{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,19]],"date-time":"2025-02-19T20:40:02Z","timestamp":1739997602190,"version":"3.37.3"},"publisher-location":"Berlin, Heidelberg","reference-count":14,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642121784"},{"type":"electronic","value":"9783642121791"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-12179-1_30","type":"book-chapter","created":{"date-parts":[[2010,3,31]],"date-time":"2010-03-31T19:23:41Z","timestamp":1270063421000},"page":"352-367","source":"Crossref","is-referenced-by-count":0,"title":["A Light-Weighted Misused Key Detection in Wireless Sensor Networks"],"prefix":"10.1007","author":[{"given":"Young-Ju","family":"Han","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Min-Woo","family":"Park","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Jong-Myoung","family":"Kim","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Tai-Myoung","family":"Chung","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","reference":[{"key":"30_CR1","doi-asserted-by":"crossref","unstructured":"Cerpa, A., Elson, J., Estrin, D., Girod, L., Hamilton, M., Zhao, J.: Habitat Monitoring: Application Driver for Wireless Communications Technology. In: Proceedings of the ACM SIGCOMMWorkshop on Data Communications in Latin America and the Caribbean, San Jose, Costa Rica (2001)","DOI":"10.1145\/371626.371720"},{"key":"30_CR2","doi-asserted-by":"crossref","unstructured":"Shen, C., Srisathapornphat, C., Jaikaeo, C.: Sensor Information Networking Architecture and applications. In: IEEE Personal Communications, August 2001, pp. 52\u201359 (2001)","DOI":"10.1109\/98.944004"},{"key":"30_CR3","doi-asserted-by":"publisher","first-page":"52","DOI":"10.1145\/948109.948119","volume-title":"Proceedings of the 10th ACM conference on Computer and communications security","author":"D. Liu","year":"2003","unstructured":"Liu, D., Ning, P.: Establishing pairwise keys in distributed sensor networks. In: Proceedings of the 10th ACM conference on Computer and communications security, pp. 52\u201361. ACM Press, New York (2003)"},{"key":"30_CR4","doi-asserted-by":"crossref","unstructured":"Liu, D., Ning, P., Du, W.: Group-Based Key Pre-Distribution in Wireless Sensor Networks. In: Proc. 2005 ACM Wksp. Wireless Security (WiSe 2005), September 2005, pp. 11\u201320 (2005)","DOI":"10.1145\/1080793.1080798"},{"key":"30_CR5","doi-asserted-by":"crossref","unstructured":"Lui, D., Dong, Q.: Detecting Misused Keys in Wireless Sensor Networks. In: Performance, Computing, and Communications Conference (IPCCC 2007), April 2007, pp. 272\u2013280 (2007)","DOI":"10.1109\/PCCC.2007.358904"},{"key":"30_CR6","unstructured":"Chan, H., Perrig, A., Song, D.: Random Key Predistribution Schemes for Sensor Networks. In: Proc. IEEE Sec. and Privacy Symp., pp. 197\u2013213 (2003)"},{"key":"30_CR7","doi-asserted-by":"crossref","unstructured":"Akyildiz, I.F., Su, W., Sankasubramaniam, Y., Cayirci, E.: Wireless Sensor Networks: A Survey. Computer Networks, 393\u2013422 (2002)","DOI":"10.1016\/S1389-1286(01)00302-4"},{"key":"30_CR8","doi-asserted-by":"crossref","unstructured":"Eschenauer, L., Gligor, V.: A Key Management Scheme for Distributed Sensor Networks. In: Proc. 9th ACM Conf. Comp. and Commun. Sec., November 2002, pp. 41\u201347 (2002)","DOI":"10.1145\/586110.586117"},{"key":"30_CR9","doi-asserted-by":"publisher","first-page":"122","DOI":"10.1109\/MCOM.2006.1632659","volume":"44","author":"M. Eltoweissy","year":"2006","unstructured":"Eltoweissy, M., Moharrum, M., Mukkamala, R.: Dynamic Key Management in Sensor Networks. IEEE Communications Magazine\u00a044, 122\u2013130 (2006)","journal-title":"IEEE Communications Magazine"},{"key":"30_CR10","doi-asserted-by":"crossref","unstructured":"Camtepe, S.A., Yener, B.: Key distribution Mechanisms for Wireless Sensor Networks: A Survey, Technical Report TR-05-07, Rensselaer Polytechnic Institute (March 2005)","DOI":"10.1109\/ICC.2006.255107"},{"key":"30_CR11","doi-asserted-by":"crossref","unstructured":"Mhatre, V., Rosenberg, C.: Design Guidelines for Wireless Sensor Networks: Communication, Clustering and Aggregation. Ad. Hoc. Networks, 45\u201363 (2004)","DOI":"10.1016\/S1570-8705(03)00047-7"},{"key":"30_CR12","doi-asserted-by":"publisher","first-page":"660","DOI":"10.1109\/TWC.2002.804190","volume":"1","author":"W.B. Heinzelman","year":"2002","unstructured":"Heinzelman, W.B., Chandrakasan, A.P., Balakrishnan, H.: An application-Specific Protocol Architecture for Wireless Microsensor Networks. IEEE Transaction on Wireless Communications\u00a01, 660\u2013670 (2002)","journal-title":"IEEE Transaction on Wireless Communications"},{"key":"30_CR13","unstructured":"Du, W., Deng, J., Han, Y.S., Chen, S., Varshney, P.K.: A Key Management Scheme for Wireless Sensor Networks Using Deployment Knowledge. In: IEEE INFOCOM 2004, vol.\u00a01, pp. 7\u201311 (March 2004)"},{"issue":"11-12","key":"30_CR14","first-page":"2314","volume":"30","author":"Y. Xiao","year":"2007","unstructured":"Xiao, Y., Rayi, V.K., Sun, B., Du, X., Hu, F., Galloway, M.: A survey of key management schemes in wireless sensor networks. Computer Communications Special issue on security on wireless ad hoc and sensor networks\u00a030(11-12), 2314\u20132341 (2007)","journal-title":"Computer Communications Special issue on security on wireless ad hoc and sensor networks"}],"container-title":["Lecture Notes in Computer Science","Computational Science and Its Applications \u2013 ICCSA 2010"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-12179-1_30.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,19]],"date-time":"2025-02-19T20:11:42Z","timestamp":1739995902000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-12179-1_30"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642121784","9783642121791"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-12179-1_30","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2010]]}}}