{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T14:35:39Z","timestamp":1740148539766,"version":"3.37.3"},"reference-count":14,"publisher":"Wiley","license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61373138","61272422","BE2015702","BK20151511","2015M570468","2016T90485","DZXX-017","WSNLBZY201516","KYLX15_0853"],"award-info":[{"award-number":["61373138","61272422","BE2015702","BK20151511","2015M570468","2016T90485","DZXX-017","WSNLBZY201516","KYLX15_0853"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61373138","61272422","BE2015702","BK20151511","2015M570468","2016T90485","DZXX-017","WSNLBZY201516","KYLX15_0853"],"award-info":[{"award-number":["61373138","61272422","BE2015702","BK20151511","2015M570468","2016T90485","DZXX-017","WSNLBZY201516","KYLX15_0853"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Key Research and Development Program of Jiangsu Province","award":["61373138","61272422","BE2015702","BK20151511","2015M570468","2016T90485","DZXX-017","WSNLBZY201516","KYLX15_0853"],"award-info":[{"award-number":["61373138","61272422","BE2015702","BK20151511","2015M570468","2016T90485","DZXX-017","WSNLBZY201516","KYLX15_0853"]}]},{"DOI":"10.13039\/501100004608","name":"Natural Science Foundation of Jiangsu Province","doi-asserted-by":"publisher","award":["61373138","61272422","BE2015702","BK20151511","2015M570468","2016T90485","DZXX-017","WSNLBZY201516","KYLX15_0853"],"award-info":[{"award-number":["61373138","61272422","BE2015702","BK20151511","2015M570468","2016T90485","DZXX-017","WSNLBZY201516","KYLX15_0853"]}],"id":[{"id":"10.13039\/501100004608","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Postdoctoral Foundation","award":["61373138","61272422","BE2015702","BK20151511","2015M570468","2016T90485","DZXX-017","WSNLBZY201516","KYLX15_0853"],"award-info":[{"award-number":["61373138","61272422","BE2015702","BK20151511","2015M570468","2016T90485","DZXX-017","WSNLBZY201516","KYLX15_0853"]}]},{"name":"Postdoctoral Foundation","award":["61373138","61272422","BE2015702","BK20151511","2015M570468","2016T90485","DZXX-017","WSNLBZY201516","KYLX15_0853"],"award-info":[{"award-number":["61373138","61272422","BE2015702","BK20151511","2015M570468","2016T90485","DZXX-017","WSNLBZY201516","KYLX15_0853"]}]},{"name":"Sixth Talent Peaks Project of Jiangsu Province","award":["61373138","61272422","BE2015702","BK20151511","2015M570468","2016T90485","DZXX-017","WSNLBZY201516","KYLX15_0853"],"award-info":[{"award-number":["61373138","61272422","BE2015702","BK20151511","2015M570468","2016T90485","DZXX-017","WSNLBZY201516","KYLX15_0853"]}]},{"name":"Fund of Jiangsu High Technology Research Key Laboratory for Wireless Sensor Networks","award":["61373138","61272422","BE2015702","BK20151511","2015M570468","2016T90485","DZXX-017","WSNLBZY201516","KYLX15_0853"],"award-info":[{"award-number":["61373138","61272422","BE2015702","BK20151511","2015M570468","2016T90485","DZXX-017","WSNLBZY201516","KYLX15_0853"]}]},{"name":"Science and Technology Innovation Fund for Postgraduate Education of Jiangsu Province","award":["61373138","61272422","BE2015702","BK20151511","2015M570468","2016T90485","DZXX-017","WSNLBZY201516","KYLX15_0853"],"award-info":[{"award-number":["61373138","61272422","BE2015702","BK20151511","2015M570468","2016T90485","DZXX-017","WSNLBZY201516","KYLX15_0853"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Journal of Sensors"],"published-print":{"date-parts":[[2016]]},"abstract":"<jats:p>Broadcast authentication is a fundamental security technology in wireless sensor networks (ab. WSNs). As an authentication protocol, the most widely used in WSN,<jats:italic>\u03bc<\/jats:italic>TESLA protocol, its publication of key is based on a fixed time interval, which may lead to unsatisfactory performance under the unstable network traffic environment. Furthermore, the frequent network communication will cause the delay authentication for some broadcast packets while the infrequent one will increase the overhead of key computation. To solve these problems, this paper improves the traditional<jats:italic>\u03bc<\/jats:italic>TESLA by determining the publication of broadcast key based on the network data flow rather than the fixed time interval. Meanwhile, aiming at the finite length of hash chain and the problem of exhaustion, a self-renewal hash chain based on Benaloh-Leichter secret sharing scheme (SRHC-BL SSS) is designed, which can prolong the lifetime of network. Moreover, by introducing the queue theory model, we demonstrate that our scheme has much lower key consumption than<jats:italic>\u03bc<\/jats:italic>TESLA through simulation evaluations. Finally, we analyze and prove the security and efficiency of the proposed self-renewal hash chain, comparing with other typical schemes.<\/jats:p>","DOI":"10.1155\/2016\/9021650","type":"journal-article","created":{"date-parts":[[2016,8,9]],"date-time":"2016-08-09T17:01:57Z","timestamp":1470762117000},"page":"1-13","source":"Crossref","is-referenced-by-count":3,"title":["An Improved<i>\u03bc<\/i>TESLA Protocol Based on Queuing Theory and Benaloh-Leichter SSS in WSNs"],"prefix":"10.1155","volume":"2016","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-4392-3599","authenticated-orcid":true,"given":"Haiping","family":"Huang","sequence":"first","affiliation":[{"name":"College of Computer, Nanjing University of Posts and Telecommunications, Nanjing 210003, China"},{"name":"Jiangsu High Technology Research Key Laboratory for Wireless Sensor Networks, Nanjing 210003, China"}]},{"given":"Tianhe","family":"Gong","sequence":"additional","affiliation":[{"name":"College of Computer, Nanjing University of Posts and Telecommunications, Nanjing 210003, China"},{"name":"Jiangsu High Technology Research Key Laboratory for Wireless Sensor Networks, Nanjing 210003, China"}]},{"given":"Tao","family":"Chen","sequence":"additional","affiliation":[{"name":"College of Computer, Nanjing University of Posts and Telecommunications, Nanjing 210003, China"},{"name":"Jiangsu High Technology Research Key Laboratory for Wireless Sensor Networks, Nanjing 210003, China"}]},{"given":"Mingliang","family":"Xiong","sequence":"additional","affiliation":[{"name":"College of Computer, Nanjing University of Posts and Telecommunications, Nanjing 210003, China"},{"name":"Jiangsu High Technology Research Key Laboratory for Wireless Sensor Networks, Nanjing 210003, China"}]},{"given":"Xinxing","family":"Pan","sequence":"additional","affiliation":[{"name":"College of Computer, Nanjing University of Posts and Telecommunications, Nanjing 210003, China"},{"name":"Jiangsu High Technology Research Key Laboratory for Wireless Sensor Networks, Nanjing 210003, China"}]},{"given":"Ting","family":"Dai","sequence":"additional","affiliation":[{"name":"Department of Computer Science, College of Engineering, North Carolina State University, Raleigh, NC 27695, USA"}]}],"member":"311","reference":[{"key":"2","doi-asserted-by":"publisher","DOI":"10.1023\/a:1016598314198"},{"first-page":"161","volume-title":"One-time password system with infinite nested Hash chains","year":"2010","key":"5"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1109\/JSTSP.2014.2331916"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1145\/1952982.1952987"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1145\/1027794.1027800"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2013.263"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1109\/tii.2015.2469644"},{"first-page":"9","volume-title":"Broadcast authentication in sensor networks using compressed bloom filters","year":"2008","key":"13"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2009.2019663"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1109\/tvt.2008.2003961"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2007.10.017"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1109\/tnet.2014.2332980"},{"issue":"9","key":"22","first-page":"1717","volume":"28","year":"2006","journal-title":"Journal of Electronics & Information Technology"},{"first-page":"387","volume-title":"Self-updating hash chains and their implementations","year":"2006","key":"23"}],"container-title":["Journal of Sensors"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/downloads.hindawi.com\/journals\/js\/2016\/9021650.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/js\/2016\/9021650.xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/js\/2016\/9021650.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2016,8,9]],"date-time":"2016-08-09T17:02:06Z","timestamp":1470762126000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.hindawi.com\/journals\/js\/2016\/9021650\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"references-count":14,"alternative-id":["9021650","9021650"],"URL":"https:\/\/doi.org\/10.1155\/2016\/9021650","relation":{},"ISSN":["1687-725X","1687-7268"],"issn-type":[{"type":"print","value":"1687-725X"},{"type":"electronic","value":"1687-7268"}],"subject":[],"published":{"date-parts":[[2016]]}}}