iBet uBet web content aggregator. Adding the entire web to your favor.
iBet uBet web content aggregator. Adding the entire web to your favor.



Link to original content: https://api.crossref.org/works/10.1155/2013/740392
{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,6,4]],"date-time":"2024-06-04T19:14:27Z","timestamp":1717528467173},"reference-count":18,"publisher":"SAGE Publications","issue":"7","license":[{"start":{"date-parts":[[2013,7,1]],"date-time":"2013-07-01T00:00:00Z","timestamp":1372636800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/journals.sagepub.com\/page\/policies\/text-and-data-mining-license"}],"funder":[{"DOI":"10.13039\/501100002383","name":"King Saud University","doi-asserted-by":"publisher","award":["11-INF1500-02"],"id":[{"id":"10.13039\/501100002383","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["journals.sagepub.com"],"crossmark-restriction":true},"short-container-title":["International Journal of Distributed Sensor Networks"],"published-print":{"date-parts":[[2013,7,1]]},"abstract":" Security in current\/next generation wireless sensor network (WSN) is challenging, due to its special characteristics and the scarcity of energy, and processing power. Thus, many security methods are trying to solve the problem of security in wireless sensor networks. Many of these methods use symmetric cryptography, and others use asymmetric cryptography. Security in WSN demands authentication, confidentiality, integrity, balancing the energy cost, nonreputation, and scalability services. In this paper, we introduce two protocols to address these main security services. The proposed protocols integrate public key and symmetric key algorithms to ensure optimal usage of sensors' energy and processing power to provide adequate security in next generation WSN. The proposed protocols utilize Elliptic Curve Cryptography (ECC), Advanced Encryption Standard (AES), Certification Authority (CA), and Registration Authority (RA) to achieve a reasonable tradeoff. <\/jats:p>","DOI":"10.1155\/2013\/740392","type":"journal-article","created":{"date-parts":[[2013,7,28]],"date-time":"2013-07-28T21:01:21Z","timestamp":1375045281000},"page":"740392","update-policy":"http:\/\/dx.doi.org\/10.1177\/sage-journals-update-policy","source":"Crossref","is-referenced-by-count":5,"title":["Integrated Protocols to Ensure Security Services in Wireless Sensor Networks"],"prefix":"10.1177","volume":"9","author":[{"given":"Mohammed","family":"Faisal","sequence":"first","affiliation":[{"name":"Department of Computer Science, King Saud University, P.O. Box 51178, Riyadh 11543, Saudi Arabia"}]},{"given":"Jalal","family":"Al-Muhtadi","sequence":"additional","affiliation":[{"name":"Department of Computer Science, King Saud University, P.O. Box 51178, Riyadh 11543, Saudi Arabia"}]},{"given":"Abdullah","family":"Al-Dhelaan","sequence":"additional","affiliation":[{"name":"Department of Computer Science, King Saud University, P.O. Box 51178, Riyadh 11543, Saudi Arabia"}]}],"member":"179","published-online":{"date-parts":[[2013,7,28]]},"reference":[{"key":"B1-2013-740392","doi-asserted-by":"publisher","DOI":"10.1002\/9780470443521"},{"key":"B2-2013-740392","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2009.10.001"},{"key":"B4-2013-740392","volume":"31","author":"Amin F.","year":"2008","journal-title":"Proceedings of World Academy of Science, Engineering and Technology"},{"key":"B5-2013-740392","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-30496-8_2"},{"key":"B6-2013-740392","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-28632-5_9"},{"key":"B7-2013-740392","doi-asserted-by":"publisher","DOI":"10.1201\/9781420011241"},{"key":"B8-2013-740392","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-35521-9_15"},{"issue":"3","key":"B9-2013-740392","first-page":"194","volume":"10","author":"Kadri B.","year":"2010","journal-title":"International Journal of Network Security"},{"key":"B11-2013-740392","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-46406-9"},{"key":"B12-2013-740392","first-page":"59","volume-title":"Proceedings of the 2nd ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN '04)","author":"Watro R."},{"key":"B10-2013-740392","doi-asserted-by":"publisher","DOI":"10.1145\/359340.359342"},{"key":"B13-2013-740392","first-page":"143","volume-title":"Secure Communications and Asymmetric Cryptosystems","author":"Diffie W.","year":"1982"},{"key":"B14-2013-740392","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2007.04.014"},{"key":"B15-2013-740392","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2005.05.018"},{"key":"B16-2013-740392","first-page":"324","volume-title":"Proceedings of the IEEE International Conference on Pervasive Computing and Communications (PerCom '05)","author":"Wandert A. S."},{"key":"B17-2013-740392","doi-asserted-by":"publisher","DOI":"10.1109\/ICMEE.2010.5558401"},{"key":"B18-2013-740392","volume-title":"Guide to Elliptic Curve Cryptography","author":"Hankerson D.","year":"2004"},{"key":"B22-2013-740392","doi-asserted-by":"publisher","DOI":"10.1109\/WiMob.2008.16"}],"container-title":["International Journal of Distributed Sensor Networks"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/downloads.hindawi.com\/journals\/ijdsn\/2013\/740392.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/journals.sagepub.com\/doi\/full-xml\/10.1155\/2013\/740392","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/journals.sagepub.com\/doi\/full\/10.1155\/2013\/740392","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,16]],"date-time":"2021-05-16T22:27:33Z","timestamp":1621204053000},"score":1,"resource":{"primary":{"URL":"http:\/\/journals.sagepub.com\/doi\/10.1155\/2013\/740392"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,7,1]]},"references-count":18,"journal-issue":{"issue":"7","published-print":{"date-parts":[[2013,7,1]]}},"alternative-id":["10.1155\/2013\/740392"],"URL":"https:\/\/doi.org\/10.1155\/2013\/740392","relation":{},"ISSN":["1550-1477","1550-1477"],"issn-type":[{"value":"1550-1477","type":"print"},{"value":"1550-1477","type":"electronic"}],"subject":[],"published":{"date-parts":[[2013,7,1]]}}}