{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,15]],"date-time":"2025-06-15T04:41:31Z","timestamp":1749962491416,"version":"3.40.4"},"publisher-location":"Berlin, Heidelberg","reference-count":26,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642369575"},{"type":"electronic","value":"9783642369582"}],"license":[{"start":{"date-parts":[[2013,1,1]],"date-time":"2013-01-01T00:00:00Z","timestamp":1356998400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-642-36958-2_13","type":"book-chapter","created":{"date-parts":[[2013,4,22]],"date-time":"2013-04-22T12:05:11Z","timestamp":1366632311000},"page":"180-195","source":"Crossref","is-referenced-by-count":12,"title":["LPKM: A Lightweight Polynomial-Based Key Management Protocol for Distributed Wireless Sensor Networks"],"prefix":"10.1007","author":[{"given":"Xinxin","family":"Fan","sequence":"first","affiliation":[]},{"given":"Guang","family":"Gong","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"13_CR1","doi-asserted-by":"crossref","unstructured":"Albrecht, M., Gentry, C., Halevi, S., Katz, J.: Attacking Cryptographic Schemes Based on \u201cPerturbation Polynomials\u201d. In: The 16th ACM Conference on Computer and Communication Security - CCS 2009, pp. 1\u201310. ACM Press (2009)","DOI":"10.1145\/1653662.1653664"},{"key":"13_CR2","unstructured":"Balenson, D., McGrew, D., Sherman, A.: Key Management for Large Dynamic Groups: One-Way Function Trees and Amortized Initialization. In: IETF Internet Draft (August 2000), http:\/\/tools.ietf.org\/html\/draft-irtf-smug-groupkeymgmt-oft-00"},{"issue":"3","key":"13_CR3","doi-asserted-by":"publisher","first-page":"362","DOI":"10.1006\/jcss.1999.1694","volume":"61","author":"M. Bellare","year":"2000","unstructured":"Bellare, M., Kilian, J., Rogaway, P.: The Security of the Cipher Block Chaining Message Authentication Code. Journal of Computer and System Sciences\u00a061(3), 362\u2013399 (2000)","journal-title":"Journal of Computer and System Sciences"},{"key":"13_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"471","DOI":"10.1007\/3-540-48071-4_33","volume-title":"Advances in Cryptology - CRYPTO \u201992","author":"C. Blundo","year":"1993","unstructured":"Blundo, C., De Santis, A., Herzberg, A., Kutten, S., Vaccaro, U., Yung, M.: Perfectly-Secure Key Distribution for Dynamic Conferences. In: Brickell, E.F. (ed.) CRYPTO 1992. LNCS, vol.\u00a0740, pp. 471\u2013486. Springer, Heidelberg (1993)"},{"issue":"10","key":"13_CR5","doi-asserted-by":"publisher","first-page":"103","DOI":"10.1109\/MC.2003.1236475","volume":"36","author":"H. Chan","year":"2003","unstructured":"Chan, H., Perrig, A.: Security and Privacy in Sensor Networks. IEEE Computer Magazine\u00a036(10), 103\u2013105 (2003)","journal-title":"IEEE Computer Magazine"},{"key":"13_CR6","unstructured":"Chan, H., Perrig, A., Song, D.: Random Key Predistribution Schemes for Sensor Networks. In: The 2003 IEEE Symposium on Security and Privacy - S&P 2003, pp. 197\u2013213. IEEE Computer Society (2003)"},{"key":"13_CR7","unstructured":"Crossbow Technology Inc., MICAz \u2013 Wireless Measurement System, http:\/\/bullseye.xbow.com:81\/Products\/Product_pdf_files\/Wireless_pdf\/MICAz_Datasheet.pdf ."},{"key":"13_CR8","doi-asserted-by":"crossref","unstructured":"Du, W., Deng, J., Han, Y., Varshney, P.: A Pairwise Key Pre-Distribution Schemes for Wireless Sensor Networks. In: The 10th ACM Conference on Computer and Communication Security - CCS 2003, pp. 42\u201351. ACM Press (2003)","DOI":"10.1145\/948117.948118"},{"issue":"3","key":"13_CR9","doi-asserted-by":"publisher","first-page":"1223","DOI":"10.1109\/TWC.2009.060598","volume":"8","author":"X. Du","year":"2009","unstructured":"Du, X., Guizani, G., Xiao, Y., Chen, H.-H.: A Routing-Driven Elliptic Curve Cryptography Based Key Management Scheme for Heterogeneous Sensor Networks. IEEE Transactions on Wireless Communications\u00a08(3), 1223\u20131229 (2009)","journal-title":"IEEE Transactions on Wireless Communications"},{"key":"13_CR10","doi-asserted-by":"crossref","unstructured":"Eschenauer, L., Gligor, V.: A Key-Management Scheme for Distributed Sensor Networks. In: The 9th ACM Conference on Computer and Communication Security - CCS 2002, pp. 41\u201347. ACM Press (2002)","DOI":"10.1145\/586110.586117"},{"key":"13_CR11","unstructured":"Harn, L., Gong, G.: Conference Key Establishment Using Polynomials, Centre for Applied Cryptographic Research (CACR). Technical Reports, CACR 2012-10, http:\/\/cacr.uwaterloo.ca\/techreports\/2012\/cacr2012-10.pdf , 2012."},{"key":"13_CR12","unstructured":"Hung, H., Muckenhirn, C., Rivers, T.: Group Key Management Protocol (GKMP) Architecture, Request for Comments (RFC 2094), Internet Engineering Task Force (July 1997), http:\/\/tools.ietf.org\/html\/rfc2094"},{"key":"13_CR13","unstructured":"IEEE Standard 802.15.4: Wireless Medium Access Control (MAC) and Physical Layer (PHY) Specification for Low-Rate Wireless Personal Area Networks (WPANs). IEEE Computer Soceity (June 2006)"},{"key":"13_CR14","doi-asserted-by":"crossref","unstructured":"Liu, D., Ning, P.: Establishing Pairwise Keys in Distributed Sensor Netowrks. In: The 10th ACM Conference on Computer and Communication Security - CCS 2003, pp. 52\u201361. ACM Press (2003)","DOI":"10.1145\/948117.948119"},{"key":"13_CR15","unstructured":"Liu, D., Ning, P.: Security for Wireless Sensor Networks. Advances in Information Security Series. Springer (2006)"},{"key":"13_CR16","unstructured":"L\u00f3pez, J., Zhou, J.: Wireless Sensor Network Security. Cryptology and Information Security Series. IOS Press (2008)"},{"issue":"4","key":"13_CR17","doi-asserted-by":"crossref","first-page":"22","DOI":"10.1145\/1387663.1387668","volume":"4","author":"D. Malan","year":"2008","unstructured":"Malan, D., Welsh, M., Smith, M.D.: Implementing Public-Key Infrastructure for Sensor Networks. ACM Transactions on Sensor Networks\u00a04(4), Article No: 22 (2008)","journal-title":"ACM Transactions on Sensor Networks"},{"key":"13_CR18","doi-asserted-by":"crossref","unstructured":"Mandal, K., Fan, X., Gong, G.: A Light weight Pseudorandom Number Generator for EPC Class 1 Gen 2 RFID Tags. In: West European Workshop on Research in Cryptography - WEWoRC 2011, Conference Record, pp. 91\u201395 (2011)","DOI":"10.20533\/ijrfidsc.2046.3715.2013.0011"},{"key":"13_CR19","doi-asserted-by":"crossref","unstructured":"Parno, B., Perrig, A., Gligor, V.: Distributed Detection of Node Replication Attacks in Sensor Networks. In: The 2005 IEEE Symposium on Security and Privacy - S&P 2005, pp. 49\u201363. IEEE Computer Society (2005)","DOI":"10.1109\/SP.2005.8"},{"key":"13_CR20","doi-asserted-by":"crossref","unstructured":"Perrig, A., Szewczyk, R., Wen, V., Culler, D., Tygar, J.: SPINS: Security Protocols for Sensor Netowkrs. In: The 7th Annual ACM International Conference on Mobile Computing and Networks - Mobicom 2001, pp. 189\u2013199. ACM Press (2001)","DOI":"10.1145\/381677.381696"},{"key":"13_CR21","unstructured":"Ren, K., Lou, W.: Communication Security in Wireless Sensor Network, VDM Verlag Dr. M\u00fcller (2008)"},{"key":"13_CR22","doi-asserted-by":"crossref","unstructured":"Wallner, D., Harder, E., Agee, R.: Key Management for Multicast: Issues and Architectures, Request for Comments (RFC 2627), Internet Engineering Task Force (June 1999), http:\/\/tools.ietf.org\/html\/rfc2627","DOI":"10.17487\/rfc2627"},{"key":"13_CR23","doi-asserted-by":"crossref","unstructured":"Zhang, W., Tran, M., Zhu, S., Cao, G.: A Random Perturbation-Based Scheme for Pairwise Key Establishment in Sensor Netowkrs. In: The 8th ACM International Symposium on Mobile Ad Hoc Networking and Computing - MobiHoc 2007, pp. 90\u201399. ACM Press (2007)","DOI":"10.1145\/1288107.1288120"},{"key":"13_CR24","doi-asserted-by":"crossref","unstructured":"Zhu, S., Setia, S., Jajodia, S.: LEAP: Efficient Security Mechanisms for Large-Scale Distributed Sensor Networks. In: The 10th ACM Conference on Computer and Communication Security - CCS 2003, pp. 62\u201372. ACM Press (2003)","DOI":"10.1145\/948109.948120"},{"issue":"4","key":"13_CR25","doi-asserted-by":"publisher","first-page":"500","DOI":"10.1145\/1218556.1218559","volume":"2","author":"S. Zhu","year":"2006","unstructured":"Zhu, S., Setia, S., Jajodia, S.: LEAP+: Efficient Security Mechanisms for Large-Scale Distributed Sensor Networks. ACM Transactions on Sensor Networks\u00a02(4), 500\u2013528 (2006)","journal-title":"ACM Transactions on Sensor Networks"},{"key":"13_CR26","unstructured":"Zhu, S., Xu, S., Setia, S., Jajodia, S.: Establishing Pairwise Keys for Secure Communication in Ad Hoc Networks: A Probabilistic Approach. In: The 11th IEEE International Conference on Network Protocols - ICNP 2003, pp. 326\u2013335. IEEE Computer Society (2003)"}],"container-title":["Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","Ad Hoc Networks"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-36958-2_13","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,4,30]],"date-time":"2025-04-30T06:05:29Z","timestamp":1745993129000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-36958-2_13"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783642369575","9783642369582"],"references-count":26,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-36958-2_13","relation":{},"ISSN":["1867-8211","1867-822X"],"issn-type":[{"type":"print","value":"1867-8211"},{"type":"electronic","value":"1867-822X"}],"subject":[],"published":{"date-parts":[[2013]]}}}