{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,1]],"date-time":"2026-05-01T10:28:17Z","timestamp":1777631297574,"version":"3.51.4"},"reference-count":33,"publisher":"Wiley","issue":"1","license":[{"start":{"date-parts":[[2021,6,14]],"date-time":"2021-06-14T00:00:00Z","timestamp":1623628800000},"content-version":"vor","delay-in-days":164,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100005417","name":"Universiti Teknologi Malaysia","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100005417","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["onlinelibrary.wiley.com"],"crossmark-restriction":true},"short-container-title":["Complexity"],"published-print":{"date-parts":[[2021,1]]},"abstract":"<jats:p>Wireless Sensor Network (WSN) is a particular network built from small sensor nodes. These sensor nodes have unique features. That is, it can sense and process data in WSN. WSN has tremendous applications in many fields. Despite the significance of WSN, this kind of network faced several issues. The biggest problems rising in WSN are energy consumption and security. Robust security development is needed to cope with WSN applications. For security purposes in WSN, cryptography techniques are very favorable. However, WSN has resource limitations, which is the main problem in applying any security scheme. Hence, if we are using the cryptography scheme in WSN, we must first guarantee that it must be energy\u2010efficient. Thus, we proposed a secure hybrid session key management scheme for WSN. In this scheme, the major steps of public key cryptography are minimized, and much of the operations are based on symmetric key cryptography. This strategy extensively reduces the energy consumption of WSN and ensures optimum security. The proposed scheme is implemented, and their analysis is performed using different parameters with benchmark schemes. We concluded that the proposed scheme is energy\u2010efficient and outperforms the available benchmark schemes. Furthermore, it provides an effective platform for secure key agreements and management in the WSN environment.<\/jats:p>","DOI":"10.1155\/2021\/6577492","type":"journal-article","created":{"date-parts":[[2021,6,14]],"date-time":"2021-06-14T17:20:09Z","timestamp":1623691209000},"update-policy":"https:\/\/doi.org\/10.1002\/crossmark_policy","source":"Crossref","is-referenced-by-count":24,"title":["An Efficient and Secure Session Key Management Scheme in Wireless Sensor Network"],"prefix":"10.1155","volume":"2021","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-4216-1246","authenticated-orcid":false,"given":"Gulzar","family":"Mehmood","sequence":"first","affiliation":[]},{"given":"Muhammad Sohail","family":"Khan","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0974-6154","authenticated-orcid":false,"given":"Abdul","family":"Waheed","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6623-1758","authenticated-orcid":false,"given":"Mahdi","family":"Zareei","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7554-290X","authenticated-orcid":false,"given":"Muhammad","family":"Fayaz","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0078-7849","authenticated-orcid":false,"given":"Tariq","family":"Sadad","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2535-3438","authenticated-orcid":false,"given":"Nazri","family":"Kama","sequence":"additional","affiliation":[]},{"given":"Azri","family":"Azmi","sequence":"additional","affiliation":[]}],"member":"311","published-online":{"date-parts":[[2021,6,14]]},"reference":[{"key":"e_1_2_9_1_2","doi-asserted-by":"crossref","unstructured":"SimonG. Mar\u00f3tiM. L\u00e9deczi\u00c1.et al. Sensor network-based countersniper system Proceedings of the 2nd international conference on Embedded networked sensor systems November 2004 Baltimore MD USA 1\u201312.","DOI":"10.1145\/1031495.1031497"},{"key":"e_1_2_9_2_2","doi-asserted-by":"crossref","unstructured":"Castillo-EfferM. QuintelaD. H. MorenoW. JordanR. andWesthoffW. Wireless sensor networks for flash-flood alerting Proceedings of the Fifth IEEE International Caracas Conference on Devices Circuits and Systems 2004 November 2004 Punta Cana Dominican Republic 142\u2013146.","DOI":"10.1109\/ICCDCS.2004.1393370"},{"key":"e_1_2_9_3_2","doi-asserted-by":"crossref","unstructured":"ZhangS.andZhangH. A review of wireless sensor networks and its applications Proceedings of the 2012 IEEE International Conference on Automation and Logistics August 2012 Zhengzhou China 386\u2013389.","DOI":"10.1109\/ICAL.2012.6308240"},{"key":"e_1_2_9_4_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2008.04.002"},{"key":"e_1_2_9_5_2","unstructured":"IEEE Standard for Local and Metropolitan Area Networks Part 16: Air Interface for Fixed and Mobile Broadband Wireless Access Systems Amendment 2: Physical and Medium Access Control Layers for Combined Fixed and Mobile Operation in Licensed Bands and Corrigendum 1 IEEE Std 802.16e-2005 and IEEE Std 802.16-2004\/Cor 1-2005 (Amendment and Corrigendum to IEEE Std 802.16-2004) 2006."},{"key":"e_1_2_9_6_2","doi-asserted-by":"crossref","unstructured":"YuL. WangN. ZhangW. andZhengC. GROUP: a grid-clustering routing protocol for wireless sensor networks Proceedings of the 2006 International Conference on Wireless Communications Networking and Mobile Computing July 2006 Vancouver Canada 1\u20135.","DOI":"10.1109\/WiCOM.2006.287"},{"key":"e_1_2_9_7_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.jksuci.2017.04.002"},{"key":"e_1_2_9_8_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2017.07.031"},{"key":"e_1_2_9_9_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-13-9177-4_9"},{"key":"e_1_2_9_10_2","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2017.2768073"},{"key":"e_1_2_9_11_2","article-title":"Lightweight cryptographic protocols for IoT constrained devices: a survey","volume":"8","author":"Khan M. N.","year":"2020","journal-title":"IEEE Internet of Things Journal"},{"key":"e_1_2_9_12_2","article-title":"An efficient and secure session key establishment scheme for health-care applications in wireless body area networks","volume":"37","author":"Mehmood G.","year":"2018","journal-title":"Journal of Engineering and Applied Sciences"},{"key":"e_1_2_9_13_2","doi-asserted-by":"crossref","unstructured":"TangH. ZhuL. andZhangZ. A novel authenticated group key agreement protocol based on elliptic curve Diffie-Hellman Proceedings of the 2008 4th International Conference on Wireless Communications October 2008 Dalian China 1\u20134.","DOI":"10.1109\/WiCom.2008.1103"},{"key":"e_1_2_9_14_2","doi-asserted-by":"crossref","unstructured":"ZhangZ. JiangC. andDengJ. A novel group key agreement protocol for wireless sensor networks Proceedings of the 2010 International Conference on Measuring Technology and Mechatronics Automation March 2010 Changsha China 230\u2013233.","DOI":"10.1109\/ICMTMA.2010.92"},{"key":"e_1_2_9_15_2","article-title":"Review on fault detection and recovery in WSN","volume":"5","author":"Nagalgaonkar Pramod D. B.","year":"2015","journal-title":"International Journal of Advanced Research in Computer Science and Software Engineering"},{"key":"e_1_2_9_16_2","doi-asserted-by":"crossref","unstructured":"Abi-CharP. E. MhamedA. andEl-HassanB. A secure authenticated key agreement protocol based on elliptic curve cryptography Proceedings of the Third International Symposium on Information Assurance and Security August 2007 Manchester UK 89\u201394.","DOI":"10.1109\/ISIAS.2007.4299756"},{"key":"e_1_2_9_17_2","doi-asserted-by":"crossref","unstructured":"MeingastM. RoostaT. andSastryS. Security and privacy issues with health care information technology Proceedings of the 2006 International Conference of the IEEE Engineering in Medicine and Biology Society June 2006 Montreal Canada 5453\u20135458.","DOI":"10.1109\/IEMBS.2006.260060"},{"key":"e_1_2_9_18_2","article-title":"A secure low-delay protocol for wireless body area networks","volume":"9","author":"Singel\u00e9e D.","year":"2010","journal-title":"Adhoc & Sensor Wireless Networks"},{"key":"e_1_2_9_19_2","doi-asserted-by":"publisher","DOI":"10.1007\/11422778_9"},{"key":"e_1_2_9_20_2","unstructured":"ErtaulL. ChudinovP. andMoralesB. IoT security: authenticated lightweight key exchange (ALIKE) Proceedings of the International Conference on Wireless Networks (ICWN) July 2019 Rome Italy 45\u201350."},{"key":"e_1_2_9_21_2","doi-asserted-by":"crossref","unstructured":"EldefrawyM. H. KhanM. K. andAlghathbarK. A key agreement algorithm with rekeying for wireless sensor networks using public key cryptography Proceedings of the 2010 International Conference on Anti-Counterfeiting March 2010 Hoboken NJ USA 1\u20136.","DOI":"10.1109\/ICASID.2010.5551480"},{"key":"e_1_2_9_22_2","first-page":"929","article-title":"Three improved algorithms for multipath key establishment in sensor networks using protocols for secure message transmission","volume":"8","author":"Wu J.","year":"2010","journal-title":"IEEE Transactions on Dependable and Secure Computing"},{"key":"e_1_2_9_23_2","doi-asserted-by":"publisher","DOI":"10.1177\/1550147720925772"},{"key":"e_1_2_9_24_2","doi-asserted-by":"publisher","DOI":"10.1109\/tii.2019.2895030"},{"key":"e_1_2_9_25_2","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2017.2771382"},{"key":"e_1_2_9_26_2","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2017.2780183"},{"key":"e_1_2_9_27_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2012.12.001"},{"key":"e_1_2_9_28_2","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2016.2544805"},{"key":"e_1_2_9_29_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2018.11.005"},{"key":"e_1_2_9_30_2","doi-asserted-by":"publisher","DOI":"10.1007\/s11276-019-01980-1"},{"key":"e_1_2_9_31_2","article-title":"An energy-efficient cluster head selection scheme for energy-harvesting wireless sensor networks","volume":"20","author":"Ren Q.","year":"2020","journal-title":"Sensors"},{"key":"e_1_2_9_32_2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3007405"},{"key":"e_1_2_9_33_2","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-020-07926-7"}],"container-title":["Complexity"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/downloads.hindawi.com\/journals\/complexity\/2021\/6577492.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/complexity\/2021\/6577492.xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1155\/2021\/6577492","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,8,9]],"date-time":"2024-08-09T22:38:30Z","timestamp":1723243110000},"score":1,"resource":{"primary":{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/10.1155\/2021\/6577492"}},"subtitle":[],"editor":[{"given":"Dimitri","family":"Volchenkov","sequence":"additional","affiliation":[]}],"short-title":[],"issued":{"date-parts":[[2021,1]]},"references-count":33,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2021,1]]}},"alternative-id":["10.1155\/2021\/6577492"],"URL":"https:\/\/doi.org\/10.1155\/2021\/6577492","archive":["Portico"],"relation":{},"ISSN":["1076-2787","1099-0526"],"issn-type":[{"value":"1076-2787","type":"print"},{"value":"1099-0526","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,1]]},"assertion":[{"value":"2021-04-13","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2021-06-04","order":2,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2021-06-14","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}],"article-number":"6577492"}}