{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,16]],"date-time":"2026-03-16T09:41:39Z","timestamp":1773654099155,"version":"3.50.1"},"reference-count":60,"publisher":"MDPI AG","issue":"2","license":[{"start":{"date-parts":[[2014,2,11]],"date-time":"2014-02-11T00:00:00Z","timestamp":1392076800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/3.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Sensors"],"abstract":"<jats:p>Robust security is highly coveted in real wireless sensor network (WSN) applications since wireless sensors\u2019 sense critical data from the application environment. This article presents an efficient and adaptive mutual authentication framework that  suits real heterogeneous WSN-based applications (such as smart homes, industrial environments, smart grids, and healthcare monitoring). The proposed framework offers:  (i) key initialization; (ii) secure network (cluster) formation (i.e., mutual authentication and dynamic key establishment); (iii) key revocation; and (iv) new node addition into the network. The correctness of the proposed scheme is formally verified. An extensive analysis shows the proposed scheme coupled with message confidentiality, mutual authentication and dynamic session key establishment, node privacy, and message freshness. Moreover, the preliminary study also reveals the proposed framework is secure against popular types  of attacks, such as impersonation attacks, man-in-the-middle attacks, replay attacks,  and information-leakage attacks. As a result, we believe the proposed framework achieves efficiency at reasonable computation and communication costs and it can be a safeguard to real heterogeneous WSN applications.<\/jats:p>","DOI":"10.3390\/s140202732","type":"journal-article","created":{"date-parts":[[2014,2,11]],"date-time":"2014-02-11T11:10:42Z","timestamp":1392117042000},"page":"2732-2755","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":22,"title":["An Efficient and Adaptive Mutual Authentication Framework for Heterogeneous Wireless Sensor Network-Based Applications"],"prefix":"10.3390","volume":"14","author":[{"given":"Pardeep","family":"Kumar","sequence":"first","affiliation":[{"name":"Centre for Wireless Communication, University of Oulu, P.O. Box 4500, FI 90014, Finland"}]},{"given":"Mika","family":"Ylianttila","sequence":"additional","affiliation":[{"name":"Centre for Wireless Communication, University of Oulu, P.O. Box 4500, FI 90014, Finland"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9829-9287","authenticated-orcid":false,"given":"Andrei","family":"Gurtov","sequence":"additional","affiliation":[{"name":"Helsinki Institute of Information Technology, P.O. Box 15600, Aalto 00076, Finland"}]},{"given":"Sang-Gon","family":"Lee","sequence":"additional","affiliation":[{"name":"Department of Ubiquitous-IT, Dongseo University, San 69-1, Jurye-2-Dong, Sasang-Gu,  Busan 617-716, South Korea"}]},{"given":"Hoon-Jae","family":"Lee","sequence":"additional","affiliation":[{"name":"Department of Ubiquitous-IT, Dongseo University, San 69-1, Jurye-2-Dong, Sasang-Gu,  Busan 617-716, South Korea"}]}],"member":"1968","published-online":{"date-parts":[[2014,2,11]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","first-page":"820716","DOI":"10.1155\/2012\/820716","article-title":"A wireless sensor network for precise volatile organic compound monitoring","volume":"2012","author":"Manes","year":"2012","journal-title":"Int. J. Distrib. Sens. Netw."},{"key":"ref_2","doi-asserted-by":"crossref","first-page":"400","DOI":"10.1109\/JSAC.2009.090505","article-title":"Pervasive, secure access to a hierarchical sensor-based healthcare monitoring architecture in wireless heterogeneous networks","volume":"27","author":"Yuang","year":"2009","journal-title":"IEEE J. Sel. Areas Commun."},{"key":"ref_3","doi-asserted-by":"crossref","unstructured":"Bhardwaj, S., Xzcelebi, T., Uysal, C., and Lukkien, J. (2012, January 13\u201316). Resource and Service Management Architecture of a Low Capacity Network For Smart Spaces. Las Vegas, NV, USA.","DOI":"10.1109\/ICCE.2012.6161936"},{"key":"ref_4","unstructured":"Correa, T.K., Haenggi, M., and Antsaklis, P. (2006, January 18\u201321). Wireless Sensor Networks for Structural Health Monitoring: A Multi-Scale Approach. St. Louise, MO, USA."},{"key":"ref_5","first-page":"46","article-title":"Wireless sensor networks for industrial process monitoring and control: A survey","volume":"3","author":"Zhao","year":"2011","journal-title":"Netw. Protoc. Algorithms"},{"key":"ref_6","doi-asserted-by":"crossref","unstructured":"Dyo, V., Ellwood, S.A., Macdonald, D.W., Markham, A., Mascolo, C., Pasztor, B., Scellato, S., Trigoni, N., Wohlers, R., and Yousef, K. (2010, January 3\u20135). Evolution and Sustainability of a Wildlife Monitoring Sensor Networks. Zurich, Switzerland.","DOI":"10.1145\/1869983.1869997"},{"key":"ref_7","doi-asserted-by":"crossref","first-page":"317020","DOI":"10.1155\/2012\/317020","article-title":"Continuous remote monitoring in hazardous sites using sensor technologies","volume":"2012","author":"Manes","year":"2012","journal-title":"Int. J. Distrib. Sens. Netw."},{"key":"ref_8","unstructured":"TelosB Datasheet. Available online: http:\/\/www.willow.co.uk\/TelosB_Datasheet.pdf."},{"key":"ref_9","unstructured":"Micaz Datasheet. Available online: http:\/\/www.openautomation.net\/uploadsproductos\/micaz_datasheet.pdf."},{"key":"ref_10","unstructured":"Stargate System Hardware. Available online: http:\/\/platformx.sourceforge.net\/home.html."},{"key":"ref_11","unstructured":"Koubaa, A., and Alves, M. (2005, January 6\u20138). A Two-tiered Architecture for Real-Time Communication in Large-Scale Wireless Sensor Networks: Research Challenges. Spain."},{"key":"ref_12","doi-asserted-by":"crossref","first-page":"231","DOI":"10.1109\/TC.2007.70774","article-title":"Energy-efficient multihop polling in clusters of two-layered heterogeneous sensor networks","volume":"57","author":"Zhang","year":"2008","journal-title":"IEEE Trans. Comput."},{"key":"ref_13","first-page":"745","article-title":"A Survey on clustering algorithms for heterogeneous wireless sensor networks","volume":"2","author":"Katiyar","year":"2011","journal-title":"Int. J. Adv. Netw. Appl."},{"key":"ref_14","doi-asserted-by":"crossref","unstructured":"Gill, K., Yao, F., and Yang, S.-H. (2008, January 6\u20138). Transparent Heterogeneous Networks for Remote Control of Home Environments. Hainan, China.","DOI":"10.1109\/ICNSC.2008.4525442"},{"key":"ref_15","doi-asserted-by":"crossref","first-page":"121","DOI":"10.1007\/s11235-008-9099-8","article-title":"Coverage based inter-cluster communication for load-balancing in heterogeneous wireless sensor networks","volume":"38","author":"Israr","year":"2008","journal-title":"Telecommun. Syst."},{"key":"ref_16","doi-asserted-by":"crossref","first-page":"865","DOI":"10.1109\/TPDS.2006.106","article-title":"Location-aware combinational key management scheme for clustered sensor networks","volume":"17","author":"Younis","year":"2006","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"key":"ref_17","doi-asserted-by":"crossref","first-page":"76","DOI":"10.1109\/MWC.2007.4396946","article-title":"Key management issues in wireless sensor networks: current proposals and future developments","volume":"14","author":"Lee","year":"2007","journal-title":"IEEE Wirel. Commun."},{"key":"ref_18","doi-asserted-by":"crossref","first-page":"4136","DOI":"10.1109\/TWC.2007.060255","article-title":"On broadcast authentication in wireless sensor networks","volume":"6","author":"Ren","year":"2007","journal-title":"IEEE Trans. Wirel. Commun."},{"key":"ref_19","doi-asserted-by":"crossref","unstructured":"Du, X., Guizani, M., Xiao, Y., and Chen, H.-H. (2008, January 19\u201323). Defending DoS Attacks on Broadcast Authentication in Wireless Sensor Networks. Beijing, China.","DOI":"10.1109\/ICC.2008.319"},{"key":"ref_20","doi-asserted-by":"crossref","first-page":"2106","DOI":"10.1109\/TWC.2012.032812.110433","article-title":"PKC Based Broadcast Authentication using Signature Amortization for WSNs","volume":"11","author":"Liu","year":"2012","journal-title":"IEEE Trans. Wirel. Commun."},{"key":"ref_21","doi-asserted-by":"crossref","unstructured":"Eschenauer, L., and Gligor, V.D. (2002, January 17\u201321). A Key-management Scheme for Distributed Sensor Networks. Washington, DC, USA.","DOI":"10.1145\/586110.586117"},{"key":"ref_22","unstructured":"Chen, H., Perrig, A., and Song, D.X. (2003, January 11\u201314). Random Key Pre-distribution Scheme for Sensor Networks. Oakland, CA, USA."},{"key":"ref_23","doi-asserted-by":"crossref","first-page":"668","DOI":"10.1016\/j.adhoc.2004.08.012","article-title":"Group key management scheme for large-scale sensor networks","volume":"3","author":"Eltoweissy","year":"2005","journal-title":"Ad Hoc Netw."},{"key":"ref_24","doi-asserted-by":"crossref","unstructured":"Du, W., Deng, J., Han, Y.S., and Varshney, P.K. (2003, January 27\u201330). A Pairwise Key Pre-distribution Scheme for Wireless Sensor Networks. Washington, DC, USA.","DOI":"10.1145\/948109.948118"},{"key":"ref_25","doi-asserted-by":"crossref","first-page":"204","DOI":"10.1145\/1105688.1105691","article-title":"Improving key pre-distribution with deployment knowledge in static sensor networks","volume":"1","author":"Liu","year":"2005","journal-title":"ACM Trans. Sens. Netw."},{"key":"ref_26","doi-asserted-by":"crossref","first-page":"1059","DOI":"10.1016\/j.adhoc.2010.08.011","article-title":"SAKE: Software attestation for key establishment in sensor networks","volume":"9","author":"Seshadri","year":"2011","journal-title":"Ad Hoc Netw."},{"key":"ref_27","doi-asserted-by":"crossref","first-page":"639","DOI":"10.1109\/TWC.2008.060603","article-title":"A framework for a distributed key management scheme in heterogeneous wireless sensor networks","volume":"7","author":"Lu","year":"2008","journal-title":"IEEE Trans. Wirel. Commun."},{"key":"ref_28","doi-asserted-by":"crossref","first-page":"24","DOI":"10.1016\/j.adhoc.2006.05.012","article-title":"An effective key management scheme for heterogeneous sensor networks","volume":"5","author":"Du","year":"2007","journal-title":"Ad Hoc Netw."},{"key":"ref_29","doi-asserted-by":"crossref","unstructured":"Brown, J., Du, X., and Nygrad, K. (2007, January 26\u201330). An Efficient Public Key based Heterogeneous Sensor Network Key Distribution Scheme. Washington, DC, USA.","DOI":"10.1109\/GLOCOM.2007.191"},{"key":"ref_30","doi-asserted-by":"crossref","first-page":"663","DOI":"10.1109\/TMC.2007.1020","article-title":"Efficient hybrid security mechanisms for heterogeneous sensor networks","volume":"6","author":"Traynor","year":"2007","journal-title":"IEEE Trans. Mobile Comput."},{"key":"ref_31","first-page":"125","article-title":"HERO: Hierarchical key management protocol for heterogeneous wireless sensor networks","volume":"264","author":"Maala","year":"2008","journal-title":"IFIP-Wirel. Sens. Actor Netw. II"},{"key":"ref_32","unstructured":"Jolly, G., Kuscu, M.C., Kokate, P., and Younis, M. (July2003, January 30). A Low-energy Key Management Protocol for Wireless Sensor Networks. Antalya, Turkey."},{"key":"ref_33","doi-asserted-by":"crossref","first-page":"35","DOI":"10.1016\/j.adhoc.2006.05.011","article-title":"An improved key distribution mechanism for large-scale hierarchical wireless sensor networks","volume":"5","author":"Cheng","year":"2007","journal-title":"Ad Hoc Netw."},{"key":"ref_34","doi-asserted-by":"crossref","unstructured":"Das, A.K. (2009, January 5\u201310). An Unconditionally Secure Key Management Scheme for Large-Scale Heterogeneous Sensor Networks. Bangalore, India.","DOI":"10.1109\/COMSNETS.2009.4808919"},{"key":"ref_35","doi-asserted-by":"crossref","unstructured":"Kausar, F., Hussain, S., Yang, L.T., and Masood, A. (2008). Scalable and efficient key management for heterogeneous sensor networks. J. Supercomput., 45.","DOI":"10.1007\/s11227-008-0184-2"},{"key":"ref_36","doi-asserted-by":"crossref","unstructured":"Tian, B., Han, S., and Dillon, T. (2009, January 14\u201316). A Key Management Scheme for Heterogeneous Sensor Networks Using Keyed-Hash Chain. Wu Yi Mountain, China.","DOI":"10.1109\/MSN.2009.26"},{"key":"ref_37","doi-asserted-by":"crossref","unstructured":"Azarderskhash, R., and Masoleh, A.R. (2011). Secure clustering and symmetric key establishment in heterogeneous wireless sensor networks. EURASIP J. Wirel. Commun. Netw., 893592.","DOI":"10.1155\/2011\/893592"},{"key":"ref_38","unstructured":"Das, A.K., Das, A., Mohapatra, S., and Vavilapalli, S. A Location-Aware Scheme for the Key Establishment in Wireless Sensor Networks. Available online: http:\/\/cse.iitkgp.ac.in\/\u223cabhij\/publications\/t-nbd-06.pdf."},{"key":"ref_39","doi-asserted-by":"crossref","first-page":"18","DOI":"10.1145\/77648.77649","article-title":"A logic of authentication","volume":"8","author":"Burrows","year":"1990","journal-title":"ACM Trans. Comput. Syst."},{"key":"ref_40","doi-asserted-by":"crossref","first-page":"876","DOI":"10.1016\/j.jss.2011.10.049","article-title":"An efficient and secure multi-server authentication scheme with key agreement","volume":"85","author":"Tsaur","year":"2012","journal-title":"J. Syst. Softw."},{"key":"ref_41","doi-asserted-by":"crossref","first-page":"241","DOI":"10.1109\/TSG.2011.2166280","article-title":"Smart \u201cstick-on\u201d sensors for the smart grid","volume":"3","author":"Moghe","year":"2012","journal-title":"IEEE Trans. Smart Grid"},{"key":"ref_42","doi-asserted-by":"crossref","first-page":"11544","DOI":"10.3390\/s111211544","article-title":"Heterogeneous collaborative sensor networks for electrical management of an automated house with PV energy","volume":"11","author":"Matallanas","year":"2011","journal-title":"Sensors"},{"key":"ref_43","first-page":"1533","article-title":"Zero knowledge protocol to design security model for threats in WSN","volume":"2","author":"Parbat","year":"2012","journal-title":"Int. J. Eng. Res. Appl.(IJERA)"},{"key":"ref_44","doi-asserted-by":"crossref","first-page":"55","DOI":"10.3390\/s120100055","article-title":"Security issues in healthcare applications using wireless medical sensor networks: A survey","volume":"12","author":"Kumar","year":"2012","journal-title":"Sensors"},{"key":"ref_45","doi-asserted-by":"crossref","first-page":"289","DOI":"10.1007\/978-3-642-03829-7_10","article-title":"Analysis of security threats, requirements, technologies and standards in wireless sensor networks","volume":"705","author":"Lopez","year":"2009","journal-title":"Found. Secur. Anal. Design V"},{"key":"ref_46","doi-asserted-by":"crossref","first-page":"50","DOI":"10.1504\/IJSNET.2006.010834","article-title":"Efficient anonymity schemes for clustered wireless sensor networks","volume":"1","author":"Misra","year":"2006","journal-title":"Int. J. Sens. Netw."},{"key":"ref_47","first-page":"393","article-title":"Two attacks on a sensor network key distribution scheme of Chen and Agrawal","volume":"2","author":"Paterson","year":"2009","journal-title":"J. Math. Cryptol."},{"key":"ref_48","doi-asserted-by":"crossref","first-page":"272","DOI":"10.1016\/j.csi.2008.05.014","article-title":"A novel access control for secure sensor networks","volume":"31","author":"Huang","year":"2009","journal-title":"Comput. Stand. Interf."},{"key":"ref_49","doi-asserted-by":"crossref","first-page":"492","DOI":"10.1109\/TCE.2009.5174412","article-title":"Enhanced novel access control protocol over wireless sensor networks","volume":"55","author":"Kim","year":"2009","journal-title":"IEEE Trans. Consum. Electron."},{"key":"ref_50","doi-asserted-by":"crossref","first-page":"566","DOI":"10.1109\/TCE.2010.5505971","article-title":"On the security of an enhanced novel access control protocol for wireless sensor networks","volume":"56","author":"Zeng","year":"2010","journal-title":"IEEE Trans. Consum. Electron."},{"key":"ref_51","doi-asserted-by":"crossref","unstructured":"Karloff, C., Sastry, N., and Wagner, D. (2004, January 25\u201328). TinySec: A Secure Link Layer Security Architecture for Wireless Sensor Networks. Baltimore, MD, USA.","DOI":"10.1145\/1031495.1031515"},{"key":"ref_52","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1016\/j.adhoc.2006.05.014","article-title":"Access control in wireless sensor networks","volume":"5","author":"Zhou","year":"2007","journal-title":"Ad Hoc Netw."},{"key":"ref_53","unstructured":"Re, G.L., Milazzo, F., and Ortolani, M. (2011, January 14\u201319). Secure Random Number Generation in Wireless Sensor Networks. Sydney, Australia."},{"key":"ref_54","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/1814539.1814550","article-title":"MEDiSN: Medical emergency detection in sensor networks","volume":"10","author":"Ko","year":"2010","journal-title":"ACM Trans. Embed. Comput. Syst."},{"key":"ref_55","doi-asserted-by":"crossref","unstructured":"Wang, F., Wang, D., and Liu, J. (2009, January 22\u201326). Traffic-aware Relay Node Deployment for Data Collection Wireless Sensor Networks. Rome, Italy.","DOI":"10.1109\/SAHCN.2009.5168981"},{"key":"ref_56","doi-asserted-by":"crossref","unstructured":"Drozda, M., Schaust, S., and Szczerbicka, H. (2007, January 25\u201328). AIS for Misbehavior Detection in Wireless Sensor Network: Performance and Design Principles. Singapore.","DOI":"10.1109\/CEC.2007.4424955"},{"key":"ref_57","doi-asserted-by":"crossref","unstructured":"Lee, J., Kapitanova, K., and Son, S.H. (2010). The price of security in wireless sensor networks. Comput. Netw., 54.","DOI":"10.1016\/j.comnet.2010.05.011"},{"key":"ref_58","doi-asserted-by":"crossref","first-page":"5","DOI":"10.1109\/MNET.2013.6423185","article-title":"Authentication and Authorization Mechanisms for substation automation in smart grid networks","volume":"27","author":"Vaidya","year":"2013","journal-title":"IEEE Netw."},{"key":"ref_59","doi-asserted-by":"crossref","first-page":"201","DOI":"10.1007\/s11071-012-0652-3","article-title":"A secure biometric-based remote user authentication with key agreement scheme using extended chaotic maps","volume":"71","author":"Lee","year":"2013","journal-title":"Nonlin. Dyn."},{"key":"ref_60","doi-asserted-by":"crossref","first-page":"9589","DOI":"10.3390\/s130809589","article-title":"An advanced temporal credential-based security with mutual authentication and key agreement for wireless sensor networks","volume":"13","author":"Li","year":"2013","journal-title":"Sensors"}],"container-title":["Sensors"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1424-8220\/14\/2\/2732\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T21:08:04Z","timestamp":1760216884000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1424-8220\/14\/2\/2732"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,2,11]]},"references-count":60,"journal-issue":{"issue":"2","published-online":{"date-parts":[[2014,2]]}},"alternative-id":["s140202732"],"URL":"https:\/\/doi.org\/10.3390\/s140202732","relation":{},"ISSN":["1424-8220"],"issn-type":[{"value":"1424-8220","type":"electronic"}],"subject":[],"published":{"date-parts":[[2014,2,11]]}}}