{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T17:47:25Z","timestamp":1743097645996,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":32,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642148484"},{"type":"electronic","value":"9783642148491"}],"license":[{"start":{"date-parts":[[2010,11,8]],"date-time":"2010-11-08T00:00:00Z","timestamp":1289174400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2010,11,8]],"date-time":"2010-11-08T00:00:00Z","timestamp":1289174400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.1007\/978-3-642-14849-1_23","type":"book-chapter","created":{"date-parts":[[2011,4,27]],"date-time":"2011-04-27T15:47:28Z","timestamp":1303919248000},"page":"741-785","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Key Management in Sensor Networks"],"prefix":"10.1007","author":[{"given":"Dahai","family":"Xu","sequence":"first","affiliation":[]},{"given":"Jeffrey","family":"Dwoskin","sequence":"additional","affiliation":[]},{"given":"Jianwei","family":"Huang","sequence":"additional","affiliation":[]},{"given":"Tian","family":"Lan","sequence":"additional","affiliation":[]},{"given":"Ruby","family":"Lee","sequence":"additional","affiliation":[]},{"given":"Mung","family":"Chiang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2010,11,8]]},"reference":[{"key":"23_CR1","doi-asserted-by":"crossref","unstructured":"R. Blom. An optimal class of symmetric key generation system. In Advanced in Cryptology\u2014Eurocrypt\u201984, LNCS, vol. 209, pages, 335\u2013338, 1984.","DOI":"10.1007\/3-540-39757-4_22"},{"key":"23_CR2","doi-asserted-by":"crossref","unstructured":"S. \u00c7amtepe and B. Yener. Combinatorial design of key distribution mechanisms for wireless sensor networks. In: European Symposium On Research in Computer Security (ESORICS\u201904), Sophia Antipolis, France, 2004.","DOI":"10.1007\/978-3-540-30108-0_18"},{"key":"23_CR3","unstructured":"S. A. \u00c7amtepe and B. Yener. Key distribution mechanisms for wireless sensor networks: a survey. Technical Report TR-05-07, Rensselaer Polytechnic Institute, Computer Science Department, 2005. Available at http:\/\/www.cs.rpi.edu\/research\/pdf\/05-07.pdf. Accessed in 2006"},{"key":"23_CR4","unstructured":"H. Chan, A. Perrig, and D. Song. Random key predistribution schemes for sensor networks. In IEEE Symposium on Security and Privacy, pages 197\u2013213, Oakland, CA, 2003."},{"key":"23_CR5","unstructured":"W. Du, J. Deng, Y. Han, S. Chen, and P. Varshney. A key management scheme for wireless sensor networks using deployment knowledge. In: INFOCOM 2004. Twenty-third AnnualJoint Conference of the IEEE Computer and Communications Societies, Hong Kong, 2004."},{"key":"23_CR6","doi-asserted-by":"crossref","unstructured":"W. Du, J. Deng, Y. S. Han, and P. K. Varshney. A pairwise key pre-distribution scheme for wireless sensor networks. In: CCS\u201903: ACM conference on Computer and communications security, New York, NY, pages. 42\u201351, 2003.","DOI":"10.1145\/948109.948118"},{"key":"23_CR7","doi-asserted-by":"crossref","unstructured":"J. Dwoskin and R. Lee. Hardware-rooted trust for secure key management and transient trust. In: CCS\u201907: ACM conference on Computer and communications security, Alexandria, VA, pages 389\u2013400, 2007.","DOI":"10.1145\/1315245.1315294"},{"key":"23_CR8","doi-asserted-by":"crossref","unstructured":"J. Dwoskin, D. Xu, J. Huang, M. Chiang, and R. Lee. Secure key management architecture against sensor-node fabrication attacks. In: IEEE GlobeCom, Washington, D.C., pages 166\u2013171, 2007.","DOI":"10.1109\/GLOCOM.2007.39"},{"key":"23_CR9","doi-asserted-by":"crossref","unstructured":"L. Eschenauer and V. D. Gligor. A key-management scheme for distributed sensor networks. In: CCS\u201902: ACM conference on Computer and communications security, New York, NY, pages, 41\u201347, 2002.","DOI":"10.1145\/586110.586117"},{"key":"23_CR10","doi-asserted-by":"crossref","unstructured":"P. Feldman. A practical scheme for non-interactive verifiable secret sharing. In: IEEE Symposium on Foundations of Computer Science, Los Angeles, CA, Pages 427\u2013438, 1987.","DOI":"10.1109\/SFCS.1987.4"},{"key":"23_CR11","doi-asserted-by":"crossref","unstructured":"M. Fitzi, J. Garay, S. Gollakota, C. Rangan, and K. Srinathan. Round-optimal and efficient verifiable secret sharing. In: Third Theory of Cryptography Conference, Volume 3876 of Lecture Notes in Computer Science, pages 329\u2013342, 2006.","DOI":"10.1007\/11681878_17"},{"issue":"4","key":"23_CR12","doi-asserted-by":"publisher","first-page":"427","DOI":"10.1109\/90.944341","volume":"9","author":"Z. Haas","year":"2001","unstructured":"Z. Haas and M. Pearlman. The performance of query control schemes for the zone routing protocol. In: IEEE\/ACM Transactions on Networking, 9(4): 427\u2013438, 2001.","journal-title":"IEEE\/ACM Transactions on Networking"},{"key":"23_CR13","doi-asserted-by":"crossref","unstructured":"A. Howard, M. J. Mataric, and G. S. Sukhatme. Mobile sensor network deployment using potential fields: A distributed, scalable solution to the area coverage problem. In: Distributed Autonomous Robotic Systems, Fukuoka, Japan, pages 299\u2013308, 2002.","DOI":"10.1007\/978-4-431-65941-9_30"},{"key":"23_CR14","unstructured":"D. Huang and D. Medhi. A byzantine resilient multi-path key establishment scheme and its robustness analysis for sensor networks. In: 19th IEEE International Parallel and Distributed Processing Symposium, Washington, DC, pages, 4\u20138, 2005."},{"key":"23_CR15","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3388323","volume":"16","author":"D. Huang","year":"2007","unstructured":"D. Huang and D. Medhi. Secure pairwise key establishment in large-scale sensor networks: An area partitioning and multigroup key predistribution approach. ACM Transactions on Sensor Networks 16:1\u201334, 2007.","journal-title":"ACM Transactions on Sensor Networks"},{"key":"23_CR16","doi-asserted-by":"crossref","unstructured":"D. Huang, M. Mehta, D. Medhi, and L. Harn. Location-aware key management scheme for wireless sensor networks. In: Proceedings of the 2nd ACM workshop on Security of ad hoc and sensor networks, ACM New York, NY, pp. 29\u201342, 2004.","DOI":"10.1145\/1029102.1029110"},{"key":"23_CR17","doi-asserted-by":"crossref","unstructured":"J. Hwang and Y. Kim. Revisiting random key pre-distribution schemes for wireless sensor networks. In; ACM workshop on Security of ad hoc and sensor networks, Washington, DC, USA, pages, 43\u201352, 2004.","DOI":"10.1145\/1029102.1029111"},{"key":"23_CR18","doi-asserted-by":"crossref","unstructured":"T. Lan, M. Chiang, and R. Lee. Multi-path key establishment against REM attacks in wireless ad hoc networks. In: IEEE Globecom, Honolulu, HI, 2009.","DOI":"10.1109\/GLOCOM.2009.5426213"},{"key":"23_CR19","doi-asserted-by":"crossref","unstructured":"J. Lee and D. Stinson. Deterministic key predistribution schemes for distributed sensor networks. 11th Annual Workshop on Selected Areas in Cryptography, Waterloo, Ontario, Canada, 2004.","DOI":"10.1007\/978-3-540-30564-4_21"},{"key":"23_CR20","doi-asserted-by":"crossref","unstructured":"R. Lee et al. Architecture for protecting critical secrets in microprocessors. In: International Symposium on Computer Architecture (ISCA 2005), pages, 2\u201313, 2005.","DOI":"10.1145\/1080695.1069971"},{"key":"23_CR21","volume-title":"Error Control Coding: Fundamentals and Applications.","author":"S. Lin","year":"1983","unstructured":"S. Lin and D. Costello. Error Control Coding: Fundamentals and Applications. Prentice Hall, NJ, USA, 1983."},{"key":"23_CR22","doi-asserted-by":"crossref","unstructured":"D. Liu and P. Ning. Establishing pairwise keys in distributed sensor networks. In: Proceedings of the 10th ACM Conference on Computer and Communications Security (CCS \u201903), Washington, DC, pages, 52\u201361, 2003.","DOI":"10.1145\/948109.948119"},{"key":"23_CR23","doi-asserted-by":"crossref","unstructured":"D. Liu and P. Ning. Location-based pairwise key establishments for static sensor networks. In: Proceedings of the 1st ACM workshop on Security of ad hoc and sensor networks, ACM New York, NY, pages. 72\u201382, 2003.","DOI":"10.1145\/986858.986869"},{"key":"23_CR24","doi-asserted-by":"crossref","unstructured":"T. Matsumoto and H. Imai. On the key predistribution systems: a practical solution to the key distribution problem. In: Advances in Sryptology\u2013Crypto\u201987, Santa Barbara, CA, 1987.","DOI":"10.1007\/3-540-48184-2_14"},{"key":"23_CR25","volume-title":"Ad Hoc Wireless Networks: Architectures and Protocols.","author":"C. S. R. Murthy","year":"2004","unstructured":"C. S. R. Murthy and B. S. Manoj. Ad Hoc Wireless Networks: Architectures and Protocols. Prentice Hall Communications Engineering and Emerging Technologies Series, NJ, USA, 2004."},{"key":"23_CR26","doi-asserted-by":"crossref","unstructured":"B. Parno, A. Perrig, and V. Gligor. Distributed detection of node replication attacks in sensor networks. In: Proceedings of the 2005 IEEE Symposium on Security and Privacy, pages 49\u201363, California, USA, 2005.","DOI":"10.1109\/SP.2005.8"},{"key":"23_CR27","doi-asserted-by":"crossref","unstructured":"R. D. Pietro, L. V. Mancini, and A. Mei. Random key-assignment for secure wireless sensor networks. In: SASN\u201903: ACM workshop on Security of ad hoc and sensor networks, New York, NY, pages. 62\u201371, 2003.","DOI":"10.1145\/986858.986868"},{"key":"23_CR28","unstructured":"S. Seys and B. Preneel. The wandering nodes: Key management for lower-power mobile ad hoc netowrks. In: IEEE International Conference on Distributed Computing Systems Workshops, ICDCSW\u201905, 2005."},{"key":"23_CR29","doi-asserted-by":"crossref","unstructured":"A. Shamir. How to share a secret. In: Communications of the ACM, 1979.","DOI":"10.1145\/359168.359176"},{"key":"23_CR30","doi-asserted-by":"crossref","unstructured":"S. Zhu, S. Setia, and S. Jajodia. LEAP: Efficient security mechanisms for large-scale distributed sensor networks. In: CCS\u201903: ACM conference on Computer and communications security, New York, NY, pages. 62\u201372,, 2003.","DOI":"10.1145\/948109.948120"},{"key":"23_CR31","unstructured":"S. Zhu, S. Setia, S. Jajodia, and P. Ning. An interleaved hop-by-hop authentication scheme for filtering of injected false data in sensor networks. Security and Privacy, 2004. In: Proceedings. IEEE Symposium, pages, 259\u2013271, California, USA, 2004."},{"key":"23_CR32","unstructured":"S. Zhu, S. Xu, S. Setia, and S. Jajodia. Establishing pairwise keys for secure communication in ad hoc networks: A probabilistic approach. In: Proceedings of the 11th IEEE International Conference on Network Protocols (ICNP\u201903), pp. 326\u2013335, 2003."}],"container-title":["Monographs in Theoretical Computer Science. An EATCS Series","Theoretical Aspects of Distributed Computing in Sensor Networks"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-14849-1_23","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,5]],"date-time":"2025-03-05T08:37:22Z","timestamp":1741163842000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-642-14849-1_23"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,11,8]]},"ISBN":["9783642148484","9783642148491"],"references-count":32,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-14849-1_23","relation":{},"ISSN":["1431-2654"],"issn-type":[{"type":"print","value":"1431-2654"}],"subject":[],"published":{"date-parts":[[2010,11,8]]},"assertion":[{"value":"8 November 2010","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}