Journal of Software Engineering1819-43112152-0941Asian Network for Scientific Information10.3923/jse.2014.194.202WangMing-Wei WangLie-Jun YangQing-Hua XieWei-Min 3201483In this study, we proposed a mutual authentication protocol between sensor nodes and gateway nodes. In our scheme, we adopted multiple security techniques against different security threats, such as time stamps against replay attacks, the ZUC encryption algorithm against data eaves dropping and unauthorized falsification. To verify the effectiveness and efficiency of our scheme, we implemented a telosb-based wireless sensor test bed, in which all sensor nodes were equipped with our security scheme to facilitate mutual authentications between each other. The experiment results reveal that, our proposal can not only resist the common attacks, such as the impersonation attack, replay attack and DoS attacks, but show a sound network performance.]]>Arikumar, K.S. and K. Thirumoorthy,20112011pp: 10101015Benenson, Z., F.C. Freiling, E. Hammerschmidt, S. Lucks and L. Pimenidis,20062006pp: 3849Cao, X., W. Kou, L. Dang and B. Zhao,200831659667Das, M.L.,2009810861090Du, Z.Q., Y.L. Shen, J.F. Ma and L.H. Zhou,201031113119Gnawali, O., R. Fonseca, K. Jamieson, D. Moss and P. Levis,20092009pp: 114Jiang, C.M., H.X. Xu and B. Li,2008258085Levis, P., S. Madden, J. Polastre, R. Szewczyk and K. Whitehouse et al.,20052005pp: 115-148pp: 115-148Lin, K. and P. Levis,20082008pp: 433444Perrig A., R. Szewczyk, J.D. Tygar, V. Wen and D.E. Culler,20028521534Raymond, D.R. and S.F. Midkiff,200877481Ren, K., W. Lou, K. Zeng and P.J. Moran,2010641364144Sen, J.,20122012pp: 407-460pp: 407-460Shen, Y.L., J.F. Ma and Q.Q. Pei,20072007pp: 362367Shim, K.A., Y.R. Lee and C.M. Park,201311182189Wang, H. and Q. Li,201210272283Wong, K.H.M., Y. Zheng, J. Cao and S. Wang,20062006pp: 244251Yasmin, R., E. Ritter and G. Wang,20102010pp: 882889Yussoff, Y.M., H. Hashim and M.D. Baba,20129230239