{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,1]],"date-time":"2025-06-01T04:10:54Z","timestamp":1748751054381,"version":"3.41.0"},"publisher-location":"Cham","reference-count":24,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319271606"},{"type":"electronic","value":"9783319271613"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-27161-3_36","type":"book-chapter","created":{"date-parts":[[2015,11,18]],"date-time":"2015-11-18T04:38:40Z","timestamp":1447821520000},"page":"405-412","source":"Crossref","is-referenced-by-count":2,"title":["A Hierarchical Shared Key Algorithm in Wireless Sensor Networks"],"prefix":"10.1007","author":[{"given":"Zeyu","family":"Sun","sequence":"first","affiliation":[]},{"given":"Weiguo","family":"Wu","sequence":"additional","affiliation":[]},{"given":"Xiaofei","family":"Xing","sequence":"additional","affiliation":[]},{"given":"Chuanfeng","family":"Li","sequence":"additional","affiliation":[]},{"given":"Yalin","family":"Nie","sequence":"additional","affiliation":[]},{"given":"Yangjie","family":"Cao","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,12,29]]},"reference":[{"key":"36_CR1","doi-asserted-by":"crossref","unstructured":"Ang, G., Wei, W., Zhixiao, W., Yan, W.: A hierarchical authentication scheme for the different radio ranges sensor network. In: 2009 International conference on Computational Science and Engineering, pp. 494\u2013501 (2009)","DOI":"10.1109\/CSE.2009.227"},{"key":"36_CR2","unstructured":"Hailun, T., Sanjay, J., Diet, O., John, Z., Vijay, S.: Secure multi-hop network programming with multiple one-way key chains. In: Proceeding of the First ACM Conference on Wireless Network Security, pp. 206\u2013211 (2008)"},{"key":"36_CR3","doi-asserted-by":"crossref","unstructured":"Ang, G., Wei, W., Zhi, W.: Hopfield-association: establishing a shared key in the wireless sensor networks. In: 2010 Second International Conference on Networks Security, Wireless Communications and Trusted Computing, pp. 70\u201373 (2010)","DOI":"10.1109\/NSWCTC.2010.24"},{"key":"36_CR4","doi-asserted-by":"crossref","unstructured":"Deng, J., Han, R., Mishra, S.: Defending against path-based dos attacks in wireless sensor networks. In: Proceedings of the 3rd ACM Workshop on Security of Ad Hoc and Sensor Networks, pp. 195\u2013199 (2005)","DOI":"10.1145\/1102219.1102235"},{"key":"36_CR5","unstructured":"Deb, B., Bhatnagar, S., Nath, B.: ReInForM:Reliable information forwarding using multiple paths in sensor networks. In: 28th Annual IEEE Conference on Local Computer Networks, pp. 350\u2013354 (2003)"},{"issue":"4","key":"36_CR6","doi-asserted-by":"publisher","first-page":"36","DOI":"10.1109\/TWC.2002.804190","volume":"1","author":"WR Heinzelman","year":"2002","unstructured":"Heinzelman, W.R., Chandrakasan, A., Balarkrishnan, H.: An application-specific protocol architecture for wireless microsensor networks. IEEE Trans. Wirel. Commun. 1(4), 36\u201349 (2002)","journal-title":"IEEE Trans. Wirel. Commun."},{"key":"36_CR7","unstructured":"Chan, H., Perrig, A., Song, D.: Random Key predistribution schemes for sensor networks. In: IEEE Symposium on Security and Privacy, pp. 56\u201367 (2003)"},{"key":"36_CR8","unstructured":"Suhas, M., Wade, T., Narayan, M., Chunxuna, Y., Alex, R.: Radio-telepathy: extracting a secret key from an unauthenticated wireless channel. In: Proceedings of ACM MobiCom, pp. 236\u2013242 (2008)"},{"issue":"8","key":"36_CR9","doi-asserted-by":"publisher","first-page":"728","DOI":"10.1016\/S0167-4048(03)00013-0","volume":"22","author":"CC Chang","year":"2003","unstructured":"Chang, C.C., Chang, Y.F.: Efficient anonymous auction protocol with freewheeling bids. Comput. Secur. 22(8), 728\u2013734 (2003)","journal-title":"Comput. Secur."},{"issue":"2","key":"36_CR10","doi-asserted-by":"publisher","first-page":"169","DOI":"10.1016\/j.cose.2004.09.010","volume":"24","author":"R Jiang","year":"2005","unstructured":"Jiang, R., Pan, L., Li, J.H.: An improvement on efficient anonymous auction protocols. Comput. Secur. 24(2), 169\u2013174 (2005)","journal-title":"Comput. Secur."},{"key":"36_CR11","unstructured":"Ye, F., Luo, H, Lu, S., Zhang, L.: Statistical route-filtering of injected false data in sensor networks. In: Proceeding IEEE INFOCOM, pp. 453\u2013457 (2004)"},{"issue":"2","key":"36_CR12","doi-asserted-by":"publisher","first-page":"155","DOI":"10.1016\/S0169-023X(01)00048-9","volume":"40","author":"MS Hwang","year":"2002","unstructured":"Hwang, M.S., Lu, J.L., Lin, C.: Adding timestamps to the electronic auction protocol. Data Knowl. Eng. 40(2), 155\u2013162 (2002)","journal-title":"Data Knowl. Eng."},{"issue":"2","key":"36_CR13","doi-asserted-by":"publisher","first-page":"1487","DOI":"10.1016\/j.amc.2005.06.016","volume":"174","author":"TL Horng","year":"2006","unstructured":"Horng, T.L., Wen, S.J., Chi, K.L.: An electronic online bidding auction protocol with both security and efficiency. Appl. Math. Comput. 174(2), 1487\u20131497 (2006)","journal-title":"Appl. Math. Comput."},{"issue":"9","key":"36_CR14","doi-asserted-by":"publisher","first-page":"126","DOI":"10.1109\/35.312841","volume":"32","author":"BC Neuman","year":"1994","unstructured":"Neuman, B.C., Ts\u2019o, T.: Kerberos: an authentication service for computer networks. IEEE Commun. 32(9), 126\u2013135 (1994)","journal-title":"IEEE Commun."},{"issue":"2","key":"36_CR15","first-page":"489","volume":"21","author":"RL Rivest","year":"1982","unstructured":"Rivest, R.L., Shamir, A., Adleman, M.: A method for obtaining digital signatures and public-key cryptosystems. Commun. ACM 21(2), 489\u2013499 (1982)","journal-title":"Commun. ACM"},{"key":"36_CR16","doi-asserted-by":"crossref","unstructured":"Housley, R., Hoffman, P.: Internet X.509 pubic key infrastructure operational protocols: FTP and HTTP. IEEE Commun. 203\u2013227 (1999)","DOI":"10.17487\/rfc2585"},{"key":"36_CR17","doi-asserted-by":"crossref","unstructured":"Mathur, S., Trappe, W., Mandayam, N., Ye, C., Reznik, A.: Radio-telepathy: extracting a secret key from an unauthenticated wireless channel. In: Proceedings of ACM Mobicom 2008, pp. 522\u2013530 (2008)","DOI":"10.1145\/1409944.1409960"},{"issue":"2","key":"36_CR18","first-page":"1254","volume":"10","author":"F Xue","year":"2002","unstructured":"Xue, F., Kumar, P.R.: The number of neighbors needed for connectivity of wireless networks. Wirel. Netw. 10(2), 1254\u20131263 (2002)","journal-title":"Wirel. Netw."},{"issue":"5","key":"36_CR19","doi-asserted-by":"publisher","first-page":"521","DOI":"10.1023\/A:1016598314198","volume":"8","author":"A Perrig","year":"2002","unstructured":"Perrig, A., Szewczyk, V., Wen, D.C., Tygar, J.D.: SPINS: security protocols for sensor networks. J. Wirel. Netw. 8(5), 521\u2013534 (2002)","journal-title":"J. Wirel. Netw."},{"key":"36_CR20","unstructured":"Savo, G.G.: Optimal Transmission Radius in Sensor Networks. Advanced Wireless Sensor Network: 4G Technologies, pp. 568\u2013571. Wiley, New York (2006)"},{"issue":"6","key":"36_CR21","first-page":"962","volume":"22","author":"D Whit","year":"2010","unstructured":"Whit, D., Martin, H.: New directions in cryptography. IEEE Trans. Inf. Theor. 22(6), 962\u2013977 (2010)","journal-title":"IEEE Trans. Inf. Theor."},{"key":"36_CR22","doi-asserted-by":"crossref","unstructured":"Eschenauer, L., Gligor, V.D.: A key-management scheme for distributed sensor networks. In: Proceedings of ACM CCS 2002, pp. 520\u2013523 (2002)","DOI":"10.1145\/586110.586117"},{"key":"36_CR23","doi-asserted-by":"crossref","unstructured":"Xu, Y., Heidemann, E.J.: Geography-informed energy conservation for ad hoc routing. In: Proceedings of the 7th Annual International Conference on Mobile Computing and Networking, pp. 56\u201359 (2001)","DOI":"10.1145\/381677.381685"},{"issue":"4","key":"36_CR24","first-page":"13","volume":"7","author":"S Liming","year":"2002","unstructured":"Liming, S., Guiming, G.: A survey on energy efficient protocols for wireless. Commun. China Comput. Fed. (CCF) 7(4), 13\u201316 (2002)","journal-title":"Commun. China Comput. Fed. (CCF)"}],"container-title":["Lecture Notes in Computer Science","Algorithms and Architectures for Parallel Processing"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-27161-3_36","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,31]],"date-time":"2025-05-31T12:33:46Z","timestamp":1748694826000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-27161-3_36"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319271606","9783319271613"],"references-count":24,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-27161-3_36","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2015]]}}}