{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T12:43:22Z","timestamp":1740141802894,"version":"3.37.3"},"reference-count":19,"publisher":"SAGE Publications","issue":"6","license":[{"start":{"date-parts":[[2013,6,1]],"date-time":"2013-06-01T00:00:00Z","timestamp":1370044800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/journals.sagepub.com\/page\/policies\/text-and-data-mining-license"}],"funder":[{"DOI":"10.13039\/501100003725","name":"National Research Foundation of Korea","doi-asserted-by":"publisher","award":["2012-0005793","2011-0013776","10039165"],"award-info":[{"award-number":["2012-0005793","2011-0013776","10039165"]}],"id":[{"id":"10.13039\/501100003725","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100003725","name":"National Research Foundation of Korea","doi-asserted-by":"publisher","award":["2012-0005793","2011-0013776","10039165"],"award-info":[{"award-number":["2012-0005793","2011-0013776","10039165"]}],"id":[{"id":"10.13039\/501100003725","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100002994","name":"Ministry of Knowledge Economy","doi-asserted-by":"publisher","award":["2012-0005793","2011-0013776","10039165"],"award-info":[{"award-number":["2012-0005793","2011-0013776","10039165"]}],"id":[{"id":"10.13039\/501100002994","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["journals.sagepub.com"],"crossmark-restriction":true},"short-container-title":["International Journal of Distributed Sensor Networks"],"published-print":{"date-parts":[[2013,6,1]]},"abstract":"<jats:p> Key management in a large portion of ubiquitous sensor networks has been a challenge due to the limited capabilities of their wireless communicating and battery-powered sensors. Moreover, an attacker physically capturing even a few nodes hampers the entire network security by impersonating nodes to inject false data in an undetected manner. To efficiently protect from such impersonating by node capture, we propose a new dynamic key management framework particularly for large-scale clustered sensor networks. In the framework, different keying mechanisms, respectively, secure in-cluster, intercluster, and individual communication by refreshing keys on demand, while adaptively handling node addition and capture. Theoretic analysis and simulation results show that our proposed framework provides higher connectivity and security against impersonating than other existing studies do, for better trade-off with resource overheads. <\/jats:p>","DOI":"10.1155\/2013\/397926","type":"journal-article","created":{"date-parts":[[2013,6,18]],"date-time":"2013-06-18T21:01:04Z","timestamp":1371589264000},"page":"397926","update-policy":"https:\/\/doi.org\/10.1177\/sage-journals-update-policy","source":"Crossref","is-referenced-by-count":3,"title":["Impersonating-Resilient Dynamic Key Management for Large-Scale Wireless Sensor Networks"],"prefix":"10.1177","volume":"9","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-4173-3214","authenticated-orcid":false,"given":"Gowun","family":"Jeong","sequence":"first","affiliation":[{"name":"AI and Media Laboratory, Department of Computer Science, Korea Advanced Institute of Science and Technology, Daehak-ro, Yuseong-gu, Daejeon 305-701, Republic of Korea"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1426-7147","authenticated-orcid":false,"given":"Yong-Ho","family":"Seo","sequence":"additional","affiliation":[{"name":"Department of Intelligent Robot Engineering, Mokwon University, Doanbuk-ro, Seo-gu, Daejeon 302-729, Republic of Korea"}]},{"given":"Hyun S.","family":"Yang","sequence":"additional","affiliation":[{"name":"AI and Media Laboratory, Department of Computer Science, Korea Advanced Institute of Science and Technology, Daehak-ro, Yuseong-gu, Daejeon 305-701, Republic of Korea"}]}],"member":"179","published-online":{"date-parts":[[2013,6,18]]},"reference":[{"doi-asserted-by":"publisher","key":"B1-2013-397926","DOI":"10.1145\/1218556.1218559"},{"key":"B2-2013-397926","first-page":"31","volume":"5","author":"Kavitha T.","year":"2010","journal-title":"Journal of Information Assurance and Security"},{"doi-asserted-by":"publisher","key":"B3-2013-397926","DOI":"10.1109\/JPROC.2005.862321"},{"doi-asserted-by":"publisher","key":"B4-2013-397926","DOI":"10.1016\/j.jnca.2009.10.001"},{"doi-asserted-by":"publisher","key":"B5-2013-397926","DOI":"10.1002\/sec.354"},{"volume-title":"Handbook of Applied Cryptography","year":"1997","author":"Menezes A.","key":"B6-2013-397926"},{"doi-asserted-by":"publisher","key":"B8-2013-397926","DOI":"10.1002\/sec.123"},{"doi-asserted-by":"publisher","key":"B10-2013-397926","DOI":"10.1109\/COMST.2005.1593277"},{"doi-asserted-by":"publisher","key":"B11-2013-397926","DOI":"10.1109\/AVSS.2011.6027314"},{"volume-title":"Proceedings of the 23rd Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM '04)","author":"Du W.","first-page":"586","key":"B12-2013-397926"},{"doi-asserted-by":"publisher","key":"B13-2013-397926","DOI":"10.1109\/TNET.2011.2141682"},{"doi-asserted-by":"publisher","key":"B14-2013-397926","DOI":"10.1155\/2013\/167575"},{"doi-asserted-by":"publisher","key":"B15-2013-397926","DOI":"10.1023\/A:1016598314198"},{"doi-asserted-by":"publisher","key":"B16-2013-397926","DOI":"10.1109\/TMC.2010.140"},{"doi-asserted-by":"publisher","key":"B17-2013-397926","DOI":"10.1007\/978-3-642-22670-0_10"},{"doi-asserted-by":"publisher","key":"B18-2013-397926","DOI":"10.1017\/CBO9780511804090"},{"doi-asserted-by":"publisher","key":"B19-2013-397926","DOI":"10.1109\/MCOM.2006.1632659"},{"volume-title":"Proceedings of the ACM 1rst International Conference on Embedded Networked Sensor Systems (SenSys '03)","author":"Zhao J.","first-page":"1","key":"B20-2013-397926"},{"doi-asserted-by":"publisher","key":"B21-2013-397926","DOI":"10.1155\/2013\/374796"}],"container-title":["International Journal of Distributed Sensor Networks"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/journals.sagepub.com\/doi\/pdf\/10.1155\/2013\/397926","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/journals.sagepub.com\/doi\/full-xml\/10.1155\/2013\/397926","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/journals.sagepub.com\/doi\/pdf\/10.1155\/2013\/397926","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,16]],"date-time":"2021-05-16T19:04:05Z","timestamp":1621191845000},"score":1,"resource":{"primary":{"URL":"http:\/\/journals.sagepub.com\/doi\/10.1155\/2013\/397926"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,6,1]]},"references-count":19,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2013,6,1]]}},"alternative-id":["10.1155\/2013\/397926"],"URL":"https:\/\/doi.org\/10.1155\/2013\/397926","relation":{},"ISSN":["1550-1477","1550-1477"],"issn-type":[{"type":"print","value":"1550-1477"},{"type":"electronic","value":"1550-1477"}],"subject":[],"published":{"date-parts":[[2013,6,1]]}}}