publisher","award":["MOST 103-2632-E-324-001-MY3","MOST 103-2622-E-212-009-CC2","MOST 103-2221-E-324-023","MOST 104-2221-E-324-012"],"award-info":[{"award-number":["MOST 103-2632-E-324-001-MY3","MOST 103-2622-E-212-009-CC2","MOST 103-2221-E-324-023","MOST 104-2221-E-324-012"]}],"id":[{"id":"10.13039\/501100001868","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001868","name":"National Science Council","doi-asserted-by":"publisher","award":["MOST 103-2632-E-324-001-MY3","MOST 103-2622-E-212-009-CC2","MOST 103-2221-E-324-023","MOST 104-2221-E-324-012"],"award-info":[{"award-number":["MOST 103-2632-E-324-001-MY3","MOST 103-2622-E-212-009-CC2","MOST 103-2221-E-324-023","MOST 104-2221-E-324-012"]}],"id":[{"id":"10.13039\/501100001868","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001868","name":"National Science Council","doi-asserted-by":"publisher","award":["MOST 103-2632-E-324-001-MY3","MOST 103-2622-E-212-009-CC2","MOST 103-2221-E-324-023","MOST 104-2221-E-324-012"],"award-info":[{"award-number":["MOST 103-2632-E-324-001-MY3","MOST 103-2622-E-212-009-CC2","MOST 103-2221-E-324-023","MOST 104-2221-E-324-012"]}],"id":[{"id":"10.13039\/501100001868","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Journal of Sensors"],"published-print":{"date-parts":[[2015]]},"abstract":"<jats:p>In recent years, wireless sensor network (WSN) applications have tended to transmit data hop by hop, from sensor nodes through cluster nodes to the base station. As a result, users must collect data from the base station. This study considers two different applications: hop by hop transmission of data from cluster nodes to the base station and the direct access to cluster nodes data by mobile users via mobile devices. Due to the hardware limitations of WSNs, some low-cost operations such as symmetric cryptographic algorithms and hash functions are used to implement a dynamic key management. The session key can be updated to prevent threats of attack from each communication. With these methods, the data gathered in wireless sensor networks can be more securely communicated. Moreover, the proposed scheme is analyzed and compared with related schemes. In addition, an NS2 simulation is developed in which the experimental results show that the designed communication protocol is workable.<\/jats:p>","DOI":"10.1155\/2015\/827546","type":"journal-article","created":{"date-parts":[[2015,8,16]],"date-time":"2015-08-16T17:03:58Z","timestamp":1439744638000},"page":"1-10","source":"Crossref","is-referenced-by-count":3,"title":["Mobile Device Based Dynamic Key Management Protocols for Wireless Sensor Networks"],"prefix":"10.1155","volume":"2015","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-4958-2043","authenticated-orcid":true,"given":"Chin-Ling","family":"Chen","sequence":"first","affiliation":[{"name":"Department of Computer Science and Information Engineering, Chaoyang University of Technology, Taichung 41349, Taiwan"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Chih-Cheng","family":"Chen","sequence":"additional","affiliation":[{"name":"Department of Health Policy and Management, Chung Shan Medical University, Taichung 40201, Taiwan"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"De-Kui","family":"Li","sequence":"additional","affiliation":[{"name":"Department of Information Management, Liaocheng University, Liaocheng, Shandong 252000, China"}],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"311","reference":[{"key":"1","doi-asserted-by":"publisher","DOI":"10.1155\/2015\/534657"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.2298\/csis120907025c"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2006.05.011"},{"issue":"5","key":"4","first-page":"1243","volume":"5","year":"2009","journal-title":"The International Journal of Innovative Computing, Information and Control"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1145\/1105688.1105691"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1155\/2008\/691571"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.3390\/s100807347"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1155\/2014\/134357"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1155\/2014\/573913"},{"issue":"11","key":"12","first-page":"2803","volume":"4","year":"2008","journal-title":"International Journal of Innovative Computing, Information and Control"},{"issue":"5","key":"13","first-page":"2257","volume":"7","year":"2011","journal-title":"The International Journal of Innovative Computing, Information and Control"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1049\/ip-e.1991.0022"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1109\/30.826377"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1109\/tce.2004.1309433"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1109\/tce.2004.1309441"},{"issue":"3","key":"19","first-page":"897","volume":"6","year":"2010","journal-title":"The International Journal of Innovative Computing, Information and Control"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1016\/j.jpdc.2007.06.010"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1023\/A:1013941929408"},{"key":"25","first-page":"153","volume-title":"Dynamic source routing in ad hoc wireless networks","volume":"353","year":"1996"},{"issue":"8","key":"27","first-page":"2257","volume":"38","year":"2012","journal-title":"Computers & Security"},{"key":"28","doi-asserted-by":"publisher","DOI":"10.1016\/j.jpdc.2010.03.009"}],"container-title":["Journal of Sensors"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/downloads.hindawi.com\/journals\/js\/2015\/827546.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/js\/2015\/827546.xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/js\/2015\/827546.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2016,7,27]],"date-time":"2016-07-27T17:56:40Z","timestamp":1469642200000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.hindawi.com\/journals\/js\/2015\/827546\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"references-count":21,"alternative-id":["827546","827546"],"URL":"https:\/\/doi.org\/10.1155\/2015\/827546","relation":{},"ISSN":["1687-725X","1687-7268"],"issn-type":[{"type":"print","value":"1687-725X"},{"type":"electronic","value":"1687-7268"}],"subject":[],"published":{"date-parts":[[2015]]}}}