{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,4]],"date-time":"2026-02-04T16:13:37Z","timestamp":1770221617774,"version":"3.49.0"},"reference-count":27,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2017,11,4]],"date-time":"2017-11-04T00:00:00Z","timestamp":1509753600000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Wireless Pers Commun"],"published-print":{"date-parts":[[2018,3]]},"DOI":"10.1007\/s11277-017-5040-3","type":"journal-article","created":{"date-parts":[[2017,11,4]],"date-time":"2017-11-04T11:18:11Z","timestamp":1509794291000},"page":"95-110","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":7,"title":["An Authentication Key Establish Protocol for WSNs Based on Combined Key"],"prefix":"10.1007","volume":"99","author":[{"given":"Qikun","family":"Zhang","sequence":"first","affiliation":[]},{"given":"Junling","family":"Yuan","sequence":"additional","affiliation":[]},{"given":"Ge","family":"Guo","sequence":"additional","affiliation":[]},{"given":"Yong","family":"Gan","sequence":"additional","affiliation":[]},{"given":"Jianwei","family":"Zhang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,11,4]]},"reference":[{"key":"5040_CR1","doi-asserted-by":"crossref","unstructured":"Fanian, A., & Berenjkoub, M. (2012). An efficient end to end key establishment protocol for wireless sensor networks. In 9th international ISC conference on information security and cryptology (ISCISC) (pp. 73\u201379).","DOI":"10.1109\/ISCISC.2012.6408194"},{"issue":"2","key":"5040_CR2","doi-asserted-by":"crossref","first-page":"113","DOI":"10.1007\/s11235-010-9391-2","volume":"50","author":"W Znaidi","year":"2012","unstructured":"Znaidi, W., & Minier, M. (2012). Key establishment and management for WSNs. Telecommunication Systems, 50(2), 113\u2013125.","journal-title":"Telecommunication Systems"},{"issue":"2","key":"5040_CR3","first-page":"18","volume":"9","author":"M Li","year":"2013","unstructured":"Li, M., Yu, S., Guttman, J. D., Lou, W., & Ren, K. (2013). Secure ad hoc trust initialization and key management in wireless body area networks. ACM Transactions on Sensor Networks, 9(2), 18.","journal-title":"ACM Transactions on Sensor Networks"},{"issue":"4","key":"5040_CR4","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1155\/2013\/397537","volume":"9","author":"Y Li","year":"2013","unstructured":"Li, Y., Chen, D., Li, W., Wang, G., & Smith, P. (2013). A hybrid authenticated group key agreement protocol in wireless sensor networks. International Journal of Distributed Sensor Networks, 9(4), 1\u201314.","journal-title":"International Journal of Distributed Sensor Networks"},{"issue":"1","key":"5040_CR5","first-page":"180","volume":"35","author":"G Yang","year":"2007","unstructured":"Yang, G., Wang, J. T., et al. (2007). A key establish scheme for WSN based on IBE and Diffie\u2013Hellman algorithms. Chinese Journal of Electrics, 35(1), 180\u2013184.","journal-title":"Chinese Journal of Electrics"},{"issue":"2","key":"5040_CR6","doi-asserted-by":"crossref","first-page":"222","DOI":"10.4156\/ijact.vol4.issue2.27","volume":"4","author":"W Shi","year":"2012","unstructured":"Shi, W., & Zhang, Z. (2012). Fuzzy identity-based key agreement scheme for wireless sensor networks. International Journal of Advancements in Computing Technology, 4(2), 222\u2013230.","journal-title":"International Journal of Advancements in Computing Technology"},{"key":"5040_CR7","doi-asserted-by":"crossref","unstructured":"Jeong, Y.-S., Hwang, Y.-C., Kim, G.-S., Lee, S.-H. (2007). Key pre-distribution scheme for little storage space and strong security strength in large-scale wireless sensor network. In International conference on convergence information technology (pp. 1572\u20131577).","DOI":"10.1109\/ICCIT.2007.55"},{"key":"5040_CR8","doi-asserted-by":"crossref","unstructured":"Shan, T.-H., Liu, C.-M., (2008). Enhancing the key pre-distribution scheme on wireless sensor networks. In The 2008 IEEE Asia\u2013Pacific services computing conference (pp. 1127\u20131131).","DOI":"10.1109\/APSCC.2008.188"},{"key":"5040_CR9","doi-asserted-by":"crossref","unstructured":"Li, X., Shen, J., (2009). A novel key pre-distribution scheme using one-way hash chain and bivariate polynomial for wireless sensor networks. In The 3rd international conference on anti-counterfeiting, security, and identification in communication (pp. 575\u2013580).","DOI":"10.1109\/ICASID.2009.5277014"},{"key":"5040_CR10","doi-asserted-by":"crossref","unstructured":"Gaur, A., Toshniwal, S., Prakash, A., & Agrawal, D. P. (2010). Enhanced location based key pre-distribution scheme for secure communication in wireless sensor network (WSN). In 2010 IEEE 7th international conference on mobile ad hoc and sensor systems (MASS) (pp. 552\u2013557).","DOI":"10.1109\/MASS.2010.5663897"},{"key":"5040_CR11","doi-asserted-by":"crossref","first-page":"124","DOI":"10.1007\/978-3-642-01877-0_12","volume":"5557","author":"KM Martin","year":"2009","unstructured":"Martin, K. M. (2009). On the applicability of combinatorial designs to key pre-distribution for wireless sensor networks. Lecture Notes in Computer Science, 5557, 124\u2013145.","journal-title":"Lecture Notes in Computer Science"},{"issue":"3","key":"5040_CR12","first-page":"1","volume":"71","author":"MB Paterson","year":"2012","unstructured":"Paterson, M. B., & Stinson, D. R. (2012). A unified approach to combinatorial key pre-distribution schemes for sensor networks. Designs, Codes and Cryptography, 71(3), 1\u201326.","journal-title":"Designs, Codes and Cryptography"},{"issue":"2","key":"5040_CR13","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/1330332.1330333","volume":"11","author":"J Lee","year":"2008","unstructured":"Lee, J., & Stinson, D. R. (2008). On the construction of practical key pre-distribution schemes for distributed sensor networks using combinatorial designs. ACM Transactions on Information and System Security - TISSEC, 11(2), 1\u201335.","journal-title":"ACM Transactions on Information and System Security - TISSEC"},{"key":"5040_CR14","doi-asserted-by":"crossref","unstructured":"Subash, T. D., Divya, C. (2011). Novel key pre-distribution scheme in wireless sensor network. In 2011 international conference on emerging trends in electrical and computer technology (ICETECT) (pp. 959\u2013963).","DOI":"10.1109\/ICETECT.2011.5760258"},{"issue":"5","key":"5040_CR15","doi-asserted-by":"crossref","first-page":"521","DOI":"10.1023\/A:1016598314198","volume":"8","author":"A Perrig","year":"2002","unstructured":"Perrig, A., & Szewczyk, R. (2002). SPINS: Security protocols for sensor networks. Wireless Networks, 8(5), 521\u2013534.","journal-title":"Wireless Networks"},{"issue":"8","key":"5040_CR16","first-page":"131","volume":"30","author":"HP Huang","year":"2009","unstructured":"Huang, H. P., Wang, R. C., Sun, L. J., & Xiao, F. (2009). Key distribution scheme of wireless sensor networks based on logic grid. Journal on Communications, 30(8), 131\u2013140.","journal-title":"Journal on Communications"},{"key":"5040_CR17","doi-asserted-by":"crossref","unstructured":"Hou, H., & Liu, S. (2009). CPK-based authentication and key agreement protocols with anonymity for wireless network. In 2009 International conference on multimedia information networking and security (Vol. 2009, pp. 347\u2013350).","DOI":"10.1109\/MINES.2009.260"},{"key":"5040_CR18","doi-asserted-by":"crossref","unstructured":"Shi, H, He, M, & Qin, Z. (2006). Authenticated and communication efficient group key agreement for clustered ad hoc networks. In 5th International conference on cryptology and network security\u2014CANS 2006. Lecture notes in computer science (Vol. 4301, pp. 73\u201389).","DOI":"10.1007\/11935070_5"},{"issue":"1","key":"5040_CR19","first-page":"90","volume":"4","author":"A Abdel-Hafez","year":"2007","unstructured":"Abdel-Hafez, A., Miri, A., & Oronzo-Barbosa, L. (2007). Authenticated group key agreement protocols for ad hoc wireless networks. International Journal of Network Security, 4(1), 90\u201398.","journal-title":"International Journal of Network Security"},{"key":"5040_CR20","doi-asserted-by":"crossref","unstructured":"Konstantinou, E. (2008). Cluster-based group key agreement for wireless ad hoc networks. In 3rd International conference on availability, reliability and security\u2014ARES 2008 (pp. 550\u2013557).","DOI":"10.1109\/ARES.2008.106"},{"key":"5040_CR21","doi-asserted-by":"crossref","unstructured":"Feng-Yu, L., Guo-Hua, C., & Xiao-Ding, L. (2007). Ad hoc networks security mechanism based on CPK. In International conference on computational intelligence and security workshops (Vol. 2007, pp. 522\u2013525).","DOI":"10.1109\/CISW.2007.4425548"},{"issue":"1","key":"5040_CR22","first-page":"121","volume":"21","author":"S Chatterjee","year":"2014","unstructured":"Chatterjee, S., Das, A. K., & Sing, J. K. (2014). An enhanced access control scheme in wireless sensor networks. AD HOC & Sensor Wireless Networks, 21(1), 121\u2013149.","journal-title":"AD HOC & Sensor Wireless Networks"},{"issue":"10","key":"5040_CR23","doi-asserted-by":"crossref","first-page":"5552","DOI":"10.1109\/TWC.2015.2439675","volume":"14","author":"TR Halford","year":"2015","unstructured":"Halford, T. R., Courtade, T. A., Chugg, K. M., & Li, X. (2015). Energy-efficient group key agreement for wireless networks. IEEE Transactions on Wireless Communications, 14(10), 5552\u20135564.","journal-title":"IEEE Transactions on Wireless Communications"},{"issue":"5","key":"5040_CR24","doi-asserted-by":"crossref","first-page":"453","DOI":"10.1109\/JCN.2015.000083","volume":"17","author":"J Shen","year":"2015","unstructured":"Shen, J., Tan, H., Moh, S., Chung, I., Liu, Q., & Sun, X. (2015). Enhanced secure sensor association and key management in wireless body area networks. Journal Of Communications And Networks, 17(5), 453\u2013462.","journal-title":"Journal Of Communications And Networks"},{"issue":"1","key":"5040_CR25","doi-asserted-by":"crossref","first-page":"1503","DOI":"10.1109\/ACCESS.2015.2474705","volume":"3","author":"P Porambage","year":"2015","unstructured":"Porambage, P., Braeken, A., Schmitt, C., Gurtov, A., Ylianttlia, M., & Stiller, B. (2015). Group key establishment for enabling secure multicast communication in wireless sensor networks deployed for iot applications. IEEE Access, 3(1), 1503\u20131511.","journal-title":"IEEE Access"},{"key":"5040_CR26","doi-asserted-by":"crossref","unstructured":"Ghafoor, A., Sher, M., Imran, M., & Saleem, K. (2015). A lightweight key freshness scheme for wireless sensor networks. In 12th International conference on information technology\u2014new generations (ITNG) (pp. 169\u2013173).","DOI":"10.1109\/ITNG.2015.32"},{"issue":"8","key":"5040_CR27","doi-asserted-by":"crossref","first-page":"643","DOI":"10.1016\/j.cose.2011.08.008","volume":"30","author":"E Makri","year":"2011","unstructured":"Makri, E., & Konstantinou, E. (2011). Constant round group key agreement protocols: A comparative study. Computers and Security, 30(8), 643\u2013678.","journal-title":"Computers and Security"}],"container-title":["Wireless Personal Communications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11277-017-5040-3\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-017-5040-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-017-5040-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2018,2,23]],"date-time":"2018-02-23T14:57:29Z","timestamp":1519397849000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11277-017-5040-3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,11,4]]},"references-count":27,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2018,3]]}},"alternative-id":["5040"],"URL":"https:\/\/doi.org\/10.1007\/s11277-017-5040-3","relation":{},"ISSN":["0929-6212","1572-834X"],"issn-type":[{"value":"0929-6212","type":"print"},{"value":"1572-834X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017,11,4]]}}}