{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,10]],"date-time":"2025-09-10T22:16:51Z","timestamp":1757542611328,"version":"3.37.3"},"reference-count":8,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2019,2,26]],"date-time":"2019-02-26T00:00:00Z","timestamp":1551139200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"name":"the Fundamental Research Funds for the Central Universities","award":["ZYGX2015J054"],"award-info":[{"award-number":["ZYGX2015J054"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Int J Wireless Inf Networks"],"published-print":{"date-parts":[[2019,3]]},"DOI":"10.1007\/s10776-019-00423-0","type":"journal-article","created":{"date-parts":[[2019,2,26]],"date-time":"2019-02-26T05:27:13Z","timestamp":1551158833000},"page":"61-66","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["A Novel Sub-regional Key Distribution Scheme for Distributed Wireless Sensor Networks"],"prefix":"10.1007","volume":"26","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-2516-811X","authenticated-orcid":false,"given":"Yinghong","family":"Liu","sequence":"first","affiliation":[]},{"given":"Yuanming","family":"Wu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,2,26]]},"reference":[{"key":"423_CR1","doi-asserted-by":"crossref","unstructured":"L. Eschenauer, and V.D. Gligor, A key management scheme for distributed sensor networks. In: Proceedings of the 9th ACM conference on computer and communications security. ACM Press, New York, pp. 41\u201347, 2002.","DOI":"10.1145\/586110.586117"},{"issue":"3","key":"423_CR2","doi-asserted-by":"publisher","first-page":"1419","DOI":"10.1007\/s11277-015-2290-9","volume":"82","author":"EAM Anita","year":"2015","unstructured":"E. A. M. Anita, R. Geetha and E. Kannan, A novel hybrid key management scheme for establishing secure communication in wireless sensor networks, Wireless Personal Communication, Vol. 82, No. 3, pp. 1419\u20131433, 2015.","journal-title":"Wireless Personal Communication"},{"key":"423_CR3","unstructured":"S. Zhu, S. Setia, S. Jajodia. Leap: efficient security mechanisms for large-scale distributed sensor networks. In: Proceedings of the 10th ACM Conference on Computer and Communications Security (CCS\u201903). pp. 62\u201372, 2003."},{"issue":"4","key":"423_CR4","doi-asserted-by":"publisher","first-page":"500","DOI":"10.1145\/1218556.1218559","volume":"2","author":"S Zhu","year":"2006","unstructured":"S. Zhu, S. Setia and S. Jajodia, LEAP+: efficient security mechanisms for large-scale distributed sensor networks, ACM Transactions on Sensor Networks, Vol. 2, No. 4, pp. 500\u2013528, 2006.","journal-title":"ACM Transactions on Sensor Networks"},{"issue":"2","key":"423_CR5","doi-asserted-by":"publisher","first-page":"494","DOI":"10.1109\/JSYST.2015.2422736","volume":"11","author":"J Choi","year":"2017","unstructured":"J. Choi, J. Bang, L. Kim, M. Ahn and T. Kwon, Location-based key management strong against insider threats in wireless sensor network, IEEE Systems Journal, Vol. 11, No. 2, pp. 494\u2013502, 2017.","journal-title":"IEEE Systems Journal"},{"issue":"2","key":"423_CR6","doi-asserted-by":"publisher","first-page":"801","DOI":"10.1007\/s11277-013-1493-1","volume":"78","author":"NC Wang","year":"2014","unstructured":"N. C. Wang, Y. L. Chen and H. L. Chen, An efficient grid-based pairwise key pre-distribution scheme for wireless sensor networks, Wireless Personal Communication, Vol. 78, No. 2, pp. 801\u2013816, 2014.","journal-title":"Wireless Personal Communication"},{"issue":"9","key":"423_CR7","doi-asserted-by":"publisher","first-page":"33","DOI":"10.1109\/35.312841","volume":"32","author":"BC Neuman","year":"1994","unstructured":"B. C. Neuman and T. Tso, Kerberos: an authentication service for computer network, IEEE Communications, Vol. 32, No. 9, pp. 33\u201338, 1994.","journal-title":"IEEE Communications"},{"issue":"190","key":"423_CR8","first-page":"1","volume":"39","author":"P Guo","year":"2015","unstructured":"P. Guo, J. Wang and S. Ji, A lightweight encryption scheme combined with trust management for privacy-preserving in body sensor networks, Journal of Medical Systems, Vol. 39, No. 190, pp. 1\u20138, 2015.","journal-title":"Journal of Medical Systems"}],"container-title":["International Journal of Wireless Information Networks"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10776-019-00423-0\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10776-019-00423-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10776-019-00423-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,2,25]],"date-time":"2020-02-25T19:17:24Z","timestamp":1582658244000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10776-019-00423-0"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,2,26]]},"references-count":8,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2019,3]]}},"alternative-id":["423"],"URL":"https:\/\/doi.org\/10.1007\/s10776-019-00423-0","relation":{},"ISSN":["1068-9605","1572-8129"],"issn-type":[{"type":"print","value":"1068-9605"},{"type":"electronic","value":"1572-8129"}],"subject":[],"published":{"date-parts":[[2019,2,26]]},"assertion":[{"value":"25 July 2018","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"11 February 2019","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"26 February 2019","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}