{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T14:49:38Z","timestamp":1742914178576,"version":"3.40.3"},"publisher-location":"Cham","reference-count":13,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319494449"},{"type":"electronic","value":"9783319494456"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-49445-6_7","type":"book-chapter","created":{"date-parts":[[2016,11,17]],"date-time":"2016-11-17T12:50:31Z","timestamp":1479387031000},"page":"124-137","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Light Weight Key Establishment Scheme for Wireless Sensor Networks"],"prefix":"10.1007","author":[{"given":"Payingat","family":"Jilna","sequence":"first","affiliation":[]},{"given":"P. P.","family":"Deepthi","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,11,18]]},"reference":[{"issue":"15","key":"7_CR1","doi-asserted-by":"publisher","first-page":"2591","DOI":"10.1016\/j.comnet.2010.04.010","volume":"54","author":"MA Simpl\u00edcio","year":"2010","unstructured":"Simpl\u00edcio, M.A., Barreto, P.S., Margi, C.B., Carvalho, T.C.: A survey on key management mechanisms for distributed wireless sensor networks. Comput. Netw. 54(15), 2591\u20132612 (2010)","journal-title":"Comput. Netw."},{"key":"7_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"251","DOI":"10.1007\/978-3-540-72606-7_22","volume-title":"NETWORKING 2007. Ad Hoc and Sensor Networks, Wireless Networks, Next Generation Internet","author":"Q Dong","year":"2007","unstructured":"Dong, Q., Liu, D.: Using auxiliary sensors for pairwise key establishment in WSN. In: Akyildiz, I.F., Sivakumar, R., Ekici, E., Oliveira, J.C., McNair, J. (eds.) NETWORKING 2007. LNCS, vol. 4479, pp. 251\u2013262. Springer, Heidelberg (2007). doi: 10.1007\/978-3-540-72606-7_22"},{"issue":"2","key":"7_CR3","first-page":"11","volume":"4","author":"D Liu","year":"2008","unstructured":"Liu, D., Ning, P., Du, W.: Group-based key predistribution for wireless sensor networks. ACM Trans. Sens. Netw. (TOSN) 4(2), 11 (2008)","journal-title":"ACM Trans. Sens. Netw. (TOSN)"},{"issue":"6","key":"7_CR4","doi-asserted-by":"crossref","first-page":"595","DOI":"10.1002\/sec.102","volume":"2","author":"P Kotzanikolaou","year":"2009","unstructured":"Kotzanikolaou, P., Magkos, E., Vergados, D., Stefanidakis, M.: Secure and practical key establishment for distributed sensor networks. Secur. Commun. Netw. 2(6), 595\u2013610 (2009)","journal-title":"Secur. Commun. Netw."},{"issue":"1","key":"7_CR5","doi-asserted-by":"crossref","first-page":"406254","DOI":"10.1155\/2012\/406254","volume":"8","author":"D Du","year":"2012","unstructured":"Du, D., Xiong, H., Wang, H.: An efficient key management scheme for wireless sensor networks. Int. J. Distrib. Sens. Netw. 8(1), 406254 (2012)","journal-title":"Int. J. Distrib. Sens. Netw."},{"issue":"18","key":"7_CR6","doi-asserted-by":"publisher","first-page":"3726","DOI":"10.1002\/sec.1295","volume":"8","author":"P Jilna","year":"2015","unstructured":"Jilna, P., Pattathil, D.P.: A key management technique based on elliptic curves for static wireless sensor networks. Secur. Commun. Netw. 8(18), 3726\u20133738 (2015)","journal-title":"Secur. Commun. Netw."},{"issue":"2","key":"7_CR7","doi-asserted-by":"publisher","first-page":"371","DOI":"10.1109\/TIFS.2014.2375555","volume":"10","author":"S-H Seo","year":"2015","unstructured":"Seo, S.-H., Won, J., Sultana, S., Bertino, E.: Effective key management in dynamic wireless sensor networks. IEEE Trans. Inf. Forensics Secur. 10(2), 371\u2013383 (2015)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"1","key":"7_CR8","doi-asserted-by":"publisher","first-page":"288","DOI":"10.1016\/j.adhoc.2012.05.013","volume":"11","author":"P Barsocchi","year":"2013","unstructured":"Barsocchi, P., Oligeri, G., Soriente, C.: Shake: single hash key establishment for resource constrained devices. Ad Hoc Netw. 11(1), 288\u2013297 (2013)","journal-title":"Ad Hoc Netw."},{"issue":"1","key":"7_CR9","doi-asserted-by":"publisher","first-page":"163","DOI":"10.1109\/TIFS.2012.2226718","volume":"8","author":"R Pietro Di","year":"2013","unstructured":"Di Pietro, R., Oligeri, G.: Coke crypto-less over-the-air key establishment. IEEE Trans. Inf. Forensics Secur. 8(1), 163\u2013173 (2013)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"4","key":"7_CR10","doi-asserted-by":"publisher","first-page":"500","DOI":"10.1145\/1218556.1218559","volume":"2","author":"S Zhu","year":"2006","unstructured":"Zhu, S., Setia, S., Jajodia, S.: Leap+: efficient security mechanisms for large-scale distributed sensor networks. ACM Trans. Sens. Netw. (TOSN) 2(4), 500\u2013528 (2006)","journal-title":"ACM Trans. Sens. Netw. (TOSN)"},{"key":"7_CR11","doi-asserted-by":"crossref","unstructured":"Blackshear, S., Verma, R.M.: R-leap+: randomizing leap+ key distribution to resist replay and jamming attacks. In: Proceedings of the 2010 ACM Symposium on Applied Computing, pp. 1985\u20131992. ACM (2010)","DOI":"10.1145\/1774088.1774507"},{"key":"7_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"437","DOI":"10.1007\/11872153_38","volume-title":"Personal Wireless Communications","author":"YH Kim","year":"2006","unstructured":"Kim, Y.H., Lee, H., Lee, D.H., Lim, J.: A key management scheme for large scale distributed sensor networks. In: Cuenca, P., Orozco-Barbosa, L. (eds.) PWC 2006. LNCS, vol. 4217, pp. 437\u2013446. Springer, Heidelberg (2006). doi: 10.1007\/11872153_38"},{"key":"7_CR13","doi-asserted-by":"crossref","unstructured":"Eschenauer, L., Gligor, V.D.: A key-management scheme for distributed sensor networks. In: Proceedings of the 9th ACM Conference on Computer and Communications Security, pp. 41\u201347. ACM (2002)","DOI":"10.1145\/586115.586117"}],"container-title":["Lecture Notes in Computer Science","Security, Privacy, and Applied Cryptography Engineering"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-49445-6_7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,6,20]],"date-time":"2024-06-20T17:26:54Z","timestamp":1718904414000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-49445-6_7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319494449","9783319494456"],"references-count":13,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-49445-6_7","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2016]]},"assertion":[{"value":"18 November 2016","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"SPACE","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Security, Privacy, and Applied Cryptography Engineering","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Hyderabad","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"India","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2016","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"14 December 2016","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"18 December 2016","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"6","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"space2016","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}