{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,28]],"date-time":"2025-03-28T00:55:36Z","timestamp":1743123336818,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":57,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642148484"},{"type":"electronic","value":"9783642148491"}],"license":[{"start":{"date-parts":[[2010,11,8]],"date-time":"2010-11-08T00:00:00Z","timestamp":1289174400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2010,11,8]],"date-time":"2010-11-08T00:00:00Z","timestamp":1289174400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.1007\/978-3-642-14849-1_22","type":"book-chapter","created":{"date-parts":[[2011,4,27]],"date-time":"2011-04-27T15:47:28Z","timestamp":1303919248000},"page":"697-739","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Security and Trust in Sensor Networks"],"prefix":"10.1007","author":[{"given":"Przemys\u0142aw","family":"B\u0142a\u015bkiewicz","sequence":"first","affiliation":[]},{"given":"Miros\u0142aw","family":"Kuty\u0142owski","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2010,11,8]]},"reference":[{"key":"22_CR1","doi-asserted-by":"crossref","unstructured":"M. Ajtai. Generating hard instances of lattice problems (extended abstract). In: STOC \u201996: Proceedings of the 28th Annual ACM Symposium on Theory of Computing, ACM, New York, NY, pages 99\u2013108, 1996.","DOI":"10.1145\/237814.237838"},{"key":"22_CR2","doi-asserted-by":"crossref","unstructured":"R. Anderson, Haowen Chan, and A. Perrig. Key infection: Smart trust for smart dust. In: Network Protocols, 2004. ICNP 2004. Proceedings of the 12th IEEE International Conference, pages 206\u2013215 (October 2004).","DOI":"10.1109\/ICNP.2004.1348111"},{"key":"22_CR3","first-page":"6","volume-title":"Esas","author":"L. Batina","year":"2006","unstructured":"L. Batina, N. Mentens, K. Sakiyama, B. Preneel, and I. Verbauwhede. Lowcost elliptic curve cryptography for wireless sensor networks. In Butty\u00e1n L., Gligor V. D., and Westhoff D., editors. ESAS, volume 4357 of Lecture Notes in Computer Science. Springer, Berlin, pages 6\u201317, 2006."},{"key":"22_CR4","first-page":"33","volume-title":"Isc","author":"J. Bender","year":"2009","unstructured":"J. Bender, M. Fischlin, and D. K\u00fcgler. Security analysis of the pace key-agreement protocol. In Samarati P., Yung M., Martinelli F., and Ardagna C. A., editors. ISC, volume 5735 of Lecture Notes in Computer Science. Springer, Berlin, pages 33\u201348, 2009."},{"key":"22_CR5","unstructured":"E.-O. Bla\u00df and M. Zitterbart. Efficient Implementation of Elliptic Curve Cryptography for Wireless Sensor Networks. Telematics Technical Reports TM-2005-1 (March 2005)."},{"key":"22_CR6","doi-asserted-by":"crossref","unstructured":"Rolf Blom. An optimal class of symmetric key generation systems. In: Eurocrypt, pages 335\u2013338, 1984.","DOI":"10.1007\/3-540-39757-4_22"},{"key":"22_CR7","doi-asserted-by":"publisher","first-page":"422","DOI":"10.1145\/362686.362692","volume":"13","author":"B. H. Bloom","year":"1970","unstructured":"B. H. Bloom. Space\/time trade-offs in hash coding with allowable errors. Communications of the ACM, 13:422\u2013426, 1970.","journal-title":"Communications of the ACM"},{"key":"22_CR8","doi-asserted-by":"crossref","unstructured":"B. Bruhadeshwar, K. Kothapalli, and M. S. Deepya. Reducing the cost of session key establishment. In: ARES. IEEE Computer Society, Los Alamitos, CA, pages 369\u2013373, 2009.","DOI":"10.1109\/ARES.2009.162"},{"key":"22_CR9","first-page":"227","volume-title":"Adhoc-Now","author":"M. Burmester","year":"2009","unstructured":"M. Burmester, B. de Medeiros, J. Munilla, and A. Peinado. Secure epc gen2 compliant radio frequency identification. In Ruiz P. M. and Garcia-Luna-Aceves J. J., editors. ADHOC-NOW, volume 5793 of Lecture Notes in Computer Science. Springer, Berlin, pages 227\u2013240, 2009."},{"issue":"2","key":"22_CR10","doi-asserted-by":"publisher","first-page":"346","DOI":"10.1109\/TNET.2007.892879","volume":"15","author":"S. A. \u00c7amtepe","year":"2007","unstructured":"S. A. \u00c7amtepe and B. Yener. Combinatorial design of key distribution mechanisms for wireless sensor networks. IEEE\/ACM Transaction on Networks, 15(2):346\u2013358, 2007.","journal-title":"IEEE\/ACM Transaction on Networks"},{"key":"22_CR11","first-page":"293","volume-title":"Esorics","author":"S. A. \u00c7amtepe","year":"2004","unstructured":"S. A. \u00c7amtepe and B. Yener. Combinatorial design of key distribution mechanisms for wireless sensor networks. In Samarati P., Ryan P. Y. A., Gollmann D., and Molva R., editors. ESORICS, volume 3193 of Lecture Notes in Computer Science. Springer, Berlin, pages 293\u2013308, 2004."},{"key":"22_CR12","unstructured":"H. Chan, A. Perrig, D. X. Song. Random key predistribution schemes for sensor networks. In IEEE Symposium on Security and Privacy. IEEE Computer Society, Paris, pages 197\u2013213, 2003."},{"key":"22_CR13","unstructured":"J. Cicho\u0144, J. Grza\u015blewicz, and M. Kuty\u0142owski. Forward-secure key evolution in wireless sensor networks. In Algosensors, 2009."},{"key":"22_CR14","doi-asserted-by":"publisher","first-page":"298","DOI":"10.1007\/978-3-540-79576-6_18","volume-title":"Pervasive","author":"J. Cicho\u0144","year":"2008","unstructured":"J. Cicho\u0144, M. Klonowski, and M. Kuty\u0142owski. Privacy protection for rfid with hidden subset identifiers. In Indulska J., Patterson D. J., Rodden T., and Ott M., editors. Pervasive, volume 5013 of Lecture Notes in Computer Science, Springer, Berlin, pages 298\u2013314, 2008."},{"issue":"3","key":"22_CR15","doi-asserted-by":"publisher","first-page":"18","DOI":"10.1145\/1151374.1151381","volume":"40","author":"J. Clulow","year":"2006","unstructured":"J. Clulow and T. Moore. Suicide for the common good: a new strategy for credential revocation in self-organizing systems. SIGOPS Operating Systems Review, 40(3):18\u201321, 2006.","journal-title":"SIGOPS Operating Systems Review"},{"key":"22_CR16","first-page":"47","volume-title":"Algosensors","author":"T. Dimitriou","year":"2006","unstructured":"T. Dimitriou. Securing communication trees in sensor networks. In Nikoletseas S. Jos\u00e9 E., and Rolim D. P., editors. Algosensors, volume 4240 of Lecture Notes in Computer Science. Springer, Berlin, pages 47\u201358, 2006."},{"key":"22_CR17","doi-asserted-by":"crossref","unstructured":"W. Du, J. Deng, Y. S. Han, and P. K. Varshney. A pairwise key predistribution scheme for wireless sensor networks. In: CCS \u201903: Proceedings of the 10th ACM Conference on Computer and Communications Security. ACM, New York, NY, pages 42\u201351, 2003.","DOI":"10.1145\/948109.948118"},{"key":"22_CR18","unstructured":"M. Dworkin, National Institute of Standards, and Technology (U.S.). Recommendation for block cipher modes of operation [electronic resource]: The CCM mode for authentication and confidentiality\/Morris Dworkin. U.S. Department of Commerce, Technology Administration, National Institute of Standards and Technology, Gaithersburg, MD, 2004."},{"key":"22_CR19","doi-asserted-by":"crossref","unstructured":"E. S. Elmallah, M. G. Gouda, and S. S. Kulkarni. Logarithmic keying. TAAS, 3(4), 2008.","DOI":"10.1145\/1452001.1452008"},{"key":"22_CR20","first-page":"41","volume-title":"ACM Conference on Computer and Communications Security","author":"L. Eschenauer","year":"2002","unstructured":"L. Eschenauer and V. D. Gligor. A key-management scheme for distributed sensor networks. In Atluri V., editor. ACM Conference on Computer and Communications Security, ACM, New York, NY, pages 41\u201347 (2002)."},{"key":"22_CR21","doi-asserted-by":"crossref","unstructured":"G. Gaubatz, J.-P. Kaps, E. Ozturk, and B. Sunar. State of the art in ultra-low power public key cryptography for wireless sensor networks. In: PERCOMW \u201905: Proceedings of the Third IEEE International Conference on Pervasive Computing and Communications Workshops, IEEE Computer Society, Washington, DC, pages 146\u2013150, 2005.","DOI":"10.1109\/PERCOMW.2005.76"},{"key":"22_CR22","first-page":"361","volume-title":"Eurocrypt","author":"H. Gilbert","year":"2008","unstructured":"H. Gilbert, M. J. B. Robshaw, and Y. Seurin. Hb\u0223: Increasing the security and efficiency of hb+. In Smart N. P., editor. Eurocrypt, volume 4965 of Lecture Notes in Computer Science. Springer, Berlin, pages 361\u2013378, 2008."},{"key":"22_CR23","doi-asserted-by":"crossref","unstructured":"T. Heer, S. G\u00f6tz, O. G. Morchon, and K. Wehrle. Alpha: An adaptive and lightweight protocol for hop-by-hop authentication. In CONEXT \u201908: Proceedings of the 2008 ACM CoNEXT Conference, ACM, New York, NY, pages 1\u201312, 2008.","DOI":"10.1145\/1544012.1544035"},{"key":"22_CR24","first-page":"122","volume-title":"Ct-Rsa","author":"J. Hoffstein","year":"2003","unstructured":"J. Hoffstein, N. Howgrave-Graham, J. Pipher, J. H. Silverman, and W. Whyte. Ntrusign: Digital signatures using the ntru lattice. In Joye M., editor. CT-RSA, volume 2612 of Lecture Notes in Computer Science. Springer, Berlin, pages 122\u2013140, 2003."},{"key":"22_CR25","first-page":"267","volume-title":"Ants","author":"J. Hoffstein","year":"1998","unstructured":"J. Hoffstein, J. Pipher, and J. H. Silverman. Ntru: A ring-based public key cryptosystem. In Buhler J., editor. ANTS, volume 1423 of Lecture Notes in Computer Science. Springer, Berlin, pages 267\u2013288, 1998."},{"key":"22_CR26","first-page":"52","volume-title":"Asiacrypt, volume 2248 of Lecture Notes in Computer Science","author":"N. J. Hopper","year":"2001","unstructured":"N. J. Hopper, and M. Blum. Secure human identification protocols. In Boyd C., editor. Asiacrypt, volume 2248 of Lecture Notes in Computer Science. Springer, Berlin, pages 52\u201366, 2001."},{"key":"22_CR27","first-page":"296","volume-title":"Ewsn","author":"W. Hu","year":"2009","unstructured":"W. Hu, P. I. Corke, W. C. Shih, and L. Overs. secfleck: A public key technology platform for wireless sensor networks. In Roedig U. and Sreenan C. J., editors. EWSN, volume 5432 of Lecture Notes in Computer Science. Springer, Berlin, pages 296\u2013311, 2009."},{"key":"22_CR28","first-page":"102","volume-title":"Cans","author":"M. Klonowski","year":"2007","unstructured":"M. Klonowski, M. Kuty\u0142owski, M. Ren, and K. Rybarczyk. Forwardsecure key evolution in wireless sensor networks. In Bao F., Ling S., Okamoto T., Wang H., and Xing C., editors. CANS, volume 4856 of Lecture Notes in Computer Science. Springer, Berlin, pages 102\u2013120, 2007."},{"key":"22_CR29","doi-asserted-by":"publisher","first-page":"203","DOI":"10.1090\/S0025-5718-1987-0866109-5","volume":"48","author":"N. Koblitz","year":"1987","unstructured":"N. Koblitz. Elliptic curve cryptosystems. Mathematics of Computation, 48:203\u2013209, 1987.","journal-title":"Mathematics of Computation"},{"key":"22_CR30","unstructured":"J. Kohl, F. J. Kohl, C. Neuman, and J. Steiner. Kerberos version 5 rfc, draft 3, 1990."},{"key":"22_CR31","unstructured":"M. Koza, M. Klonowski, and M. Kuty\u0142owski. Security challenges for wireless sensor networks. Dynamic routing as a security paradigm. ERCIM News, 76, 2009."},{"key":"22_CR32","doi-asserted-by":"publisher","first-page":"182","DOI":"10.1007\/978-3-642-05445-7_12","volume-title":"Selected areas in cryptography","author":"M. Krause","year":"2009","unstructured":"M. Krause and D. Stegemann. More on the security of linear rfid authentication protocols. In Jacobson Jr. M. J., Rijmen V., and Safavi-Naini R., editors. Selected areas in cryptography, volume 5867 of Lecture Notes in Computer Science. Springer, Berlin, pages 182\u2013196, 2009."},{"key":"22_CR33","unstructured":"S. Kulkarni, B. Bezawada, and M. G. Gouda. Optimal key distribution for secure communication. University of Texas, Austin MSU-CSE-07-189 (July 2007)."},{"issue":"1","key":"22_CR34","doi-asserted-by":"publisher","first-page":"65","DOI":"10.1145\/1138127.1138130","volume":"2","author":"Y. W. Law","year":"2006","unstructured":"Y. W. Law, J. Doumen, and P. Hartel. Survey and benchmark of block ciphers for wireless sensor networks. ACM Transaction on Sensor Networks, 2(1):65\u201393, 2006.","journal-title":"ACM Transaction on Sensor Networks"},{"key":"22_CR35","doi-asserted-by":"crossref","unstructured":"A. Liu and P. Ning. Tinyecc: A configurable library for elliptic curve cryptography in wireless sensor networks. In IPSN \u201908: Proceedings of the 7th International Conference on Information Processing in Sensor Networks, IEEE Computer Society, Washington, DC, pages 245\u2013256, 2008.","DOI":"10.1109\/IPSN.2008.47"},{"key":"22_CR36","doi-asserted-by":"crossref","unstructured":"D. Liu, P. Ning. Establishing pairwise keys in distributed sensor networks. In CCS \u201903: Proceedings of the 10th ACM Conference on Computer and Communications Security. ACM, New York, NY, pages 52\u201361, 2003.","DOI":"10.1145\/948109.948119"},{"key":"22_CR37","doi-asserted-by":"crossref","unstructured":"D. Liu, P. Ning, and W. Du. Group-based key pre-distribution in wireless sensor networks. In WiSe \u201905: Proceedings of the 4th ACM Workshop on Wireless Security. ACM, New York, NY, pages 11\u201320, 2005.","DOI":"10.1145\/1080793.1080798"},{"key":"22_CR38","doi-asserted-by":"crossref","unstructured":"M. Luk, G. Mezzour, A. Perrig, and V. Gligor. Minisec: A secure sensor network communication architecture. In IPSN \u201907: Proceedings of the 6th International Conference on Information Processing in Sensor Networks. ACM, New York, NY, pages 479\u2013488, 2007.","DOI":"10.1145\/1236360.1236421"},{"key":"22_CR39","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-4615-0897-7","volume-title":"Complexity of Lattice Problems","author":"D. Micciancio","year":"2002","unstructured":"D. Micciancio and S. Goldwasser. Complexity of Lattice Problems. Kluwer, Norwell, MA, (2002)."},{"key":"22_CR40","doi-asserted-by":"crossref","unstructured":"M. J. Miller and N. H. Vaidya. Leveraging channel diversity for key establishment in wireless sensor networks. In: INFOCOM 2006. 25th IEEE International Conference on Computer Communications. Proceedings, pages 1\u201312 (April 2006).","DOI":"10.1109\/INFOCOM.2006.259"},{"key":"22_CR41","doi-asserted-by":"crossref","unstructured":"V. S. Miller. Use of elliptic curves in cryptography. In: CRYPTO \u201985: Advances in Cryptology. Springer, London, pages 417\u2013426, 1986.","DOI":"10.1007\/3-540-39799-X_31"},{"key":"22_CR42","unstructured":"ZigBee Standards Organization. Zigbee specification document 053474r17. Specification Document 053474r17, ZigBee Alliance (January 2007)."},{"key":"22_CR43","doi-asserted-by":"crossref","unstructured":"B. Parno, A. Perrig, and V. D. Gligor. Distributed detection of node replication attacks in sensor networks. In: IEEE Symposium on Security and Privacy. IEEE Computer Society, Washington, DC, pages 49\u201363, 2005.","DOI":"10.1109\/SP.2005.8"},{"key":"22_CR44","doi-asserted-by":"crossref","unstructured":"A. Perrig, R. Canetti, D. Tygar, and D. Song. The Tesla broadcast authentication protocol, 2002.","DOI":"10.1007\/978-1-4615-0229-6_3"},{"key":"22_CR45","unstructured":"A. Perrig, R. Canetti, D. X. Song, and J. D. Tygar. Efficient and secure source authentication for multicast. In: NDSS. The Internet Society, Reston, VA, 2001."},{"issue":"5","key":"22_CR46","doi-asserted-by":"publisher","first-page":"521","DOI":"10.1023\/A:1016598314198","volume":"8","author":"A. Perrig","year":"2002","unstructured":"A. Perrig, R. Szewczyk, J. D. Tygar, V. Wen, and D. E. Culler. Spins: Security protocols for sensor networks. Wireless Networks, 8(5):521\u2013534, 2002.","journal-title":"Wireless Networks"},{"key":"22_CR47","first-page":"257","volume-title":"Isc","author":"M. Ren","year":"2006","unstructured":"M. Ren, T. K. Das, and J. Zhou. Diverging keys in wireless sensor networks. In Katsikas S. K., Lopez J., Backes M., Gritzalis S., and Preneel B., editors. ISC, volume 4176 of Lecture Notes in Computer Science. Springer, Berlin, pages 257\u2013269, 2006."},{"issue":"3","key":"22_CR48","doi-asserted-by":"publisher","first-page":"365","DOI":"10.1145\/937527.937529","volume":"6","author":"P. Rogaway","year":"2003","unstructured":"P. Rogaway, M. Bellare, and J. Black. Ocb: A block-cipher mode of operation for efficient authenticated encryption. ACM Transactions on Information and Systems Security, 6(3):365\u2013403, 2003.","journal-title":"ACM Transactions on Information and Systems Security"},{"issue":"4","key":"22_CR49","doi-asserted-by":"publisher","first-page":"231","DOI":"10.1007\/s11036-007-0024-2","volume":"12","author":"R. Roman","year":"2007","unstructured":"R. Roman, C. Alcaraz, and J. Lopez. A survey of cryptographic primitives and implementations for hardware-constrained sensor network nodes. Mobile Networks and Applications, 12(4):231\u2013244, 2007.","journal-title":"Mobile Networks and Applications"},{"key":"22_CR50","doi-asserted-by":"publisher","first-page":"140","DOI":"10.1145\/1352533.1352556","volume-title":"Wisec","author":"B. Song","year":"2008","unstructured":"B. Song and C. J. Mitchell. Rfid authentication protocol for low-cost tags. In Gligor V. D., Hubaux J.-P., and Poovendran R., editors. WISEC. ACM, New York, NY, pages 140\u2013147, 2008."},{"issue":"6","key":"22_CR51","doi-asserted-by":"publisher","first-page":"663","DOI":"10.1109\/TMC.2007.1020","volume":"6","author":"P. Traynor","year":"2007","unstructured":"P. Traynor, R. Kumar, H. Choi, G. Cao, S. Zhu, and T. La Porta. Efficient hybrid security mechanisms for heterogeneous sensor networks. IEEE Transactions on Mobile Computing, 6(6):663\u2013677, 2007.","journal-title":"IEEE Transactions on Mobile Computing"},{"key":"22_CR52","unstructured":"R. Watro, D. Kong, S.-f. Cuti, C. Gardiner, C. Lynn, and P. Kruus. Tinypk: Securing sensor networks with public key technology. In SASN \u201904: Proceedings of the 2nd ACM Workshop on Security of Ad Hoc and Sensor Networks. ACM, New York, NY, pages 59\u201364, 2004."},{"key":"22_CR53","unstructured":"J. Wolkerstorfer. Invited talk: Scaling ecc hardware to a minimum., 2005. Presentation."},{"issue":"3","key":"22_CR54","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/1341731.1341733","volume":"11","author":"Q. Zhang","year":"2008","unstructured":"Q. Zhang, T. Yu, and P. Ning. A framework for identifying compromised nodes in wireless sensor networks. ACM Transactions on Information and System Security, 11(3):1\u201337, 2008.","journal-title":"ACM Transactions on Information and System Security"},{"key":"22_CR55","doi-asserted-by":"crossref","unstructured":"W. Zhang, N. Subramanian, and G. Wang. Lightweight and compromise resilient message authentication in Sensor Networks, In: INFOCOM pages 1418\u20131426 (May 2008).","DOI":"10.1109\/INFOCOM.2008.200"},{"key":"22_CR56","doi-asserted-by":"crossref","unstructured":"S. Zhu, S. Setia, and S. Jajodia. Leap: efficient security mechanisms for largescale distributed sensor networks. In: CCS \u201903: Proceedings of the 10th ACM Conference on Computer and Communications Security. ACM Press, New York, NY, pages 62\u201372, 2003.","DOI":"10.1145\/948109.948120"},{"issue":"3","key":"22_CR57","doi-asserted-by":"publisher","first-page":"14","DOI":"10.1145\/1267060.1267062","volume":"3","author":"S. Zhu","year":"2007","unstructured":"S. Zhu, S. Setia, S. Jajodia, and P. Ning. Interleaved hop-by-hop authentication against false data injection attacks in sensor networks. ACM Transaction on Sensor Networks, 3(3):14, 2007.","journal-title":"ACM Transaction on Sensor Networks"}],"container-title":["Monographs in Theoretical Computer Science. An EATCS Series","Theoretical Aspects of Distributed Computing in Sensor Networks"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-14849-1_22","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,5]],"date-time":"2025-03-05T08:37:39Z","timestamp":1741163859000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-642-14849-1_22"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,11,8]]},"ISBN":["9783642148484","9783642148491"],"references-count":57,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-14849-1_22","relation":{},"ISSN":["1431-2654"],"issn-type":[{"type":"print","value":"1431-2654"}],"subject":[],"published":{"date-parts":[[2010,11,8]]},"assertion":[{"value":"8 November 2010","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}