{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,19]],"date-time":"2026-03-19T22:38:26Z","timestamp":1773959906498,"version":"3.50.1"},"reference-count":37,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2024,1,5]],"date-time":"2024-01-05T00:00:00Z","timestamp":1704412800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,1,5]],"date-time":"2024-01-05T00:00:00Z","timestamp":1704412800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Cryptogr. Commun."],"published-print":{"date-parts":[[2024,5]]},"DOI":"10.1007\/s12095-023-00693-9","type":"journal-article","created":{"date-parts":[[2024,1,5]],"date-time":"2024-01-05T05:01:48Z","timestamp":1704430908000},"page":"665-677","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Re-keying analysis in group key management of wireless sensor networks"],"prefix":"10.1007","volume":"16","author":[{"given":"Prity","family":"Kumari","sequence":"first","affiliation":[]},{"given":"Karam Ratan","family":"Singh","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,1,5]]},"reference":[{"key":"693_CR1","unstructured":"Abel, R. Julian R., Gennian G., Jianxing Y.: Resolvable and near-resolvable designs. In: Handbook of Combinatorial Designs. pp. 150-158. Chapman and Hall\/CRC, (2006)"},{"issue":"4","key":"693_CR2","doi-asserted-by":"publisher","first-page":"353","DOI":"10.1111\/j.1469-1809.1939.tb02219.x","volume":"9","author":"RC Bose","year":"1939","unstructured":"Bose, R.C.: On the construction of balanced incomplete block designs. Ann. Eugen. 9(4), 353\u2013399 (1939)","journal-title":"Ann. Eugen."},{"key":"693_CR3","first-page":"17","volume":"34","author":"RC Bose","year":"1942","unstructured":"Bose, R.C.: On some new series of balanced incomplete block designs. Bull. Calcutta Math. Soc 34, 17\u201331 (1942)","journal-title":"Bull. Calcutta Math. Soc"},{"key":"693_CR4","doi-asserted-by":"crossref","unstructured":"Camtepe, Seyit A.: B\u00fclent Y.: Combinatorial design of key distribution mechanisms for wireless sensor networks. In: Computer Security-ESORICS 2004: 9th European Symposium on Research in Computer Security, Sophia Antipolis, France, September 13\u201315, 2004. Proceedings 9, pp. 293\u2013308. Springer, Berlin Heidelberg (2004)","DOI":"10.1007\/978-3-540-30108-0_18"},{"issue":"2","key":"693_CR5","doi-asserted-by":"publisher","first-page":"346","DOI":"10.1109\/TNET.2007.892879","volume":"15","author":"SA Camtepe","year":"2007","unstructured":"Camtepe, S.A., Blent, Y.: Combinatorial design of key distribution mechanisms for wireless sensor networks. IEEE\/ACM Trans. Networking 15(2), 346\u2013358 (2007)","journal-title":"IEEE\/ACM Trans. Networking"},{"key":"693_CR6","doi-asserted-by":"crossref","unstructured":"Chen, C., Huang, Z., Wen, Q., Fan, Y.: A novel dynamic key management scheme for wireless sensor networks. 4th IEEE International Conference on Broadband Network and Multimedia Technology (pp. 549-552), (2011, October)","DOI":"10.1109\/ICBNMT.2011.6155995"},{"key":"693_CR7","doi-asserted-by":"publisher","first-page":"105","DOI":"10.1007\/s10207-006-0085-4","volume":"5","author":"D Chakrabarti","year":"2006","unstructured":"Chakrabarti, D., Maitra, S., Roy, B.: A key pre-distribution scheme for wireless sensor networks: merging blocks in combinatorial design. Int. J. Inf. Secur. 5, 105\u2013114 (2006)","journal-title":"Int. J. Inf. Secur."},{"key":"693_CR8","doi-asserted-by":"crossref","unstructured":"Colbourn, C.J.: CRC handbook of combinatorial designs (pp. 124-132). CRC press (2010)","DOI":"10.1201\/9781003040897"},{"key":"693_CR9","doi-asserted-by":"crossref","unstructured":"Craigen, R., Kharaghani, H.: Hadamard matrices and Hadamard designs. In: Handbook of combinatorial designs (pp. 299-305). Chapman and Hall\/CRC (2006)","DOI":"10.1201\/9781420010541.pt5"},{"key":"693_CR10","unstructured":"Durisic, M.P., Tafa, Z., Dimic, G., Milutinovic, V.: A survey of military applications of wireless sensor networks. IEEE Mediterranean conference on embedded computing (MECO). (pp. 196\u2013199) (2012, June)"},{"issue":"3","key":"693_CR11","first-page":"201","volume":"3","author":"M Eltoweissy","year":"2002","unstructured":"Eltoweissy, M., John, B.: A framework for scalable multicast security with Bell-LaPadua confidentiality model. J. Internet Technol. 3(3), 201\u2013212 (2002)","journal-title":"J. Internet Technol."},{"key":"693_CR12","doi-asserted-by":"publisher","first-page":"33","DOI":"10.1023\/B:JONS.0000015697.38671.ec","volume":"12","author":"M Eltoweissy","year":"2004","unstructured":"Eltoweissy, M., Hossain, M.H., Linda, M., Hal, I.S.: Combinatorial optimization of group key management. J. Netw. Syst. Manag. 12, 33\u201350 (2004)","journal-title":"J. Netw. Syst. Manag."},{"issue":"5","key":"693_CR13","doi-asserted-by":"publisher","first-page":"668","DOI":"10.1016\/j.adhoc.2004.08.012","volume":"3","author":"M Eltoweissy","year":"2005","unstructured":"Eltoweissy, M., Wadaa, A., Olariu, S., Wilson, L.: Group key management scheme for large-scale sensor networks. Ad Hoc Netw. 3(5), 668\u2013688 (2005)","journal-title":"Ad Hoc Netw."},{"issue":"4","key":"693_CR14","doi-asserted-by":"publisher","first-page":"122","DOI":"10.1109\/MCOM.2006.1632659","volume":"44","author":"M Eltoweissy","year":"2006","unstructured":"Eltoweissy, M., Moharrum, M., Mukkamala, R.: Dynamic key management in sensor networks. IEEE Commun. Mag. 44(4), 122\u2013130 (2006)","journal-title":"IEEE Commun. Mag."},{"key":"693_CR15","doi-asserted-by":"crossref","unstructured":"Fisher, R.A.: An examination of the different possible solutions of a problem in incomplete blocks. 174 (1940)","DOI":"10.1111\/j.1469-1809.1940.tb02237.x"},{"issue":"4","key":"693_CR16","doi-asserted-by":"publisher","first-page":"400","DOI":"10.1109\/JSAC.2009.090505","volume":"27","author":"YM Huang","year":"2009","unstructured":"Huang, Y.M., Hsieh, M.Y., Chao, H.C., Hung, S.H., Park, J.H.: Pervasive, secure access to a hierarchical sensor-based healthcare monitoring architecture in wireless heterogeneous networks. IEEE J. Sel. Areas Commun. 27(4), 400\u2013411 (2009)","journal-title":"IEEE J. Sel. Areas Commun."},{"key":"693_CR17","unstructured":"Karst, N.J., Wicker, S.B.: Secure re-keying and collusion prevention using block designs. IEEE Trans. Netw. (2010)"},{"issue":"10","key":"693_CR18","doi-asserted-by":"publisher","first-page":"6667","DOI":"10.1109\/TIT.2012.2204542","volume":"58","author":"NJ Karst","year":"2012","unstructured":"Karst, N.J., Wicker, S.B.: On the re-keying load in group key distributions using cover-free families. IEEE Trans. Inf. Theory 58(10), 6667\u20136671 (2012)","journal-title":"IEEE Trans. Inf. Theory"},{"issue":"4","key":"693_CR19","doi-asserted-by":"publisher","first-page":"1448","DOI":"10.1214\/aoms\/1177693259","volume":"42","author":"S Kageyama","year":"1971","unstructured":"Kageyama, S.: An improved inequality for balanced incomplete block designs. Ann. Math. Stat. 42(4), 1448\u20131449 (1971)","journal-title":"Ann. Math. Stat."},{"key":"693_CR20","doi-asserted-by":"crossref","unstructured":"Khabiri, E., Bettayeb, S.: Efficient algorithms for secure multicast key management. In: Proceedings. 31st IEEE Conference on Local Computer Networks. pp. 787\u2013792 (2006, November)","DOI":"10.1109\/LCN.2006.322038"},{"key":"693_CR21","doi-asserted-by":"crossref","unstructured":"Khanafer, M., Guennoun, M., Mouftah, H.T.: WSN architectures for intelligent transportation systems. IEEE 3rd International Conference on New Technologies, Mobility and Security. pp. 1-8, (2009, December)","DOI":"10.1109\/NTMS.2009.5384685"},{"key":"693_CR22","doi-asserted-by":"crossref","unstructured":"Lee, J., Stinson, D.R.: A combinatorial approach to key pre-distribution for distributed sensor networks. In: IEEE Wireless Communications and Networking Conference. Vol. 2, pp. 1200-1205 (2005, March)","DOI":"10.1109\/WCNC.2005.1424679"},{"issue":"2","key":"693_CR23","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/1330332.1330333","volume":"11","author":"J Lee","year":"2008","unstructured":"Lee, J., Stinson, D.R.: On the construction of practical key pre-distribution schemes for distributed sensor networks using combinatorial designs. ACM Trans. Inf. Syst. Secur. (TISSEC) 11(2), 1\u201335 (2008)","journal-title":"ACM Trans. Inf. Syst. Secur. (TISSEC)"},{"key":"693_CR24","doi-asserted-by":"crossref","unstructured":"Liu, Y.Y., Yu, X.F., Zhao, D.: Hardware design of an environmental monitoring system based on wireless sensor networks. In: Advanced materials research, Trans Tech Publications Ltd. Vol. 864, pp. 891-896 (2014)","DOI":"10.4028\/www.scientific.net\/AMR.864-867.891"},{"key":"693_CR25","doi-asserted-by":"crossref","unstructured":"Moharrum, M., Mukkamala, R., Eltoweissy, M.: TKGS: verifiable threshold-based key generation scheme in open wireless ad hoc networks. In: Proceedings. 13th International Conference on Computer Communications and Networks. IEEE Cat. No. 04EX969, pp. 31\u201336(2004, October)","DOI":"10.1109\/ICCCN.2004.1401580"},{"key":"693_CR26","doi-asserted-by":"crossref","unstructured":"Moharrum, M.A., Eltoweissy, M.: A study of static versus dynamic keying schemes in sensor networks. In: Proceedings of the 2nd ACM international workshop on Performance evaluation of wireless ad hoc, sensor, and ubiquitous networks. pp. 122\u2013129 (2005)","DOI":"10.1145\/1089803.1089976"},{"key":"693_CR27","doi-asserted-by":"crossref","unstructured":"Redwine, S.T.: A logic for the exclusion basis system. IEEE 37th Annual Hawaii International Conference on System Sciences. Proceedings of the pp. 6-pp (2004, January).","DOI":"10.1109\/HICSS.2004.1265659"},{"key":"693_CR28","doi-asserted-by":"crossref","unstructured":"Ruj, S., Nayak, A., Stojmenovic, I.: Fully secure pairwise and triple key distribution in wireless sensor networks using combinatorial designs. Proceedings IEEE INFOCOM, pp. 326-330 (2011, April)","DOI":"10.1109\/INFCOM.2011.5935175"},{"key":"693_CR29","volume-title":"Combinatorial Designs: Constructions and Analysis","author":"DR Stinson","year":"2004","unstructured":"Stinson, D.R.: Combinatorial Designs: Constructions and Analysis, vol. 480. Springer, New York (2004)"},{"key":"693_CR30","unstructured":"Tie, L., Li, J.: Combinatorial optimization for wireless sensor networks. In: Proceedings of IEEE International Workshop on VLSI Design and Video Technology. pp. 439-442(2005, May)"},{"key":"693_CR31","volume-title":"Security in Wireless Sensor Networks","author":"Y Wang","year":"2008","unstructured":"Wang, Y., Attebury, G., Ramamurthy, B.: Security in Wireless Sensor Networks. Auerbach Publications, CRC Press (2008)"},{"issue":"1","key":"693_CR32","doi-asserted-by":"publisher","first-page":"16","DOI":"10.1109\/90.836475","volume":"8","author":"CK Wong","year":"2000","unstructured":"Wong, C.K., Gouda, M., Lam, S.S.: Secure group communications using key graphs. IEEE\/ACM Trans. Netw. 8(1), 16\u201330 (2000)","journal-title":"IEEE\/ACM Trans. Netw."},{"issue":"2","key":"693_CR33","doi-asserted-by":"publisher","first-page":"121","DOI":"10.1111\/j.1469-1809.1936.tb02134.x","volume":"7","author":"F Yates","year":"1936","unstructured":"Yates, F.: Incomplete randomized blocks. Ann. Eugen. 7(2), 121\u2013140 (1936)","journal-title":"Ann. Eugen."},{"issue":"8","key":"693_CR34","doi-asserted-by":"publisher","first-page":"865","DOI":"10.1109\/TPDS.2006.106","volume":"17","author":"MF Younis","year":"2006","unstructured":"Younis, M.F., Ghumman, K., Eltoweissy, M.: Location-aware combinatorial key management scheme for clustered sensor networks. IEEE Trans. Parallel Distrib. Syst. 17(8), 865\u2013882 (2006)","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"issue":"18","key":"693_CR35","doi-asserted-by":"publisher","first-page":"6351","DOI":"10.1002\/sec.1726","volume":"9","author":"F Zhan","year":"2016","unstructured":"Zhan, F., Yao, N.: A collusion-resistant dynamic key management scheme for WSNs. Secur. Commun. Netw. 9(18), 6351\u20136364 (2016)","journal-title":"Secur. Commun. Netw."},{"issue":"2","key":"693_CR36","doi-asserted-by":"publisher","first-page":"63","DOI":"10.1016\/j.jnca.2009.10.001","volume":"33","author":"J Zhang","year":"2010","unstructured":"Zhang, J., Varadharajan, V.: Wireless sensor network key management survey and taxonomy. J. Netw. Comput. Appl. 33(2), 63\u201375 (2010)","journal-title":"J. Netw. Comput. Appl."},{"key":"693_CR37","unstructured":"Zhu, S., Setia, S., Jajodia, S.: Performance optimizations for group key management schemes. In: 23rd International Conference on Distributed Computing Systems, IEEE. Proceedings. pp. 163\u2013171 (2003, May)"}],"container-title":["Cryptography and Communications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12095-023-00693-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s12095-023-00693-9\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12095-023-00693-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,11,7]],"date-time":"2024-11-07T13:21:51Z","timestamp":1730985711000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s12095-023-00693-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,1,5]]},"references-count":37,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2024,5]]}},"alternative-id":["693"],"URL":"https:\/\/doi.org\/10.1007\/s12095-023-00693-9","relation":{},"ISSN":["1936-2447","1936-2455"],"issn-type":[{"value":"1936-2447","type":"print"},{"value":"1936-2455","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,1,5]]},"assertion":[{"value":"15 June 2023","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"23 December 2023","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"5 January 2024","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}]}}