{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,15]],"date-time":"2026-01-15T22:02:59Z","timestamp":1768514579561,"version":"3.49.0"},"reference-count":30,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2022,9,8]],"date-time":"2022-09-08T00:00:00Z","timestamp":1662595200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2022,9,8]],"date-time":"2022-09-08T00:00:00Z","timestamp":1662595200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Wireless Pers Commun"],"published-print":{"date-parts":[[2023,1]]},"DOI":"10.1007\/s11277-022-09979-2","type":"journal-article","created":{"date-parts":[[2022,9,8]],"date-time":"2022-09-08T05:02:47Z","timestamp":1662613367000},"page":"855-873","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["Combinatorial Design Based Key Pre-distribution Scheme with High Scalability and Minimal Storage for Wireless Sensor Networks"],"prefix":"10.1007","volume":"128","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-5368-087X","authenticated-orcid":false,"given":"Lakshmi Jayant","family":"Kittur","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Alwyn Roshan","family":"Pais","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2022,9,8]]},"reference":[{"issue":"1","key":"9979_CR1","doi-asserted-by":"publisher","first-page":"4","DOI":"10.1145\/1653760.1653764","volume":"6","author":"S Ruj","year":"2009","unstructured":"Ruj, S., & Roy, B. (2009). Key predistribution using combinatorial designs for grid-group deployment scheme in wireless sensor networks. ACM Transactions on Sensor Networks (TOSN), 6(1), 4.","journal-title":"ACM Transactions on Sensor Networks (TOSN)"},{"key":"9979_CR2","doi-asserted-by":"crossref","unstructured":"Ruj, S., & Roy, B. (2007). Key predistribution using partially balanced designs in wireless sensor networks. In International Symposium on Parallel and Distributed Processing and Applications. pp. 431\u2013445. Springer.","DOI":"10.1007\/978-3-540-74742-0_40"},{"issue":"2","key":"9979_CR3","doi-asserted-by":"publisher","first-page":"619","DOI":"10.1016\/j.jnca.2011.11.016","volume":"35","author":"C Zhu","year":"2012","unstructured":"Zhu, C., Zheng, C., Shu, L., & Han, G. (2012). A survey on coverage and connectivity issues in wireless sensor networks. Journal of Network and Computer Applications, 35(2), 619\u2013632.","journal-title":"Journal of Network and Computer Applications"},{"issue":"8","key":"9979_CR4","doi-asserted-by":"publisher","first-page":"102","DOI":"10.1109\/MCOM.2002.1024422","volume":"40","author":"IF Akyildiz","year":"2002","unstructured":"Akyildiz, I. F., Su, W., Sankarasubramaniam, Y., & Cayirci, E. (2002). A survey on sensor networks. IEEE Communications Magazine, 40(8), 102\u2013114.","journal-title":"IEEE Communications Magazine"},{"issue":"1","key":"9979_CR5","doi-asserted-by":"publisher","first-page":"697","DOI":"10.1007\/s11277-017-4197-0","volume":"96","author":"A Kumar","year":"2017","unstructured":"Kumar, A., & Pais, A. R. (2017). En-route filtering techniques in wireless sensor networks: A survey. Wireless Personal Communications, 96(1), 697\u2013739.","journal-title":"Wireless Personal Communications"},{"issue":"2","key":"9979_CR6","doi-asserted-by":"publisher","first-page":"948","DOI":"10.1109\/TWC.2012.010413.120732","volume":"12","author":"W Bechkit","year":"2013","unstructured":"Bechkit, W., Challal, Y., Bouabdallah, A., & Tarokh, V. (2013). A highly scalable key pre-distribution scheme for wireless sensor networks. IEEE Transactions on Wireless Communications, 12(2), 948\u2013959.","journal-title":"IEEE Transactions on Wireless Communications"},{"key":"9979_CR7","doi-asserted-by":"crossref","unstructured":"Blundo, C., De\u00a0Santis, A., Herzberg, A., Kutten, S., Vaccaro, U., & Yung, M. (1992). Perfectly secure key distribution for dynamic conferences. In Annual international cryptology conference. pp. 471\u2013486. Springer.","DOI":"10.1007\/3-540-48071-4_33"},{"key":"9979_CR8","doi-asserted-by":"crossref","unstructured":"Liu, D., & Ning, P. (2003). Establishing pairwise keys in distributed sensor networks. In Proceedings of the 10th ACM conference on Computer and communications security. pp. 52\u201361.","DOI":"10.1145\/948109.948119"},{"key":"9979_CR9","doi-asserted-by":"crossref","unstructured":"Liu, D., & Ning, P. (2003). Location-based pairwise key establishments for static sensor networks. In Proceedings of the 1st ACM workshop on Security of ad hoc and sensor networks, pp. 72\u201382.","DOI":"10.1145\/986858.986869"},{"key":"9979_CR10","doi-asserted-by":"crossref","unstructured":"Blom, R. (1984). An optimal class of symmetric key generation systems. In: Workshop on the Theory and Application of of Cryptographic Techniques, pp. 335\u2013338. Springer.","DOI":"10.1007\/3-540-39757-4_22"},{"issue":"2","key":"9979_CR11","doi-asserted-by":"publisher","first-page":"228","DOI":"10.1145\/1065545.1065548","volume":"8","author":"W Du","year":"2005","unstructured":"Du, W., Deng, J., Han, Y. S., Varshney, P. K., Katz, J., & Khalili, A. (2005). A pairwise key predistribution scheme for wireless sensor networks. ACM Transactions on Information and System Security (TISSEC), 8(2), 228\u2013258.","journal-title":"ACM Transactions on Information and System Security (TISSEC)"},{"key":"9979_CR12","doi-asserted-by":"crossref","unstructured":"Huang, D., Mehta, M., Medhi, D., & Harn, L. (2004). Location-aware key management scheme for wireless sensor networks. In Proceedings of the 2nd ACM workshop on Security of ad hoc and sensor networks. pp. 29\u201342.","DOI":"10.1145\/1029102.1029110"},{"issue":"3","key":"9979_CR13","doi-asserted-by":"publisher","first-page":"16-es","DOI":"10.1145\/1267060.1267064","volume":"3","author":"D Huang","year":"2007","unstructured":"Huang, D., & Medhi, D. (2007). Secure pairwise key establishment in large-scale sensor networks: An area partitioning and multigroup key predistribution approach. ACM Transactions on Sensor Networks, 3(3), 16-es.","journal-title":"ACM Transactions on Sensor Networks"},{"issue":"2","key":"9979_CR14","doi-asserted-by":"publisher","first-page":"346","DOI":"10.1109\/TNET.2007.892879","volume":"15","author":"SA \u00c7amtepe","year":"2007","unstructured":"\u00c7amtepe, S. A., & Yener, B. (2007). Combinatorial design of key distribution mechanisms for wireless sensor networks. IEEE\/ACM Transactions on Networking, 15(2), 346\u2013358.","journal-title":"IEEE\/ACM Transactions on Networking"},{"key":"9979_CR15","unstructured":"Lee, J., & Stinson, D.R. (2005). A combinatorial approach to key predistribution for distributed sensor networks. In IEEE Wireless Communications and Networking Conference. 2005, vol.\u00a02, pp. 1200\u20131205. IEEE."},{"key":"9979_CR16","doi-asserted-by":"crossref","unstructured":"Simonova, K., Ling, A.C., & Wang, X.S. (2006). Location-aware key predistribution scheme for wide area wireless sensor networks. In Proceedings of the fourth ACM workshop on Security of ad hoc and sensor networks. pp. 157\u2013168.","DOI":"10.1145\/1180345.1180365"},{"key":"9979_CR17","doi-asserted-by":"crossref","unstructured":"Mitra, S., Mukhopadhyay, S., & Dutta, R. (2012). A flexible deterministic approach to key pre-distribution in grid based wsns. In International conference on ad hoc networks. pp. 164\u2013179. Springer.","DOI":"10.1007\/978-3-642-36958-2_12"},{"key":"9979_CR18","unstructured":"Bag, S. (2015). A new key predistribution scheme for grid-group deployment of wireless sensor networks. Adhoc & Sensor Wireless Networks 27."},{"issue":"1","key":"9979_CR19","doi-asserted-by":"publisher","first-page":"145","DOI":"10.1186\/1687-1499-2013-145","volume":"2013","author":"S Bag","year":"2013","unstructured":"Bag, S., & Roy, B. (2013). A new key predistribution scheme for general and grid-group deployment of wireless sensor networks. EURASIP Journal on Wireless Communications and Networking, 2013(1), 145.","journal-title":"EURASIP Journal on Wireless Communications and Networking"},{"issue":"2","key":"9979_CR20","doi-asserted-by":"publisher","first-page":"2821","DOI":"10.1007\/s11277-017-4326-9","volume":"96","author":"V Modiri","year":"2017","unstructured":"Modiri, V., Javadi, H. H. S., & Anzani, M. (2017). A novel scalable key pre-distribution scheme for wireless sensor networks based on residual design. Wireless Personal Communications, 96(2), 2821\u20132841.","journal-title":"Wireless Personal Communications"},{"issue":"6","key":"9979_CR21","doi-asserted-by":"publisher","first-page":"2401","DOI":"10.1007\/s12652-018-0902-4","volume":"10","author":"A Kumar","year":"2019","unstructured":"Kumar, A., & Pais, A. R. (2019). A new combinatorial design based key pre-distribution scheme for wireless sensor networks. Journal of Ambient Intelligence and Humanized Computing, 10(6), 2401\u20132416.","journal-title":"Journal of Ambient Intelligence and Humanized Computing"},{"issue":"3","key":"9979_CR22","doi-asserted-by":"publisher","first-page":"1185","DOI":"10.1007\/s11276-018-1698-z","volume":"25","author":"A Kumar","year":"2019","unstructured":"Kumar, A., & Pais, A. R. (2019). A new hybrid key pre-distribution scheme for wireless sensor networks. Wireless Networks, 25(3), 1185\u20131199.","journal-title":"Wireless Networks"},{"issue":"7","key":"9979_CR23","doi-asserted-by":"publisher","first-page":"892","DOI":"10.1049\/iet-com.2018.5258","volume":"13","author":"A Kumar","year":"2019","unstructured":"Kumar, A., Bansal, N., & Pais, A. R. (2019). New key pre-distribution scheme based on combinatorial design for wireless sensor networks. IET Communications, 13(7), 892\u2013897.","journal-title":"IET Communications"},{"issue":"1","key":"9979_CR24","doi-asserted-by":"publisher","first-page":"1471","DOI":"10.1007\/s12652-020-02216-3","volume":"12","author":"A Kumar","year":"2021","unstructured":"Kumar, A., Bansal, N., & Pais, A. R. (2021). A partial key pre-distribution based en-route filtering scheme for wireless sensor networks. Journal of Ambient Intelligence and Humanized Computing, 12(1), 1471\u20131486.","journal-title":"Journal of Ambient Intelligence and Humanized Computing"},{"key":"9979_CR25","doi-asserted-by":"crossref","unstructured":"Kittur, L.J., & Pais, A.R. (2022). Key pre-distribution scheme for wireless sensor networks using combinatorial design. In Proceedings of First International Conference on Computational Electronics for Wireless Communications. pp. 635\u2013644. Springer.","DOI":"10.1007\/978-981-16-6246-1_54"},{"key":"9979_CR26","volume-title":"Combinatorial designs: Constructions and analysis","author":"D Stinson","year":"2007","unstructured":"Stinson, D. (2007). Combinatorial designs: Constructions and analysis. Springer Science & Business Media."},{"key":"9979_CR27","doi-asserted-by":"crossref","unstructured":"Blackburn, S.R., Etzion, T., Martin, K.M., & Paterson, M.B. (2008). Efficient key predistribution for grid-based wireless sensor networks. In International conference on information theoretic security. pp. 54\u201369. Springer.","DOI":"10.1007\/978-3-540-85093-9_6"},{"key":"9979_CR28","unstructured":"Black, P.E. (2006). Manhattan distance dictionary of algorithms and data structures. https:\/\/xlinux.nist.gov\/dads\/\/."},{"key":"9979_CR29","doi-asserted-by":"publisher","DOI":"10.1201\/b15902","volume-title":"Introduction to combinatorial designs","author":"WD Wallis","year":"2016","unstructured":"Wallis, W. D. (2016). Introduction to combinatorial designs. CRC Press."},{"issue":"2","key":"9979_CR30","doi-asserted-by":"publisher","first-page":"204","DOI":"10.1145\/1105688.1105691","volume":"1","author":"D Liu","year":"2005","unstructured":"Liu, D., & Ning, P. (2005). Improving key predistribution with deployment knowledge in static sensor networks. ACM Transactions on Sensor Networks (TOSN), 1(2), 204\u2013239.","journal-title":"ACM Transactions on Sensor Networks (TOSN)"}],"container-title":["Wireless Personal Communications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-022-09979-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11277-022-09979-2\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-022-09979-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,18]],"date-time":"2023-01-18T10:14:05Z","timestamp":1674036845000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11277-022-09979-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,9,8]]},"references-count":30,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2023,1]]}},"alternative-id":["9979"],"URL":"https:\/\/doi.org\/10.1007\/s11277-022-09979-2","relation":{},"ISSN":["0929-6212","1572-834X"],"issn-type":[{"value":"0929-6212","type":"print"},{"value":"1572-834X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,9,8]]},"assertion":[{"value":"28 August 2022","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"8 September 2022","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declaration"}},{"value":"The authors declare that they have no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}