{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,12]],"date-time":"2026-03-12T21:49:56Z","timestamp":1773352196447,"version":"3.50.1"},"reference-count":35,"publisher":"Springer Science and Business Media LLC","issue":"6","license":[{"start":{"date-parts":[[2020,3,31]],"date-time":"2020-03-31T00:00:00Z","timestamp":1585612800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,3,31]],"date-time":"2020-03-31T00:00:00Z","timestamp":1585612800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100007129","name":"Natural Science Foundation of Shandong Province","doi-asserted-by":"crossref","award":["ZR2019MF054"],"award-info":[{"award-number":["ZR2019MF054"]}],"id":[{"id":"10.13039\/501100007129","id-type":"DOI","asserted-by":"crossref"}]},{"DOI":"10.13039\/501100012558","name":"Foundation of Science and Technology on Information Assurance Laboratory","doi-asserted-by":"publisher","award":["KJ-17-004"],"award-info":[{"award-number":["KJ-17-004"]}],"id":[{"id":"10.13039\/501100012558","id-type":"DOI","asserted-by":"publisher"}]},{"name":"2017 Weihai University Co-construction Project"},{"name":"Equip Pre-research Projects of 2018 supported by Foundation of China Academy of Space Technology","award":["WT-TXYY\/ WLZDFHJY003"],"award-info":[{"award-number":["WT-TXYY\/ WLZDFHJY003"]}]},{"DOI":"10.13039\/501100012226","name":"Fundamental Research Funds for the Central Universities","doi-asserted-by":"crossref","award":["HIT.NSRIF.2020099"],"award-info":[{"award-number":["HIT.NSRIF.2020099"]}],"id":[{"id":"10.13039\/501100012226","id-type":"DOI","asserted-by":"crossref"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"crossref","award":["61902091"],"award-info":[{"award-number":["61902091"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]},{"name":"engineering technology and research center of weihai information security"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Wireless Netw"],"published-print":{"date-parts":[[2020,8]]},"DOI":"10.1007\/s11276-020-02317-z","type":"journal-article","created":{"date-parts":[[2020,3,31]],"date-time":"2020-03-31T19:02:52Z","timestamp":1585681372000},"page":"4061-4078","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["A centralized key management scheme for space network with resistance of nonlinear channel noise"],"prefix":"10.1007","volume":"26","author":[{"given":"Jie","family":"Liu","sequence":"first","affiliation":[]},{"given":"Xiaojun","family":"Tong","sequence":"additional","affiliation":[]},{"given":"Zhu","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Miao","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Jing","family":"Ma","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,3,31]]},"reference":[{"issue":"8","key":"2317_CR1","doi-asserted-by":"crossref","first-page":"82","DOI":"10.1109\/MCOM.2015.7180512","volume":"53","author":"C Jiang","year":"2015","unstructured":"Jiang, C., Wang, X., Wang, J., Chen, H. H., & Ren, Y. (2015). Security in space information networks. IEEE Communications Magazine,53(8), 82\u201388.","journal-title":"IEEE Communications Magazine"},{"key":"2317_CR2","unstructured":"McDaniel, P., Prakash, A., & Honeyman, P. (1999). Antigone: A flexible framework for secure group communication. Center for Information Technology Integration."},{"issue":"3","key":"2317_CR3","doi-asserted-by":"crossref","first-page":"309","DOI":"10.1145\/937503.937506","volume":"35","author":"S Rafaeli","year":"2003","unstructured":"Rafaeli, S., & Hutchison, D. (2003). A survey of key management for secure group communication. ACM Computing Surveys (CSUR),35(3), 309\u2013329.","journal-title":"ACM Computing Surveys (CSUR)"},{"issue":"1","key":"2317_CR4","doi-asserted-by":"crossref","first-page":"1-es","DOI":"10.1145\/1216370.1216371","volume":"39","author":"JVD Merwe","year":"2007","unstructured":"Merwe, J. V. D., Dawoud, D., & McDonald, S. (2007). A survey on peer-to-peer key management for mobile ad hoc networks. ACM Computing Surveys (CSUR),39(1), 1-es.","journal-title":"ACM Computing Surveys (CSUR)"},{"issue":"1","key":"2317_CR5","first-page":"105","volume":"2","author":"Y Challal","year":"2005","unstructured":"Challal, Y., & Seba, H. (2005). Group key management protocols: A novel taxonomy. International Journal of Information Technology,2(1), 105\u2013118.","journal-title":"International Journal of Information Technology"},{"key":"2317_CR6","doi-asserted-by":"crossref","unstructured":"Rani, T. P., & Kumar, C. J. (2012). Survey on key pre distribution for security in wireless sensor networks. In International conference on computer science and information technology (pp. 248\u2013252). Springer.","DOI":"10.1007\/978-3-642-27299-8_26"},{"issue":"1","key":"2317_CR7","doi-asserted-by":"crossref","first-page":"16","DOI":"10.1109\/90.836475","volume":"8","author":"CK Wong","year":"2000","unstructured":"Wong, C. K., Gouda, M., & Lam, S. S. (2000). Secure group communications using key graphs. IEEE\/ACM Transactions on Networking,8(1), 16\u201330.","journal-title":"IEEE\/ACM Transactions on Networking"},{"issue":"5","key":"2317_CR8","doi-asserted-by":"crossref","first-page":"444","DOI":"10.1109\/TSE.2003.1199073","volume":"29","author":"AT Sherman","year":"2003","unstructured":"Sherman, A. T., & McGrew, D. A. (2003). Key establishment in large dynamic groups using one-way function trees. IEEE Transactions on Software Engineering,29(5), 444\u2013458.","journal-title":"IEEE Transactions on Software Engineering"},{"issue":"9","key":"2317_CR9","doi-asserted-by":"crossref","first-page":"1614","DOI":"10.1109\/49.790485","volume":"17","author":"M Waldvogel","year":"1999","unstructured":"Waldvogel, M., Caronni, G., Sun, D., Weiler, N., & Plattner, B. (1999). The VersaKey framework: Versatile group key management. IEEE Journal on Selected Areas in Communications,17(9), 1614\u20131631.","journal-title":"IEEE Journal on Selected Areas in Communications"},{"key":"2317_CR10","unstructured":"Li, D., Zhang, R., & WAng, C. (2012). Efficient group key management scheme with hierarchy structure. Chinese Journal of Electronics, 21(2)."},{"issue":"3","key":"2317_CR11","doi-asserted-by":"crossref","first-page":"481","DOI":"10.1007\/s11227-011-0607-3","volume":"61","author":"H Seba","year":"2012","unstructured":"Seba, H., Lagraa, S., & Kheddouci, H. (2012). Alliance-based clustering scheme for group key management in mobile ad hoc networks. The Journal of Supercomputing,61(3), 481\u2013501.","journal-title":"The Journal of Supercomputing"},{"issue":"2","key":"2317_CR12","doi-asserted-by":"crossref","first-page":"359","DOI":"10.1007\/s11277-008-9653-4","volume":"52","author":"JH Son","year":"2010","unstructured":"Son, J. H., Lee, J. S., & Seo, S. W. (2010). Topological key hierarchy for energy-efficient group key management in wireless sensor networks. Wireless Personal Communications,52(2), 359.","journal-title":"Wireless Personal Communications"},{"issue":"1","key":"2317_CR13","doi-asserted-by":"crossref","first-page":"384","DOI":"10.1016\/j.jnca.2010.05.001","volume":"34","author":"E Konstantinou","year":"2011","unstructured":"Konstantinou, E. (2011). Efficient cluster-based group key agreement protocols for wireless ad hoc networks. Journal of Network and Computer Applications,34(1), 384\u2013393.","journal-title":"Journal of Network and Computer Applications"},{"key":"2317_CR14","doi-asserted-by":"crossref","unstructured":"Arslan, M. G., & Alagoz, F. (2006). Security issues and performance study of key management techniques over satellite links. In 2006 11th international workshop on computer-aided modeling, analysis and design of communication links and networks (pp. 122\u2013128). IEEE.","DOI":"10.1109\/CAMAD.2006.1649728"},{"key":"2317_CR15","doi-asserted-by":"crossref","unstructured":"Ahmad, K., Bakhache, B., El Assad, S., & Sindian, S. (2012). A scalable key management scheme for secure IP multicast over DVB-S using chaos. In 2012 16th IEEE mediterranean electrotechnical conference (pp. 736\u2013740). IEEE.","DOI":"10.1109\/MELCON.2012.6196536"},{"issue":"1","key":"2317_CR16","doi-asserted-by":"crossref","first-page":"269","DOI":"10.1007\/s11277-013-1505-1","volume":"77","author":"J Zhou","year":"2014","unstructured":"Zhou, J., Song, M., Song, J., Zhou, X. W., & Sun, L. (2014). Autonomic group key management in deep space DTN. Wireless Personal Communications,77(1), 269\u2013287.","journal-title":"Wireless Personal Communications"},{"key":"2317_CR17","doi-asserted-by":"crossref","unstructured":"Caparra, G., Ceccato, S., Sturaro, S., & Laurenti, N. (2017). A key management architecture for GNSS open service Navigation Message Authentication. In 2017 European navigation conference (ENC) (pp. 287\u2013297). IEEE.","DOI":"10.1109\/EURONAV.2017.7954220"},{"issue":"17","key":"2317_CR18","doi-asserted-by":"crossref","first-page":"e3358","DOI":"10.1002\/dac.3358","volume":"30","author":"V Sureshkumar","year":"2017","unstructured":"Sureshkumar, V., Amin, R., & Anitha, R. (2017). An enhanced bilinear pairing based authenticated key agreement protocol for multiserver environment. International Journal of Communication Systems,30(17), e3358.","journal-title":"International Journal of Communication Systems"},{"issue":"5","key":"2317_CR19","doi-asserted-by":"crossref","first-page":"1132","DOI":"10.1007\/s11036-016-0776-7","volume":"23","author":"L Harn","year":"2018","unstructured":"Harn, L., Hsu, C. F., & Li, B. (2018). Centralized group key establishment protocol without a mutually trusted third party. Mobile Networks and Applications,23(5), 1132\u20131140.","journal-title":"Mobile Networks and Applications"},{"key":"2317_CR20","doi-asserted-by":"crossref","unstructured":"Elmasri, M. H., Megahed, M. H., & Elazeem, M. H. A. (2016). Design and software implementation of new high performance group key management algorithm for tactical satellite. In 2016 33rd National radio science conference (NRSC) (pp. 149\u2013158). IEEE.","DOI":"10.1109\/NRSC.2016.7450848"},{"key":"2317_CR21","unstructured":"Qian, L., Ningning, S., & Wenlu, Z. (2013). Research of centralized multicast key management for LEO satellite networks."},{"key":"2317_CR22","doi-asserted-by":"crossref","unstructured":"Roy-Chowdhury, A., & Baras, J. S. (2004). Key management for secure multicast in hybrid satellite networks. In IFIP international information security conference (pp. 533\u2013548). Springer.","DOI":"10.1007\/1-4020-8143-X_35"},{"key":"2317_CR23","doi-asserted-by":"crossref","unstructured":"Jiao, W., Hu, J., Lu, Z., & Xu, J. (2013). A threshold value-based group key management for satellite network. In 2013 IEEE Third International Conference on Information Science and Technology (ICIST) (pp. 718-721). IEEE.","DOI":"10.1109\/ICIST.2013.6747646"},{"key":"2317_CR24","doi-asserted-by":"crossref","unstructured":"Liu, Y., Zhang, A., Li, J., & Wu, J. (2016). An anonymous distributed key management system based on CL-PKC for space information network. In 2016 IEEE international conference on communications (ICC) (pp. 1\u20137). IEEE.","DOI":"10.1109\/ICC.2016.7510841"},{"key":"2317_CR25","doi-asserted-by":"crossref","first-page":"269","DOI":"10.1016\/j.comnet.2016.12.017","volume":"113","author":"M Gharib","year":"2017","unstructured":"Gharib, M., Moradlou, Z., Doostari, M. A., & Movaghar, A. (2017). Fully distributed ECC-based key management for mobile ad hoc networks. Computer Networks,113, 269\u2013283.","journal-title":"Computer Networks"},{"issue":"1","key":"2317_CR26","doi-asserted-by":"crossref","first-page":"95","DOI":"10.1007\/s11277-017-5040-3","volume":"99","author":"Q Zhang","year":"2018","unstructured":"Zhang, Q., Yuan, J., Guo, G., Gan, Y., & Zhang, J. (2018). An authentication key establish protocol for WSNs based on combined key. Wireless Personal Communications,99(1), 95\u2013110.","journal-title":"Wireless Personal Communications"},{"key":"2317_CR27","unstructured":"Lavanya, S., & Usha, M. (2018). Dynamic key management in heterogeneous wireless sensor networks based on residual energy. In International conference on mobile and wireless technology (pp. 59\u201368). Springer."},{"issue":"24","key":"2317_CR28","doi-asserted-by":"crossref","first-page":"10163","DOI":"10.1109\/JSEN.2018.2871661","volume":"18","author":"H Fakhrey","year":"2018","unstructured":"Fakhrey, H., Johnston, M., Angelini, F., & Tiwari, R. (2018). The optimum design of location-dependent key management protocol for a multiple sink WSN using a random selected cell reporter. IEEE Sensors Journal,18(24), 10163\u201310173.","journal-title":"IEEE Sensors Journal"},{"issue":"2","key":"2317_CR29","doi-asserted-by":"crossref","first-page":"355","DOI":"10.18494\/SAM.2019.2085","volume":"31","author":"TC Hsiao","year":"2019","unstructured":"Hsiao, T. C., Chen, T. L., Chen, T. S., & Chung, Y. F. (2019). Elliptic curve cryptosystems-based date-constrained hierarchical key management scheme in internet of things. Sensors and Materials,31(2), 355\u2013364.","journal-title":"Sensors and Materials"},{"issue":"4","key":"2317_CR30","doi-asserted-by":"crossref","first-page":"2401","DOI":"10.1007\/s11071-012-0628-3","volume":"70","author":"P Gong","year":"2012","unstructured":"Gong, P., Li, P., & Shi, W. (2012). A secure chaotic maps-based key agreement protocol without using smart cards. Nonlinear Dynamics,70(4), 2401\u20132406.","journal-title":"Nonlinear Dynamics"},{"issue":"4","key":"2317_CR31","doi-asserted-by":"crossref","first-page":"345","DOI":"10.3233\/FI-2019-1851","volume":"169","author":"P Zajac","year":"2019","unstructured":"Zajac, P. (2019). Hybrid encryption from McEliece cryptosystem with pseudo-random error vector. Fundamenta Informaticae,169(4), 345\u2013360.","journal-title":"Fundamenta Informaticae"},{"key":"2317_CR32","doi-asserted-by":"crossref","first-page":"243","DOI":"10.1016\/j.ins.2019.09.030","volume":"510","author":"P Branco","year":"2020","unstructured":"Branco, P., Mateus, P., Salema, C., & Souto, A. (2020). Using low-density parity-check codes to improve the McEliece cryptosystem. Information Sciences,510, 243\u2013255.","journal-title":"Information Sciences"},{"key":"2317_CR33","doi-asserted-by":"crossref","unstructured":"Misoczki, R., Tillich, J. P., Sendrier, N., & Barreto, P. S. (2013). MDPC-McEliece: New McEliece variants from moderate density parity-check codes. In 2013 IEEE international symposium on information theory (pp. 2069\u20132073). IEEE.","DOI":"10.1109\/ISIT.2013.6620590"},{"key":"2317_CR34","doi-asserted-by":"crossref","unstructured":"Von Maurich, I., & G\u00fcneysu, T. (2014). Lightweight code-based cryptography: QC-MDPC McEliece encryption on reconfigurable devices. In 2014 Design, automation and test in Europe conference and exhibition (date) (pp. 1\u20136). IEEE.","DOI":"10.7873\/DATE2014.051"},{"key":"2317_CR35","doi-asserted-by":"crossref","unstructured":"Becker, A., Joux, A., May, A., & Meurer, A. (2012). Decoding random binary linear codes in 2 n\/20: How 1\u2009+\u20091\u2009=\u20090 improves information set decoding. In Annual international conference on the theory and applications of cryptographic techniques (pp. 520\u2013536). Springer.","DOI":"10.1007\/978-3-642-29011-4_31"}],"container-title":["Wireless Networks"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11276-020-02317-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11276-020-02317-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11276-020-02317-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,3,30]],"date-time":"2021-03-30T23:29:05Z","timestamp":1617146945000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11276-020-02317-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,3,31]]},"references-count":35,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2020,8]]}},"alternative-id":["2317"],"URL":"https:\/\/doi.org\/10.1007\/s11276-020-02317-z","relation":{},"ISSN":["1022-0038","1572-8196"],"issn-type":[{"value":"1022-0038","type":"print"},{"value":"1572-8196","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,3,31]]},"assertion":[{"value":"31 March 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Compliance with ethical standards"}},{"value":"The authors declare that they have no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}