{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,16]],"date-time":"2026-01-16T01:46:31Z","timestamp":1768527991499,"version":"3.49.0"},"publisher-location":"Berlin, Heidelberg","reference-count":22,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783540691693","type":"print"},{"value":"9783540691709","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-3-540-69170-9_25","type":"book-chapter","created":{"date-parts":[[2008,6,6]],"date-time":"2008-06-06T10:31:15Z","timestamp":1212748275000},"page":"372-385","source":"Crossref","is-referenced-by-count":67,"title":["SAKE: Software Attestation for Key Establishment in Sensor Networks"],"prefix":"10.1007","author":[{"given":"Arvind","family":"Seshadri","sequence":"first","affiliation":[]},{"given":"Mark","family":"Luk","sequence":"additional","affiliation":[]},{"given":"Adrian","family":"Perrig","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"5","key":"25_CR1","doi-asserted-by":"publisher","first-page":"521","DOI":"10.1023\/A:1016598314198","volume":"8","author":"A. Perrig","year":"2002","unstructured":"Perrig, A., Szewczyk, R., Wen, V., Culler, D., Tygar, J.D.: SPINS: Security protocols for sensor networks. Wireless Networks\u00a08(5), 521\u2013534 (2002)","journal-title":"Wireless Networks"},{"key":"25_CR2","doi-asserted-by":"crossref","unstructured":"Eschenauer, L., Gligor, V.: A key-management scheme for distributed sensor networks. In: Proceedings of Conference on Computer and Communication Security, November 2002, pp. 41\u201347 (2002)","DOI":"10.1145\/586110.586117"},{"key":"25_CR3","unstructured":"Chan, H., Perrig, A., Song, D.: Random key predistribution schemes for sensor networks. In: IEEE Symposium on Security and Privacy (May 2003)"},{"key":"25_CR4","doi-asserted-by":"crossref","unstructured":"Liu, D., Ning, P.: Establishing pairwise keys in distributed sensor networks. In: Proceedings of ACM Conference on Computer and Communications Security (CCS), October 2003, pp. 52\u201361 (2003)","DOI":"10.1145\/948109.948119"},{"key":"25_CR5","doi-asserted-by":"crossref","unstructured":"Du, W., Deng, J., Han, Y., Varshney, P.: A pairwise key pre-distribution scheme for wireless sensor networks. In: Proceedings of ACM Conference on Computer and Communications Security (CCS), October 2003, pp. 42\u201351 (2003)","DOI":"10.1145\/948109.948118"},{"key":"25_CR6","doi-asserted-by":"crossref","unstructured":"Karlof, C., Sastry, N., Wagner, D.: TinySec: A link layer security architecture for wireless sensor networks. In: Proceedings of ACM Conference on Embedded Networked Sensor Systems (SenSys) (November 2004)","DOI":"10.1145\/1031495.1031515"},{"key":"25_CR7","doi-asserted-by":"crossref","unstructured":"Cagalj, M., Capkun, S., Rengaswamy, R., Tsigkogiannis, I., Srivastava, M., Hubaux, J.P.: Integrity (I) codes: Message integrity protection and authentication over insecure channels. In: IEEE Symposium on Security and Privacy (May 2006)","DOI":"10.1109\/SP.2006.23"},{"key":"25_CR8","doi-asserted-by":"crossref","unstructured":"Holmquist, L.E., Mattern, F., Schiele, B., Alahuhta, P., Beigl, M., Gellersen, H.W.: Smart-its friends: A technique for users to easily establish connections between smart artefacts. In: Proceedings of Ubicomp (2001)","DOI":"10.1007\/3-540-45427-6_10"},{"key":"25_CR9","doi-asserted-by":"crossref","unstructured":"Lester, J., Hannaford, B., Borriello, G.: Are you with me? Using accelerometers to determine if two devices are carried by the same person. In: Proceedings of Pervasive (2004)","DOI":"10.1007\/978-3-540-24646-6_3"},{"key":"25_CR10","doi-asserted-by":"crossref","unstructured":"Castelluccia, C., Mutaf, P.: Shake them up! a movement-based pairing protocol for cpu-constrained devices. In: Proceedings of ACM\/Usenix Mobisys (2005)","DOI":"10.1145\/1067170.1067177"},{"key":"25_CR11","doi-asserted-by":"crossref","unstructured":"Anderson, R., Chan, H., Perrig, A.: Key infection: Smart trust for smart dust. In: Proceedings of IEEE Conference on Network Protocols (ICNP) (October 2004)","DOI":"10.1109\/ICNP.2004.1348111"},{"key":"25_CR12","doi-asserted-by":"crossref","unstructured":"Kuo, C., Luk, M., Negi, R., Perrig, A.: Message-in-a-bottle: User-friendly and secure key deployment for sensor nodes. In: Proceedings of the ACM Conference on Embedded Networked Sensor System (SenSys) 2007 (2007)","DOI":"10.1145\/1322263.1322286"},{"key":"25_CR13","doi-asserted-by":"crossref","unstructured":"Rasmussen, K., Capkun, S.: Implications of radio fingerprinting on the security of sensor networks. In: Proceedings of the Third International Conference on Security and Privacy for Communication Networks (SecureComm) (September 2007)","DOI":"10.1109\/SECCOM.2007.4550352"},{"key":"25_CR14","doi-asserted-by":"crossref","unstructured":"Seshadri, A., Luk, M., Perrig, A., van Doorn, L., Khosla, P.: SCUBA: Secure code update by attestation in sensor networks. In: ACM Workshop on Wireless Security (WiSe) (September 2006)","DOI":"10.1145\/1161289.1161306"},{"key":"25_CR15","doi-asserted-by":"crossref","unstructured":"Hill, J., Szewczyk, R., Woo, A., Hollar, S., Culler, D., Pister, K.: System architecture directions for networked sensors. In: Architectural Support for Programming Languages and Operating Systems, pp. 93\u2013104 (2000)","DOI":"10.1145\/378993.379006"},{"key":"25_CR16","doi-asserted-by":"crossref","unstructured":"Polastre, J., Szewczyk, R., Culler, D.: Telos: Enabling ultra-low power wireless research. In: Proceedings of International Conference on Information Processing in Sensor Networks: Special track on Platform Tools and Design Methods for Network Embedded Sensors (IPSN\/SPOTS) (April 2005)","DOI":"10.1109\/IPSN.2005.1440950"},{"key":"25_CR17","doi-asserted-by":"crossref","unstructured":"Wan, C.Y., Campbell, A.T., Krishnamurthy, L.: PSFQ: A reliable transport protocol for wireless sensor networks. In: Proceedings of ACM Workshop on Wireless Sensor Networks and Applications (WSNA) (September 2002)","DOI":"10.1145\/570738.570740"},{"issue":"4","key":"25_CR18","doi-asserted-by":"publisher","first-page":"9","DOI":"10.1145\/302350.302353","volume":"32","author":"R. Anderson","year":"1998","unstructured":"Anderson, R., Bergadano, F., Crispo, B., Lee, J., Manifavas, C., Needham, R.: A new family of authentication protocols. ACM Operating Systems Review\u00a032(4), 9\u201320 (1998)","journal-title":"ACM Operating Systems Review"},{"key":"25_CR19","doi-asserted-by":"crossref","unstructured":"Rivest, R.: The RC5 encryption algorithm. In: Proceedings of Workshop on Fast Software Encryption, pp. 86\u201396 (1994)","DOI":"10.1007\/3-540-60590-8_7"},{"key":"25_CR20","doi-asserted-by":"crossref","unstructured":"Perrig, A., Szewczyk, R., Wen, V., Culler, D., Tygar, J.D.: SPINS: Security protocols for sensor networks. In: Proceedings of Conference on Mobile Computing and Networks (Mobicom) (July 2001)","DOI":"10.1145\/381677.381696"},{"key":"25_CR21","unstructured":"Lenstra, A., Verheul, E.: Selecting cryptographic key sizes. Journal of Cryptology: The Journal of the International Association for Cryptologic Research (1999)"},{"key":"25_CR22","doi-asserted-by":"crossref","unstructured":"Zhu, S., Setia, S., Jajodia, S.: LEAP: Efficient security mechanisms for large-scale distributed sensor networks. In: Proceedings of ACM Conference on Computer and Communications Security (CCS) (October 2003)","DOI":"10.1145\/948109.948120"}],"container-title":["Lecture Notes in Computer Science","Distributed Computing in Sensor Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-69170-9_25.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,3]],"date-time":"2021-05-03T04:30:36Z","timestamp":1620016236000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-69170-9_25"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540691693","9783540691709"],"references-count":22,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-69170-9_25","relation":{},"subject":[]}}