{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,15]],"date-time":"2024-09-15T14:21:03Z","timestamp":1726410063949},"publisher-location":"Berlin, Heidelberg","reference-count":18,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642225765"},{"type":"electronic","value":"9783642225772"}],"license":[{"start":{"date-parts":[[2011,1,1]],"date-time":"2011-01-01T00:00:00Z","timestamp":1293840000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.1007\/978-3-642-22577-2_77","type":"book-chapter","created":{"date-parts":[[2011,7,6]],"date-time":"2011-07-06T12:41:43Z","timestamp":1309956103000},"page":"580-587","source":"Crossref","is-referenced-by-count":0,"title":["Analysis of Security and Key Management Schemes for Authenticated Broadcast in Heterogeneous Wireless Sensor Networks"],"prefix":"10.1007","author":[{"given":"P.","family":"Kalyani","sequence":"first","affiliation":[]},{"given":"C.","family":"Chellappan","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"6","key":"77_CR1","doi-asserted-by":"publisher","first-page":"53","DOI":"10.1145\/990680.990707","volume":"47","author":"A. Perrig","year":"2004","unstructured":"Perrig, A., Stankovic, J., Wagner, D.: Security in wireless sensor networks. Communication ACM\u00a047(6), 53\u201357 (2004)","journal-title":"Communication ACM"},{"issue":"4","key":"77_CR2","doi-asserted-by":"publisher","first-page":"2","DOI":"10.1109\/COMST.2005.1593277","volume":"7","author":"D. Djenouri","year":"2005","unstructured":"Djenouri, D., Khelladi, L.: A Survey of Security Issues in Mobile AdHoc and Sensor Networks. IEEE Communication Surveys and Tutorials\u00a07(4), 2\u201328 (2005)","journal-title":"IEEE Communication Surveys and Tutorials"},{"key":"77_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"2","DOI":"10.1007\/978-3-540-30496-8_2","volume-title":"Security in Ad-hoc and Sensor Networks","author":"G. Gaubatz","year":"2005","unstructured":"Gaubatz, G., Kaps, J.-P., Sunar, B.: Public Key Cryptography in Sensor Networks\u2014Revisited. In: Castelluccia, C., Hartenstein, H., Paar, C., Westhoff, D. (eds.) ESAS 2004. LNCS, vol.\u00a03313, pp. 2\u201318. Springer, Heidelberg (2005)"},{"issue":"5","key":"77_CR4","doi-asserted-by":"publisher","first-page":"521","DOI":"10.1023\/A:1016598314198","volume":"8","author":"A. Perrig","year":"2002","unstructured":"Perrig, A., Szewczyk, R., Wen, V., Culler, D., Tygar, J.D.: SPINS: Security Protocols for Sensor Networks. Wireless Networks\u00a08(5), 521\u2013534 (2002)","journal-title":"Wireless Networks"},{"key":"77_CR5","unstructured":"Baggio, A.: Wireless sensor networks in precision agriculture. In: ACM Workshop on Real-World Wireless Sensor Networks (REALWSN 2005), Stockholm, Sweden (June 2005)"},{"key":"77_CR6","doi-asserted-by":"crossref","unstructured":"Mainwaring, A., Polastre, J., Szewczyk, R., Culler, D., Anderson, J.: Wireless SensorNetworks for Habitat Monitoring. In: First ACM Workshop on Wireless Sensor Networks and Applications, Atlanta, GA, USA (September 2002)","DOI":"10.1145\/570738.570751"},{"key":"77_CR7","doi-asserted-by":"crossref","unstructured":"Fuchs, G., Truchat, S., Dressler, F.: Distributed Software Management in Sensor Networks using Profiling Techniques. In: 1st IEEE\/ACM International Conference on Communication System Software and Middleware (IEEE COMSWARE 2006): 1st International Workshop on Software for Sensor Networks (SensorWare 2006), New Dehli, India (January 2006)","DOI":"10.1109\/COMSWA.2006.1665225"},{"key":"77_CR8","unstructured":"Zhang, W., Cao, G.: Group Rekeying for Filtering False Data in Sensor Networks: A Predistribution and Local Collaboration-Based Approach. In: 24th IEEE Annual Joint Conference of the IEEE"},{"issue":"1","key":"77_CR9","doi-asserted-by":"publisher","first-page":"38","DOI":"10.1109\/MWC.2004.1269716","volume":"11","author":"H. Yang","year":"2004","unstructured":"Yang, H., Luo, H., Ye, F., Lu, S., Zhang, L.: Security in mobile ad hoc networks: challenges and solutions. IEEE Wireless Communications\u00a011(1), 38\u201347 (2004)","journal-title":"IEEE Wireless Communications"},{"key":"77_CR10","doi-asserted-by":"crossref","unstructured":"Delgosha, F.: Senier member of IEEE A multivibrate key establishment scheme for wireless sensor networks. IEEE Transaction on wireless communication\u00a018 (April 2009)","DOI":"10.1109\/TWC.2009.071338"},{"key":"77_CR11","doi-asserted-by":"publisher","first-page":"2314","DOI":"10.1016\/j.comcom.2007.04.009","volume":"30","author":"Y. Xiao","year":"2007","unstructured":"Xiao, Y., Rayi, V., Sun, B., Du, X., Hue, F.: A survey of key management schemes in wireless sensor networks. Computer Communications\u00a030, 2314\u20132341 (2007)","journal-title":"Computer Communications"},{"key":"77_CR12","unstructured":"Gura, N., Patel, A., Wander, A., Eberle, H., Shantz, S.C.: Comparing Elliptic Curve Cryptography and RSA on 8-bit CPUs"},{"key":"77_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"130","DOI":"10.1007\/978-3-540-85053-3_9","volume-title":"Cryptographic Hardware and Embedded Systems \u2013 CHES 2008","author":"D. Vigilant","year":"2008","unstructured":"Vigilant, D.: RSA with CRT: A new cost-effective solution to thwart fault attacks. In: Oswald, E., Rohatgi, P. (eds.) CHES 2008. LNCS, vol.\u00a05154, pp. 130\u2013145. Springer, Heidelberg (2008)"},{"key":"77_CR14","doi-asserted-by":"publisher","first-page":"494","DOI":"10.3844\/ajeassp.2009.494.500","volume":"2","author":"Z.M. Hanapi","year":"2009","unstructured":"Hanapi, Z.M., Ismail, M., Jumari, K.: Priority and Random Selection for Dynamic Window Secured Implicit Geographic Routing in Wireless Sensor Network. American Journal of Engineering and Applied Sciences\u00a02, 494\u2013500 (2009), doi:10.3844\/ajeassp.2009.494.500","journal-title":"American Journal of Engineering and Applied Sciences"},{"key":"77_CR15","doi-asserted-by":"publisher","first-page":"1758","DOI":"10.3844\/ajassp.2009.1758.1762","volume":"6","author":"A. Maalla","year":"2009","unstructured":"Maalla, A., Wei, C., Taha, H.J.: Optimal Power Multicast Problem in Wireless Mesh Networks by Using a Hybrid Particle Swarm Optimization. American Journal of Applied Sciences\u00a06, 1758\u20131762 (2009), doi:10.3844\/ajassp.2009.1758.1762","journal-title":"American Journal of Applied Sciences"},{"key":"77_CR16","doi-asserted-by":"publisher","first-page":"337","DOI":"10.3844\/ajeassp.2009.337.343","volume":"2","author":"N.M.H. Ismail","year":"2009","unstructured":"Ismail, N.M.H., Othman, M.: Low Power Phase Locked Loop Frequency Synthesizer for 2.4 GHz Band Zigbee. American Journal of Engineering and Applied Sciences\u00a02, 337\u2013343 (2009), doi:10.3844\/ajeassp.2009.337.343","journal-title":"American Journal of Engineering and Applied Sciences"},{"key":"77_CR17","doi-asserted-by":"publisher","first-page":"214","DOI":"10.3844\/ajeassp.2010.214.221","volume":"3","author":"C. Chang","year":"2010","unstructured":"Chang, C., Mehta, R.: Fiber Optic Sensors for Transportation Infrastructural Health Monitoring. American Journal of Engineering and Applied Sciences\u00a03, 214\u2013221 (2010), doi:10.3844\/ajeassp.2010.214.221","journal-title":"American Journal of Engineering and Applied Sciences"},{"key":"77_CR18","doi-asserted-by":"crossref","unstructured":"Delgosha, F.: Senier member of IEEE A multivibrate key establishment scheme for wireless sensor networks. IEEE Transaction on Wireless Communication\u00a018 (April 2009)","DOI":"10.1109\/TWC.2009.071338"}],"container-title":["Communications in Computer and Information Science","High Performance Architecture and Grid Computing"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-22577-2_77","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,12]],"date-time":"2019-06-12T19:50:55Z","timestamp":1560369055000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-22577-2_77"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"ISBN":["9783642225765","9783642225772"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-22577-2_77","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2011]]}}}