{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,25]],"date-time":"2025-10-25T14:21:39Z","timestamp":1761402099172,"version":"3.40.5"},"reference-count":19,"publisher":"World Scientific Pub Co Pte Ltd","issue":"01","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["J CIRCUIT SYST COMP"],"published-print":{"date-parts":[[2021,1]]},"abstract":"<jats:p> Wireless sensor networks (WSNs) have attracted a lot of interests over last years in security to ensure integrity, authenticity and data confidentiality. WSN applications are numerous, which range from smart home in indoor deployment offices to smart agriculture in outdoor deployments. Due to the deployment of nodes in remote areas, the solution brought to the wireless sensor network to increase the information security consists in protecting the messages exchanged between nodes. In the paper, modifications in the key management scheme are presented. Due to resource constraints in the sensor nodes, the proposed scheme ensures a distribution of the secured keys between nodes. New session keys transmitted between sensor nodes are defined during the discovery and path key phases. The experimental results prove that the proposed scheme is adapted to the WSN applications in terms of connectivity and resiliency. <\/jats:p>","DOI":"10.1142\/s0218126621500031","type":"journal-article","created":{"date-parts":[[2020,7,27]],"date-time":"2020-07-27T06:52:36Z","timestamp":1595832756000},"page":"2150003","source":"Crossref","is-referenced-by-count":6,"title":["KMPH: Key Management Scheme Based on Pool-Hash for WSN"],"prefix":"10.1142","volume":"30","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-1623-6830","authenticated-orcid":false,"given":"Abdelhamid","family":"Helali","sequence":"first","affiliation":[{"name":"Faculty of Sciences of Monastir, Micro-Opto-Electronics and Nanostructures Laboratory, LMON, Monastir University, LR99ES29, Monastir 5000, Tunisia"}]},{"given":"Amina","family":"Msolli","sequence":"additional","affiliation":[{"name":"Faculty of Sciences of Monastir, Micro-Opto-Electronics and Nanostructures Laboratory, LMON, Monastir University, LR99ES29, Monastir 5000, Tunisia"}]},{"given":"Hassen","family":"Maaref","sequence":"additional","affiliation":[{"name":"Faculty of Sciences of Monastir, Micro-Opto-Electronics and Nanostructures Laboratory, LMON, Monastir University, LR99ES29, Monastir 5000, Tunisia"}]},{"given":"Ridha","family":"Mghaieth","sequence":"additional","affiliation":[{"name":"Faculty of Sciences of Monastir, Micro-Opto-Electronics and Nanostructures Laboratory, LMON, Monastir University, LR99ES29, Monastir 5000, Tunisia"}]}],"member":"219","published-online":{"date-parts":[[2020,7,25]]},"reference":[{"key":"S0218126621500031BIB001","doi-asserted-by":"crossref","first-page":"36","DOI":"10.7763\/IJMO.2011.V1.82","volume":"2","author":"Kalaivani K.","year":"2012","journal-title":"Int. J. Model. Optimiz."},{"key":"S0218126621500031BIB002","first-page":"3906","volume":"2","author":"Patel V.","year":"2014","journal-title":"Int. J. Eng. Dev. Res."},{"first-page":"14","volume-title":"IFIP Int. Workshop on Information Security Theory and Practices","author":"Bekara C.","key":"S0218126621500031BIB003"},{"key":"S0218126621500031BIB004","doi-asserted-by":"crossref","first-page":"1978","DOI":"10.1109\/TC.2015.2456026","volume":"65","author":"Mali G.","year":"2015","journal-title":"IEEE Trans. Comp."},{"key":"S0218126621500031BIB005","doi-asserted-by":"crossref","first-page":"35","DOI":"10.1049\/iet-wss.2015.0003","volume":"6","author":"Gong X.","year":"2016","journal-title":"IET Wirel. Sens. Syst."},{"key":"S0218126621500031BIB006","first-page":"1224","volume":"30","author":"Anwar R. W.","year":"2014","journal-title":"World Appl. Sci. J."},{"first-page":"62","volume-title":"Proc. Tenth ACM Conference on Computer and Communications Security","author":"Zhu S.","key":"S0218126621500031BIB007"},{"key":"S0218126621500031BIB008","doi-asserted-by":"crossref","first-page":"346","DOI":"10.1109\/TNET.2007.892879","volume":"15","author":"Camtepe S. A.","year":"2007","journal-title":"IEEE\/ACM Trans. Network."},{"key":"S0218126621500031BIB009","first-page":"41","volume-title":"CCS \u201902 Proc. 9th ACM Conference on Computer and Communications Security","author":"Eschenauer L.","year":"2002"},{"volume-title":"Int. Conf. Future Computer and Communication, ICFCC","year":"2009","author":"Samundiswary P.","key":"S0218126621500031BIB011"},{"key":"S0218126621500031BIB012","doi-asserted-by":"crossref","first-page":"493","DOI":"10.1016\/j.peva.2013.03.001","volume":"70","author":"Ya\u011fan O.","year":"2013","journal-title":"Perform. Eval."},{"key":"S0218126621500031BIB013","doi-asserted-by":"crossref","first-page":"34","DOI":"10.1109\/TIFS.2016.2601061","volume":"12","author":"Gandino F.","year":"2017","journal-title":"IEEE Trans. Inform. Foren. Security"},{"first-page":"586","volume-title":"23rd Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE INFOCOM 2004)","author":"Du W.","key":"S0218126621500031BIB014"},{"key":"S0218126621500031BIB015","first-page":"27","author":"Liu D.","year":"2003","journal-title":"J. ACM"},{"key":"S0218126621500031BIB016","first-page":"217","volume-title":"18th International Parallel and Distributed Processing Symp. (IPDPS\u201904)","author":"Di Pietro R.","year":"2004"},{"key":"S0218126621500031BIB017","doi-asserted-by":"crossref","first-page":"243","DOI":"10.1016\/j.comcom.2012.09.015","volume":"36","author":"Bechkit W.","year":"2013","journal-title":"Comp. Commun."},{"key":"S0218126621500031BIB018","doi-asserted-by":"crossref","first-page":"910","DOI":"10.1016\/j.compeleceng.2018.01.016","volume":"72","author":"Msolli A.","year":"2018","journal-title":"Comp. Electr. Eng."},{"volume-title":"IEEE SP\u201903","year":"2003","author":"Chan H.","key":"S0218126621500031BIB019"},{"volume-title":"Computer & Information Technology (GSCIT), 2014 Global Summit","year":"2014","author":"Msolli A.","key":"S0218126621500031BIB020"}],"container-title":["Journal of Circuits, Systems and Computers"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.worldscientific.com\/doi\/pdf\/10.1142\/S0218126621500031","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,2,3]],"date-time":"2021-02-03T04:05:38Z","timestamp":1612325138000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.worldscientific.com\/doi\/abs\/10.1142\/S0218126621500031"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,7,25]]},"references-count":19,"journal-issue":{"issue":"01","published-print":{"date-parts":[[2021,1]]}},"alternative-id":["10.1142\/S0218126621500031"],"URL":"https:\/\/doi.org\/10.1142\/s0218126621500031","relation":{},"ISSN":["0218-1266","1793-6454"],"issn-type":[{"type":"print","value":"0218-1266"},{"type":"electronic","value":"1793-6454"}],"subject":[],"published":{"date-parts":[[2020,7,25]]}}}