{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T21:54:53Z","timestamp":1743026093010,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":23,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642291531"},{"type":"electronic","value":"9783642291548"}],"license":[{"start":{"date-parts":[[2012,1,1]],"date-time":"2012-01-01T00:00:00Z","timestamp":1325376000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-29154-8_16","type":"book-chapter","created":{"date-parts":[[2012,4,21]],"date-time":"2012-04-21T03:18:00Z","timestamp":1334978280000},"page":"186-197","source":"Crossref","is-referenced-by-count":4,"title":["A Dynamic Authentication Scheme for Hierarchical Wireless Sensor Networks"],"prefix":"10.1007","author":[{"given":"Junqi","family":"Zhang","sequence":"first","affiliation":[]},{"given":"Rajan","family":"Shankaran","sequence":"additional","affiliation":[]},{"given":"Mehmet A.","family":"Orgun","sequence":"additional","affiliation":[]},{"given":"Abdul","family":"Sattar","sequence":"additional","affiliation":[]},{"given":"Vijay","family":"Varadharajan","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"16_CR1","first-page":"91","volume":"1","author":"M.J.C.M. Belinda","year":"2009","unstructured":"Belinda, M.J.C.M., Dhas, C.S.G.: A study of security in wireless sensor networks. MASAUM Journal Of Reviews and Surveys\u00a01, 91\u201395 (2009)","journal-title":"MASAUM Journal Of Reviews and Surveys"},{"key":"16_CR2","unstructured":"Blab, E.O., Zitterbart, M.: Towards acceptable public key cryptography in sensor networks. In: The 2nd International Workshop on Ubiquitous Computing (2005)"},{"key":"16_CR3","volume-title":"Proceedings of IEEE Infocom","author":"H. Chan","year":"2005","unstructured":"Chan, H., Perrig, A.: Pike: Peer intermediaries for key establishment in sensor networks. In: Proceedings of IEEE Infocom. IEEE Computer Society Press, Los Alamitos (2005)"},{"key":"16_CR4","first-page":"197","volume-title":"Proceedings of the 2003 IEEE Symposium on Security and Privacy","author":"H. Chan","year":"2003","unstructured":"Chan, H., Perrig, A., Song, D.: Random key predistribution schemes for sensor networks. In: Proceedings of the 2003 IEEE Symposium on Security and Privacy, p. 197. IEEE Computer Society, Washington, DC (2003)"},{"key":"16_CR5","doi-asserted-by":"crossref","unstructured":"Chen, C., Li, C.: Dynamic session key generation for wireless sensor networks. EURASIP Journal on Wireless Communications and Networking (2008)","DOI":"10.1155\/2008\/691571"},{"key":"16_CR6","unstructured":"Deng, J., Han, R., Mishra, S.: Countermeasures against traffic analysis attacks in wireless sensor networks. In: Proceedings of 1st IEEE Conference on Security and Privacy for Emerging Areas in Communication Networks (2005)"},{"key":"16_CR7","doi-asserted-by":"publisher","first-page":"644","DOI":"10.1109\/TIT.1976.1055638","volume":"22","author":"W. Diffie","year":"1976","unstructured":"Diffie, W., Hellman, M.E.: New directions in cryptography. IEEE Transactions on Information Theory\u00a022, 644\u2013654 (1976)","journal-title":"IEEE Transactions on Information Theory"},{"key":"16_CR8","doi-asserted-by":"publisher","first-page":"42","DOI":"10.1145\/948109.948118","volume-title":"Proceedings of the 10th ACM Conference on Computer and Communications Security","author":"W. Du","year":"2003","unstructured":"Du, W., Deng, J., Han, Y.S., Varshney, P.K.: A pairwise key pre-distribution scheme for wireless sensor networks. In: Proceedings of the 10th ACM Conference on Computer and Communications Security, pp. 42\u201351. ACM Press, New York (2003)"},{"key":"16_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"2","DOI":"10.1007\/978-3-540-30496-8_2","volume-title":"Security in Ad-hoc and Sensor Networks","author":"G. Gaubatz","year":"2005","unstructured":"Gaubatz, G., Kaps, J.P., Sunar, B.: Public key cryptography in sensor networks - revisited. In: Castelluccia, C., Hartenstein, H., Paar, C., Westhoff, D. (eds.) ESAS 2004. LNCS, vol.\u00a03313, pp. 2\u201318. Springer, Heidelberg (2005)"},{"key":"16_CR10","unstructured":"The Open Group. Architecture for Public-Key Infrastructure, APKI (1999)"},{"key":"16_CR11","first-page":"1976","volume-title":"Twenty-Second Annual Joint Conference of the IEEE Computer and Communications Societies","author":"Y.C. Hu","year":"2003","unstructured":"Hu, Y.C., Perrig, A., Johnson, D.B.: Packet leashes: a defense against wormhole attacks in wireless networks. In: Twenty-Second Annual Joint Conference of the IEEE Computer and Communications Societies, vol.\u00a03, pp. 1976\u20131986. IEEE, Los Alamitos (2003)"},{"key":"16_CR12","doi-asserted-by":"crossref","unstructured":"Karlof, C., Wagner, D.: Secure routing in wireless sensor networks: Attacks and countermeasures. In: Proceedings of the 1st IEEE International Workshop on Sensor Network Protocols and Applications, Anchorage, AK, USA (2003)","DOI":"10.1016\/S1570-8705(03)00008-8"},{"key":"16_CR13","doi-asserted-by":"publisher","first-page":"52","DOI":"10.1145\/948109.948119","volume-title":"Proceedings of the 10th ACM Conference on Computer and Communications Security","author":"D. Liu","year":"2003","unstructured":"Liu, D., Ning, P.: Establishing pairwise keys in distributed sensor networks. In: Proceedings of the 10th ACM Conference on Computer and Communications Security, pp. 52\u201361. ACM Press, New York (2003)"},{"key":"16_CR14","doi-asserted-by":"crossref","unstructured":"Liu, D., Ning, P.: Multi-level mtesla: Broadcast authentication for distributed sensor networks. ACM Transactions in Embedded Computing Systems (TECS)\u00a03 (2004)","DOI":"10.1145\/1027794.1027800"},{"key":"16_CR15","unstructured":"Zhu, S., Liu, S.J.D., Ning, P.: Practical broadcast authentication in sensor networks. In: Proceedings of Proc. of MobiQuitous, Mobicom 2001 (July 2005)"},{"key":"16_CR16","doi-asserted-by":"crossref","unstructured":"Newsome, J., Shi, E., Song, D., Perrig, A.: The sybil attack in sensor networks: Analysis & defenses. In: Proceedings of the 3rd International Symposium on Information Processing in Sensor Networks, pp. 259\u2013268 (2004)","DOI":"10.1145\/984622.984660"},{"key":"16_CR17","doi-asserted-by":"crossref","unstructured":"Perrig, A., Szewczyk, R., Tygar, J.D., Wen, V., Culler, D.E.: Spins: Security protocols for sensor networks. In: Proceedings of 7th Annual ACM International Conference on Mobile Computing and Networks (Mobicom 2001), Rome, Italy (2001)","DOI":"10.1145\/381677.381696"},{"key":"16_CR18","doi-asserted-by":"publisher","first-page":"120","DOI":"10.1145\/359340.359342","volume":"22","author":"R.L. Rivest","year":"1978","unstructured":"Rivest, R.L., Shamir, A., Adleman, L.M.: A method for obtaining digital signatures and public-key cryptosystems. Communications of the ACM\u00a022, 120\u2013126 (1978)","journal-title":"Communications of the ACM"},{"key":"16_CR19","doi-asserted-by":"crossref","unstructured":"Singh, K., Muthukkumarasamy, V.: A minimal protocol for authenticated key distribution in wireless sensor networks. In: Proceedings of the 4th International Conference on Intelligent Sensing and Information Processing, Bangalore, India (December 2006)","DOI":"10.1109\/ICISIP.2006.4286066"},{"key":"16_CR20","doi-asserted-by":"crossref","unstructured":"Watro, R., Kong, D., Cuti, S.F., Gardiner, C., Lynn, C., Kruus, P.: Tinypk: Securing sensor networks with public key technology. In: Proceedings of the 2nd ACM Workshop on Security of Ad hoc and Sensor Networks, Washington DC, USA (2004)","DOI":"10.1145\/1029102.1029113"},{"key":"16_CR21","unstructured":"Ye, F., Luo, H., Lu, S., Zhang, L.: Statistical en-route filtering of injected false data in sensor networks. In: IEEE Infocom 2004 (March 2004)"},{"key":"16_CR22","doi-asserted-by":"crossref","unstructured":"Zhu, S., Setia, S., Jajodia, S.: Leap: Efficient security mechanism for large-scale distributed sensor networks. In: Proceedings of the 10th ACM Conference on Computer and Communication Security (CCS), Washinton DC, USA (2004)","DOI":"10.1145\/948109.948120"},{"key":"16_CR23","unstructured":"Zhu, S., Setia, S., Jajodia, S., Ning, P.: An interleaved hop-by-hop authentication scheme for filtering false data in sensor networks. In: IEEE Symposium on Security and Privacy (2004)"}],"container-title":["Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","Mobile and Ubiquitous Systems: Computing, Networking, and Services"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-29154-8_16","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,6,22]],"date-time":"2023-06-22T04:45:35Z","timestamp":1687409135000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-29154-8_16"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642291531","9783642291548"],"references-count":23,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-29154-8_16","relation":{},"ISSN":["1867-8211","1867-822X"],"issn-type":[{"type":"print","value":"1867-8211"},{"type":"electronic","value":"1867-822X"}],"subject":[],"published":{"date-parts":[[2012]]}}}