{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T04:52:34Z","timestamp":1725511954469},"publisher-location":"Berlin, Heidelberg","reference-count":18,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540710929"},{"type":"electronic","value":"9783540710936"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-3-540-71093-6_21","type":"book-chapter","created":{"date-parts":[[2007,5,29]],"date-time":"2007-05-29T18:58:59Z","timestamp":1180465139000},"page":"267-281","source":"Crossref","is-referenced-by-count":0,"title":["A Key Management Based on Multiple Regression in Hierarchical Sensor Network"],"prefix":"10.1007","author":[{"given":"Mihui","family":"Kim","sequence":"first","affiliation":[]},{"given":"Inshil","family":"Doh","sequence":"additional","affiliation":[]},{"given":"Kijoon","family":"Chae","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"doi-asserted-by":"crossref","unstructured":"Perrig, A., Szewczyk, R., Wen, V., Culler, D., Tygar, J.D.: SPINS: Security Protocols for Sensor Networks. In: MobiCom 2001, pp. 189\u2013199 (2001)","key":"21_CR1","DOI":"10.1145\/381677.381696"},{"issue":"4","key":"21_CR2","first-page":"421","volume":"43","author":"S. Avancha","year":"2003","unstructured":"Avancha, S., Undercoffer, J., Joshi, A., Pinkston, J.: Secure sensor networks for perimeter protection. International Journal of Computer and Telecommunications Networking\u00a043(4), 421\u2013435 (2003)","journal-title":"International Journal of Computer and Telecommunications Networking"},{"key":"21_CR3","doi-asserted-by":"publisher","first-page":"42","DOI":"10.1145\/948109.948118","volume-title":"10th ACM Conference on Computer and Communications Security","author":"W. Du","year":"2003","unstructured":"Du, W., Deng, J., Han, Y.S., Varshney, P.: A Pairwise Key Pre-distribution Scheme for Wireless Sensor Networks. In: 10th ACM Conference on Computer and Communications Security, pp. 42\u201351. ACM Press, New York (2003)"},{"doi-asserted-by":"crossref","unstructured":"Liu, D., Ning, P.: Establishing Pairwise Keys in Distributed Sensor Networks. In: CCS\u201903, pp. 52\u201361 (2003)","key":"21_CR4","DOI":"10.1145\/948109.948119"},{"unstructured":"Chen, X., Drissi, J.: An Efficient Key Management Scheme in Hierarchical Sensor Networks. In: MASS 2005 (2005)","key":"21_CR5"},{"issue":"1","key":"21_CR6","doi-asserted-by":"publisher","first-page":"7","DOI":"10.1145\/974121.974123","volume":"33","author":"M. Tubaishat","year":"2004","unstructured":"Tubaishat, M., Yin, J., Panja, B., Madria, S.: A Secure Hierarchical Model for Sensor Networ. SIGMOD Record\u00a033(1), 7\u201313 (2004)","journal-title":"SIGMOD Record"},{"key":"21_CR7","volume-title":"Introduction to Regression Analysis","author":"M.A. Golberg","year":"2004","unstructured":"Golberg, M.A.: Introduction to Regression Analysis. WIT Press, Southampton (2004)"},{"key":"21_CR8","first-page":"83","volume-title":"ACM Workshop on the Security of Ad hoc and Sensor Network","author":"J.D. Richard","year":"2003","unstructured":"Richard, J.D., Mishra, S.: Security Support for In-Network Processing in Wireless Sensor Networks. In: ACM Workshop on the Security of Ad hoc and Sensor Network, pp. 83\u201393. ACM Press, New York (2003)"},{"key":"21_CR9","volume-title":"ACM Workshop on Wireless Security","author":"M. Bohge","year":"2003","unstructured":"Bohge, M., Trappe, W.: An Authentication Framework for Hierarchical Ad-hoc Sensor Networks. In: ACM Workshop on Wireless Security, ACM Press, New York (2003)"},{"doi-asserted-by":"crossref","unstructured":"Hou, Y.T., Shi, Y., Sherali, H.D.: Rate Allocation in Wireless Sensor Networks with Network Lifetime Requirement. In: MobiHoc, pp. 67\u201377 (2004)","key":"21_CR10","DOI":"10.1145\/989459.989469"},{"key":"21_CR11","volume-title":"ACM\/IEEE Mobicom","author":"F. Ye","year":"2002","unstructured":"Ye, F., Luo, H., Cheng, J., Lu, S., Zhang, L.: A Two-tier Data Dissemination Model for Large-scale Wireless Sensor Networks. In: ACM\/IEEE Mobicom, IEEE Computer Society Press, Los Alamitos (2002)"},{"doi-asserted-by":"crossref","unstructured":"Intanagonwiwat, C., Govindan, R., Estrin, D., Heidemann, J., Silva, F.: Directed Diffusion for Wireless Sensor Networking. ACM\/IEEE Transactions on Networking, 2\u201316 (2002)","key":"21_CR12","DOI":"10.1109\/TNET.2002.808417"},{"unstructured":"Ding, J., Sivalingam, K., Li, B.: Design and Analysis of an Integrated MAC and Routing Protocol Framework for Wireless Sensor Networks. Int. Journal on Ad Hoc & Sensor Wireless Networks (2005)","key":"21_CR13"},{"unstructured":"MICA2 Series (MPR4x0), http:\/\/www.xbow.com\/Products\/productsdetails.aspx?sid=72","key":"21_CR14"},{"unstructured":"TinyOS Tutorial, http:\/\/www.tinyos.net\/tinyos-1.x\/doc\/tutorial\/","key":"21_CR15"},{"doi-asserted-by":"crossref","unstructured":"Karlof, C., Sastry, N., Wagner, D.: TinySec: A Link Layer Security Architecture for Wireless Sensor Networks. In: SenSys04\u2019, Nov. (2004)","key":"21_CR16","DOI":"10.1145\/1031495.1031515"},{"doi-asserted-by":"crossref","unstructured":"Shnayder, V., Hempstead, M., Chen, B., Welsh, M.: Simulating the Power Consumption of LargeScale Sensor Network Applications. In: SenSys 04\u2019, Nov. (2004)","key":"21_CR17","DOI":"10.1145\/1031495.1031518"},{"unstructured":"Chan, H., Perrig, A.: PIKE: Peer Intermediaries for Key Establishment. In: INFOCOM 2005 (2005)","key":"21_CR18"}],"container-title":["Lecture Notes in Computer Science","Information Security Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-71093-6_21.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,19]],"date-time":"2020-11-19T05:15:26Z","timestamp":1605762926000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-71093-6_21"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540710929","9783540710936"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-71093-6_21","relation":{},"subject":[]}}