{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,16]],"date-time":"2026-02-16T09:37:32Z","timestamp":1771234652287,"version":"3.50.1"},"reference-count":24,"publisher":"World Scientific Pub Co Pte Ltd","issue":"01","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Discrete Math. Algorithm. Appl."],"published-print":{"date-parts":[[2022,1]]},"abstract":"<jats:p> An accumulation of wireless sensor nodes is combined together to form the Wireless Sensor Networks. The sensor nodes are distributed haphazardly without any decided method into a natural setting, which is generally inhospitable and it is difficult to provide key-chains to each node for security as they are haphazardly distributed. In this paper, we use Nested Block Design (NBD) as Key Pre-distribution Scheme (KPS) and found out that NBD support large networks with fewer keys in each node than Symmetric Balanced Incomplete Block Designs (SBIBD) and Transversal Design (TD[Formula: see text]), provide higher resiliency than SBIBDs and better connectivity than TD[Formula: see text], tradeoff between local connectivity and resiliency ([Formula: see text]) is lower than SBIBD but more than TD[Formula: see text] and key-node ratio ([Formula: see text]) is same for [Formula: see text] but lower than SBIBD. <\/jats:p>","DOI":"10.1142\/s1793830921501007","type":"journal-article","created":{"date-parts":[[2021,2,5]],"date-time":"2021-02-05T03:18:57Z","timestamp":1612495137000},"source":"Crossref","is-referenced-by-count":3,"title":["Nested block design as key pre-distribution in wireless sensor networks"],"prefix":"10.1142","volume":"14","author":[{"given":"K. R.","family":"Singh","sequence":"first","affiliation":[{"name":"National Institute of Technology, Yupia, Arunachal Pradesh, 791112, India"}]},{"given":"P.","family":"Das","sequence":"additional","affiliation":[{"name":"National Institute of Technology, Yupia, Arunachal Pradesh, 791112, India"}]},{"given":"S.","family":"Banerjee","sequence":"additional","affiliation":[{"name":"National Institute of Technology, Yupia, Arunachal Pradesh, 791112, India"}]}],"member":"219","published-online":{"date-parts":[[2021,3,11]]},"reference":[{"key":"S1793830921501007BIB001","doi-asserted-by":"publisher","DOI":"10.1111\/j.1469-1809.1939.tb02219.x"},{"key":"S1793830921501007BIB002","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-30108-0_18"},{"key":"S1793830921501007BIB003","first-page":"197","volume-title":"IEEE Symp. Security and Privacy","author":"Chan H.","year":"2003"},{"key":"S1793830921501007BIB004","doi-asserted-by":"publisher","DOI":"10.5220\/0006132700490058"},{"key":"S1793830921501007BIB005","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1976.1055638"},{"key":"S1793830921501007BIB006","doi-asserted-by":"publisher","DOI":"10.1007\/s11276-006-6530-5"},{"key":"S1793830921501007BIB007","doi-asserted-by":"publisher","DOI":"10.1007\/s11390-008-9168-1"},{"key":"S1793830921501007BIB008","doi-asserted-by":"publisher","DOI":"10.1145\/948109.948118"},{"key":"S1793830921501007BIB009","doi-asserted-by":"publisher","DOI":"10.1145\/586110.586117"},{"key":"S1793830921501007BIB010","doi-asserted-by":"publisher","DOI":"10.3390\/asi3010014"},{"key":"S1793830921501007BIB012","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2011.01.037"},{"key":"S1793830921501007BIB013","first-page":"1200","volume-title":"Wireless Communications and Networking Conf. IEEE","volume":"2","author":"Lee J.","year":"2005"},{"key":"S1793830921501007BIB014","doi-asserted-by":"publisher","DOI":"10.1145\/1330332.1330333"},{"key":"S1793830921501007BIB015","doi-asserted-by":"publisher","DOI":"10.1145\/948109.948119"},{"key":"S1793830921501007BIB016","doi-asserted-by":"publisher","DOI":"10.1109\/35.312841"},{"key":"S1793830921501007BIB017","doi-asserted-by":"publisher","DOI":"10.1007\/s10623-012-9749-4"},{"key":"S1793830921501007BIB018","doi-asserted-by":"publisher","DOI":"10.1145\/381677.381696"},{"key":"S1793830921501007BIB019","doi-asserted-by":"publisher","DOI":"10.1093\/biomet\/54.3-4.479"},{"key":"S1793830921501007BIB020","doi-asserted-by":"publisher","DOI":"10.1145\/359340.359342"},{"key":"S1793830921501007BIB021","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnnms.2015.08.002"},{"key":"S1793830921501007BIB022","first-page":"42","author":"Sharma K.","year":"2010","journal-title":"IJCA Special Issue on Mobile Ad-Hoc Networks MANETs"},{"key":"S1793830921501007BIB023","doi-asserted-by":"crossref","unstructured":"D. R. Stinson,  Combinatorial Designs\u200a : Constructions and Analysis  (Springer Science and Business Media, 2007),  pp. 1\u201339.","DOI":"10.1145\/1466390.1466393"},{"key":"S1793830921501007BIB024","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2006.315852"},{"issue":"2","key":"S1793830921501007BIB025","first-page":"121","volume":"7","author":"Yates F.","year":"1936","journal-title":"Ann. Human Gen."}],"container-title":["Discrete Mathematics, Algorithms and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.worldscientific.com\/doi\/pdf\/10.1142\/S1793830921501007","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,2,16]],"date-time":"2022-02-16T10:18:01Z","timestamp":1645006681000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.worldscientific.com\/doi\/abs\/10.1142\/S1793830921501007"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,3,11]]},"references-count":24,"journal-issue":{"issue":"01","published-print":{"date-parts":[[2022,1]]}},"alternative-id":["10.1142\/S1793830921501007"],"URL":"https:\/\/doi.org\/10.1142\/s1793830921501007","relation":{},"ISSN":["1793-8309","1793-8317"],"issn-type":[{"value":"1793-8309","type":"print"},{"value":"1793-8317","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,3,11]]},"article-number":"2150100"}}