{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,16]],"date-time":"2025-10-16T10:04:43Z","timestamp":1760609083817,"version":"3.41.2"},"reference-count":25,"publisher":"Wiley","issue":"1","license":[{"start":{"date-parts":[[2018,7,16]],"date-time":"2018-07-16T00:00:00Z","timestamp":1531699200000},"content-version":"vor","delay-in-days":196,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"Funding of Science and Technology on Information Assurance Laboratory","award":["KJ-17-001","122102210126"],"award-info":[{"award-number":["KJ-17-001","122102210126"]}]},{"name":"Key Scientific and Technological Project of Henan Province","award":["KJ-17-001","122102210126"],"award-info":[{"award-number":["KJ-17-001","122102210126"]}]}],"content-domain":{"domain":["onlinelibrary.wiley.com"],"crossmark-restriction":true},"short-container-title":["Wireless Communications and Mobile Computing"],"published-print":{"date-parts":[[2018,1]]},"abstract":"<jats:p>In wireless sensor networks, users sometimes need to retrieve real\u2010time data directly from the sensor nodes. Many authentication protocols are proposed to address the security and privacy aspects of this scenario. However, these protocols still have security loopholes and fail to provide strong user anonymity. In order to overcome these shortcomings, we propose an anonymous authenticated key exchange protocol based on Elliptic Curves Cryptography (ECC). The novel protocol provides strong user anonymity such that even the gateway node and the sensor nodes do not know the real identity of the user. The security of the proposed protocol is conducted in a well\u2010defined security model under the CDH assumption. Compared with other related protocols, our protocol is efficient in terms of communication and enjoys stronger security. The only disadvantage is that our protocol consumes more computation resources due to the usage of asymmetric cryptography mechanisms to realize strong anonymity. Consequently, our protocol is suitable for applications which require strong anonymity and high security in wireless sensor networks.<\/jats:p>","DOI":"10.1155\/2018\/2484268","type":"journal-article","created":{"date-parts":[[2018,7,16]],"date-time":"2018-07-16T23:30:46Z","timestamp":1531783846000},"update-policy":"https:\/\/doi.org\/10.1002\/crossmark_policy","source":"Crossref","is-referenced-by-count":10,"title":["A Provably Secure Anonymous Authenticated Key Exchange Protocol Based on ECC for Wireless Sensor Networks"],"prefix":"10.1155","volume":"2018","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-5863-1014","authenticated-orcid":false,"given":"Ke","family":"Zhang","sequence":"first","affiliation":[]},{"given":"Kai","family":"Xu","sequence":"additional","affiliation":[]},{"given":"Fushan","family":"Wei","sequence":"additional","affiliation":[]}],"member":"311","published-online":{"date-parts":[[2018,7,16]]},"reference":[{"doi-asserted-by":"publisher","key":"e_1_2_10_1_2","DOI":"10.1109\/TII.2018.2809672"},{"doi-asserted-by":"publisher","key":"e_1_2_10_2_2","DOI":"10.1109\/TDSC.2016.2596286"},{"doi-asserted-by":"publisher","key":"e_1_2_10_3_2","DOI":"10.1109\/TDSC.2017.2725953"},{"doi-asserted-by":"publisher","key":"e_1_2_10_4_2","DOI":"10.1109\/TIFS.2017.2705620"},{"doi-asserted-by":"publisher","key":"e_1_2_10_5_2","DOI":"10.1109\/jsyst.2015.2428620"},{"key":"e_1_2_10_6_2","article-title":"Security analysis and improvement of bio-hashing based three-factor authentication scheme for telecare medical information systems","author":"Jiang Q.","year":"2017","journal-title":"Journal of Ambient Intelligence and Humanized Computing"},{"doi-asserted-by":"publisher","key":"e_1_2_10_7_2","DOI":"10.1016\/j.compeleceng.2017.03.016"},{"doi-asserted-by":"publisher","key":"e_1_2_10_8_2","DOI":"10.1109\/TWC.2008.080128"},{"doi-asserted-by":"publisher","key":"e_1_2_10_9_2","DOI":"10.3390\/s100302450"},{"doi-asserted-by":"publisher","key":"e_1_2_10_10_2","DOI":"10.3390\/s110504767"},{"doi-asserted-by":"publisher","key":"e_1_2_10_11_2","DOI":"10.1016\/j.jnca.2012.05.010"},{"doi-asserted-by":"publisher","key":"e_1_2_10_12_2","DOI":"10.1007\/s11432-015-5469-5"},{"doi-asserted-by":"publisher","key":"e_1_2_10_13_2","DOI":"10.1007\/s11235-013-9755-5"},{"doi-asserted-by":"publisher","key":"e_1_2_10_14_2","DOI":"10.1016\/j.adhoc.2014.03.003"},{"doi-asserted-by":"publisher","key":"e_1_2_10_15_2","DOI":"10.1016\/j.future.2016.11.033"},{"doi-asserted-by":"publisher","key":"e_1_2_10_16_2","DOI":"10.1007\/s12083-015-0404-5"},{"doi-asserted-by":"publisher","key":"e_1_2_10_17_2","DOI":"10.1109\/ACCESS.2017.2673239"},{"doi-asserted-by":"publisher","key":"e_1_2_10_18_2","DOI":"10.3390\/s17122946"},{"doi-asserted-by":"publisher","key":"e_1_2_10_19_2","DOI":"10.1016\/j.jnca.2017.07.001"},{"doi-asserted-by":"publisher","key":"e_1_2_10_20_2","DOI":"10.1002\/dac.3336"},{"doi-asserted-by":"publisher","key":"e_1_2_10_21_2","DOI":"10.1109\/TIFS.2017.2721359"},{"key":"e_1_2_10_22_2","article-title":"A provably secure password-based anonymous authentication scheme for wireless body area networks","author":"Wei F.","year":"2017","journal-title":"Computers and Electrical Engineering"},{"doi-asserted-by":"crossref","unstructured":"ZhangZ. YangK. HuX. andWangY. Practical anonymous password authentication and TLS with anonymous client authentication Proceedings of the 23rd ACM Conference on Computer and Communications Security CCS 2016 October 2016 1179\u20131191 2-s2.0-84995480949.","key":"e_1_2_10_23_2","DOI":"10.1145\/2976749.2978354"},{"doi-asserted-by":"publisher","key":"e_1_2_10_24_2","DOI":"10.1109\/TDSC.2016.2605087"},{"doi-asserted-by":"publisher","key":"e_1_2_10_25_2","DOI":"10.1007\/BF00196725"}],"container-title":["Wireless Communications and Mobile Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/downloads.hindawi.com\/journals\/wcmc\/2018\/2484268.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/wcmc\/2018\/2484268.xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1155\/2018\/2484268","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,8,7]],"date-time":"2024-08-07T06:04:44Z","timestamp":1723010684000},"score":1,"resource":{"primary":{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/10.1155\/2018\/2484268"}},"subtitle":[],"editor":[{"given":"Ding","family":"Wang","sequence":"additional","affiliation":[]}],"short-title":[],"issued":{"date-parts":[[2018,1]]},"references-count":25,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2018,1]]}},"alternative-id":["10.1155\/2018\/2484268"],"URL":"https:\/\/doi.org\/10.1155\/2018\/2484268","archive":["Portico"],"relation":{},"ISSN":["1530-8669","1530-8677"],"issn-type":[{"type":"print","value":"1530-8669"},{"type":"electronic","value":"1530-8677"}],"subject":[],"published":{"date-parts":[[2018,1]]},"assertion":[{"value":"2018-01-22","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2018-04-19","order":2,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2018-07-16","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}],"article-number":"2484268"}}