{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,4,2]],"date-time":"2022-04-02T06:35:24Z","timestamp":1648881324828},"reference-count":29,"publisher":"Springer Science and Business Media LLC","issue":"1","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["J Wireless Com Network"],"published-print":{"date-parts":[[2009,12]]},"DOI":"10.1155\/2009\/427492","type":"journal-article","created":{"date-parts":[[2009,7,7]],"date-time":"2009-07-07T13:37:55Z","timestamp":1246973875000},"source":"Crossref","is-referenced-by-count":0,"title":["In Situ Key Establishment in Large-Scale Sensor Networks"],"prefix":"10.1186","volume":"2009","author":[{"given":"Yingchang","family":"Xiang","sequence":"first","affiliation":[]},{"given":"Fang","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Xiuzhen","family":"Cheng","sequence":"additional","affiliation":[]},{"given":"Dechang","family":"Chen","sequence":"additional","affiliation":[]},{"given":"David H. C.","family":"Du","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2009,5,31]]},"reference":[{"key":"1662_CR1","volume-title":"Constraints and approaches for distributed sensor network security","author":"DW Carman","year":"2000","unstructured":"Carman DW, Kruss PS, Matt BJ: Constraints and approaches for distributed sensor network security. NAI Labs, Glenwood, Md, USA; September 2000."},{"key":"1662_CR2","doi-asserted-by":"publisher","first-page":"41","DOI":"10.1145\/586110.586117","volume-title":"Proceedings of the 9th ACM Conference on Computer and Communications Security (CCS '02)","author":"L Eschenauer","year":"2002","unstructured":"Eschenauer L, Gligor VD: A key-management scheme for distributed sensor networks. Proceedings of the 9th ACM Conference on Computer and Communications Security (CCS '02), November 2002, Washington, DC, USA 41-47."},{"key":"1662_CR3","first-page":"197","volume-title":"Proceedings of the IEEE Computer Society Symposium on Research in Security and Privacy (S&P '03)","author":"H Chan","year":"2003","unstructured":"Chan H, Perrig A, Song D: Random key predistribution schemes for sensor networks. Proceedings of the IEEE Computer Society Symposium on Research in Security and Privacy (S&P '03), May 2003, Berkeley, Calif, USA 197-213."},{"key":"1662_CR4","first-page":"524","volume-title":"Proceedings of the 24th Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM '05)","author":"H Chan","year":"2005","unstructured":"Chan H, Perrig A: PIKE: peer intermediaries for key establishment in sensor networks. Proceedings of the 24th Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM '05), March 2005, Miami, Fla, USA 524-535."},{"key":"1662_CR5","doi-asserted-by":"crossref","first-page":"42","DOI":"10.1145\/948109.948118","volume-title":"Proceedings of the 10th ACM Conference on Computer and Communications Security (CCS '03)","author":"W Du","year":"2003","unstructured":"Du W, Deng J, Han YS, Varshney PK, Katz J, Khalili A: A pairwise key predistribution scheme for wireless sensor networks. Proceedings of the 10th ACM Conference on Computer and Communications Security (CCS '03), October 2003, Washington, DC, USA 42-51."},{"key":"1662_CR6","first-page":"586","volume-title":"Proceedings of the 23rd Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM '04)","author":"W Du","year":"2004","unstructured":"Du W, Deng J, Han YS, Chen S, Varshney PK: A key management scheme for wireless sensor networks using deployment knowledge. Proceedings of the 23rd Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM '04), March 2004, Hong Kong 586-597."},{"key":"1662_CR7","doi-asserted-by":"crossref","first-page":"52","DOI":"10.1145\/948109.948119","volume-title":"Proceedings of the 10th ACM Conference on Computer and Communications Security (CCS '03)","author":"D Liu","year":"2003","unstructured":"Liu D, Ning P: Establishing pairwise keys in distributed sensor networks. Proceedings of the 10th ACM Conference on Computer and Communications Security (CCS '03), October 2003, Washington, DC, USA 52-61."},{"key":"1662_CR8","volume-title":"Proceedings of the ACM Workshop on Wireless Security (WiSe '05)","author":"D Liu","year":"2005","unstructured":"Liu D, Ning P, Du W: Group-based key predistribution for wireless sensor networks. Proceedings of the ACM Workshop on Wireless Security (WiSe '05), September 2005, Cologne, Germany"},{"key":"1662_CR9","first-page":"261","volume-title":"Proceedings of the 4th International Symposium on Information Processing in Sensor Networks (IPSN '05)","author":"Z Yu","year":"2005","unstructured":"Yu Z, Guan Y: A key pre-distribution scheme using deployment knowledge for wireless sensor networks. Proceedings of the 4th International Symposium on Information Processing in Sensor Networks (IPSN '05), April 2005, Los Angeles, Calif, USA 261-268."},{"key":"1662_CR10","volume-title":"Handbook of Wireless Mesh & Sensor Networking","author":"Z Yu","year":"2007","unstructured":"Yu Z, Wei Y, Guan Y: Key management for wireless sensor networks. In Handbook of Wireless Mesh & Sensor Networking. Edited by: Aggelou G. McGraw-Hill, New York, NY, USA; 2007."},{"key":"1662_CR11","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/1080793.1080797","volume-title":"Proceedings of the ACM Workshop on Wireless Security (WiSe '05)","author":"L Zhou","year":"2005","unstructured":"Zhou L, Ni J, Ravishankar CV: Efficient key establishment for group-based wireless sensor deployments. Proceedings of the ACM Workshop on Wireless Security (WiSe '05), September 2005, Cologne, Germany 1-10."},{"issue":"8","key":"1662_CR12","doi-asserted-by":"publisher","first-page":"1174","DOI":"10.1109\/TPDS.2007.1063","volume":"18","author":"L Ma","year":"2007","unstructured":"Ma L, Cheng X, Liu F, An F, Rivera J: iPAK: an in-situ pairwise key bootstrapping scheme for wireless sensor networks. IEEE Transactions on Parallel and Distributed Systems 2007, 18(8):1174-1184.","journal-title":"IEEE Transactions on Parallel and Distributed Systems"},{"issue":"7","key":"1662_CR13","doi-asserted-by":"publisher","first-page":"858","DOI":"10.1109\/TMC.2007.70775","volume":"7","author":"F Liu","year":"2008","unstructured":"Liu F, Cheng X, Ma L, Xing K: SBK: a self-configuring framework for bootstrapping keys in sensor networks. IEEE Transactions on Mobile Computing 2008, 7(7):858-868.","journal-title":"IEEE Transactions on Mobile Computing"},{"issue":"1","key":"1662_CR14","doi-asserted-by":"publisher","first-page":"224","DOI":"10.1109\/TWC.2008.060455","volume":"7","author":"F Liu","year":"2008","unstructured":"Liu F, Cheng X: LKE: a self-configuring scheme for location-aware key establishment in wireless sensor networks. IEEE Transactions on Wireless Communications 2008, 7(1):224-232.","journal-title":"IEEE Transactions on Wireless Communications"},{"key":"1662_CR15","doi-asserted-by":"crossref","unstructured":"Camtepe SA, Yener B: Key distribution mechanisms for wireless sensor networks: a survey. In RPI Technical Report. Computer Science Department, Rensselaer Polytechnic Institute, Troy, NY, USA; March 2005.","DOI":"10.1109\/ICC.2006.255107"},{"key":"1662_CR16","first-page":"326","volume-title":"Proceedings of the 11th IEEE International Conference on Network Protocols (ICNP '03)","author":"S Zhu","year":"2003","unstructured":"Zhu S, Xu S, Setia S, Jajodia S: Establishing pairwise keys for secure communication in ad hoc networks: a probabilistic approach. Proceedings of the 11th IEEE International Conference on Network Protocols (ICNP '03), November 2003, Atlanta, Ga, USA 326."},{"key":"1662_CR17","first-page":"217","volume-title":"Proceedings of the 18th International Parallel and Distributed Processing Symposium (IPDPS '04)","author":"R Di Pietro","year":"2004","unstructured":"Di Pietro R, Mancini LV, Mei A: Efficient and resilient key discovery based on pseudo-random key pre-deployment. Proceedings of the 18th International Parallel and Distributed Processing Symposium (IPDPS '04), April 2004, Santa Fe, NM, USA 217-224."},{"key":"1662_CR18","first-page":"335","volume-title":"Proceedings of the Workshop on the Theory and Application of Cryptographic Techniques (EUROCRYPT '84)","author":"R Blom","year":"1984","unstructured":"Blom R: An optimal class of symmetric key generation systems. Proceedings of the Workshop on the Theory and Application of Cryptographic Techniques (EUROCRYPT '84), April 1984, Paris, France 335-338."},{"key":"1662_CR19","doi-asserted-by":"publisher","first-page":"471","DOI":"10.1007\/3-540-48071-4_33","volume":"740","author":"C Blundo","year":"1992","unstructured":"Blundo C, Santis AD, Herzberg A, Kutten S, Vaccaroe U, Yung M: Perfectly-secure key distribution for dynamic conferences. Proceedings of the 12th Annual International Cryptology Conference on Advances in Cryptology (CRYPTO '92), August 1992, Santa Barbara, Calif, USA, Lecture Notes in Computer Science 740: 471-486.","journal-title":"Proceedings of the 12th Annual International Cryptology Conference on Advances in Cryptology (CRYPTO '92)"},{"key":"1662_CR20","doi-asserted-by":"publisher","first-page":"58","DOI":"10.1145\/1062689.1062698","volume-title":"Proceedings of the 6th ACM International Symposium on Mobile Ad Hoc Networking and Computing (MOBIHOC '05)","author":"W Du","year":"2005","unstructured":"Du W, Wang R, Ning P: An efficient scheme for authenticating public keys in sensor networks. In Proceedings of the 6th ACM International Symposium on Mobile Ad Hoc Networking and Computing (MOBIHOC '05), May 2005, Urbana-Champaign, Ill, USA. ACM Press; 58-67."},{"issue":"6","key":"1662_CR21","doi-asserted-by":"publisher","first-page":"38","DOI":"10.1109\/MWC.2004.1368895","volume":"11","author":"E Shi","year":"2004","unstructured":"Shi E, Perrig A: Designing secure sensor networks. IEEE Wireless Communications 2004, 11(6):38-43. 10.1109\/MWC.2004.1368895","journal-title":"IEEE Wireless Communications"},{"key":"1662_CR22","first-page":"72","volume-title":"Proceedings of the 1st ACM Workshop on Security of Ad Hoc and Security of Ad Hoc and Sensor Networks in Association with 10th ACM Conference on Computer and Communications Security","author":"D Liu","year":"2003","unstructured":"Liu D, Ning P: Location-based pairwise key establishments for static sensor networks. Proceedings of the 1st ACM Workshop on Security of Ad Hoc and Security of Ad Hoc and Sensor Networks in Association with 10th ACM Conference on Computer and Communications Security, October 2003, Fairfax, Va, USA 72-82."},{"key":"1662_CR23","doi-asserted-by":"publisher","first-page":"29","DOI":"10.1145\/1029102.1029110","volume-title":"Proceedings of the ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN '04)","author":"D Huang","year":"2004","unstructured":"Huang D, Mehta M, Medhi D, Harn L: Location-aware key management scheme for wireless sensor networks. In Proceedings of the ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN '04), October 2004, Washington, DC, USA. ACM Press; 29-42."},{"key":"1662_CR24","doi-asserted-by":"publisher","first-page":"189","DOI":"10.1145\/381677.381696","volume-title":"Proceedings of the 7th Annual International Conference on Mobile Computing and Networking, (MOBICOM '01)","author":"A Perrig","year":"2001","unstructured":"Perrig A, Szewczyk R, Wen V, Culler D, Tygar JD: SPINS: security protocols for sensor networks. Proceedings of the 7th Annual International Conference on Mobile Computing and Networking, (MOBICOM '01), July 2001, Rome, Italy 189-199."},{"key":"1662_CR25","doi-asserted-by":"crossref","first-page":"62","DOI":"10.1145\/948109.948120","volume-title":"Proceedings of the 10th ACM Conference on Computer and Communications Security (CCS '03)","author":"S Zhu","year":"2003","unstructured":"Zhu S, Setia S, Jajodia S: LEAP: efficient security mechanisms for large-scale distributed sensor networks. Proceedings of the 10th ACM Conference on Computer and Communications Security (CCS '03), October 2003, Washington, DC, USA 62-72."},{"key":"1662_CR26","doi-asserted-by":"publisher","first-page":"59","DOI":"10.1145\/1029102.1029113","volume-title":"Proceedings of the ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN '04)","author":"R Watro","year":"2004","unstructured":"Watro R, Kong D, Cuti S-F, Gardiner C, Lynn C, Kruus P: TinyPK: securing sensor networks with public key technology. Proceedings of the ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN '04), October 2004, Washington, DC, USA 59-64."},{"key":"1662_CR27","volume-title":"Digitalized signatures and public-key functions as intractable as factorization","author":"MO Rabin","year":"1979","unstructured":"Rabin MO: Digitalized signatures and public-key functions as intractable as factorization. MIT Laboratory for Computer Science, Cambridge, Mass, USA; 1979."},{"key":"1662_CR28","first-page":"206","volume-title":"Proceedings of the 12th IEEE International Conference on Network Protocols (ICNP '04)","author":"R Anderson","year":"2004","unstructured":"Anderson R, Chan H, Perrig A: Key infection: smart trust for smart dust. Proceedings of the 12th IEEE International Conference on Network Protocols (ICNP '04), October 2004, Berlin, Germany 206-215."},{"key":"1662_CR29","volume-title":"Real 802.11 Security: Wi-Fi Protected Access and 802.11i","author":"J Edney","year":"2004","unstructured":"Edney J, Arbaugh WA: Real 802.11 Security: Wi-Fi Protected Access and 802.11i. Addison-Wesley, Reading, Mass, USA; 2004."}],"container-title":["EURASIP Journal on Wireless Communications and Networking"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1155\/2009\/427492.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,7]],"date-time":"2019-08-07T19:11:55Z","timestamp":1565205115000},"score":1,"resource":{"primary":{"URL":"https:\/\/jwcn-eurasipjournals.springeropen.com\/articles\/10.1155\/2009\/427492"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,5,31]]},"references-count":29,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2009,12]]}},"alternative-id":["1662"],"URL":"https:\/\/doi.org\/10.1155\/2009\/427492","relation":{},"ISSN":["1687-1499"],"issn-type":[{"value":"1687-1499","type":"electronic"}],"subject":[],"published":{"date-parts":[[2009,5,31]]},"article-number":"427492"}}