{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,10]],"date-time":"2026-04-10T21:15:47Z","timestamp":1775855747544,"version":"3.50.1"},"reference-count":12,"publisher":"MDPI AG","issue":"3","license":[{"start":{"date-parts":[[2020,1,29]],"date-time":"2020-01-29T00:00:00Z","timestamp":1580256000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Sensors"],"abstract":"<jats:p>Wireless sensor networks (WSNs) have evolved over the last few decades due to the availability of low-cost, short-range and easy deployed sensors [...]<\/jats:p>","DOI":"10.3390\/s20030744","type":"journal-article","created":{"date-parts":[[2020,1,29]],"date-time":"2020-01-29T10:51:07Z","timestamp":1580295067000},"page":"744","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":33,"title":["Security and Privacy in Wireless Sensor Networks: Advances and Challenges"],"prefix":"10.3390","volume":"20","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-8918-1703","authenticated-orcid":false,"given":"Cheng-Chi","family":"Lee","sequence":"first","affiliation":[{"name":"Department of Library and Information Science, Research and Development Center for Physical Education, Health, and Information Technology, Fu Jen Catholic University, New Taipei City 24205, Taiwan"},{"name":"Department of Photonics and Communication Engineering, Asia University, Taichung 41354, Taiwan"}]}],"member":"1968","published-online":{"date-parts":[[2020,1,29]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","unstructured":"Unka\u0161evi\u0107, T., Banjac, Z., and Milosavljevi\u0107, M. (2019). A Generic Model of the Pseudo-Random Generator Based on Permutations Suitable for Security Solutions in Computationally-Constrained Environments. Sensors, 19.","DOI":"10.3390\/s19235322"},{"key":"ref_2","doi-asserted-by":"crossref","unstructured":"Ostadal, R., Matyas, V., Svenda, P., and Nemec, L. (2019). Crowdsourced Security Reconstitution for Wireless Sensor Networks: Secrecy Amplification. Sensors, 19.","DOI":"10.3390\/s19225041"},{"key":"ref_3","doi-asserted-by":"crossref","unstructured":"Shen, Q., Liu, W., Lin, Y., and Zhu, Y. (2019). Designing an Image Encryption Scheme Based on Compressive Sensing and Non-Uniform Quantization for Wireless Visual Sensor Networks. Sensors, 19.","DOI":"10.3390\/s19143081"},{"key":"ref_4","doi-asserted-by":"crossref","unstructured":"Gulen, U., Alkhodary, A., and Baktir, S. (2019). Implementing RSA for Wireless Sensor Nodes. Sensors, 19.","DOI":"10.3390\/s19132864"},{"key":"ref_5","doi-asserted-by":"crossref","unstructured":"Furtak, J., Zieli\u0144ski, Z., and Chudzikiewicz, J. (2019). A Framework for Constructing a Secure Domain of Sensor Nodes. Sensors, 19.","DOI":"10.3390\/s19122797"},{"key":"ref_6","doi-asserted-by":"crossref","unstructured":"Zhu, B., Susilo, W., Qin, J., Guo, F., Zhao, Z., and Ma, J. (2019). A Secure and Efficient Data Sharing and Searching Scheme in Wireless Sensor Networks. Sensors, 19.","DOI":"10.3390\/s19112583"},{"key":"ref_7","doi-asserted-by":"crossref","unstructured":"Bialas, A. (2019). Vulnerability Assessment of Sensor Systems. Sensors, 19.","DOI":"10.3390\/s19112518"},{"key":"ref_8","doi-asserted-by":"crossref","unstructured":"Lee, C.-F., Shen, J.-J., Chen, Z.-R., and Agrawal, S. (2019). Self-Embedding Authentication Watermarking with Effective Tampered Location Detection and High-Quality Image Recovery. Sensors, 19.","DOI":"10.3390\/s19102267"},{"key":"ref_9","doi-asserted-by":"crossref","unstructured":"Liu, F., Tang, Y., and Wang, L. (2019). eHAPAC: A Privacy-Supported Access Control Model for IP-Enabled Wireless Sensor Networks. Sensors, 19.","DOI":"10.3390\/s19071513"},{"key":"ref_10","doi-asserted-by":"crossref","unstructured":"Yang, J., He, S., Xu, Y., Chen, L., and Ren, J. (2019). A Trusted Routing Scheme Using Blockchain and Reinforcement Learning for Wireless Sensor Networks. Sensors, 19.","DOI":"10.3390\/s19040970"},{"key":"ref_11","doi-asserted-by":"crossref","unstructured":"Tan, X., Su, S., Huang, Z., Guo, X., Zuo, Z., Sun, X., and Li, L. (2019). Wireless Sensor Networks Intrusion Detection Based on SMOTE and the Random Forest Algorithm. Sensors, 19.","DOI":"10.3390\/s19010203"},{"key":"ref_12","doi-asserted-by":"crossref","unstructured":"Tan, H., and Chung, I. (2018). A Secure and Efficient Group Key Management Protocol with Cooperative Sensor Association in WBANs. Sensors, 18.","DOI":"10.3390\/s18113930"}],"container-title":["Sensors"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1424-8220\/20\/3\/744\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T08:53:01Z","timestamp":1760172781000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1424-8220\/20\/3\/744"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,1,29]]},"references-count":12,"journal-issue":{"issue":"3","published-online":{"date-parts":[[2020,2]]}},"alternative-id":["s20030744"],"URL":"https:\/\/doi.org\/10.3390\/s20030744","relation":{},"ISSN":["1424-8220"],"issn-type":[{"value":"1424-8220","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,1,29]]}}}