{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,12,30]],"date-time":"2024-12-30T19:00:07Z","timestamp":1735585207779},"reference-count":24,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2021,5,8]],"date-time":"2021-05-08T00:00:00Z","timestamp":1620432000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,5,8]],"date-time":"2021-05-08T00:00:00Z","timestamp":1620432000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["SN COMPUT. SCI."],"published-print":{"date-parts":[[2021,7]]},"DOI":"10.1007\/s42979-021-00645-1","type":"journal-article","created":{"date-parts":[[2021,5,8]],"date-time":"2021-05-08T15:02:27Z","timestamp":1620486147000},"update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Security Analysis of Group Key Management Schemes in Wireless Sensor Networks Against IND-SAOA Game"],"prefix":"10.1007","volume":"2","author":[{"given":"Payal","family":"Sharma","sequence":"first","affiliation":[]},{"given":"B. R.","family":"Purushothama","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,5,8]]},"reference":[{"key":"645_CR1","doi-asserted-by":"publisher","first-page":"115","DOI":"10.1016\/j.jnca.2015.10.011","volume":"61","author":"O Cheikhrouhou","year":"2016","unstructured":"Cheikhrouhou O. Secure group communication in wireless sensor networks: a survey. J Netw Comput Appl. 2016;61:115\u201332.","journal-title":"J Netw Comput Appl"},{"key":"645_CR2","doi-asserted-by":"crossref","unstructured":"Kausar F, Hussain S, Park JH, Masood A. Secure group communication with self-healing and rekeying in wireless sensor networks. Int Conf Mobile Ad-hoc Sens Netw. 2007; 737\u201348.","DOI":"10.1007\/978-3-540-77024-4_67"},{"key":"645_CR3","doi-asserted-by":"crossref","unstructured":"Yang Y, Zhou J, Deng RH, Bao F. Hierarchical self-healing key distribution for heterogeneous wireless sensor networks. Int Conf Secur Privacy Commun Syst. 2009; 285\u201395.","DOI":"10.1007\/978-3-642-05284-2_16"},{"key":"645_CR4","doi-asserted-by":"crossref","unstructured":"Khalid A, Hussain M. A secure group rekeying scheme with compromised node revocation in wireless sensor networks. Int Conf Inf Secur Assur. 2009; 712\u201321.","DOI":"10.1007\/978-3-642-02617-1_72"},{"issue":"2","key":"645_CR5","doi-asserted-by":"publisher","first-page":"359","DOI":"10.1007\/s11277-008-9653-4","volume":"52","author":"JH Son","year":"2010","unstructured":"Son JH, Lee JS, Seo SW. Topological key hierarchy for energy-efficient group key management in wireless sensor networks. Wireless Pers Commun. 2010;52(2):359.","journal-title":"Wireless Pers Commun"},{"key":"645_CR6","doi-asserted-by":"crossref","unstructured":"Dini G, Savino IM. $$S^{2}$$RP: a secure and scalable rekeying protocol for wireless sensor networks. IEEE Int Conf Mobile Ad Hoc Sens Syst. 2006;457\u201366.","DOI":"10.1109\/MOBHOC.2006.278586"},{"key":"645_CR7","doi-asserted-by":"crossref","unstructured":"Ghafoor A, Sher M, Imran M, Saleem K. A lightweight key freshness scheme for wireless sensor networks. In: 12th IEEE international conference on information technology-new generations, 2015; pp. 169\u2013173.","DOI":"10.1109\/ITNG.2015.32"},{"issue":"1","key":"645_CR8","doi-asserted-by":"publisher","first-page":"33","DOI":"10.1023\/B:JONS.0000015697.38671.ec","volume":"12","author":"M Eltoweissy","year":"2004","unstructured":"Eltoweissy M, Heydari MH, Morales L, Sudborough IH. Combinatorial optimization of group key management. J Netw Syst Manage. 2004;12(1):33\u201350.","journal-title":"J Netw Syst Manage"},{"issue":"2","key":"645_CR9","first-page":"371","volume":"10","author":"SH Seo","year":"2014","unstructured":"Seo SH, Won J, Sultana S, Bertino E. Effective key management in dynamic wireless sensor networks. IEEE Trans Inf Forensics Secur. 2014;10(2):371\u201383.","journal-title":"IEEE Trans Inf Forensics Secur"},{"issue":"3","key":"645_CR10","doi-asserted-by":"publisher","first-page":"179","DOI":"10.1049\/iet-ifs.2012.0352","volume":"8","author":"P Vijayakumar","year":"2014","unstructured":"Vijayakumar P, Bose S, Kannan A. Chinese remainder theorem based centralised group key management for secure multicast communication. IET Inf Secur. 2014;8(3):179\u201387.","journal-title":"IET Inf Secur"},{"issue":"3","key":"645_CR11","doi-asserted-by":"publisher","first-page":"1663","DOI":"10.1109\/TITS.2020.2975226","volume":"22","author":"A Mansour","year":"2020","unstructured":"Mansour A, Malik KM, Alkaff A, Kanaan H. ALMS: Asymmetric Lightweight Centralized Group Key Management Protocol for VANETs. IEEE Trans Intell Transp Syst. 2020;22(3):1663\u201378.","journal-title":"IEEE Trans Intell Transp Syst"},{"key":"645_CR12","doi-asserted-by":"crossref","unstructured":"Guo S, Leung V. A compromise-resilient group rekeying scheme for hierarchical wireless sensor networks. IEEE Wireless Commun Netw Conf. 2010;1\u20136.","DOI":"10.5772\/13671"},{"issue":"4","key":"645_CR13","doi-asserted-by":"publisher","first-page":"642","DOI":"10.1016\/j.csi.2008.06.005","volume":"31","author":"M Wen","year":"2009","unstructured":"Wen M, Zheng YF, Ye WJ, Chen KF, Qiu WD. A key management protocol with robust continuity for sensor networks. Comput Stand Interfaces. 2009;31(4):642\u20137.","journal-title":"Comput Stand Interfaces"},{"issue":"17","key":"645_CR14","doi-asserted-by":"publisher","first-page":"3952","DOI":"10.1002\/sec.1578","volume":"9","author":"P Vijayakumar","year":"2016","unstructured":"Vijayakumar P, Naresh R, Jegatha Deborah L, Hafizul Islam SK. An efficient group key agreement protocol for secure P2P communication. Secur Commun Netw. 2016;9(17):3952\u201365.","journal-title":"Secur Commun Netw"},{"issue":"8","key":"645_CR15","doi-asserted-by":"publisher","first-page":"783","DOI":"10.1007\/s00779-011-0365-5","volume":"15","author":"O Cheikhrouhou","year":"2011","unstructured":"Cheikhrouhou O, Koub\u00e2a A, Dini G, Abid M. RiSeG: a ring based secure group communication protocol for resource-constrained wireless sensor networks. Pers Ubiquit Comput. 2011;15(8):783\u201397.","journal-title":"Pers Ubiquit Comput"},{"key":"645_CR16","doi-asserted-by":"publisher","first-page":"426","DOI":"10.1016\/j.compeleceng.2014.02.008","volume":"41","author":"G Dini","year":"2015","unstructured":"Dini G, Lopriore L. Key propagation in wireless sensor networks. Comput Electr Eng. 2015;41:426\u201333.","journal-title":"Comput Electr Eng"},{"issue":"3","key":"645_CR17","first-page":"695","volume":"33","author":"P Pandiaraja","year":"2017","unstructured":"Pandiaraja P, Vijayakumar P, Vijayakumar V, Seshadhri R. Computation efficient attribute based broadcast group key management for secure document access in public cloud. J Inf Sci Eng. 2017;33(3):695\u2013712.","journal-title":"J Inf Sci Eng"},{"issue":"11","key":"645_CR18","doi-asserted-by":"publisher","first-page":"11309","DOI":"10.1109\/TVT.2019.2943118","volume":"68","author":"X Li","year":"2019","unstructured":"Li X, Wang Y, Vijayakumar P, He D, Kumar N, Ma J. Blockchain-based mutual-healing group key distribution scheme in unmanned aerial vehicles ad-hoc network. IEEE Trans Veh Technol. 2019;68(11):11309\u201322.","journal-title":"IEEE Trans Veh Technol"},{"issue":"5","key":"645_CR19","doi-asserted-by":"publisher","first-page":"3801","DOI":"10.1109\/JIOT.2020.3024703","volume":"8","author":"R Vinoth","year":"2020","unstructured":"Vinoth R, Deborah LJ, Vijayakumar P, Kumar N. Secure multi-factor authenticated key agreement scheme for industrial IoT. IEEE Internet Things J. 2020;8(5):3801\u201311.","journal-title":"IEEE Internet Things J."},{"key":"645_CR20","doi-asserted-by":"crossref","unstructured":"Purushothama BR, Koti N. Security analysis of tree and non-tree based group key management schemes under strong active outsider attack model. In: 2015 IEEE international conference on advances in computing, communications and informatics (ICACCI). 2015; pp. 1825\u20131829.","DOI":"10.1109\/ICACCI.2015.7275882"},{"key":"645_CR21","doi-asserted-by":"crossref","unstructured":"Chaudhari A, Pareek G, Purushothama BR. Security analysis of centralized group key management schemes for wireless sensor networks under strong active outsider adversary model. In: 2017 IEEE international conference on advances in computing, communications and informatics (ICACCI). 2017; pp. 1576\u20131581.","DOI":"10.1109\/ICACCI.2017.8126066"},{"key":"645_CR22","doi-asserted-by":"crossref","unstructured":"Purushothama BR, Verma AP. Security analysis of group key management schemes of wireless sensor network under active outsider adversary model. In: 2017 IEEE international conference on advances in computing, communications and informatics (ICACCI). 2017, pp. 988-9-94.","DOI":"10.1109\/ICACCI.2017.8125970"},{"key":"645_CR23","doi-asserted-by":"crossref","unstructured":"Sawant SV, Pareek G, Purushothama BR. Group key management schemes under strong active adversary model: a security analysis. In: Springer International symposium on security in computing and communication. 2018; pp. 403\u2013418.","DOI":"10.1007\/978-981-13-5826-5_31"},{"issue":"2","key":"645_CR24","first-page":"48","volume":"14","author":"SM Patil","year":"2019","unstructured":"Patil SM, BR P. Security analysis of proxy cryptography based group key management schemes for dynamic and wireless networks under active outsider attack model. J Inf Assur Secur. 2019;14(2):48\u201366.","journal-title":"J Inf Assur Secur."}],"container-title":["SN Computer Science"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s42979-021-00645-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s42979-021-00645-1\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s42979-021-00645-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,6,26]],"date-time":"2021-06-26T20:21:23Z","timestamp":1624738883000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s42979-021-00645-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,5,8]]},"references-count":24,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2021,7]]}},"alternative-id":["645"],"URL":"https:\/\/doi.org\/10.1007\/s42979-021-00645-1","relation":{},"ISSN":["2662-995X","2661-8907"],"issn-type":[{"value":"2662-995X","type":"print"},{"value":"2661-8907","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,5,8]]},"assertion":[{"value":"22 November 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"13 April 2021","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"8 May 2021","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of Interest"}}],"article-number":"261"}}