{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T00:59:42Z","timestamp":1740099582910,"version":"3.37.3"},"publisher-location":"Singapore","reference-count":25,"publisher":"Springer Singapore","isbn-type":[{"type":"print","value":"9789811508172"},{"type":"electronic","value":"9789811508189"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-981-15-0818-9_22","type":"book-chapter","created":{"date-parts":[[2019,11,7]],"date-time":"2019-11-07T19:18:32Z","timestamp":1573154312000},"page":"347-364","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["A Hybrid Key Management Scheme for Wireless Sensor Network"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-1177-2914","authenticated-orcid":false,"given":"Yanyan","family":"Han","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9546-5043","authenticated-orcid":false,"given":"Yanru","family":"He","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Peihe","family":"Liu","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Xiaoxuan","family":"Yan","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Na","family":"Li","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2019,11,8]]},"reference":[{"issue":"9","key":"22_CR1","first-page":"2211","volume":"37","author":"B Yu","year":"2015","unstructured":"Yu, B., Zhou, W., Bin, Y., et al.: ZigBee model for detection and suppression of same-frequency attacks. J. Electron. Inf. Technol. 37(9), 2211\u20132217 (2015)","journal-title":"J. Electron. Inf. Technol."},{"doi-asserted-by":"crossref","unstructured":"Lotfallahtabrizi, P., Morgan, Y.: A novel host intrusion detection system using neural network. In: Computing and Communication Workshop and Conference, pp. 124\u2013130. IEEE (2018)","key":"22_CR2","DOI":"10.1109\/CCWC.2018.8301663"},{"doi-asserted-by":"crossref","unstructured":"Eschenauer, L., Gligor, V.D.: A key-management scheme for distributed sensor networks. In: ACM Conference on Computer and Communications Security, pp. 41\u201347 (2002)","key":"22_CR3","DOI":"10.1145\/586115.586117"},{"unstructured":"Chan, H., Perrig, A., Song, D.: Random key predistribution schemes for sensor networks. In: Proceedings of 2003 Symposium on Security and Privacy, pp. 197\u2013213. IEEE (2003)","key":"22_CR4"},{"unstructured":"Du, W., Deng, J., Han, Y.S., et al.: A key management scheme for wireless sensor networks using deployment knowledge. In: IEEE INFOCOM 2004: Twenty-Third Annual Joint Conference of the IEEE Computer and Communications Societies, Hongkong, pp. 586\u2013597. IEEE (2004)","key":"22_CR5"},{"issue":"5","key":"22_CR6","doi-asserted-by":"publisher","first-page":"1204","DOI":"10.1109\/TNET.2007.896259","volume":"15","author":"D Huang","year":"2007","unstructured":"Huang, D., Mehta, M., van de Liefvoort, A., et al.: Modeling pairwise key establishment for random key predistribution in large-scale sensor networks. IEEE\/ACM Trans. Netw. 15(5), 1204\u20131215 (2007)","journal-title":"IEEE\/ACM Trans. Netw."},{"key":"22_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"291","DOI":"10.1007\/978-3-642-12179-1_26","volume-title":"Computational Science and Its Applications \u2013 ICCSA 2010","author":"H Wang","year":"2010","unstructured":"Wang, H., Yang, J., Wang, P., Tu, P.: Efficient pairwise key establishment scheme based on random pre-distribution keys in WSN. In: Taniar, D., Gervasi, O., Murgante, B., Pardede, E., Apduhan, Bernady O. (eds.) ICCSA 2010. LNCS, vol. 6018, pp. 291\u2013304. Springer, Heidelberg (2010). \n                    https:\/\/doi.org\/10.1007\/978-3-642-12179-1_26"},{"key":"22_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"335","DOI":"10.1007\/3-540-39757-4_22","volume-title":"Advances in Cryptology","author":"R Blom","year":"1985","unstructured":"Blom, R.: An optimal class of symmetric key generation systems. In: Beth, T., Cot, N., Ingemarsson, I. (eds.) EUROCRYPT 1984. LNCS, vol. 209, pp. 335\u2013338. Springer, Heidelberg (1985). \n                    https:\/\/doi.org\/10.1007\/3-540-39757-4_22"},{"issue":"4","key":"22_CR9","first-page":"25","volume":"1","author":"AW Hussain","year":"2015","unstructured":"Hussain, A.W., Ibrahem, M.K.: An efficient pairwise and group key management scheme for wireless sensor network. Int. J. Enhanc. Res. Sci. Technol. Eng. 1(4), 25\u201331 (2015)","journal-title":"Int. J. Enhanc. Res. Sci. Technol. Eng."},{"issue":"2","key":"22_CR10","doi-asserted-by":"publisher","first-page":"228","DOI":"10.1145\/1065545.1065548","volume":"8","author":"W Du","year":"2005","unstructured":"Du, W., Deng, J., Han, Y.S., et al.: A pairwise key predistribution scheme for wireless sensor networks. ACM Trans. Inf. Syst. Secur. (TISSEC) 8(2), 228\u2013258 (2005)","journal-title":"ACM Trans. Inf. Syst. Secur. (TISSEC)"},{"issue":"1","key":"22_CR11","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1006\/inco.1998.2717","volume":"146","author":"C Blundo","year":"1998","unstructured":"Blundo, C., Santis, A.D., Herzberg, A.: Perfectly-secure key distribution for dynamic conferences. Inf. Computat. 146(1), 1\u201323 (1998)","journal-title":"Inf. Computat."},{"doi-asserted-by":"crossref","unstructured":"Zhu, S., Setia, S., Jajodia, S.: LEAP: efficient security mechanisms for large-scale distributed sensor networks. In: ACM Conference on Computer and Communications Security, Dallas, USA, pp. 62\u201372. ACM (2003)","key":"22_CR12","DOI":"10.1145\/948109.948120"},{"issue":"7","key":"22_CR13","first-page":"2042","volume":"7","author":"R Jiang","year":"2013","unstructured":"Jiang, R., Luo, J., Wang, X.: HRKT: a hierarchical route key tree based group key management for wireless sensor networks. KSII Trans. Internet Inf. Syst. 7(7), 2042\u20132060 (2013)","journal-title":"KSII Trans. Internet Inf. Syst."},{"doi-asserted-by":"crossref","unstructured":"Jiang, R., Luo, J., Wang, X.: A logic-route key tree based group key management scheme for wireless sensor networks. In: 2013 IEEE\/CIC International Conference on Communications in China (ICCC), Xi\u2019an, pp. 686\u2013691. IEEE Computer Society (2013)","key":"22_CR14","DOI":"10.1109\/ICCChina.2013.6671199"},{"issue":"1","key":"22_CR15","first-page":"42","volume":"37","author":"Y Du","year":"2016","unstructured":"Du, Y., Zhang, Y., Li, M., et al.: Optimization method of intrusion detection sample data based on improved FastICA algorithm. J. Commun. 37(1), 42\u201348 (2016)","journal-title":"J. Commun."},{"issue":"20","key":"22_CR16","first-page":"113","volume":"36","author":"S Zhao","year":"2010","unstructured":"Zhao, S., Zhang, Z.: Research on regular hexagon node coverage model of wireless sensor network. Comput. Eng. 36(20), 113\u2013115+118 (2010)","journal-title":"Comput. Eng."},{"doi-asserted-by":"crossref","unstructured":"Manikandan, G., Sakthi, U.: A comprehensive survey on various key management schemes in WSN. In: 2018 2nd International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC), Palladam, India, pp. 378\u2013383 (2018)","key":"22_CR17","DOI":"10.1109\/I-SMAC.2018.8653656"},{"doi-asserted-by":"crossref","unstructured":"Gautam, A.K., Kumar, R.: A comparative study of recently proposed key management schemes in wireless sensor network. In: 2018 International Conference on Computing, Power and Communication Technologies (GUCON), Greater Noida, Uttar Pradesh, India, pp. 512\u2013517 (2018)","key":"22_CR18","DOI":"10.1109\/GUCON.2018.8674948"},{"issue":"2","key":"22_CR19","doi-asserted-by":"publisher","first-page":"948","DOI":"10.1109\/TWC.2012.010413.120732","volume":"12","author":"W Bechkit","year":"2013","unstructured":"Bechkit, W., Challal, Y., Bouabdallah, A.: A highly scalable key pre-distribution scheme for wireless sensor networks. IEEE Trans. Wirel. Commun. 12(2), 948\u2013959 (2013)","journal-title":"IEEE Trans. Wirel. Commun."},{"doi-asserted-by":"crossref","unstructured":"Chakavarika, T.T., Chaurasia, B.K., Gupta, S.K.: Performance evaluation of a polynomial based key management scheme in wireless sensor networks. In: 2016 International Conference on Communication and Signal Processing (ICCSP), Melmaruvathur, pp. 2114\u20132118 (2016)","key":"22_CR20","DOI":"10.1109\/ICCSP.2016.7754553"},{"doi-asserted-by":"crossref","unstructured":"Kamble, S.B., Jog, V.V.: Efficient key management for dynamic wireless sensor network. In: 2017 2nd IEEE International Conference on Recent Trends in Electronics, Information and Communication Technology (RTEICT), Bangalore, pp. 583\u2013586 (2017)","key":"22_CR21","DOI":"10.1109\/RTEICT.2017.8256663"},{"doi-asserted-by":"crossref","unstructured":"Ahlawat, P., Dave, M.: An improved hybrid key management scheme for wireless sensor networks. In: 2016 Fourth International Conference on Parallel, Distributed and Grid Computing (PDGC), Waknaghat, pp. 253\u2013258 (2016)","key":"22_CR22","DOI":"10.1109\/PDGC.2016.7913154"},{"doi-asserted-by":"crossref","unstructured":"Msolli, A., Ameur, H.: A new secure key management scheme for wireless sensor network. In: 2017 International Conference on Control, Automation and Diagnosis (ICCAD), Hammamet, pp. 254\u2013257 (2017)","key":"22_CR23","DOI":"10.1109\/CADIAG.2017.8075666"},{"doi-asserted-by":"crossref","unstructured":"Prema, S., Pramod, T.C.: Key establishment scheme for intra and inter cluster communication in WSN. In: 2018 Second International Conference on Computing Methodologies and Communication (ICCMC), Erode, pp. 942\u2013944 (2018)","key":"22_CR24","DOI":"10.1109\/ICCMC.2018.8487756"},{"issue":"3","key":"22_CR25","doi-asserted-by":"publisher","first-page":"23","DOI":"10.14257\/ijgdc.2014.7.3.03","volume":"7","author":"JS Patel","year":"2014","unstructured":"Patel, J.S., Chavda, V.M.: Security vulnerability and robust security requirements using key management in sensor network. Int. J. Grid Distrib. Comput. 7(3), 23\u201328 (2014)","journal-title":"Int. J. Grid Distrib. Comput."}],"container-title":["Communications in Computer and Information Science","Frontiers in Cyber Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-15-0818-9_22","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,11,7]],"date-time":"2019-11-07T19:20:10Z","timestamp":1573154410000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-981-15-0818-9_22"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9789811508172","9789811508189"],"references-count":25,"URL":"https:\/\/doi.org\/10.1007\/978-981-15-0818-9_22","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"8 November 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"FCS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Frontiers in Cyber Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Xi'an","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"15 November 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17 November 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"fcs2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/fcs.xidian.edu.cn","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"67","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"20","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"30% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3.55","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"5","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}