{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:42:21Z","timestamp":1750308141357,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":23,"publisher":"ACM","license":[{"start":{"date-parts":[[2005,11,2]],"date-time":"2005-11-02T00:00:00Z","timestamp":1130889600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2005,11,2]]},"DOI":"10.1145\/1098918.1098922","type":"proceedings-article","created":{"date-parts":[[2006,2,6]],"date-time":"2006-02-06T15:52:40Z","timestamp":1139241160000},"page":"27-38","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":20,"title":["A new approach for establishing pairwise keys for securing wireless sensor networks"],"prefix":"10.1145","author":[{"given":"Arno","family":"Wacker","sequence":"first","affiliation":[{"name":"Universit\u00e4t Stuttgart, Stuttgart, Germany"}]},{"given":"Mirko","family":"Knoll","sequence":"additional","affiliation":[{"name":"Universit\u00e4t Stuttgart, Stuttgart, Germany"}]},{"given":"Timo","family":"Heiber","sequence":"additional","affiliation":[{"name":"Universit\u00e4t Stuttgart, Stuttgart, Germany"}]},{"given":"Kurt","family":"Rothermel","sequence":"additional","affiliation":[{"name":"Universit\u00e4t Stuttgart, Stuttgart, Germany"}]}],"member":"320","published-online":{"date-parts":[[2005,11,2]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"A key-distribution scheme for wireless home automation networks,\" in Proceedings of IEEE CCNC","author":"Wacker A.","year":"2004","unstructured":"A. Wacker , T. Heiber , and H. Cermann , \" A key-distribution scheme for wireless home automation networks,\" in Proceedings of IEEE CCNC 2004 , IEEE Communications Society . Las Vegas, Nevada, USA:, Jan., 5-8 2004. A. Wacker, T. Heiber, and H. Cermann, \"A key-distribution scheme for wireless home automation networks,\" in Proceedings of IEEE CCNC 2004, IEEE Communications Society. Las Vegas, Nevada, USA:, Jan., 5-8 2004."},{"key":"e_1_3_2_1_2_1","volume-title":"PGP in constrained wireless devices,\" in Proceedings of the 9th USENIX Security Symposium","author":"Brown M.","year":"2000","unstructured":"M. Brown and D. Cheung , \" PGP in constrained wireless devices,\" in Proceedings of the 9th USENIX Security Symposium , 2000 . M. Brown and D. Cheung, \"PGP in constrained wireless devices,\" in Proceedings of the 9th USENIX Security Symposium, 2000."},{"key":"e_1_3_2_1_3_1","volume-title":"May","author":"Chan H.","year":"2003","unstructured":"H. Chan , A. Perrig , and D. Song , \" Random key predistribution schemes for sensor networks,\" in IEEE Symposium on Security and Privacy , May 2003 . H. Chan, A. Perrig, and D. Song, \"Random key predistribution schemes for sensor networks,\" in IEEE Symposium on Security and Privacy, May 2003."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/65.806983"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/49.223866"},{"key":"e_1_3_2_1_6_1","volume-title":"The multi-tree approach to reliability in distributed networks.\" in Proceedings of the 25th Symposium on FOCS","author":"Itah A.","year":"1984","unstructured":"A. Itah and M. Rodeh , \" The multi-tree approach to reliability in distributed networks.\" in Proceedings of the 25th Symposium on FOCS , 1984 . A. Itah and M. Rodeh, \"The multi-tree approach to reliability in distributed networks.\" in Proceedings of the 25th Symposium on FOCS, 1984."},{"key":"e_1_3_2_1_7_1","volume-title":"A distance vector algorithm for alternate path routing","author":"Sidhu D.","year":"1990","unstructured":"D. Sidhu , S. Abdallah , and R. Nair , \" A distance vector algorithm for alternate path routing .\" 1990 , submitted for publication. D. Sidhu, S. Abdallah, and R. Nair, \"A distance vector algorithm for alternate path routing.\" 1990, submitted for publication."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2001.937262"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/938985.938999"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1002\/net.3230040204"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.4064\/fm-10-1-96-115"},{"key":"e_1_3_2_1_12_1","volume-title":"Pervasive","author":"Wacker A.","year":"2004","unstructured":"A. Wacker , T. Heiber , H. Cermann , and P. J. Marr\u00f3n , \" A fault-tolerant key-distribution scheme for securing wireless ad-hoc networks,\" in Proceedings of the second Conference on Pervasive Computing , Pervasive 2004 . Vienna, Austria : Springer-Verlag , April, 19-23 2004. A. Wacker, T. Heiber, H. Cermann, and P. J. Marr\u00f3n, \"A fault-tolerant key-distribution scheme for securing wireless ad-hoc networks,\" in Proceedings of the second Conference on Pervasive Computing, Pervasive 2004. Vienna, Austria: Springer-Verlag, April, 19-23 2004."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1137\/0204043"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/501436.501437"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/1031495.1031515"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/PERCOM.2005.41"},{"issue":"2","key":"e_1_3_2_1_18_1","first-page":"3","article-title":"Secure routing in wireless sensor networks: Attacks and countermeasures","volume":"1","author":"Karlof C.","year":"2003","unstructured":"C. Karlof and D. Wagner , \" Secure routing in wireless sensor networks: Attacks and countermeasures ,\" Elsevier's AdHoc Networks Journal, Special Issue on Sensor Network Applications and Protocols , vol. 1 , no. 2 -- 3 , pp. 293--315, September 2003 . C. Karlof and D. Wagner, \"Secure routing in wireless sensor networks: Attacks and countermeasures,\" Elsevier's AdHoc Networks Journal, Special Issue on Sensor Network Applications and Protocols, vol. 1, no. 2--3, pp. 293--315, September 2003.","journal-title":"Elsevier's AdHoc Networks Journal, Special Issue on Sensor Network Applications and Protocols"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/381677.381696"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/501436.501438"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/586110.586117"},{"key":"e_1_3_2_1_23_1","volume-title":"Mar.","author":"Chan H.","year":"2005","unstructured":"H. Chan and A. Perrig , \" PIKE: Peer intermediaries for key establishment in sensor networks,\" in Proceedings of IEEE Infocom , Mar. 2005 . H. Chan and A. Perrig, \"PIKE: Peer intermediaries for key establishment in sensor networks,\" in Proceedings of IEEE Infocom, Mar. 2005."},{"key":"e_1_3_2_1_24_1","unstructured":"\"Crossbow Technology Inc.: Motes Smart Dust Sensors Wireless Sensor Networks \" Webpage. {Online}. Available: http:\/\/www.xbow.com  \"Crossbow Technology Inc.: Motes Smart Dust Sensors Wireless Sensor Networks \" Webpage. {Online}. Available: http:\/\/www.xbow.com"},{"key":"e_1_3_2_1_25_1","unstructured":"D. Herrscher S. Maier J. Tian and K. Rothermel \"A Novel Approach to Evaluating Implementations of Location-Based Software \" in Proceedings of the 2004 International Symposium on Performance Evaluation of Computer and Telecommunication Systems (SPECTS 2004) San Jose CA USA July 25--29 2004 pp. 484--490.  D. Herrscher S. Maier J. Tian and K. Rothermel \"A Novel Approach to Evaluating Implementations of Location-Based Software \" in Proceedings of the 2004 International Symposium on Performance Evaluation of Computer and Telecommunication Systems (SPECTS 2004) San Jose CA USA July 25--29 2004 pp. 484--490."}],"event":{"name":"SenSys05: ACM Conference on Embedded Network Sensor Systems","sponsor":["SIGMETRICS ACM Special Interest Group on Measurement and Evaluation","SIGCOMM ACM Special Interest Group on Data Communication","SIGMOBILE ACM Special Interest Group on Mobility of Systems, Users, Data and Computing","SIGOPS ACM Special Interest Group on Operating Systems","ACM Association for Computing Machinery","SIGBED ACM Special Interest Group on Embedded Systems","SIGARCH ACM Special Interest Group on Computer Architecture"],"location":"San Diego California USA","acronym":"SenSys05"},"container-title":["Proceedings of the 3rd international conference on Embedded networked sensor systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1098918.1098922","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1098918.1098922","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T16:08:41Z","timestamp":1750262921000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1098918.1098922"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005,11,2]]},"references-count":23,"alternative-id":["10.1145\/1098918.1098922","10.1145\/1098918"],"URL":"https:\/\/doi.org\/10.1145\/1098918.1098922","relation":{},"subject":[],"published":{"date-parts":[[2005,11,2]]},"assertion":[{"value":"2005-11-02","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}