{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,5]],"date-time":"2025-07-05T04:11:18Z","timestamp":1751688678190,"version":"3.41.0"},"reference-count":28,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2018,5,19]],"date-time":"2018-05-19T00:00:00Z","timestamp":1526688000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Wireless Pers Commun"],"published-print":{"date-parts":[[2018,8]]},"DOI":"10.1007\/s11277-018-5789-z","type":"journal-article","created":{"date-parts":[[2018,5,19]],"date-time":"2018-05-19T11:47:37Z","timestamp":1526730457000},"page":"1749-1763","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":12,"title":["Secure Self-healing Group Key Distribution Scheme with Constant Storage for SCADA Systems in Smart Grid"],"prefix":"10.1007","volume":"101","author":[{"given":"Tahadray Jean","family":"Tsitaitse","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7528-0364","authenticated-orcid":false,"given":"Yongquan","family":"Cai","sequence":"additional","affiliation":[]},{"given":"Allah","family":"Ditta","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,5,19]]},"reference":[{"key":"5789_CR1","doi-asserted-by":"crossref","unstructured":"Sridhar, S., Govindarasu, M., & Liu, C. C. (2012). Risk analysis of coordinated cyber attacks on power grid. In Control and optimization methods for electric smart grids (pp. 275\u2013294).","DOI":"10.1007\/978-1-4614-1605-0_14"},{"issue":"2","key":"5789_CR2","doi-asserted-by":"publisher","first-page":"820","DOI":"10.1109\/SURV.2012.081712.00144","volume":"15","author":"T Rams","year":"2013","unstructured":"Rams, T., & Pacyna, P. (2013). A survey of group key distribution schemes with self-healing property. IEEE Communications Surveys and Tutorials, 15(2), 820\u2013842.","journal-title":"IEEE Communications Surveys and Tutorials"},{"key":"5789_CR3","doi-asserted-by":"crossref","unstructured":"Staddon, J., et al. (2002). Self-healing key distribution with revocation. In IEEE symposium on security and privacy, 2002. Proceedings (pp. 241\u2013257). IEEE.","DOI":"10.1109\/SECPRI.2002.1004375"},{"issue":"1","key":"5789_CR4","doi-asserted-by":"publisher","first-page":"15","DOI":"10.1023\/B:DESI.0000029210.20690.3f","volume":"32","author":"C Blundo","year":"2004","unstructured":"Blundo, C., DArco, P., Santis, A. D., et al. (2004). Design of self-healing key distribution schemes. Designs, Codes and Cryptography, 32(1), 15\u201344.","journal-title":"Designs, Codes and Cryptography"},{"key":"5789_CR5","doi-asserted-by":"crossref","unstructured":"Liu, D., Ning, P., & Sun, K. (2003). Efficient self-healing group key distribution with revocation capability. In ACM conference on computer and communications security (pp. 231\u2013240).","DOI":"10.1145\/948109.948141"},{"issue":"8","key":"5789_CR6","doi-asserted-by":"publisher","first-page":"759","DOI":"10.1109\/LCOMM.2005.1496607","volume":"9","author":"D Hong","year":"2005","unstructured":"Hong, D., & Kang, J. S. (2005). An efficient key distribution scheme with self-healing property. IEEE Communications Letters, 9(8), 759\u2013761.","journal-title":"IEEE Communications Letters"},{"key":"5789_CR7","doi-asserted-by":"crossref","unstructured":"Yuan, T., Ma, J., & Zhong, Y., et al. (2008). Self-healing key distribution with revocation and collusion resistance for wireless sensor networks. In International multi-symposiums on computer and computational sciences (pp. 83\u201390). IEEE Computer Society.","DOI":"10.1109\/IMSCCS.2008.13"},{"issue":"4","key":"5789_CR8","doi-asserted-by":"publisher","first-page":"1876","DOI":"10.1109\/TWC.2009.080046","volume":"8","author":"S Han","year":"2009","unstructured":"Han, S., Tian, B., He, M., et al. (2009). Efficient threshold self-healing key distribution with sponsorization for infrastructureless wireless networks. IEEE Transactions on Wireless Communications, 8(4), 1876\u20131887.","journal-title":"IEEE Transactions on Wireless Communications"},{"issue":"2","key":"5789_CR9","doi-asserted-by":"publisher","first-page":"264","DOI":"10.1109\/TBC.2005.847600","volume":"51","author":"X Du","year":"2005","unstructured":"Du, X., Wang, Y., Ge, J., et al. (2005). An ID-based broadcast encryption scheme for key distribution. IEEE Transactions on Broadcasting, 51(2), 264\u2013266.","journal-title":"IEEE Transactions on Broadcasting"},{"key":"5789_CR10","doi-asserted-by":"crossref","unstructured":"Zou, X., & Dai, Y. S. (2006). A robust and stateless self-healing group key management scheme. In International conference on communication technology (pp. 1\u20134). IEEE.","DOI":"10.1109\/ICCT.2006.341791"},{"key":"5789_CR11","doi-asserted-by":"crossref","unstructured":"Tian, B., Han, S., & Dillon, T. S. (2008). An efficient self-healing key distribution scheme. New technologies, mobility and security (pp. 1\u20135).","DOI":"10.1109\/NTMS.2008.ECP.18"},{"key":"5789_CR12","doi-asserted-by":"crossref","unstructured":"Xu, Q., & He, M. (2009). Improved constant storage self-healing key distribution with revocation in wireless sensor network. Lecture notes in computer science (pp. 41\u201355).","DOI":"10.1007\/978-3-642-00306-6_4"},{"key":"5789_CR13","unstructured":"Dutta, R., Mukhopadhyay, S., & Dowling, T. (2009). Enhanced access polynomial based self-healing key distribution. Lecture notes of the institute for computer sciences social informatics and telecommunications engineering (pp. 13\u201324)."},{"key":"5789_CR14","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s11277-016-3515-2","volume":"91","author":"H Guo","year":"2016","unstructured":"Guo, H., & Zheng, Y. (2016). On the security of a self-healing group key distribution scheme. Wireless Personal Communications, 91, 1\u201313.","journal-title":"Wireless Personal Communications"},{"key":"5789_CR15","doi-asserted-by":"crossref","unstructured":"Rams, T., & Pacyna, P. Long-lived self-healing group key distribution scheme with backward secrecy. In Conference on networked systems (pp. 59\u201365). IEEE Computer Society.","DOI":"10.1109\/NetSys.2013.19"},{"key":"5789_CR16","doi-asserted-by":"crossref","unstructured":"Sez, G. (2005). On threshold self-healing key distribution schemes. In IMA international conference on cryptography and coding (pp. 340\u2013354).","DOI":"10.1007\/11586821_23"},{"issue":"6","key":"5789_CR17","doi-asserted-by":"publisher","first-page":"597","DOI":"10.1016\/j.adhoc.2009.11.005","volume":"8","author":"R Dutta","year":"2010","unstructured":"Dutta, R., Mukhopadhyay, S., & Collier, M. (2010). Computationally secure self-healing key distribution with revocation in wireless ad hoc networks. Ad Hoc Networks, 8(6), 597\u2013613.","journal-title":"Ad Hoc Networks"},{"key":"5789_CR18","doi-asserted-by":"crossref","unstructured":"Gu, J., & Xue, Z. An efficient self-healing key distribution with resistance to the collusion attack for wireless sensor networks. In IEEE international conference on communications (pp. 1\u20135).","DOI":"10.1109\/ICC.2010.5502594"},{"key":"5789_CR19","doi-asserted-by":"crossref","unstructured":"Tian, B., Han, S., & Dillon, T. S. (2008). A self-healing and mutual-healing key distribution scheme using bilinear pairings for wireless networks. IEEE\/IFIP international conference on embedded and ubiquitous computing (pp. 208\u2013215). IEEE Computer Society.","DOI":"10.1109\/EUC.2008.36"},{"key":"5789_CR20","doi-asserted-by":"crossref","unstructured":"Han, S., Tian, B., & Zhang, Y., et al. (2010). An efficient self-healing key distribution scheme with constant-size personal keys for wireless sensor networks. In IEEE international conference on communications (pp. 1\u20135).","DOI":"10.1109\/ICC.2010.5501988"},{"issue":"1","key":"5789_CR21","doi-asserted-by":"publisher","first-page":"14","DOI":"10.1016\/j.adhoc.2006.05.007","volume":"5","author":"Y Jiang","year":"2007","unstructured":"Jiang, Y., Lin, C., Shi, M., et al. (2007). Self-healing group key distribution with time-limited node revocation for wireless sensor networks. Ad Hoc Networks, 5(1), 14\u201323.","journal-title":"Ad Hoc Networks"},{"key":"5789_CR22","unstructured":"More, S. M., Malkin, M., & Staddon, J., et al. (2003). Sliding-window self-healing key distribution. In ACM workshop on survivable and self-regenerative systems: In association with, ACM conference on computer and communications security. (pp. 82\u201390)."},{"issue":"6","key":"5789_CR23","doi-asserted-by":"publisher","first-page":"1026","DOI":"10.1002\/sec.1057","volume":"8","author":"R Jiang","year":"2015","unstructured":"Jiang, R., Lu, R., Luo, J., et al. (2015). Efficient self-healing group key management with dynamic revocation and collusion resistance for SCADA in smart grid. Security and Communication Networks, 8(6), 1026\u20131039.","journal-title":"Security and Communication Networks"},{"key":"5789_CR24","first-page":"135","volume-title":"Computationally secure hierarchical self-healing key distribution for heterogeneous wireless sensor networks, information and communications security","author":"Y Yang","year":"2009","unstructured":"Yang, Y., Zhou, J., Deng, R., & Bao, F. (2009). Computationally secure hierarchical self-healing key distribution for heterogeneous wireless sensor networks, information and communications security (pp. 135\u2013149). Beijing: Springer."},{"key":"5789_CR25","doi-asserted-by":"crossref","unstructured":"Dutta, R., Chang, E. C., & Mukhopadhyay, S. (2007). Efficient self-healing key distribution with revocation for wireless sensor networks using one way key chains. In Applied cryptography and network security, Zhuhai, China (pp. 385\u2013400).","DOI":"10.1007\/978-3-540-72738-5_25"},{"key":"5789_CR26","doi-asserted-by":"publisher","first-page":"255","DOI":"10.1007\/s00145-001-0009-4","volume":"14","author":"AK Lenstra","year":"2001","unstructured":"Lenstra, A. K., & Verheul, E. R. (2001). Selecting cryptographic key sizes. Journal of Cryptology, 14, 255\u2013293.","journal-title":"Journal of Cryptology"},{"issue":"1\u20133","key":"5789_CR27","doi-asserted-by":"publisher","first-page":"15","DOI":"10.1023\/B:DESI.0000029210.20690.3f","volume":"32","author":"C Blundo","year":"2004","unstructured":"Blundo, C., et al. (2004). Design of self-healing key distribution schemes. Designs Codes and Cryptography, 32(1\u20133), 15\u201344.","journal-title":"Designs Codes and Cryptography"},{"issue":"4","key":"5789_CR28","doi-asserted-by":"publisher","first-page":"619","DOI":"10.3923\/itj.2009.619.624","volume":"8","author":"CL Du","year":"2009","unstructured":"Du, C. L., Hu, M. Z., Zhang, H. L., et al. (2009). Anti-collusive self-healing key distribution scheme with revocation capability. Information Technology Journal, 8(4), 619\u2013624.","journal-title":"Information Technology Journal"}],"container-title":["Wireless Personal Communications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11277-018-5789-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-018-5789-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-018-5789-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,4]],"date-time":"2025-07-04T16:49:54Z","timestamp":1751647794000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11277-018-5789-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,5,19]]},"references-count":28,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2018,8]]}},"alternative-id":["5789"],"URL":"https:\/\/doi.org\/10.1007\/s11277-018-5789-z","relation":{},"ISSN":["0929-6212","1572-834X"],"issn-type":[{"type":"print","value":"0929-6212"},{"type":"electronic","value":"1572-834X"}],"subject":[],"published":{"date-parts":[[2018,5,19]]},"assertion":[{"value":"19 May 2018","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}