{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,19]],"date-time":"2025-03-19T15:10:22Z","timestamp":1742397022094,"version":"3.30.2"},"reference-count":32,"publisher":"Elsevier BV","issue":"4","license":[{"start":{"date-parts":[[2003,11,1]],"date-time":"2003-11-01T00:00:00Z","timestamp":1067644800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Ad Hoc Networks"],"published-print":{"date-parts":[[2003,11]]},"DOI":"10.1016\/s1570-8705(03)00046-5","type":"journal-article","created":{"date-parts":[[2003,9,11]],"date-time":"2003-09-11T23:29:31Z","timestamp":1063322971000},"page":"455-468","source":"Crossref","is-referenced-by-count":40,"title":["Providing secrecy in key management protocols for large wireless sensors networks"],"prefix":"10.1016","volume":"1","author":[{"given":"Roberto","family":"Di Pietro","sequence":"first","affiliation":[]},{"given":"Luigi V.","family":"Mancini","sequence":"additional","affiliation":[]},{"given":"Sushil","family":"Jajodia","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"issue":"4","key":"10.1016\/S1570-8705(03)00046-5_BIB1","doi-asserted-by":"crossref","first-page":"628","DOI":"10.1109\/49.839937","article-title":"New multiparty authentication services and key agreement protocols","volume":"18","author":"Ateniese","year":"2000","journal-title":"IEEE Journal on Selected Areas in Communications"},{"key":"10.1016\/S1570-8705(03)00046-5_BIB2","series-title":"Proceedings of the 2001 ACM International Symposium on Mobile ad hoc Networking & Computing","first-page":"156","article-title":"Secure pebblenets","author":"Basagni","year":"2001"},{"key":"10.1016\/S1570-8705(03)00046-5_BIB3","unstructured":"H. Chan, A. Perrig, D. Song, Random key predistribution schemes for sensor networks, in: Proceedings of the IEEE Symposium on Security and Privacy, Oakland, CA, USA, 11\u201314 May 2003, pp. 197\u2013213"},{"issue":"6","key":"10.1016\/S1570-8705(03)00046-5_BIB4","doi-asserted-by":"crossref","first-page":"445","DOI":"10.1023\/A:1019136102972","article-title":"Performance comparison of battery power consumption in wireless multiple access protocols","volume":"5","author":"Chen","year":"1999","journal-title":"Wireless Networks"},{"key":"10.1016\/S1570-8705(03)00046-5_BIB5","doi-asserted-by":"crossref","unstructured":"D.A.R.P.A., June 2002. www.darpa.mil\/mto\/mems","DOI":"10.1145\/504689.504690"},{"key":"10.1016\/S1570-8705(03)00046-5_BIB6","series-title":"Proceedings of the 17th IFIP International Conference on Information Security","first-page":"423","article-title":"Secure selective exclusion in ad hoc wireless network","author":"Di Pietro","year":"2002"},{"key":"10.1016\/S1570-8705(03)00046-5_BIB7","series-title":"Proceedings of the 18th International Conference on Information Security","first-page":"121","article-title":"A time driven methodology for keys dimensioning in secure multicast communications","author":"Di Pietro","year":"2003"},{"key":"10.1016\/S1570-8705(03)00046-5_BIB8","doi-asserted-by":"crossref","unstructured":"R. Di Pietro, L.V. Mancini, A. Mei, Random keys assignment for secure wireless sensor networks, in: Proceedings of the ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN \u201903), 31 October 2003, Fairfax, VA, USA","DOI":"10.1145\/986858.986868"},{"issue":"6","key":"10.1016\/S1570-8705(03)00046-5_BIB9","doi-asserted-by":"crossref","first-page":"644","DOI":"10.1109\/TIT.1976.1055638","article-title":"New directions in cryptography","volume":"IT-22","author":"Diffie","year":"1976","journal-title":"IEEE Transactions on Information Theory"},{"key":"10.1016\/S1570-8705(03)00046-5_BIB10","doi-asserted-by":"crossref","unstructured":"J. Elson, L. Girod, D. Estrin, Fine-grained network time synchronization using reference broadcasts, in: Proceedings of the Fifth Symposium on Operating Systems Design and Implementation (OSDI 2002), Boston, MA, USA, 9\u201311 December 2002","DOI":"10.1145\/1060289.1060304"},{"issue":"1","key":"10.1016\/S1570-8705(03)00046-5_BIB11","doi-asserted-by":"crossref","first-page":"149","DOI":"10.1145\/774763.774787","article-title":"Wireless sensor networks: a new regime for time synchronization","volume":"33","author":"Elson","year":"2003","journal-title":"ACM SIGCOMM Computer Communication Review"},{"key":"10.1016\/S1570-8705(03)00046-5_BIB12","series-title":"Proceedings of the 9th ACM Conference on Computer and Communications Security","first-page":"41","article-title":"A key-management scheme for distributed sensor networks","author":"Eschenauer","year":"2002"},{"key":"10.1016\/S1570-8705(03)00046-5_BIB13","unstructured":"H. Harney, E. Harder, Logical key hierarchy protocol, Internet draft, IETF, April 1999"},{"key":"10.1016\/S1570-8705(03)00046-5_BIB14","series-title":"Proceedings of the 9th International Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS-IX)","first-page":"93","article-title":"System architecture directions for networked sensors","author":"Hill","year":"2000"},{"key":"10.1016\/S1570-8705(03)00046-5_BIB15","series-title":"Proceedings of the ACM\/IEEE International Conference on Mobile Computing and Networking (MobiCom99)","first-page":"271","article-title":"Mobile networking for smart dust","author":"Kahn","year":"1999"},{"issue":"5","key":"10.1016\/S1570-8705(03)00046-5_BIB16","doi-asserted-by":"crossref","first-page":"533","DOI":"10.1002\/wcm.75","article-title":"Adaptive security for multi-layer ad hoc networks","volume":"2","author":"Kong","year":"2002","journal-title":"Wireless Communications and Mobile Computing"},{"issue":"7","key":"10.1016\/S1570-8705(03)00046-5_BIB17","doi-asserted-by":"crossref","first-page":"558","DOI":"10.1145\/359545.359563","article-title":"Time, clocks, the ordering of events in a distributed system","volume":"21","author":"Lamport","year":"1978","journal-title":"Communications of the ACM"},{"key":"10.1016\/S1570-8705(03)00046-5_BIB18","doi-asserted-by":"crossref","unstructured":"S. Marti, K.L.M. Baker, Mitigating routing misbehavior in mobile ad hoc networks, in: Proceedings of the Sixth Annual International Conference on Mobile Computing and Networking, 2000, pp. 255\u2013265","DOI":"10.1145\/345910.345955"},{"key":"10.1016\/S1570-8705(03)00046-5_BIB19","unstructured":"Security Requirements for Cryptographic Modules, Fips Pub. 140-1, National Institute of Standard and Technology, January 1994"},{"year":"2001","series-title":"Ad Hoc Networking","author":"Perkins","key":"10.1016\/S1570-8705(03)00046-5_BIB20"},{"key":"10.1016\/S1570-8705(03)00046-5_BIB21","series-title":"Network and Distributed System Security Symposium, NDSS\u201901","first-page":"35","article-title":"Efficient and secure source authentication for multicast","author":"Perrig","year":"2001"},{"key":"10.1016\/S1570-8705(03)00046-5_BIB22","doi-asserted-by":"crossref","unstructured":"A. Perrig, R. Canetti, J.D. Tygar, D. Song, Efficient authentication and signing of multicast streams over lossy channels, in: IEEE Symposium on Security and Privacy, May 2000, pp. 56\u201373","DOI":"10.1109\/SECPRI.2000.848446"},{"key":"10.1016\/S1570-8705(03)00046-5_BIB23","doi-asserted-by":"crossref","unstructured":"A. Perrig, D. Song, J.D. Tygar, Elk, a new protocol for efficient large-group key distribution, in: Proceedings of 2001 IEEE Symposium on Security & Privacy, 2001, pp. 247\u2013262","DOI":"10.1109\/SECPRI.2001.924302"},{"key":"10.1016\/S1570-8705(03)00046-5_BIB24","series-title":"Proceedings of the Seventh Annual International Conference on Mobile Computing and Networking","first-page":"189","article-title":"Spins: security protocols for sensor networks","author":"Perrig","year":"2001"},{"issue":"2","key":"10.1016\/S1570-8705(03)00046-5_BIB25","doi-asserted-by":"crossref","first-page":"46","DOI":"10.1109\/98.760423","article-title":"A review of current routing protocols for ad hoc mobile wireless network","volume":"6","author":"Royer","year":"1999","journal-title":"IEEE Personal Communication Magazine"},{"key":"10.1016\/S1570-8705(03)00046-5_BIB26","doi-asserted-by":"crossref","unstructured":"R. Safaci-Naini, H. Wang, New constructions for multicast re-keying schemes using perfect hash function, in: Proceedings of the Seventh ACM Conference on Computer and Communications Security, 2000, pp. 228\u2013234","DOI":"10.1145\/352600.352637"},{"year":"1996","series-title":"Applied Cryptography: Protocols, Algorithms and Source Code in C","author":"Schneier","key":"10.1016\/S1570-8705(03)00046-5_BIB27"},{"issue":"2","key":"10.1016\/S1570-8705(03)00046-5_BIB28","doi-asserted-by":"crossref","first-page":"62","DOI":"10.1109\/54.914626","article-title":"Dynamic power management in wireless sensor networks","volume":"18","author":"Sinha","year":"2001","journal-title":"IEEE Design and Test of Computer"},{"issue":"8","key":"10.1016\/S1570-8705(03)00046-5_BIB29","doi-asserted-by":"crossref","first-page":"769","DOI":"10.1109\/71.877936","article-title":"Key agreement in dynamic peer groups","volume":"11","author":"Steiner","year":"2000","journal-title":"IEEE Transactions on Parallel and Distributed Systems"},{"key":"10.1016\/S1570-8705(03)00046-5_BIB30","doi-asserted-by":"crossref","unstructured":"D. Wallner, E. Harder, R. Agee, Key Management for Multicast: Issues and Architectures, RFC 2627, June 1999","DOI":"10.17487\/rfc2627"},{"issue":"1","key":"10.1016\/S1570-8705(03)00046-5_BIB31","doi-asserted-by":"crossref","first-page":"16","DOI":"10.1109\/90.836475","article-title":"Secure group communications using key graphs","volume":"8","author":"Wong","year":"2000","journal-title":"IEEE\/ACM Transactions on Networking"},{"key":"10.1016\/S1570-8705(03)00046-5_BIB32","doi-asserted-by":"crossref","unstructured":"Y. Zhang, W. Lee, Intrusion detection in wireless ad hoc networks, in: Proceedings of the Sixth Annual International Conference on Mobile Computing and Networking, 2000, pp. 275\u2013283","DOI":"10.1145\/345910.345958"}],"container-title":["Ad Hoc Networks"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1570870503000465?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1570870503000465?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2024,12,13]],"date-time":"2024-12-13T18:35:09Z","timestamp":1734114909000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S1570870503000465"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2003,11]]},"references-count":32,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2003,11]]}},"alternative-id":["S1570870503000465"],"URL":"https:\/\/doi.org\/10.1016\/s1570-8705(03)00046-5","relation":{},"ISSN":["1570-8705"],"issn-type":[{"type":"print","value":"1570-8705"}],"subject":[],"published":{"date-parts":[[2003,11]]}}}