{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,3]],"date-time":"2025-05-03T06:40:03Z","timestamp":1746254403972,"version":"3.40.4"},"reference-count":30,"publisher":"Springer Science and Business Media LLC","issue":"6","license":[{"start":{"date-parts":[[2014,6,4]],"date-time":"2014-06-04T00:00:00Z","timestamp":1401840000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Peer-to-Peer Netw. Appl."],"published-print":{"date-parts":[[2015,11]]},"DOI":"10.1007\/s12083-014-0286-y","type":"journal-article","created":{"date-parts":[[2014,6,3]],"date-time":"2014-06-03T07:06:58Z","timestamp":1401779218000},"page":"1133-1142","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":33,"title":["Securing distributed storage for Social Internet of Things using regenerating code and Blom key agreement"],"prefix":"10.1007","volume":"8","author":[{"given":"Jun","family":"Wu","sequence":"first","affiliation":[]},{"given":"Mianxiong","family":"Dong","sequence":"additional","affiliation":[]},{"given":"Kaoru","family":"Ota","sequence":"additional","affiliation":[]},{"given":"Lin","family":"Liang","sequence":"additional","affiliation":[]},{"given":"Zhenyu","family":"Zhou","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2014,6,4]]},"reference":[{"key":"286_CR1","first-page":"1","volume":"99","author":"H Li","year":"2013","unstructured":"Li H, Lin X, Yang H, Liang X, Lu R, Shen X (2013) EPPDR: an efficient privacy-preserving demand response scheme with adaptive key evolution in smart grid. IEEE Trans Parallel Distrib Syst 99:1\u201311. doi: 10.1109\/TPDS.2013.124","journal-title":"IEEE Trans Parallel Distrib Syst"},{"key":"286_CR2","doi-asserted-by":"crossref","unstructured":"Dong M, Ota K, Lin M, Tang Z, Du S, Zhu H (2014) UAV-assisted data gathering in wireless sensor networks. J Supercomput 1\u201314. doi: 10.1007\/s11227-014-1161-6","DOI":"10.1007\/s11227-014-1161-6"},{"key":"286_CR3","first-page":"1","volume":"99","author":"H Li","year":"2013","unstructured":"Li H, Lu R, Zhou L, Yang B, Shen X (2013) An efficient merkle tree based authentication scheme for smart grid. IEEE Syst J 99:1\u20139. doi: 10.1109\/JSYST.2013.2271537","journal-title":"IEEE Syst J"},{"key":"286_CR4","doi-asserted-by":"crossref","unstructured":"Dong M, Ota K, Li H, Du S, Zhu H, Guo S (2013) RENDEZVOUS: towards fast event detecting in wireless sensor and actor networks, computing 1\u201313. doi: 10.1007\/s00607-013-0364-7","DOI":"10.1007\/s00607-013-0364-7"},{"key":"286_CR5","doi-asserted-by":"crossref","first-page":"5","DOI":"10.4236\/ait.2011.11002","volume":"1","author":"E Kosmatos","year":"2011","unstructured":"Kosmatos E, Tselikas ND, Boucouvalas AC (2011) Integrating RFIDs and smart objects into a unified Internet of Things architecture. Adv Internet Things 1:5\u201312","journal-title":"Adv Internet Things"},{"key":"286_CR6","doi-asserted-by":"crossref","first-page":"2787","DOI":"10.1016\/j.comnet.2010.05.010","volume":"15","author":"L Atzori","year":"2010","unstructured":"Atzori L, Iera A, Morabito G (2010) The internet of things: a survey. Comput Netw 15:2787\u20132805","journal-title":"Comput Netw"},{"key":"286_CR7","unstructured":"Ding L, Shi P, Liu B (2010) The clustering of internet, internet of things and social network. In KAM Symposium"},{"key":"286_CR8","doi-asserted-by":"crossref","unstructured":"Guinard D, Fischer M, Trifa V (2010) Sharing using social networks in a composable web of things. In PERCOM Workshops","DOI":"10.1109\/PERCOMW.2010.5470524"},{"key":"286_CR9","doi-asserted-by":"crossref","unstructured":"Atzori L, Iera A, Morabito G, Nitti M (2012) The Social Internet of Things (SIoT)\u2013when social networks meet the internet of things: concept, architecture and network characterization. Comput Netw","DOI":"10.1016\/j.comnet.2012.07.010"},{"key":"286_CR10","doi-asserted-by":"crossref","first-page":"1193","DOI":"10.1109\/LCOMM.2011.090911.111340","volume":"11","author":"L Atzori","year":"2011","unstructured":"Atzori L, Iera A, Morabito G (2011) SIoT: giving a social structure to the Internet of Things. IEEE Commun Lett 11:1193\u20131195","journal-title":"IEEE Commun Lett"},{"key":"286_CR11","first-page":"1","volume":"99","author":"M Nitti","year":"2013","unstructured":"Nitti M, Girau R, Atzori L (2013) Trustworthiness management in the Social Internet of Things. IEEE Trans Knowl Data Eng 99:1\u201314","journal-title":"IEEE Trans Knowl Data Eng"},{"key":"286_CR12","first-page":"261","volume":"2","author":"Z Kong","year":"2010","unstructured":"Kong Z, Aly SA, Solganin E (2010) Decentralized coding algorithms for distributed storage in wireless sensor networks. IEEE J Sel Areas Commun 2:261\u2013267","journal-title":"IEEE J Sel Areas Commun"},{"key":"286_CR13","doi-asserted-by":"crossref","unstructured":"Kamra A, Feldman J, Misra V, Rubenstein D (2006) Growth codes: maximizing sensor network data persistence. Proceedings of Conference of ACM Special Interest Group on Data Communication (2006), ACM: Pisa, Italy, 2006; SIGCOMM","DOI":"10.1145\/1159913.1159943"},{"key":"286_CR14","doi-asserted-by":"crossref","unstructured":"Subramanian N, Yang C, Zhang W (2007) Securing distributed data storage and retrieval in sensor networks. Proceedings of Fifth Annual IEEE International Conference on Pervasive Computing and Communications, IEEE: New York, USA, 2007; PerCom","DOI":"10.1109\/PERCOM.2007.29"},{"key":"286_CR15","doi-asserted-by":"crossref","first-page":"982","DOI":"10.1109\/TMC.2010.214","volume":"7","author":"H Shen","year":"2011","unstructured":"Shen H, Zhao L, Li Z (2011) A distributed spatial-temporal similarity data storage scheme in wireless sensor networks. IEEE Trans Mob Comput 7:982\u2013996","journal-title":"IEEE Trans Mob Comput"},{"key":"286_CR16","doi-asserted-by":"crossref","first-page":"4539","DOI":"10.1109\/TIT.2010.2054295","volume":"9","author":"AG Dimakis","year":"2010","unstructured":"Dimakis AG, Godfrey PB, Wu Y, Wainwright MJ, Ramchandran K (2010) Network coding for distributed storage systems. IEEE Trans Inf Theory 9:4539\u20134551","journal-title":"IEEE Trans Inf Theory"},{"key":"286_CR17","doi-asserted-by":"crossref","first-page":"1586","DOI":"10.1109\/TPDS.2010.27","volume":"21","author":"HY Lin","year":"2010","unstructured":"Lin HY, Tzeng WG (2010) A secure decentralized erasure code for distributed networked storage. IEEE Trans Parallel Distrib Syst 21:1586\u20131594","journal-title":"IEEE Trans Parallel Distrib Syst"},{"key":"286_CR18","first-page":"231","volume-title":"Non-public key distribution. In Proc. CRYPTO 82","author":"R Blom","year":"1983","unstructured":"Blom R (1983) Non-public key distribution. In Proc. CRYPTO 82. Plenum Press, New York, pp 231\u2013236"},{"key":"286_CR19","doi-asserted-by":"crossref","unstructured":"Wang SJ, Tsai YR, Chan JW (2007) A countermeasure against frequent attacks based on the Blom-scheme in ad hoc sensor networks. Proc. 2nd International Symposium on Wireless Pervasive Computing (ISWPC 2007)","DOI":"10.1109\/ISWPC.2007.342593"},{"key":"286_CR20","doi-asserted-by":"crossref","unstructured":"Fu H, Kawamura S, Li C (2006) Blom-based q-composite: a generalized framework of random key pre-distribution schemes for wireless sensor networks. Proc. 2006 IEEE\/RSJ International Conference on Intelligent Robots and Systems","DOI":"10.1109\/IROS.2006.282413"},{"key":"286_CR21","doi-asserted-by":"crossref","unstructured":"Subash TD, Divya C (2011) Novel key pre-distribution scheme in wireless sensor network. Proc. 2011 International Conference on Emerging Trends in Electrical and Computer Technology (ICETECT 2011)","DOI":"10.1109\/ICETECT.2011.5760258"},{"key":"286_CR22","unstructured":"Fu H, Kawamura S, Zhang M, Zhang L (2005) Replication attack on random key pre-distribution schemes for wireless sensor networks. Proc. Sixth Annual IEEE SMC Information Assurance Workshop (IAW 2005)"},{"key":"286_CR23","doi-asserted-by":"crossref","unstructured":"Fanian A, Berenjkoub M, Saidi H, Gulliver TA (2010) A new key establishment protocol for limited resource wireless sensor networks. Proc. Eighth Annual Communication Networks and Services Research Conference (CNSR 2010)","DOI":"10.1109\/CNSR.2010.43"},{"key":"286_CR24","doi-asserted-by":"crossref","unstructured":"Zhang J, Sun Y, Liu L (2007) NPKPS: a novel pairwise key pre-distribution scheme for wireless sensor networks. Proc. IET Conference on Wireless, Mobile and Sensor Networks (CCWMSN07)","DOI":"10.1049\/cp:20070180"},{"key":"286_CR25","doi-asserted-by":"crossref","unstructured":"Xie M (2009) Research on the realization of a new type of wireless sensor network communication protocol. Proc. 2nd IEEE International Conference on Computer Science and Information Technology (ICCSIT 2009)","DOI":"10.1109\/ICCSIT.2009.5234626"},{"key":"286_CR26","doi-asserted-by":"crossref","unstructured":"Nikodem J, Nikodem M (2007) Securing communication trees in ad hoc sensor networks with polynomial-based key pre-distribution. Proc. 12th IEEE Symposium on Computers and Communications (ISCC 2007)","DOI":"10.1109\/ISCC.2007.4381547"},{"key":"286_CR27","doi-asserted-by":"crossref","unstructured":"Chaurasia A, Dubey U, Ghosh RK (2012) A robust key management scheme with strong connectivity for wireless sensor network. Proc. 2012 International Conference on Collaboration Technologies and Systems (CTS 2012)","DOI":"10.1109\/CTS.2012.6261049"},{"key":"286_CR28","doi-asserted-by":"crossref","unstructured":"Corena JC, Ohtsuki T (2012) A multiple-MAC-based protocol to identify misbehaving nodes in network coding. Proc. IEEE Vehicular Technology Conference (VTC Fall 2012)","DOI":"10.1109\/VTCFall.2012.6399271"},{"key":"286_CR29","doi-asserted-by":"crossref","unstructured":"Li C, Wang Z, Yang C (2010) SEAODV: a security enhanced AODV routing protocol for wireless mesh networks. Proc. IEEE 6th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob 2010)","DOI":"10.1109\/WIMOB.2010.5644855"},{"key":"286_CR30","doi-asserted-by":"crossref","first-page":"2673","DOI":"10.1049\/iet-com.2011.0118","volume":"18","author":"N Erratt","year":"2011","unstructured":"Erratt N, Liang Y (2011) Compressed data-stream protocol: an energy-efficient compressed data-stream protocol for wireless sensor networks. IET Commun 18:2673\u20132683","journal-title":"IET Commun"}],"container-title":["Peer-to-Peer Networking and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-014-0286-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s12083-014-0286-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-014-0286-y","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,3]],"date-time":"2025-05-03T06:20:27Z","timestamp":1746253227000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s12083-014-0286-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,6,4]]},"references-count":30,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2015,11]]}},"alternative-id":["286"],"URL":"https:\/\/doi.org\/10.1007\/s12083-014-0286-y","relation":{},"ISSN":["1936-6442","1936-6450"],"issn-type":[{"type":"print","value":"1936-6442"},{"type":"electronic","value":"1936-6450"}],"subject":[],"published":{"date-parts":[[2014,6,4]]}}}