{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:38:59Z","timestamp":1750307939375,"version":"3.41.0"},"reference-count":37,"publisher":"Association for Computing Machinery (ACM)","issue":"3","license":[{"start":{"date-parts":[[2007,8,1]],"date-time":"2007-08-01T00:00:00Z","timestamp":1185926400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Trans. Sen. Netw."],"published-print":{"date-parts":[[2007,8]]},"abstract":"<jats:p>Existing pairwise key establishment schemes for large-scale sensor networks are vulnerable to various passive or active attacks. We classify attacks as selective node capture attacks, node fabrication attacks, and insider attacks. In order to improve the security robustness of random key predistribution and pairwise key establishment schemes against these attacks, we propose a five-phase pairwise key predistribution and pairwise key establishment approach by using area partitioning and multigroup key predistribution. Our security performance studies show that our proposed approach is resilient to selective node capture and node fabrication attacks, and restricts the consequence of any insider attack to a minimal level.<\/jats:p>","DOI":"10.1145\/1267060.1267064","type":"journal-article","created":{"date-parts":[[2007,9,14]],"date-time":"2007-09-14T13:44:55Z","timestamp":1189777495000},"page":"16","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":16,"title":["Secure pairwise key establishment in large-scale sensor networks"],"prefix":"10.1145","volume":"3","author":[{"given":"Dijiang","family":"Huang","sequence":"first","affiliation":[{"name":"Arizona State University, Tempe, AZ"}]},{"given":"Deep","family":"Medhi","sequence":"additional","affiliation":[{"name":"University of Missouri--Kansas City, Kansas City, MO"}]}],"member":"320","published-online":{"date-parts":[[2007,8]]},"reference":[{"key":"e_1_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2002.1024422"},{"key":"e_1_2_1_2_1","series-title":"Lecture Notes in Computer Science","volume-title":"Proceedings of EUROCRYPT'84","author":"Blom R.","unstructured":"Blom , R. 1985. An optimal class of symmetric key generation systems . In Proceedings of EUROCRYPT'84 . Lecture Notes in Computer Science , vol. 209 . Springer-Verlag , Berlin, Germany , 335--338. Blom, R. 1985. An optimal class of symmetric key generation systems. In Proceedings of EUROCRYPT'84. Lecture Notes in Computer Science, vol. 209. Springer-Verlag, Berlin, Germany, 335--338."},{"key":"e_1_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1006\/inco.1998.2717"},{"volume-title":"Proceedings of the 2003 Symposium on Security and Privacy. IEEE Computer Society Press","author":"Chan H.","key":"e_1_2_1_4_1","unstructured":"Chan , H. , Perrig , A. , and Song , D . 2003. Random key predistribution schemes for sensor networks . In Proceedings of the 2003 Symposium on Security and Privacy. IEEE Computer Society Press , Los Alamitos, CA, 197--215. Chan, H., Perrig, A., and Song, D. 2003. Random key predistribution schemes for sensor networks. In Proceedings of the 2003 Symposium on Security and Privacy. IEEE Computer Society Press, Los Alamitos, CA, 197--215."},{"volume-title":"Proceedings of the 18th International Parallel and Distributed Processing Symposium (IPDPS). 217","author":"Di Pietro R.","key":"e_1_2_1_5_1","unstructured":"Di Pietro , R. , Mancini , L. V. , and Mei , A . 2004. Efficient and resilient key discovery based on pseudo-random key pre-deployment . In Proceedings of the 18th International Parallel and Distributed Processing Symposium (IPDPS). 217 . Di Pietro, R., Mancini, L. V., and Mei, A. 2004. Efficient and resilient key discovery based on pseudo-random key pre-deployment. In Proceedings of the 18th International Parallel and Distributed Processing Symposium (IPDPS). 217."},{"key":"e_1_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.5555\/646334.687813"},{"volume-title":"Proceedings of the IEEE Information Communications Conference (INFOCOM). 586--597","author":"Du W.","key":"e_1_2_1_7_1","unstructured":"Du , W. , Deng , J. , Han , Y. S. , Chen , S. , and Varshney , P. K . 2004. A key management scheme for wireless sensor networks using deployment knowledge . In Proceedings of the IEEE Information Communications Conference (INFOCOM). 586--597 . Du, W., Deng, J., Han, Y. S., Chen, S., and Varshney, P. K. 2004. A key management scheme for wireless sensor networks using deployment knowledge. In Proceedings of the IEEE Information Communications Conference (INFOCOM). 586--597."},{"key":"e_1_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/1065545.1065548"},{"key":"e_1_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/948109.948118"},{"key":"e_1_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jpdc.2005.12.011"},{"key":"e_1_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/586110.586117"},{"key":"e_1_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/509506.509514"},{"volume-title":"Proceedings of the 2004 Workshop on Cryptographic Hardware and Embedded Systems (CHES). 119--132","author":"Gura N.","key":"e_1_2_1_13_1","unstructured":"Gura , N. , Patel , A. , and Wander , A . 2004. Comparing elliptic curve cryptography and rsa on 8-bit cpus . In Proceedings of the 2004 Workshop on Cryptographic Hardware and Embedded Systems (CHES). 119--132 . Gura, N., Patel, A., and Wander, A. 2004. Comparing elliptic curve cryptography and rsa on 8-bit cpus. In Proceedings of the 2004 Workshop on Cryptographic Hardware and Embedded Systems (CHES). 119--132."},{"volume-title":"the 5th IEEE International Workshop on Algorithms for Wireless, Mobile, Ad Hoc and Sensor Networks. 240b.","author":"Huang D.","key":"e_1_2_1_14_1","unstructured":"Huang , D. and Medhi , D . 2005. A Byzantine resilient multi-path key establishment scheme and its robustness analysis for sensor networks . In the 5th IEEE International Workshop on Algorithms for Wireless, Mobile, Ad Hoc and Sensor Networks. 240b. Huang, D. and Medhi, D. 2005. A Byzantine resilient multi-path key establishment scheme and its robustness analysis for sensor networks. In the 5th IEEE International Workshop on Algorithms for Wireless, Mobile, Ad Hoc and Sensor Networks. 240b."},{"volume-title":"Proceedings of the 24th IEEE International Performance Computing and Communications Conference. 177--183","author":"Huang D.","key":"e_1_2_1_15_1","unstructured":"Huang , D. , Mehta , M. , and Medhi , D . 2005. Source routing based pairwise key establishment protocol for sensor networks . In Proceedings of the 24th IEEE International Performance Computing and Communications Conference. 177--183 . Huang, D., Mehta, M., and Medhi, D. 2005. Source routing based pairwise key establishment protocol for sensor networks. In Proceedings of the 24th IEEE International Performance Computing and Communications Conference. 177--183."},{"key":"e_1_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/1029102.1029110"},{"key":"e_1_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2007.896259"},{"key":"e_1_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/313451.313558"},{"key":"e_1_2_1_19_1","doi-asserted-by":"crossref","unstructured":"Karlof C. and Wagner D. 2003. Secure routing in wireless sensor networks: Attacks and countermeasures. AdHoc Netw. J. (Special issue on Sensor Network Applications and Protocols) 1 2--3 (Sept.) 293--315.  Karlof C. and Wagner D. 2003. Secure routing in wireless sensor networks: Attacks and countermeasures. AdHoc Netw. J. (Special issue on Sensor Network Applications and Protocols) 1 2--3 (Sept.) 293--315.","DOI":"10.1016\/S1570-8705(03)00008-8"},{"volume-title":"High-speed RSA implementation. Tech. rep. 201","author":"Ko\u00e7 C. K.","key":"e_1_2_1_20_1","unstructured":"Ko\u00e7 , C. K. 1994. High-speed RSA implementation. Tech. rep. 201 , RSA Laboratories , Bedford, MA . Ko\u00e7, C. K. 1994. High-speed RSA implementation. Tech. rep. 201, RSA Laboratories, Bedford, MA."},{"volume-title":"Proceedings of the IEEE Aerospace Conference. 1125--1130","author":"Lindsey S.","key":"e_1_2_1_21_1","unstructured":"Lindsey , S. and Raghavendra , C. S . 2002. Pegasis: Power efficient gathering in sensor information systems . In Proceedings of the IEEE Aerospace Conference. 1125--1130 . Lindsey, S. and Raghavendra, C. S. 2002. Pegasis: Power efficient gathering in sensor information systems. In Proceedings of the IEEE Aerospace Conference. 1125--1130."},{"key":"e_1_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/948109.948119"},{"key":"e_1_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/986858.986869"},{"key":"e_1_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/1105688.1105691"},{"key":"e_1_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2005.21"},{"key":"e_1_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/1080793.1080798"},{"key":"e_1_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/1053283.1053287"},{"volume-title":"Proceedings of the 15th International Parallel and Distributed Processing Symposium Workshops (IPDPS). 30189a.","author":"Manjeshwar A.","key":"e_1_2_1_28_1","unstructured":"Manjeshwar , A. and Agrawal , D. P . 2001. TEEN: A routing protocol for enhanced efficiency in wireless sensor networks . In Proceedings of the 15th International Parallel and Distributed Processing Symposium Workshops (IPDPS). 30189a. Manjeshwar, A. and Agrawal, D. P. 2001. TEEN: A routing protocol for enhanced efficiency in wireless sensor networks. In Proceedings of the 15th International Parallel and Distributed Processing Symposium Workshops (IPDPS). 30189a."},{"volume-title":"Proceedings of the 24th IEEE International Performance Computing and Communications Conference. 193--197","author":"Mehta M.","key":"e_1_2_1_29_1","unstructured":"Mehta , M. , Huang , D. , and Harn , L . 2005. RINK-RKP: A scheme for key predistribution and shared-key discovery in sensor networks . In Proceedings of the 24th IEEE International Performance Computing and Communications Conference. 193--197 . Mehta, M., Huang, D., and Harn, L. 2005. RINK-RKP: A scheme for key predistribution and shared-key discovery in sensor networks. In Proceedings of the 24th IEEE International Performance Computing and Communications Conference. 193--197."},{"key":"e_1_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2005.8"},{"key":"e_1_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/332833.332838"},{"key":"e_1_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1137\/0108018"},{"key":"e_1_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1977.1055732"},{"volume-title":"The Strange Logic of Random Graphs (Algorithms and Combinatorics)","author":"Spencer J. H.","key":"e_1_2_1_34_1","unstructured":"Spencer , J. H. 2001. The Strange Logic of Random Graphs (Algorithms and Combinatorics) . Springer Verlag , Berlin, Germany . Spencer, J. H. 2001. The Strange Logic of Random Graphs (Algorithms and Combinatorics). Springer Verlag, Berlin, Germany."},{"key":"e_1_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2003.821207"},{"volume-title":"Error Control Coding for Digital Communication and Storage","author":"Wicker S. B.","key":"e_1_2_1_36_1","unstructured":"Wicker , S. B. 1995. Error Control Coding for Digital Communication and Storage . Prentice-Hall , Englewod Cliffs, NJ . Wicker, S. B. 1995. Error Control Coding for Digital Communication and Storage. Prentice-Hall, Englewod Cliffs, NJ."},{"volume-title":"Proceedings of the 11th IEEE International Conference on Network Protocols (ICNP). 326--335","author":"Zhu S.","key":"e_1_2_1_37_1","unstructured":"Zhu , S. , Xu , S. , Setia , S. , and Jajodia , S . 2003. Establishing pair-wise keys for secure communication in ad hoc networks: A probabilistic approach . In Proceedings of the 11th IEEE International Conference on Network Protocols (ICNP). 326--335 . Zhu, S., Xu, S., Setia, S., and Jajodia, S. 2003. Establishing pair-wise keys for secure communication in ad hoc networks: A probabilistic approach. In Proceedings of the 11th IEEE International Conference on Network Protocols (ICNP). 326--335."}],"container-title":["ACM Transactions on Sensor Networks"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1267060.1267064","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1267060.1267064","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T14:52:14Z","timestamp":1750258334000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1267060.1267064"}},"subtitle":["An area partitioning and multigroup key predistribution approach"],"short-title":[],"issued":{"date-parts":[[2007,8]]},"references-count":37,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2007,8]]}},"alternative-id":["10.1145\/1267060.1267064"],"URL":"https:\/\/doi.org\/10.1145\/1267060.1267064","relation":{},"ISSN":["1550-4859","1550-4867"],"issn-type":[{"type":"print","value":"1550-4859"},{"type":"electronic","value":"1550-4867"}],"subject":[],"published":{"date-parts":[[2007,8]]},"assertion":[{"value":"2007-08-01","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}