{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T13:51:46Z","timestamp":1725889906638},"publisher-location":"Cham","reference-count":29,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319596075"},{"type":"electronic","value":"9783319596082"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-59608-2_13","type":"book-chapter","created":{"date-parts":[[2017,6,13]],"date-time":"2017-06-13T15:29:56Z","timestamp":1497367796000},"page":"241-256","source":"Crossref","is-referenced-by-count":0,"title":["Secure IoT Using Weighted Signed Graphs"],"prefix":"10.1007","author":[{"given":"Pinaki","family":"Sarkar","sequence":"first","affiliation":[]},{"given":"Morshed Uddin","family":"Chowdhury","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,6,14]]},"reference":[{"issue":"3\u20134","key":"13_CR1","first-page":"313","volume":"27","author":"S Bag","year":"2015","unstructured":"Bag, S.: A new key predistribution scheme for grid-group deployment of wireless sensor networks. Ad Hoc Sens. Wirel. Netw. 27(3\u20134), 313\u2013329 (2015)","journal-title":"Ad Hoc Sens. Wirel. Netw."},{"key":"13_CR2","doi-asserted-by":"crossref","unstructured":"Bag, S., Dhar, A., Sarkar, P.: 100% connectivity for location aware code based KPD in Clustered WSN: Merging Blocks. In: Information Security Conference (ISC) 2012, Passau, Germany, pp. 136\u2013150 (2012)","DOI":"10.1007\/978-3-642-33383-5_9"},{"key":"13_CR3","doi-asserted-by":"crossref","first-page":"145","DOI":"10.1186\/1687-1499-2013-145","volume":"2013","author":"S Bag","year":"2013","unstructured":"Bag, S., Roy, B.K.: A new key predistribution scheme for general and grid-group deployment of wireless sensor networks. EURASIP J. Wirel. Commun. Networking 2013, 145 (2013)","journal-title":"EURASIP J. Wirel. Commun. Networking"},{"key":"13_CR4","series-title":"Communications in Computer and Information Science","doi-asserted-by":"publisher","first-page":"344","DOI":"10.1007\/978-3-642-22540-6_33","volume-title":"Advances in Network Security and Applications","author":"S Bag","year":"2011","unstructured":"Bag, S., Saha, A., Sarkar, P.: Highly resilient key predistribution scheme using transversal designs and reed muller codes for wireless sensor network. In: Wyld, D.C., Wozniak, M., Chaki, N., Meghanathan, N., Nagamalai, D. (eds.) CNSA 2011. CCIS, vol. 196, pp. 344\u2013355. Springer, Heidelberg (2011). doi: 10.1007\/978-3-642-22540-6_33"},{"issue":"3","key":"13_CR5","doi-asserted-by":"crossref","first-page":"463","DOI":"10.1007\/s11277-011-0302-y","volume":"60","author":"S Banihashemian","year":"2011","unstructured":"Banihashemian, S., Ghaemi Bafghi, A., Yaghmaee Moghaddam, M.H.: Centralized key management scheme in wireless sensor networks. Wirel. Pers. Commun. 60(3), 463\u2013474 (2011)","journal-title":"Wirel. Pers. Commun."},{"issue":"1","key":"13_CR6","doi-asserted-by":"crossref","first-page":"111","DOI":"10.1007\/s10623-011-9590-1","volume":"67","author":"M Bose","year":"2013","unstructured":"Bose, M., Dey, A., Mukerjee, R.: Key predistribution schemes for distributed sensor net- works via block designs. Des. Codes Cryptogr. 67(1), 111\u2013136 (2013)","journal-title":"Des. Codes Cryptogr."},{"key":"13_CR7","doi-asserted-by":"crossref","unstructured":"\u00c7amtepe, S.A., Yener, B.: Combinatorial design of key distribution mechanisms for wireless sensor networks. In: ESORICS 2004, French Riviera, France, pp. 293\u2013308, 13\u201315 September 2004","DOI":"10.1007\/978-3-540-30108-0_18"},{"key":"13_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"89","DOI":"10.1007\/11556992_7","volume-title":"Information Security","author":"D Chakrabarti","year":"2005","unstructured":"Chakrabarti, D., Maitra, S., Roy, B.: A key pre-distribution scheme for wireless sensor networks: merging blocks in combinatorial design. In: Zhou, J., Lopez, J., Deng, R.H., Bao, F. (eds.) ISC 2005. LNCS, vol. 3650, pp. 89\u2013103. Springer, Heidelberg (2005). doi: 10.1007\/11556992_7"},{"issue":"2","key":"13_CR9","doi-asserted-by":"crossref","first-page":"105","DOI":"10.1007\/s10207-006-0085-4","volume":"5","author":"D Chakrabarti","year":"2006","unstructured":"Chakrabarti, D., Maitra, S., Roy, B.K.: A key pre-distribution scheme for wireless sensor networks: merging blocks in combinatorial design. Int. J. Inf. Sec. 5(2), 105\u2013114 (2006)","journal-title":"Int. J. Inf. Sec."},{"key":"13_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"365","DOI":"10.1007\/11767480_25","volume-title":"Applied Cryptography and Network Security","author":"D Chakrabarti","year":"2006","unstructured":"Chakrabarti, D., Seberry, J.: Combinatorial structures for design of wireless sensor networks. In: Zhou, J., Yung, M., Bao, F. (eds.) ACNS 2006. LNCS, vol. 3989, pp. 365\u2013374. Springer, Heidelberg (2006). doi: 10.1007\/11767480_25"},{"key":"13_CR11","unstructured":"Chan, H., Perrig, A., Song, D.: Random key predistribution schemes for sensor networks. In: IEEE Symposium on Security and Privacy, pp. 197\u2013213. IEEE Computer Society (2003)"},{"key":"13_CR12","unstructured":"Dhar, A., Sarkar, P.: Full communication in a wireless sensor network by merging blocks of a key predistribution using reed solomon codes. In: CCSAE, pp. 389\u2013400 (2011)"},{"issue":"1","key":"13_CR13","doi-asserted-by":"crossref","first-page":"62","DOI":"10.1109\/TDSC.2006.2","volume":"3","author":"W Du","year":"2006","unstructured":"Du, W., Deng, J., Han, Y.S., Varshney, P.K.: A key predistribution scheme for sensor networks using deployment knowledge. IEEE Trans. Dependable Sec. Comput. 3(1), 62\u201377 (2006)","journal-title":"IEEE Trans. Dependable Sec. Comput."},{"key":"13_CR14","doi-asserted-by":"crossref","unstructured":"Eschenauer, L., Gligor, V.D.: A key-management scheme for distributed sensor networks. In: ACM Conference on Computer and Communications Security, pp. 41\u201347 (2002)","DOI":"10.1145\/586110.586117"},{"issue":"3","key":"13_CR15","doi-asserted-by":"crossref","first-page":"211","DOI":"10.1007\/s00145-001-0006-7","volume":"14","author":"A Fiat","year":"2001","unstructured":"Fiat, A., Tassa, T.: Dynamic traitor tracing. J. Cryptology 14(3), 211\u2013223 (2001)","journal-title":"J. Cryptology"},{"key":"13_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"89","DOI":"10.1007\/978-3-662-43414-7_5","volume-title":"Selected Areas in Cryptography \u2013 SAC 2013","author":"K Henry","year":"2014","unstructured":"Henry, K., Paterson, M.B., Stinson, D.R.: Practical approaches to varying network size in combinatorial key predistribution schemes. In: Lange, T., Lauter, K., Lison\u011bk, P. (eds.) SAC 2013. LNCS, vol. 8282, pp. 89\u2013117. Springer, Heidelberg (2014). doi: 10.1007\/978-3-662-43414-7_5"},{"issue":"2","key":"13_CR17","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/1330332.1330333","volume":"11","author":"J Lee","year":"2008","unstructured":"Lee, J., Stinson, D.R.: On the construction of practical key predistribution schemes for distributed sensor networks using combinatorial designs. ACM Trans. Inf. Syst. Secur. 11(2), 1\u201335 (2008)","journal-title":"ACM Trans. Inf. Syst. Secur."},{"key":"13_CR18","unstructured":"Lee, J., Stinson, D.R.: A combinatorial approach to key predistribution for distributed sensor networks. In: IEEE Wireless Communications and Networking Conference WCNC 2005, New Orleans, USA, pp. 1200\u20131205, 13\u201317 March 2005. Invited Paper"},{"key":"13_CR19","doi-asserted-by":"crossref","unstructured":"Martin, K.M., Paterson, M.B., Stinson, D.R.: Key predistribution for homogeneous wireless sensor networks with group deployment of nodes. TOSN 7(2) (2010)","DOI":"10.1145\/1824766.1824767"},{"key":"13_CR20","volume-title":"Computer Security: Protecting Digital Resources","author":"R Newman","year":"2009","unstructured":"Newman, R.: Computer Security: Protecting Digital Resources. Jones & Bartlett Learning, Sudbury (2009)"},{"issue":"3","key":"13_CR21","doi-asserted-by":"crossref","first-page":"433","DOI":"10.1007\/s10623-012-9749-4","volume":"71","author":"MB Paterson","year":"2014","unstructured":"Paterson, M.B., Stinson, D.R.: A unified approach to combinatorial key predistribution schemes for sensor networks. Des. Codes Cryptogr. 71(3), 433\u2013457 (2014)","journal-title":"Des. Codes Cryptogr."},{"issue":"6","key":"13_CR22","doi-asserted-by":"crossref","first-page":"709","DOI":"10.1007\/s11276-006-6530-5","volume":"12","author":"RD Pietro","year":"2006","unstructured":"Pietro, R.D., Mancini, L.V., Mei, A.: Energy efficient node-to-node authentication and communication confidentiality in wireless sensor networks. Wirel. Netw. 12(6), 709\u2013721 (2006)","journal-title":"Wirel. Netw."},{"key":"13_CR23","doi-asserted-by":"crossref","unstructured":"Ruj, S., Pal, A.: Preferential attachment model with degree bound and its application to key predistribution in WSN. In: 30th IEEE International Conference on Advanced Information Networking and Applications, AINA 2016, Crans-Montana, Switzerland, 23\u201325 March 2016, pp. 677\u2013683 (2016)","DOI":"10.1109\/AINA.2016.141"},{"key":"13_CR24","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"431","DOI":"10.1007\/978-3-540-74742-0_40","volume-title":"Parallel and Distributed Processing and Applications","author":"S Ruj","year":"2007","unstructured":"Ruj, S., Roy, B.: Key predistribution using partially balanced designs in wireless sensor networks. In: Stojmenovic, I., Thulasiram, R.K., Yang, L.T., Jia, W., Guo, M., Mello, R.F. (eds.) ISPA 2007. LNCS, vol. 4742, pp. 431\u2013445. Springer, Heidelberg (2007). doi: 10.1007\/978-3-540-74742-0_40"},{"issue":"1","key":"13_CR25","first-page":"4:1","volume":"6","author":"S Ruj","year":"2009","unstructured":"Ruj, S., Roy, B.K.: Key predistribution using combinatorial designs for grid-group deployment scheme in wireless sensor networks. TOSN 6(1), 4:1\u20134:28 (2009)","journal-title":"TOSN"},{"issue":"1","key":"13_CR26","first-page":"23","volume":"2","author":"P Sarkar","year":"2011","unstructured":"Sarkar, P., Saha, A.: Security enhanced communication in wireless sensor networks using reed-muller codes and partially balanced incomplete block designs. JoC 2(1), 23\u201330 (2011)","journal-title":"JoC"},{"key":"13_CR27","doi-asserted-by":"crossref","unstructured":"Sarkar, P., Saha, A., Chowdhury, M.U.: Secure connectivity model in Wireless Sensor Networks (WSN) using first order Reed-Muller codes. In: MASS, pp. 507\u2013512 (2010)","DOI":"10.1109\/MASS.2010.5663909"},{"key":"13_CR28","doi-asserted-by":"crossref","unstructured":"Simonova, K., Ling, A.C.H., Wang, X.S.: Location-aware key predistribution scheme for wide area wireless sensor networks. In: ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN 2006), Alexandria, VA, USA, 30 October 2006, pp. 157\u2013168 (2006)","DOI":"10.1145\/1180345.1180365"},{"key":"13_CR29","doi-asserted-by":"crossref","unstructured":"Zhou, L., Ni, J., Ravishankar, C.V.: Supporting secure communication and data collection in mobile sensor networks. In: 25th IEEE International Conference on Computer Communications, Joint Conference of the IEEE Computer and Communications Societies, INFOCOM 2006, 23\u201329 April 2006, Barcelona, Catalunya, Spain (2006)","DOI":"10.1109\/INFOCOM.2006.261"}],"container-title":["Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","Security and Privacy in Communication Networks"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-59608-2_13","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,26]],"date-time":"2019-09-26T01:01:26Z","timestamp":1569459686000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-59608-2_13"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319596075","9783319596082"],"references-count":29,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-59608-2_13","relation":{},"ISSN":["1867-8211","1867-822X"],"issn-type":[{"type":"print","value":"1867-8211"},{"type":"electronic","value":"1867-822X"}],"subject":[],"published":{"date-parts":[[2017]]}}}