{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,10]],"date-time":"2026-02-10T20:00:57Z","timestamp":1770753657455,"version":"3.50.0"},"reference-count":31,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2019,5,15]],"date-time":"2019-05-15T00:00:00Z","timestamp":1557878400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2019,5,15]],"date-time":"2019-05-15T00:00:00Z","timestamp":1557878400000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100012226","name":"Fundamental Research Funds for the Central Universities","doi-asserted-by":"crossref","award":["ZYGX2015J054"],"award-info":[{"award-number":["ZYGX2015J054"]}],"id":[{"id":"10.13039\/501100012226","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Wireless Pers Commun"],"published-print":{"date-parts":[[2019,11]]},"DOI":"10.1007\/s11277-019-06608-3","type":"journal-article","created":{"date-parts":[[2019,5,15]],"date-time":"2019-05-15T20:04:08Z","timestamp":1557950648000},"page":"1161-1180","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":20,"title":["A Key Pre-distribution Scheme based on Sub-regions for Multi-Hop Wireless Sensor Networks"],"prefix":"10.1007","volume":"109","author":[{"given":"Yinghong","family":"Liu","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2927-0034","authenticated-orcid":false,"given":"Yuanming","family":"Wu","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2019,5,15]]},"reference":[{"key":"6608_CR1","doi-asserted-by":"crossref","unstructured":"SunilKumar, K. N., & Shivashankar. (2017). A review on security and privacy issues in wireless sensor networks. In 2017 2nd IEEE International Conference On Recent Trends In Electronics Information & Communication Technology, India, pp. 1979\u20131984.","DOI":"10.1109\/RTEICT.2017.8256945"},{"issue":"3","key":"6608_CR2","doi-asserted-by":"publisher","first-page":"1419","DOI":"10.1007\/s11277-015-2290-9","volume":"82","author":"EA Mary Anita","year":"2015","unstructured":"Mary Anita, E. A., Geetha, R., & Kannan, E. (2015). A novel hybrid key management scheme for establishing secure communication in wireless sensor networks. Wireless Personal Communications,\n                           82(3), 1419\u20131433.","journal-title":"Wireless Personal Communications"},{"issue":"9","key":"6608_CR3","doi-asserted-by":"publisher","first-page":"33","DOI":"10.1109\/35.312841","volume":"32","author":"BC Neumann","year":"1994","unstructured":"Neumann, B. C., & T\u2019so, T. (1994). Kerberos: An authentication service for computer network. IEEE Communications,\n                           32(9), 33\u201338.","journal-title":"IEEE Communications"},{"key":"6608_CR4","doi-asserted-by":"crossref","unstructured":"Eschenauer, L., & Gligor, V. D. (2002). A key management scheme for distributed sensor networks. In Proceedings of the 9th ACM Conference on Computer and Communications Security. New York: ACM Press, pp. 41\u201347.","DOI":"10.1145\/586110.586117"},{"issue":"4","key":"6608_CR5","doi-asserted-by":"publisher","first-page":"500","DOI":"10.1145\/1218556.1218559","volume":"2","author":"S Zhu","year":"2006","unstructured":"Zhu, S., Setia, S., & Jajodia, S. (2006). LEAP\u2009+\u2009: Efficient security mechanisms for large-scale distributed sensor networks. ACM Transactions on Sensor Networks,\n                           2(4), 500\u2013528.","journal-title":"ACM Transactions on Sensor Networks"},{"key":"6608_CR6","volume-title":"Advances in cryptology. EUROCRYPT 1984. Lecture notes in computer science","author":"R Blom","year":"1985","unstructured":"Blom, R. (1985). An optimal class of symmetric key generation systems. In T. Beth, N. Cot, & I. Ingemarsson (Eds.), Advances in cryptology. EUROCRYPT 1984. Lecture notes in computer science (Vol. 209). Berlin: Springer."},{"key":"6608_CR7","doi-asserted-by":"crossref","unstructured":"Du, W., Han, Y. S., Deng, J., & Varshney, P. K. (2003). A pairwise key pre-distribution scheme for wireless sensor networks. In Proceedings of the 10\n                           th\n                           ACM Conference on Computer and Communication Security, pp. 42\u201351.","DOI":"10.1145\/948109.948118"},{"key":"6608_CR8","doi-asserted-by":"crossref","unstructured":"Liu, D., & Ning, P. (2003). Location-based pairwise key establishments for static sensor networks. In Proceedings of the 1st ACM Workshop on Security of Ad Hoc and Sensor Networks. New York: ACM Press, pp. 72\u201382.","DOI":"10.1145\/986858.986869"},{"issue":"5","key":"6608_CR9","first-page":"3969","volume":"12","author":"A Diop","year":"2014","unstructured":"Diop, A., Qi, Y., & Wang, Q. (2014). An improved key management scheme for hierarchical wireless sensors networks. Indonesian Journal of Electrical Engineering,\n                           12(5), 3969\u20133978.","journal-title":"Indonesian Journal of Electrical Engineering"},{"issue":"1","key":"6608_CR10","doi-asserted-by":"publisher","first-page":"1059","DOI":"10.1007\/s11277-017-4551-2","volume":"97","author":"TT Chakavarika","year":"2017","unstructured":"Chakavarika, T. T., Gupta, S. K., & Chaurasia, B. K. (2017). Energy efficient key distribution and management scheme in wireless sensor networks. Wireless Personal Communications,\n                           97(1), 1059\u20131070.","journal-title":"Wireless Personal Communications"},{"issue":"3","key":"6608_CR11","doi-asserted-by":"publisher","first-page":"363","DOI":"10.1109\/TDSC.2010.73","volume":"8","author":"K McCusker","year":"2011","unstructured":"McCusker, K., & O\u2019Connor, N. E. (2011). Low-energy symmetric key distribution in wireless sensor networks. IEEE Transactions on Dependable and Secure Computing,\n                           8(3), 363\u2013376.","journal-title":"IEEE Transactions on Dependable and Secure Computing"},{"key":"6608_CR12","doi-asserted-by":"crossref","unstructured":"Liu, D., & Ning, P. (2003). Establishing pairwise keys in distributed sensor networks. In Proceedings of the 10th ACM Conference on Computer and Communication Security, pp. 52\u20136l.","DOI":"10.1145\/948109.948119"},{"issue":"2","key":"6608_CR13","doi-asserted-by":"publisher","first-page":"801","DOI":"10.1007\/s11277-013-1493-1","volume":"78","author":"N Wang","year":"2014","unstructured":"Wang, N., Chen, Y., & Chen, H. (2014). An efficient grid-based pairwise key pre-distribution scheme for wireless sensor networks. Wireless Personal Communications,\n                           78(2), 801\u2013816.","journal-title":"Wireless Personal Communications"},{"key":"6608_CR14","unstructured":"Sridhar, V., & Raghavendar, V. (2011). Key pre-distribution scheme for grid based wireless sensor networks using quadruple polynomial shares per node.In The 2nd International Conference on Ambient Systems, Networks and Technologies (ANT), pp. 132\u2013140."},{"key":"6608_CR15","unstructured":"Liao, Y., Lei, C., & Wang, A. (2009). A robust grid-based key pre-distribution scheme for sensor networks. In 2009 Fourth International Conference on Innovative Computing, Information and Control, pp. 760\u2013763."},{"issue":"2","key":"6608_CR16","doi-asserted-by":"publisher","first-page":"195","DOI":"10.3837\/tiis.2009.02.005","volume":"3","author":"A Mohaisen","year":"2009","unstructured":"Mohaisen, A., Nyang, D., Maeng, Y., Lee, K., & Hong, D. (2009). Grid-based key pre-distribution in wireless sensor networks. KSII Transactions on Internet and Information Systems,\n                           3(2), 195\u2013208.","journal-title":"KSII Transactions on Internet and Information Systems"},{"issue":"1\u20132","key":"6608_CR17","doi-asserted-by":"publisher","first-page":"63","DOI":"10.1007\/s12190-013-0711-z","volume":"45","author":"S Mitra","year":"2014","unstructured":"Mitra, S., Mukhopadhyay, S., & Dutta, R. J. (2014). Key pre-distribution in a non-uniform rectangular grid for wireless sensor networks. Journal of Applied Mathematics and Computing,\n                           45(1\u20132), 63\u201385.","journal-title":"Journal of Applied Mathematics and Computing"},{"key":"6608_CR18","first-page":"188","volume":"2007","author":"NT Canh","year":"2007","unstructured":"Canh, N. T., Phuong, T. V., Lee, Y.-K., Lee, S., & Lee, H. (2007). A location-aware key pre-distribution scheme for distributed wireless sensor networks. ICON,\n                           2007, 188\u2013193.","journal-title":"ICON"},{"issue":"5","key":"6608_CR19","doi-asserted-by":"publisher","first-page":"485","DOI":"10.1002\/sec.337","volume":"5","author":"NTT Huyen","year":"2012","unstructured":"Huyen, N. T. T., Jo, M., Nguyen, T. D., & Huh, E. N. (2012). A beneficial analysis of deployment knowledge for key distribution in wireless sensor networks. Security and Communication Networks,\n                           5(5), 485\u2013495.","journal-title":"Security and Communication Networks"},{"key":"6608_CR20","doi-asserted-by":"crossref","unstructured":"Gaur, A., Toshniwal, S., Prakash, A., & Agrawal, D. P. (2010). Enhanced location based key pre-distribution scheme for secure communication in wireless sensor network (WSN). In 2010 IEEE 7th International Conference on Mobile Ad hoc and Sensor Systems, MASS 2010, pp. 552\u2013557.","DOI":"10.1109\/MASS.2010.5663897"},{"issue":"9","key":"6608_CR21","doi-asserted-by":"publisher","first-page":"5103","DOI":"10.1109\/JSEN.2015.2429582","volume":"15","author":"L Harn","year":"2015","unstructured":"Harn, L., & Hsu, C. F. (2015). Pre-distribution scheme for establishing group keys in wireless sensor networks. IEEE Sensors Journal,\n                           15(9), 5103\u20135108.","journal-title":"IEEE Sensors Journal"},{"key":"6608_CR22","first-page":"1","volume":"8","author":"H Yu","year":"2012","unstructured":"Yu, H., He, J., Zhang, T., & Xiao, P. (2012). A group key distribution scheme for wireless sensor networks in the internet of things scenario. International Journal of Distributed Sensor Networks,\n                           8, 1\u201312.","journal-title":"International Journal of Distributed Sensor Networks"},{"issue":"2","key":"6608_CR23","doi-asserted-by":"publisher","first-page":"404","DOI":"10.1109\/LCOMM.2017.2778725","volume":"22","author":"M Huang","year":"2018","unstructured":"Huang, M., Yu, B., & Li, S. (2018). PUF-assisted group key distribution scheme for software-defined wireless sensor networks. IEEE Communications Letters,\n                           22(2), 404\u2013407.","journal-title":"IEEE Communications Letters"},{"key":"6608_CR24","doi-asserted-by":"crossref","unstructured":"Saikia, M., & Hussain, M. A. (2017). Combinatorial group based approach for key pre-distribution scheme in wireless sensor network. In International conference on Computing Communication and Automation (ICCCA) 2017, pp. 498\u2013503.","DOI":"10.1109\/CCAA.2017.8229851"},{"issue":"12","key":"6608_CR25","doi-asserted-by":"publisher","first-page":"4400","DOI":"10.1007\/s11227-015-1534-5","volume":"71","author":"ML Messai","year":"2015","unstructured":"Messai, M. L., Seba, H., & Aliouat, M. (2015). A lightweight key management scheme for wireless sensor networks. The Journal of Supercomputing,\n                           71(12), 4400\u20134422.","journal-title":"The Journal of Supercomputing"},{"key":"6608_CR26","unstructured":"Kumar, N. K, & Nene, M. J. (2017). Chip-based key distribution technique for security enhancement in hierarchical wireless sensors networks. In 2017 IEEE 7th International Advance Computing Conference, pp. 333\u2013338."},{"issue":"2","key":"6608_CR27","doi-asserted-by":"publisher","first-page":"123","DOI":"10.1504\/IJSNET.2017.081334","volume":"23","author":"Y Wu","year":"2017","unstructured":"Wu, Y. (2017). An energy-balanced loop-free routing protocol for distributed wireless sensor networks. International Journal of Sensor Networks,\n                           23(2), 123.","journal-title":"International Journal of Sensor Networks"},{"issue":"15","key":"6608_CR28","doi-asserted-by":"publisher","first-page":"1843","DOI":"10.1016\/j.comcom.2010.06.001","volume":"33","author":"H Zhou","year":"2010","unstructured":"Zhou, H., Wu, Y., Hu, Y., & Xie, G. (2010). A novel stable selection and reliable transmission protocol for clustered heterogeneous wireless sensor networks. Computer Communications,\n                           33(15), 1843\u20131849.","journal-title":"Computer Communications"},{"issue":"10","key":"6608_CR29","doi-asserted-by":"publisher","first-page":"3827","DOI":"10.12733\/jics20106084","volume":"12","author":"H Wang","year":"2015","unstructured":"Wang, H., Wu, Y., & Hu, Y. (2015). An energy-balanced routing algorithm on heterogeneous deployment in WSN. Journal of Information & Computational Science,\n                           12(10), 3827\u20133835.","journal-title":"Journal of Information & Computational Science"},{"issue":"9","key":"6608_CR30","first-page":"1","volume":"19","author":"H Zhou","year":"2016","unstructured":"Zhou, H., Wu, Y., & Feng, L. (2016). A security mechanism for cluster-based WSN against selective forwarding. Sensors,\n                           19(9), 1\u201316.","journal-title":"Sensors"},{"issue":"11","key":"6608_CR31","doi-asserted-by":"publisher","first-page":"137","DOI":"10.4236\/wsn.2015.711012","volume":"7","author":"B Liu","year":"2015","unstructured":"Liu, B., & Wu, Y. (2015). A secure and energy-balanced routing scheme for mobile wireless sensor network. Wireless Sensor Network,\n                           7(11), 137\u2013148.","journal-title":"Wireless Sensor Network"}],"container-title":["Wireless Personal Communications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-019-06608-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11277-019-06608-3\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-019-06608-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,5,13]],"date-time":"2020-05-13T23:26:21Z","timestamp":1589412381000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11277-019-06608-3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,5,15]]},"references-count":31,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2019,11]]}},"alternative-id":["6608"],"URL":"https:\/\/doi.org\/10.1007\/s11277-019-06608-3","relation":{},"ISSN":["0929-6212","1572-834X"],"issn-type":[{"value":"0929-6212","type":"print"},{"value":"1572-834X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,5,15]]},"assertion":[{"value":"15 May 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Compliance with Ethical Standards"}},{"value":"The authors declare that there is no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}