{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2023,9,2]],"date-time":"2023-09-02T06:59:26Z","timestamp":1693637966150},"reference-count":40,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2013,5,30]],"date-time":"2013-05-30T00:00:00Z","timestamp":1369872000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/2.0"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["J Wireless Com Network"],"published-print":{"date-parts":[[2013,12]]},"DOI":"10.1186\/1687-1499-2013-145","type":"journal-article","created":{"date-parts":[[2013,5,30]],"date-time":"2013-05-30T17:01:44Z","timestamp":1369933304000},"source":"Crossref","is-referenced-by-count":7,"title":["A new key predistribution scheme for general and grid-group deployment of wireless sensor networks"],"prefix":"10.1186","volume":"2013","author":[{"given":"Samiran","family":"Bag","sequence":"first","affiliation":[]},{"given":"Bimal","family":"Roy","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2013,5,30]]},"reference":[{"key":"717_CR1","first-page":"41","volume-title":"ACM Conference on Computer and Communications Security","author":"L Eschenauer","year":"2002","unstructured":"Eschenauer L, Gligor VD: A key-management scheme for distributed sensor networks. In ACM Conference on Computer and Communications Security. Edited by: Atluri V. ACM New York; 2002:41-47."},{"key":"717_CR2","first-page":"197","volume-title":"IEEE Symposium on Security and Privacy","author":"H Chan","year":"2003","unstructured":"Chan H, Perrig A, Song DX: Random key predistribution schemes for sensor networks. In IEEE Symposium on Security and Privacy. IEEE Computer Society, Berkeley, CA, USA; 11\u201314 May 2003:197-197."},{"key":"717_CR3","first-page":"52","volume-title":"ACM Conference on Computer and Communications Security","author":"D Liu","year":"2003","unstructured":"Liu D, Ning P: Establishing pairwise keys in distributed sensor networks. In ACM Conference on Computer and Communications Security. Edited by: Jajodia S, Atluri V, Jaeger T. ACM New York; 2003:52-61."},{"key":"717_CR4","first-page":"335","volume-title":"Proceedings of EUROCRYPT 84, A Workshop on the Theory and Application of Cryptographic Techniques","author":"R Blom","year":"1984","unstructured":"Blom R: An optimal class of symmetric key generation systems. In Proceedings of EUROCRYPT 84, A Workshop on the Theory and Application of Cryptographic Techniques. Edited by: Beth T, Cot N, Ingemarsson I. Springer Berlin; 1984:335-338."},{"key":"717_CR5","first-page":"471","volume-title":"Advances in Cryptology\u2013CRYPTO \u201892","author":"C Blundo","year":"1992","unstructured":"Blundo C, Santis AD, Herzberg A, Kutten S, Vaccaro U, Yung M: Perfectly-secure key distribution for dynamic conferences. In Advances in Cryptology\u2013CRYPTO \u201892. Edited by: Brickell EF. Springer Berlin; 1992:471-486."},{"key":"717_CR6","first-page":"293","volume-title":"Computer Securtiy\u2013ESORICS","author":"SA \u00c7amtepe","year":"2004","unstructured":"\u00c7amtepe SA, Yener B: Combinatorial design of key distribution mechanisms for wireless sensor networks. In Computer Securtiy\u2013ESORICS. Edited by: Samarati P, Ryan PYA, Gollmann D, Molva R. Springer Berlin; 2004:293-308."},{"issue":"2","key":"717_CR7","doi-asserted-by":"publisher","first-page":"346","DOI":"10.1109\/TNET.2007.892879","volume":"15","author":"SA \u00c7amtepe","year":"2007","unstructured":"\u00c7amtepe SA, Yener B: Combinatorial design of key distribution mechanisms for wireless sensor networks. IEEE\/ACM Trans. Netw 2007, 15(2):346-358.","journal-title":"IEEE\/ACM Trans. Netw"},{"key":"717_CR8","volume-title":"IEEE Wireless Communications and Networking Conference","author":"J Lee","year":"2005","unstructured":"Lee J, Stinson DR: A combinatorial approach to key predistribution for distributed sensor networks. In IEEE Wireless Communications and Networking Conference. IEEE, New Orleans; 13\u201317 Mar 2005."},{"key":"717_CR9","doi-asserted-by":"publisher","first-page":"294","DOI":"10.1007\/978-3-540-30564-4_21","volume-title":"Selected Areas in Cryptography","author":"J Lee","year":"2004","unstructured":"Lee J, Stinson DR: Deterministic key predistribution schemes for distributed sensor networks. In Selected Areas in Cryptography. Edited by: Handschuh and Hasan. Springer Berlin; 2004:294-307."},{"key":"717_CR10","doi-asserted-by":"publisher","first-page":"431","DOI":"10.1007\/978-3-540-74742-0_40","volume-title":"ISPA, Parallel and Distributed Processing and Applications","author":"S Ruj","year":"2007","unstructured":"Ruj S, Roy BK: Key predistribution using partially balanced designs in wireless sensor networks. In ISPA, Parallel and Distributed Processing and Applications. Edited by: Stojmenovic I, Thulasiram RK, Yang LT, Jia W, Guo M, de Mello RF. Springer Berlin; 2007:431-445."},{"key":"717_CR11","doi-asserted-by":"publisher","first-page":"89","DOI":"10.1007\/11556992_7","volume-title":"Information Security","author":"D Chakrabarti","year":"2005","unstructured":"Chakrabarti D, Maitra S, Roy BK: A key pre-distribution scheme for wireless sensor networks: merging blocks in combinatorial design. In Information Security. Edited by: Zhou J, Lopez J, Deng RH, Bao F. Springer Berlin; 2005:89-103."},{"key":"717_CR12","doi-asserted-by":"publisher","first-page":"436","DOI":"10.1109\/WAINA.2011.39","volume-title":"IEEE Workshops of International Conference on Advance Information Networking and Applications (WAINA)","author":"S Bag","year":"2011","unstructured":"Bag S, Ruj S: Key distribution in wireless sensor networks using finite affine plane. In IEEE Workshops of International Conference on Advance Information Networking and Applications (WAINA). Singapore; 22\u201325 Mar 2011:436-441."},{"issue":"3","key":"717_CR13","doi-asserted-by":"publisher","first-page":"215","DOI":"10.1016\/0166-218X(88)90068-6","volume":"21","author":"CJ Mitchell","year":"1988","unstructured":"Mitchell CJ, Piper F: Key storage in secure networks. Discrete Appl. Math 1988, 21(3):215-228. 10.1016\/0166-218X(88)90068-6","journal-title":"Discrete Appl. Math"},{"key":"717_CR14","volume-title":"Information Security and Cryptology","author":"J Dong","year":"2007","unstructured":"Dong J, Pei D, Wang X: A key predistribution scheme using 3-designs. In Information Security and Cryptology. Springer Berlin; 2007."},{"key":"717_CR15","first-page":"825","volume":"23","author":"J Dong","year":"2008","unstructured":"Dong J, Pei D, Wang X: A class of key predistribution schemes based on orthogonal arrays. JCST 2008, 23: 825-831.","journal-title":"JCST"},{"key":"717_CR16","first-page":"54","volume-title":"Information Theoretic Security. Lecture Notes in Computer Science 5155","author":"S Blackburn","year":"2008","unstructured":"Blackburn S, Etzion T, Martin K, Paterson M: Efficient key predistribution for grid-based wireless sensor networks. In Information Theoretic Security. Lecture Notes in Computer Science 5155. Edited by: Fehr S. Springer Berlin; 2008:54-69."},{"key":"717_CR17","doi-asserted-by":"publisher","first-page":"280","DOI":"10.1007\/978-3-540-30564-4_20","volume-title":"Selected Areas in Cryptography","author":"R Wei","year":"2004","unstructured":"Wei R, Wu J: Product construction of key distribution schemes for sensor networks. In Selected Areas in Cryptography. Edited by: Handschuh and Hasan. Springer Berlin; 2004:280-293."},{"issue":"1","key":"717_CR18","doi-asserted-by":"publisher","first-page":"4:1","DOI":"10.1145\/1653760.1653764","volume":"6","author":"S Ruj","year":"2009","unstructured":"Ruj S, Roy BK: Key predistribution using combinatorial designs for grid-group deployment scheme in wireless sensor networks. TOSN 2009, 6(1):4:1-4:28.","journal-title":"TOSN"},{"key":"717_CR19","first-page":"275","volume-title":"Information Security and Cryptology","author":"S Ruj","year":"2008","unstructured":"Ruj S, Roy BK: Key predistribution schemes using codes in wireless sensor networks. In Information Security and Cryptology. Edited by: Yung M, Liu P, Lin D. Springer Berlin; 2008:275-288."},{"key":"717_CR20","volume-title":"Proceedings of the Twenty-third Annual Joint Conference of the IEEE Computer and Communications","author":"W Du","year":"2004","unstructured":"Du W, Deng J, Han YS, Chen S, Varshney PK: A key management scheme for wireless sensor networks using deployment knowledge. In Proceedings of the Twenty-third Annual Joint Conference of the IEEE Computer and Communications. IEEE Hong Kong; 7\u201311 Mar 2004."},{"key":"717_CR21","doi-asserted-by":"publisher","first-page":"62","DOI":"10.1109\/TDSC.2006.2","volume":"3","author":"W Du","year":"2006","unstructured":"Du W, Deng J, Han YS, Varshney PK: A key predistribution scheme for sensor networks using deployment knowledge. IEEE Trans. Dependable Sec. Comput 2006, 3: 62-77. 10.1109\/TDSC.2006.2","journal-title":"IEEE Trans. Dependable Sec. Comput"},{"issue":"2","key":"717_CR22","doi-asserted-by":"publisher","first-page":"204","DOI":"10.1145\/1105688.1105691","volume":"1","author":"D Liu","year":"2005","unstructured":"Liu D, Ning P: Improving key predistribution with deployment knowledge in static sensor networks. TOSN 2005, 1(2):204-239. 10.1145\/1105688.1105691","journal-title":"TOSN"},{"key":"717_CR23","volume-title":"Proceedings of 25th IEEE International Conference on Computer Communications","author":"L Zhou","year":"2006","unstructured":"Zhou L, Ni J, Ravishankar CV: Supporting secure communication and data collection in mobile sensor networks. In Proceedings of 25th IEEE International Conference on Computer Communications. Barcelona; 23\u201329 April 2006."},{"key":"717_CR24","doi-asserted-by":"publisher","first-page":"29","DOI":"10.1145\/1029102.1029110","volume-title":"Proceedings of the 2nd ACM workshop on Security of ad hoc and sensor networks","author":"D Huang","year":"2004","unstructured":"Huang D, Mehta M, Medhi D, Harn L: Location-aware key management scheme for wireless sensor networks, Washington. In Proceedings of the 2nd ACM workshop on Security of ad hoc and sensor networks. ACM New York; 2004:29-42."},{"key":"717_CR25","doi-asserted-by":"crossref","unstructured":"Huang D, Medhi D: Secure pairwise key establishment in large-scale sensor networks: an area partitioning and multigroup key predistribution approach. TOSN 2007., 3(3):","DOI":"10.1145\/1267060.1267064"},{"key":"717_CR26","doi-asserted-by":"publisher","first-page":"524","DOI":"10.1109\/INFCOM.2005.1497920","volume-title":"Proceedings of the 24th Annual Joint Conference of the IEEE Computer and Communications Societies","author":"H Chan","year":"2005","unstructured":"Chan H, Perrig A: PIKE: peer intermediaries for key establishment in sensor networks. In Proceedings of the 24th Annual Joint Conference of the IEEE Computer and Communications Societies. Miami; 13\u201317 Mar 2005:524-535."},{"key":"717_CR27","doi-asserted-by":"publisher","first-page":"157","DOI":"10.1145\/1180345.1180365","volume-title":"Proceedings of the fourth ACM workshop on Security of ad hoc and sensor networks","author":"K Simonova","year":"2006","unstructured":"Simonova K, Ling ACH, Wang XS: Location-aware key predistribution scheme for wide area wireless sensor networks. In Proceedings of the fourth ACM workshop on Security of ad hoc and sensor networks. Edited by: Zhu S, Liu D. ACM New York; 2006:157-168."},{"key":"717_CR28","first-page":"261","volume-title":"Proceedings of the Fourth International Symposium on Information Processing in Sensor Networks","author":"Z Yu","year":"2005","unstructured":"Yu Z, Guan Y: A key pre-distribution scheme using deployment knowledge for wireless sensor networks. In Proceedings of the Fourth International Symposium on Information Processing in Sensor Networks. IEEE, Los Angeles; 15 Apr 2005:261-268."},{"issue":"10","key":"717_CR29","doi-asserted-by":"publisher","first-page":"1411","DOI":"10.1109\/TPDS.2008.23","volume":"19","author":"Z Yu","year":"2008","unstructured":"Yu Z, Guan Y: A key management scheme using deployment knowledge for wireless sensor networks. IEEE Trans. Parallel Distrib. Syst 2008, 19(10):1411-1425.","journal-title":"IEEE Trans. Parallel Distrib. Syst"},{"key":"717_CR30","first-page":"302","volume-title":"4th International Conference, CNSA 2011","author":"S Bag","year":"2011","unstructured":"Bag S: Key predistribution in 3-dimensional grid-group deployment scheme. In 4th International Conference, CNSA 2011. Springer, Chennai, India; 15\u201317 Jul 2011:302-319."},{"key":"717_CR31","volume-title":"Combinatorial Designs: Construction and Analysis","author":"DR Stinson","year":"2004","unstructured":"Stinson DR: Combinatorial Designs: Construction and Analysis. Springer, New York; 2004."},{"key":"717_CR32","volume-title":"Combinatorics of Experimental Design","author":"AP Street","year":"1987","unstructured":"Street AP, Street DJ: Combinatorics of Experimental Design. Clarendon Press, Oxford; 1987."},{"key":"717_CR33","volume-title":"Linear Algebra and Its Applications","author":"DC Lay","year":"2005","unstructured":"Lay DC: Linear Algebra and Its Applications. Addison Wesley, 75 Arlington Street, Boston, MA 02116; 2005."},{"key":"717_CR34","volume-title":"Matrix Analysis and Applied Linear Algebra","author":"CD Meyer","year":"2001","unstructured":"Meyer CD: Matrix Analysis and Applied Linear Algebra. Society for Industrial and Applied Mathematics (SIAM) Philadelphia, United States; 2001."},{"key":"717_CR35","first-page":"42","volume-title":"Intelligence and Security Informatics","author":"W Du","year":"2003","unstructured":"Du W, Deng J, Han YS, Varshney PK: A pairwise key pre-distribution scheme for wireless sensor networks. In Intelligence and Security Informatics. Edited by: Jajodia S, Atluri V, Jaeger T. Springer Berlin; 2003:42-51."},{"key":"717_CR36","volume-title":"The Theory of Error Correcting Codes","author":"FJ MacWilliams","year":"1988","unstructured":"MacWilliams FJ, Sloane NJA: The Theory of Error Correcting Codes. Northland Holland, Amsterdam; 1988."},{"issue":"6","key":"717_CR37","doi-asserted-by":"publisher","first-page":"709","DOI":"10.1007\/s11276-006-6530-5","volume":"12","author":"RD Pietro","year":"2006","unstructured":"Pietro RD, Mancini LV, Mei A: Energy efficient node-to-node authentication and communication confidentiality in wireless sensor networks. Wireless Netw 2006, 12(6):709-721. 10.1007\/s11276-006-6530-5","journal-title":"Wireless Netw"},{"key":"717_CR38","doi-asserted-by":"crossref","unstructured":"Lee J, Stinson DR: On the construction of practical key predistribution schemes for distributed sensor networks usin combinatorial designs. ACM Trans. Inf. Syst. Secur 2008., 11(2):","DOI":"10.1145\/1330332.1330333"},{"key":"717_CR39","doi-asserted-by":"crossref","first-page":"52","DOI":"10.1145\/948109.948119","volume-title":"Proceedings of the 10th ACM conference on Computer and communications security","author":"D Liu","year":"2003","unstructured":"Liu D, Ning P: Establishing pairwise keys in distributed sensor networks. In Proceedings of the 10th ACM conference on Computer and communications security. ACM New York; 2003:52-61."},{"issue":"2","key":"717_CR40","doi-asserted-by":"publisher","first-page":"204","DOI":"10.1145\/1105688.1105691","volume":"1","author":"D Liu","year":"2005","unstructured":"Liu D, Ning P: Improving key predistribution with deployment knowledge in static sensor networks. TOSN 2005, 1(2):204-239. 10.1145\/1105688.1105691","journal-title":"TOSN"}],"container-title":["EURASIP Journal on Wireless Communications and Networking"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1186\/1687-1499-2013-145\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1186\/1687-1499-2013-145.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1186\/1687-1499-2013-145.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,2,23]],"date-time":"2022-02-23T06:59:16Z","timestamp":1645599556000},"score":1,"resource":{"primary":{"URL":"https:\/\/jwcn-eurasipjournals.springeropen.com\/articles\/10.1186\/1687-1499-2013-145"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,5,30]]},"references-count":40,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2013,12]]}},"alternative-id":["717"],"URL":"https:\/\/doi.org\/10.1186\/1687-1499-2013-145","relation":{},"ISSN":["1687-1499"],"issn-type":[{"value":"1687-1499","type":"electronic"}],"subject":[],"published":{"date-parts":[[2013,5,30]]},"article-number":"145"}}