{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,26]],"date-time":"2025-09-26T00:07:03Z","timestamp":1758845223344},"reference-count":36,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2013,8,14]],"date-time":"2013-08-14T00:00:00Z","timestamp":1376438400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Wireless Netw"],"published-print":{"date-parts":[[2014,5]]},"DOI":"10.1007\/s11276-013-0627-4","type":"journal-article","created":{"date-parts":[[2013,8,13]],"date-time":"2013-08-13T07:23:49Z","timestamp":1376378629000},"page":"625-637","source":"Crossref","is-referenced-by-count":13,"title":["Key management protocol with end-to-end data security and key revocation for a multi-BS wireless sensor network"],"prefix":"10.1007","volume":"20","author":[{"given":"Huei-Wen","family":"Ferng","sequence":"first","affiliation":[]},{"given":"Jeffrey","family":"Nurhakim","sequence":"additional","affiliation":[]},{"given":"Shi-Jinn","family":"Horng","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2013,8,14]]},"reference":[{"issue":"8","key":"627_CR1","doi-asserted-by":"crossref","first-page":"102","DOI":"10.1109\/MCOM.2002.1024422","volume":"40","author":"I. F. Akyildiz","year":"2002","unstructured":"Akyildiz, I. F., Su, W., Sankarasubramaniam, Y., & Cayirci, E. (2002). A survey on sensor networks. IEEE Communications Magazine, 40(8), 102\u2013114.","journal-title":"IEEE Communications Magazine"},{"key":"627_CR2","doi-asserted-by":"crossref","unstructured":"Blom, R. (1984, April). An optimal class of symmetric key generation systems. In Proceedings of EUROCRYPT\u201984, pp. 335\u2013338.","DOI":"10.1007\/3-540-39757-4_22"},{"key":"627_CR3","doi-asserted-by":"crossref","unstructured":"Blundo, C., Santis, A. D., Herzberg, A., Kutten, S., Vaccaro, U., & Yung, M. (1992, August). Perfectly-secure key distribution for dynamic conferences. In Proceedings of international cryptology conference\u201992, pp. 471\u2013486.","DOI":"10.1007\/3-540-48071-4_33"},{"issue":"1","key":"627_CR4","doi-asserted-by":"crossref","first-page":"52","DOI":"10.1109\/TMC.2003.1195151","volume":"2","author":"S. Capkun","year":"2003","unstructured":"Capkun, S., Buttyan, L., & Hubaux, J.P. (2003). Self-organized public-key management for mobile ad hoc networks. IEEE Transactions Mobile Computing, 2(1), 52\u201364.","journal-title":"IEEE Transactions Mobile Computing"},{"issue":"2","key":"627_CR5","doi-asserted-by":"crossref","first-page":"221","DOI":"10.1109\/JSAC.2005.861380","volume":"24","author":"S. Capkun","year":"2006","unstructured":"Capkun, S., & Hubaux, J. P. (2006). Secure positioning in wireless networks. IEEE Journal on Selected Areas in Communications, 24(2), 221\u2013232.","journal-title":"IEEE Journal on Selected Areas in Communications"},{"key":"627_CR6","unstructured":"Carman, D. W., Kruus, P. S., & Matt, B. J. (2000, September). Constraints and approaches for distributed sensor network security. NAI labs technical report."},{"key":"627_CR7","unstructured":"Chan, H., Perrig, A., & Song, D. (2003, May). Random key pre-distribution schemes for sensor network. In Proceedings of IEEE symposium on security and privacy\u201903, pp. 197\u2013213."},{"issue":"3","key":"627_CR8","doi-asserted-by":"crossref","first-page":"233","DOI":"10.1109\/TDSC.2005.37","volume":"2","author":"H. Chan","year":"2005","unstructured":"Chan, H., Gligor, V. D., Perrig, A., & Muralidharan, G. (2005). On the distribution and revocation of cryptographic keys in sensor networks. IEEE Transactions on Dependable and Secure Computing, 2(3), 233\u2013247.","journal-title":"IEEE Transactions on Dependable and Secure Computing"},{"key":"627_CR9","unstructured":"Chan, A. C. F. (2004, March). Distributed symmetric key management for mobile ad hoc networks. In Proceedings of IEEE INFOCOM\u201904, pp. 2414\u20132424."},{"issue":"2","key":"627_CR10","doi-asserted-by":"crossref","first-page":"52","DOI":"10.1109\/SURV.2009.090205","volume":"11","author":"X. Chen","year":"2009","unstructured":"Chen, X., Makki, K., Yen, K., & Pissinou, N. (2009). Sensor network security: A survey. IEEE Communications Surveys and Tutorials, 11(2), 52\u201373.","journal-title":"IEEE Communications Surveys and Tutorials"},{"issue":"6","key":"627_CR11","doi-asserted-by":"crossref","first-page":"644","DOI":"10.1109\/TIT.1976.1055638","volume":"22","author":"W. Diffie","year":"1976","unstructured":"Diffie, W., & Hellman, M. E. (1976). New directions in cryptography. IEEE Transactions on Information Theory, 22(6), 644\u2013654.","journal-title":"IEEE Transactions on Information Theory"},{"issue":"2","key":"627_CR12","doi-asserted-by":"crossref","first-page":"228","DOI":"10.1145\/1065545.1065548","volume":"8","author":"W. Du","year":"2005","unstructured":"Du, W., Deng, J., Han, Y. S., Varshney, P. K., Katz, J., & Khalili, A. (2005). A pairwise key pre-distribution scheme for wireless sensor networks. ACM Transactions on Information and System Security, 8(2), 228\u2013258.","journal-title":"ACM Transactions on Information and System Security"},{"key":"627_CR13","doi-asserted-by":"crossref","unstructured":"Eschenauer, L., & Gligor, V. D. (2002, November). A key management scheme for distributed sensor networks. In ACM conference on computer and communications security\u201902, pp. 41\u201347.","DOI":"10.1145\/586115.586117"},{"key":"627_CR14","doi-asserted-by":"crossref","unstructured":"Gandham, S. R., Dawande, M., Prakash, R., & Venkatesan, S. (2003). Energy efficient schemes for wireless sensor networks with multiple mobile base stations. In Proceedings of globecom\u201903, pp. 377\u2013381.","DOI":"10.1109\/GLOCOM.2003.1258265"},{"key":"627_CR15","volume-title":"Foundations of cryptography: Basic tools","author":"O. Goldreich","year":"2000","unstructured":"Goldreich, O. (2000). Foundations of cryptography: Basic tools. New York: Cambridge University Press."},{"key":"627_CR16","doi-asserted-by":"crossref","unstructured":"Lazos, L., & Poovendran, R. (2004, October). Serloc: Secure range-independent localization for wireless sensor networks. In Proceedings of ACM international conference mobile computing and networking\u201904.","DOI":"10.1145\/1023646.1023650"},{"issue":"5","key":"627_CR17","doi-asserted-by":"crossref","first-page":"76","DOI":"10.1109\/MWC.2007.4396946","volume":"14","author":"J. C. Lee","year":"2007","unstructured":"Lee, J. C., Leung, V. C. M., Wong, K. H., Cao, J., & Chan, H. C. B. (2007). Key management issues in wireless sensor networks: Current proposals and future developments. IEEE Wireless Communications, 14(5), 76\u201384.","journal-title":"IEEE Wireless Communications"},{"key":"627_CR18","doi-asserted-by":"crossref","unstructured":"Merkle, R. (1980, April). Protocols for public key cryptosystems. In Proceedings of IEEE symposium research in security and Privacy\u201980, pp. 122\u2013134.","DOI":"10.1109\/SP.1980.10006"},{"issue":"9","key":"627_CR19","doi-asserted-by":"crossref","first-page":"33","DOI":"10.1109\/35.312841","volume":"32","author":"B. C. Neuman","year":"1994","unstructured":"Neuman, B. C., & Tso, T. (1994). Kerberos: An authentication service for computer networks. IEEE Communications Magazine, 32(9), 33\u201338.","journal-title":"IEEE Communications Magazine"},{"key":"627_CR20","doi-asserted-by":"crossref","unstructured":"Oyman, E. I., & Ersoy, C. (2004). Multiple sink network design problem in large scale wireless sensor networks. In Proceedings of IEEE ICC\u201904, pp. 3663\u20133667.","DOI":"10.1109\/ICC.2004.1313226"},{"key":"627_CR21","doi-asserted-by":"crossref","unstructured":"Pathak, V., Yao, D., & Iftode, L. (2008, September). Securing location aware services over VANET using geographical secure path routing. In Proceedings of IEEE ICVES\u201908, pp. 346\u2013353.","DOI":"10.1109\/ICVES.2008.4640905"},{"key":"627_CR22","doi-asserted-by":"crossref","unstructured":"Perrig, A., Szewczyk, R., Wen, V., Cullar, D., & Tygar, J. D. (2001, July). SPINS: Security protocols for sensor networks. In Proceedings of ACM\/IEEE international conference on mobile computing and networking\u201901, pp. 189\u2013199.","DOI":"10.1145\/381677.381696"},{"key":"627_CR23","unstructured":"Peters, B., Smith, J., Medeiros, O., & Rohrer, M. (2001). \u2018Improving simulation model adaptability with a production control framework. In Proceedings of simulation conference\u201901."},{"issue":"5","key":"627_CR24","doi-asserted-by":"crossref","first-page":"585","DOI":"10.1109\/TMC.2007.70753","volume":"7","author":"K. Ren","year":"2008","unstructured":"Ren, K., Lou, W., & Zhang, Y. (2008). LEDS: Providing location-aware end-to-end data security in wireless sensor networks. IEEE Transactions on Mobile Computing, 7(5), 585\u2013598.","journal-title":"IEEE Transactions on Mobile Computing"},{"issue":"2","key":"627_CR25","doi-asserted-by":"crossref","first-page":"120","DOI":"10.1145\/359340.359342","volume":"21","author":"R. L. Rivest","year":"1978","unstructured":"Rivest, R. L., Shamir, A., & Adleman, L. M. (1978). A method for obtaining digital signatures and public key cryptosystems. Communications of the ACM, 21(2), 120\u2013126.","journal-title":"Communications of the ACM"},{"issue":"11","key":"627_CR26","doi-asserted-by":"crossref","first-page":"612","DOI":"10.1145\/359168.359176","volume":"22","author":"A. Shamir","year":"1979","unstructured":"Shamir, A. (1979). How to share a secret. Communications of the ACM, 22(11), 612\u2013613.","journal-title":"Communications of the ACM"},{"key":"627_CR27","doi-asserted-by":"crossref","unstructured":"Wang, Y., Ramamurthy, B., & Xue, Y. (2008, May). A key management protocol for wireless sensor networks with multiple base stations. In Proceedings of ICC\u201908, pp. 1625\u20131629.","DOI":"10.1109\/ICC.2008.314"},{"key":"627_CR28","doi-asserted-by":"crossref","unstructured":"Yang, H., Ye, F., Yuan, Y., Lu, S., & Arbaugh, W. (2005). Toward resilient security in wireless sensor networks. In Proceedings of ACM MobiHoc\u201905.","DOI":"10.1145\/1062689.1062696"},{"key":"627_CR29","doi-asserted-by":"crossref","unstructured":"Ye, F., Luo, H., Cheng, J., Lu, S., & Zhang, L. (2002, September). A two-tier data dissemination model for large-scale wireless sensor networks. In Proceedings of ACM MOBICOM\u201902.","DOI":"10.1145\/570662.570664"},{"key":"627_CR30","unstructured":"Ye, F., Luo, H., Lu, S., & Zhang, L. (2004, March). Statistical en-route filtering of injected false data in sensor networks. In Proceedings of IEEE INFOCOM\u201904."},{"issue":"11(3","key":"627_CR31","doi-asserted-by":"crossref","first-page":"285","DOI":"10.1007\/s11276-005-6612-9","volume":"05","author":"F. Ye","year":"2005","unstructured":"Ye, F., Lu, S., & Zhang, L. (2005). Gradient broadcast: A robust data delivery protocol for large scale sensor networks. Wireless Networks\u2019, 05(11(3), 285\u2013298.","journal-title":"Wireless Networks\u2019"},{"issue":"4","key":"627_CR32","doi-asserted-by":"crossref","first-page":"829","DOI":"10.1109\/JSAC.2005.863855","volume":"24","author":"Y. Zhang","year":"2006","unstructured":"Zhang, Y., Liu, W., Fang, Y., & Wu, D. (2006). Secure localization and authentication in ultra-wideband sensor networks. IEEE J. Selected Areas Comm., 24(4), 829\u2013835.","journal-title":"IEEE J. Selected Areas Comm."},{"issue":"3","key":"627_CR33","doi-asserted-by":"crossref","first-page":"6","DOI":"10.1109\/COMST.2008.4625802","volume":"10","author":"Y. Zhou","year":"2008","unstructured":"Zhou, Y., Zhang, Y., & Fang, Y. (2008). Securing wireless sensor networks: a survey. IEEE Communications Surveys and Tutorials, 10(3), 6\u201328.","journal-title":"IEEE Communications Surveys and Tutorials"},{"key":"627_CR34","doi-asserted-by":"crossref","unstructured":"Zhu, S., Setia, S., & Jajodia, S. (2003, October). LEAP: Efficient security mechanisms for large-scale distributed sensor networks. In Proceedings of ACM conference on computer and communications security\u201903, pp. 62\u201372.","DOI":"10.1145\/948109.948120"},{"key":"627_CR35","unstructured":"Zhu, S., Setia, S., Jajodia, S., & Ning, P. (2004, May). An interleaved hop-by-hop authentication scheme for filtering of injected false data in sensor networks. In Proceedings of IEEE symposium security and privacy\u201904."},{"issue":"4","key":"627_CR36","doi-asserted-by":"crossref","first-page":"500","DOI":"10.1145\/1218556.1218559","volume":"2","author":"S. Zhu","year":"2008","unstructured":"Zhu, S., Setia, S., & Jajodia, S. (2006) LEAP+: Efficient security mechanisms for large-scale distributed sensor networks. ACM Transactions on Sensor Networks 2(4):500\u2013528.","journal-title":"ACM Transactions on Sensor Networks"}],"container-title":["Wireless Networks"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11276-013-0627-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11276-013-0627-4\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11276-013-0627-4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,7,20]],"date-time":"2019-07-20T18:21:35Z","timestamp":1563646895000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11276-013-0627-4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,8,14]]},"references-count":36,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2014,5]]}},"alternative-id":["627"],"URL":"https:\/\/doi.org\/10.1007\/s11276-013-0627-4","relation":{},"ISSN":["1022-0038","1572-8196"],"issn-type":[{"value":"1022-0038","type":"print"},{"value":"1572-8196","type":"electronic"}],"subject":[],"published":{"date-parts":[[2013,8,14]]}}}