{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,28]],"date-time":"2025-10-28T00:30:41Z","timestamp":1761611441259},"reference-count":24,"publisher":"SAGE Publications","issue":"1","license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/journals.sagepub.com\/page\/policies\/text-and-data-mining-license"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["11547148","11647097","61503052"],"award-info":[{"award-number":["11547148","11647097","61503052"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100002338","name":"Ministry of Education of the People's Republic of China","doi-asserted-by":"publisher","award":["15YJC790061","16YJC870018"],"award-info":[{"award-number":["15YJC790061","16YJC870018"]}],"id":[{"id":"10.13039\/501100002338","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["journals.sagepub.com"],"crossmark-restriction":true},"short-container-title":["International Journal of Distributed Sensor Networks"],"published-print":{"date-parts":[[2018,1]]},"abstract":"<jats:p> In a recent paper, Chang and Le proposed an efficient smart card\u2013based authenticated key exchange protocol (which is referred to as CL scheme) for heterogeneous ad hoc wireless sensor networks. However, we found that the CL scheme is subject to sensor capture attack which breaks the session key security of the CL scheme. An improved protocol is proposed to fix this problem. <\/jats:p>","DOI":"10.1177\/1550147718756311","type":"journal-article","created":{"date-parts":[[2018,1,31]],"date-time":"2018-01-31T07:39:54Z","timestamp":1517384394000},"page":"155014771875631","update-policy":"http:\/\/dx.doi.org\/10.1177\/sage-journals-update-policy","source":"Crossref","is-referenced-by-count":23,"title":["On the security of a provably secure, efficient, and flexible authentication scheme for ad hoc wireless sensor networks"],"prefix":"10.1177","volume":"14","author":[{"given":"Jun","family":"He","sequence":"first","affiliation":[{"name":"School of Computer Science and Engineering, Chongqing University of Technology, Chongqing, China"}]},{"given":"Zheng","family":"Yang","sequence":"additional","affiliation":[{"name":"School of Computer Science and Engineering, Chongqing University of Technology, Chongqing, China"},{"name":"Department of Computer Science, University of Helsinki, Helsinki, Finland"}]},{"given":"Jianxun","family":"Zhang","sequence":"additional","affiliation":[{"name":"School of Computer Science and Engineering, Chongqing University of Technology, Chongqing, China"}]},{"given":"Wanping","family":"Liu","sequence":"additional","affiliation":[{"name":"School of Computer Science and Engineering, Chongqing University of Technology, Chongqing, China"}]},{"given":"Chao","family":"Liu","sequence":"additional","affiliation":[{"name":"School of Computer Science and Engineering, Chongqing University of Technology, Chongqing, China"}]}],"member":"179","published-online":{"date-parts":[[2018,1,30]]},"reference":[{"issue":"4","key":"bibr1-1550147718756311","first-page":"361","volume":"10","author":"He D","year":"2010","journal-title":"Ad Hoc Sens Wirel Ne"},{"key":"bibr2-1550147718756311","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2012.03.011"},{"key":"bibr3-1550147718756311","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2012.05.010"},{"key":"bibr4-1550147718756311","doi-asserted-by":"publisher","DOI":"10.1155\/2013\/730831"},{"key":"bibr5-1550147718756311","doi-asserted-by":"publisher","DOI":"10.5755\/j01.eee.19.6.2038"},{"key":"bibr6-1550147718756311","doi-asserted-by":"publisher","DOI":"10.3390\/s140610081"},{"key":"bibr7-1550147718756311","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2014.03.009"},{"key":"bibr8-1550147718756311","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-016-3281-1"},{"key":"bibr9-1550147718756311","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2015.2473165"},{"key":"bibr10-1550147718756311","doi-asserted-by":"publisher","DOI":"10.3390\/s16081299"},{"key":"bibr11-1550147718756311","doi-asserted-by":"publisher","DOI":"10.1002\/sec.1573"},{"key":"bibr12-1550147718756311","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2676119"},{"key":"bibr13-1550147718756311","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2673239"},{"key":"bibr14-1550147718756311","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2773535"},{"key":"bibr15-1550147718756311","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2017.06.018"},{"key":"bibr16-1550147718756311","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2017.2668062"},{"key":"bibr17-1550147718756311","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2723265"},{"key":"bibr18-1550147718756311","doi-asserted-by":"publisher","DOI":"10.1155\/2017\/6562953"},{"key":"bibr19-1550147718756311","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45539-6_11"},{"key":"bibr20-1550147718756311","first-page":"273","volume-title":"Advances in cryptology\u2014CRYPTO","author":"Jager T"},{"key":"bibr21-1550147718756311","doi-asserted-by":"publisher","DOI":"10.1002\/sec.1263"},{"key":"bibr22-1550147718756311","first-page":"57","volume-title":"27th annual ACM symposium on theory of computing","author":"Bellare M"},{"key":"bibr24-1550147718756311","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2017.09.003"},{"key":"bibr25-1550147718756311","first-page":"5290579","volume":"2017","author":"Chen Y","year":"2017","journal-title":"Wirel Commun Mob Com"}],"container-title":["International Journal of Distributed Sensor Networks"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/journals.sagepub.com\/doi\/pdf\/10.1177\/1550147718756311","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/journals.sagepub.com\/doi\/full-xml\/10.1177\/1550147718756311","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/journals.sagepub.com\/doi\/pdf\/10.1177\/1550147718756311","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,12,6]],"date-time":"2020-12-06T20:48:02Z","timestamp":1607287682000},"score":1,"resource":{"primary":{"URL":"http:\/\/journals.sagepub.com\/doi\/10.1177\/1550147718756311"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,1]]},"references-count":24,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2018,1]]}},"alternative-id":["10.1177\/1550147718756311"],"URL":"https:\/\/doi.org\/10.1177\/1550147718756311","relation":{},"ISSN":["1550-1477","1550-1477"],"issn-type":[{"value":"1550-1477","type":"print"},{"value":"1550-1477","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,1]]}}}