{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,22]],"date-time":"2026-03-22T06:33:09Z","timestamp":1774161189042,"version":"3.50.1"},"reference-count":26,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2014,1,17]],"date-time":"2014-01-17T00:00:00Z","timestamp":1389916800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/2.0"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["J Wireless Com Network"],"published-print":{"date-parts":[[2014,12]]},"DOI":"10.1186\/1687-1499-2014-9","type":"journal-article","created":{"date-parts":[[2014,1,17]],"date-time":"2014-01-17T10:06:01Z","timestamp":1389953161000},"source":"Crossref","is-referenced-by-count":12,"title":["DynTunKey: a dynamic distributed group key tunneling management protocol for heterogeneous wireless sensor networks"],"prefix":"10.1186","volume":"2014","author":[{"given":"Ramzi","family":"Bellazreg","sequence":"first","affiliation":[]},{"given":"Noureddine","family":"Boudriga","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2014,1,17]]},"reference":[{"issue":"4","key":"858_CR1","first-page":"40","volume":"19","author":"M Horton","year":"2002","unstructured":"Horton M, Culler D, Pister K, Hill J, Szewczyk R, Woo A: MICA, The commercialization of microsensor motes. Sensors 2002, 19(4):40-48.","journal-title":"Sensors"},{"key":"858_CR2","unstructured":"Chan H, Perrig A, Song D: Random key predistribution schemes for sensor networks. IEEE Symposium on Security and Privacy (IEEE, Piscataway, 2003)"},{"key":"858_CR3","doi-asserted-by":"publisher","first-page":"42","DOI":"10.1145\/948109.948118","volume-title":"Proceedings of the Tenth ACM Conference on Computer and Communications Security (CCS 2003)","author":"W Du","year":"2003","unstructured":"Du W, Deng J, Han Y, Varshney P: A pairwise key pre-distribution scheme for wireless sensor networks. In Proceedings of the Tenth ACM Conference on Computer and Communications Security (CCS 2003). Washington, DC; 27\u201330 October 2003:42-51."},{"key":"858_CR4","volume-title":"Proceedings of the 9th European Symposium Research Computer Security","author":"SA Cametepe","year":"2004","unstructured":"Cametepe SA, Yener B: Combinatorial design of key distribution mechanisms for wireless sensor networks. In Proceedings of the 9th European Symposium Research Computer Security. Sophia Antipolis; 13\u201315 September 2004."},{"key":"858_CR5","doi-asserted-by":"crossref","unstructured":"Eschenauer L, Gligor VD: A key-management scheme for distributed sensor networks. Proceedings of the 9th ACM Conference on Computer and Communications Security (CCS \u201902) (ACM Press, New York, 2002) 41-47.","DOI":"10.1145\/586110.586117"},{"key":"858_CR6","doi-asserted-by":"crossref","unstructured":"Pietro RD, Mancini LV: Random key-assignment for secure wireless sensor networks. Proceedings of the 1st ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN \u201903) (ACM Press, New York, 2003) 62-71.","DOI":"10.1145\/986858.986868"},{"key":"858_CR7","unstructured":"Liu D: Establishing Pairwise Keys in Distributed Sensor Networks."},{"key":"858_CR8","unstructured":"Du W, Deng J, Han YS, Chen S, Varshney PK: A key management scheme for wireless sensor networks using deployment knowledge. Proceedings of the IEEE INFOCOM, Hong Kong (IEEE, Piscataway, 2004) 586-97."},{"key":"858_CR9","volume-title":"IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks, WoWMoM, Lucca, 20\u201324","author":"W Bechkit","year":"2011","unstructured":"Bechkit W: New key management schemes for resource constrained wireless sensor networks. IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks, WoWMoM, Lucca, 20\u201324 June 2011"},{"key":"858_CR10","doi-asserted-by":"crossref","unstructured":"Subash TD, Divya C: Novel key pre-distribution scheme in wireless sensor network. International Conference on Emerging Trends in Electrical and Computer Technology, ICETECT (IEEE, Piscataway, 2011) 959-963.","DOI":"10.1109\/ICETECT.2011.5760258"},{"key":"858_CR11","doi-asserted-by":"crossref","unstructured":"Rasheed A, Mahapatra R: Key predistribution schemes for establishing pairwise keys with a mobile sink in sensor networks. IEEE Transactions on Parallel and Distributed Systems (IEEE, Piscataway, 2011) 176-184.","DOI":"10.1109\/TPDS.2010.57"},{"key":"858_CR12","unstructured":"Mancini LV, Law YW, Etalle S, Havinga P, R Di Pietro: LKHW: a directed diffusion-based secure multicast scheme for wireless sensor networks. 32nd International Conference on Parallel Processing Workshops (ICPPW \u201903) (IEEE, Piscataway, 2003) 397-406."},{"key":"858_CR13","unstructured":"Chan H, Perrig A: PIKE: peer intermediaries for key establishment in sensor networks. IEEE Infocom (IEEE, Piscataway, 2005)"},{"key":"858_CR14","doi-asserted-by":"crossref","unstructured":"Zhu S, Setia S, Jajodia S: LEAP: efficient security mechanisms for large-scale distributed sensor networks. 10th ACM Conference on Computer and Communications Security (CCS\u201903) (ACM Press, New York, 2003) 62-72.","DOI":"10.1145\/948117.948120"},{"key":"858_CR15","doi-asserted-by":"publisher","first-page":"312","DOI":"10.1109\/CIMSim.2011.63","volume-title":"Proceedings of the IEEE International Conference on Computational Intelligence Modelling and Simulation, CIMSim 2011, art. no. 6076377 (IEEE, Piscataway, 2011)","author":"IS Gawdan","year":"2011","unstructured":"Gawdan IS, Chow CO, Zia T, Sarhan QI: A novel secure key management module for hierarchical clustering wireless sensor networks. Proceedings of the IEEE International Conference on Computational Intelligence Modelling and Simulation, CIMSim 2011, art. no. 6076377 (IEEE, Piscataway, 2011) 312-316."},{"issue":"1","key":"858_CR16","doi-asserted-by":"publisher","first-page":"97","DOI":"10.1007\/s11042-012-1054-8","volume":"67","author":"Y Zhang","year":"2013","unstructured":"Zhang Y, Li X, Yang J, Liu Y, Xiong N, Vasilakos AV: A real-time dynamic key management for hierarchical wireless multimedia sensor network. Multimedia Tools Appl 2013, 67(1):97-117. 10.1007\/s11042-012-1054-8","journal-title":"Multimedia Tools Appl"},{"key":"858_CR17","doi-asserted-by":"crossref","unstructured":"Bellazreg R, Boudriga N, Hamdi M: A dynamic distributed key tunneling protocol for heterogeneous wireless sensor networks. IEEE International Conference on Trust Security and Privacy in Computing and Communications TrustCom (IEEE, Piscataway, 2012)","DOI":"10.1109\/TrustCom.2012.26"},{"key":"858_CR18","doi-asserted-by":"crossref","unstructured":"Sliti M, Hamdi M, Boudriga N, Helmy A: An elliptic threshold signature framework for k-security in wireless sensor networks. The 15th IEEE International Conference on Electronics, Circuits, and Systems (IEEE, Piscataway, 2008)","DOI":"10.1109\/ICECS.2008.4674832"},{"key":"858_CR19","volume-title":"IEEE Workshop on Trust, Security and Privacy in Ubiquitous Computing, WoWMoM","author":"D Augot","year":"2005","unstructured":"Augot D, Bhaskar R, Issarny V, Sacchetti D: An efficient group key agreement protocol for ad hoc networks. IEEE Workshop on Trust, Security and Privacy in Ubiquitous Computing, WoWMoM 2005, Taormina, 13\u201316 June 2005"},{"key":"858_CR20","doi-asserted-by":"publisher","first-page":"644","DOI":"10.1109\/TIT.1976.1055638","volume":"22","author":"W Diffie","year":"1976","unstructured":"Diffie W, Hellman ME: New directions in cryptography. IEEE Trans. Inf. Theory 1976, 22: 644-654. 10.1109\/TIT.1976.1055638","journal-title":"IEEE Trans. Inf. Theory"},{"key":"858_CR21","doi-asserted-by":"crossref","unstructured":"Kent S, Seo K: Security architecture for the internet protocol, RFC 4301. IEEE International Conference on Electronics, Circuits, and Systems (IEEE, Piscataway, 2005)","DOI":"10.17487\/rfc4301"},{"key":"858_CR22","volume-title":"RFC 4306","author":"C Kaufman","year":"2005","unstructured":"Kaufman C, Microsoft E: The Internet Key Exchange (IKEv2) Protocol,. RFC 4306 2005. . Accessed June 2012 http:\/\/tools.ietf.org\/search\/rfc4306"},{"key":"858_CR23","doi-asserted-by":"crossref","unstructured":"Bellazreg R, Hamdi M, Boudriga N: Coverage control and irregular radio propagation in wireless sensor networks. WCNC IEEE Wireless Communications and Networking Conference (IEEE, Piscataway, 2009)","DOI":"10.1109\/WCNC.2009.4917648"},{"key":"858_CR24","doi-asserted-by":"publisher","first-page":"277","DOI":"10.1002\/dac.890","volume":"21","author":"M Hamdi","year":"2008","unstructured":"Hamdi M, Boudriga N, Obaidat MS: WHOMoVeS: an optimized broadband sensor network for military vehicle tracking. Int. J. Commun. Syst 2008, 21: 277-300. 10.1002\/dac.890","journal-title":"Int. J. Commun. Syst"},{"issue":"5","key":"858_CR25","doi-asserted-by":"publisher","first-page":"483","DOI":"10.1002\/wcm.72","volume":"2","author":"T Camp","year":"2002","unstructured":"Camp T, Boleng J, Davies V: A survey of mobility models for ad hoc network research. Wireless Commun. Mobile Comput (WCMC), 2002, 2(5):483-502.","journal-title":"Mobile Comput (WCMC),"},{"key":"858_CR26","first-page":"11","volume":"2012","author":"D Du","year":"2012","unstructured":"Du D, Xiong H, Wang H: An efficient key management scheme for wireless sensor networks. Int. J. Distributed Sensor Netw 2012, 2012: 11-14.","journal-title":"Int. J. Distributed Sensor Netw"}],"container-title":["EURASIP Journal on Wireless Communications and Networking"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1186\/1687-1499-2014-9\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1186\/1687-1499-2014-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1186\/1687-1499-2014-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,6]],"date-time":"2019-08-06T19:00:54Z","timestamp":1565118054000},"score":1,"resource":{"primary":{"URL":"https:\/\/jwcn-eurasipjournals.springeropen.com\/articles\/10.1186\/1687-1499-2014-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,1,17]]},"references-count":26,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2014,12]]}},"alternative-id":["858"],"URL":"https:\/\/doi.org\/10.1186\/1687-1499-2014-9","relation":{},"ISSN":["1687-1499"],"issn-type":[{"value":"1687-1499","type":"electronic"}],"subject":[],"published":{"date-parts":[[2014,1,17]]},"article-number":"9"}}