{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T05:25:36Z","timestamp":1740115536579,"version":"3.37.3"},"reference-count":0,"publisher":"IOS Press","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"abstract":"<jats:p>Based on the core issues of the wireless sensor network security model, this paper proposes a new design of pre-shared key pool, which is applied in the area-based key management scheme to ensure network security. This scheme designs a pre-allocated shared key pool architecture based on time variables of one-way hash function, adds time parameters to key negotiation, node update, etc., updates the key through the time mechanism and detection mechanism, and effectively guarantees both forward and backward security of the node. For the problem that local nodes are easily captured, this paper designs a key update mechanism based on security events, namely a key pool update mechanism based on a one-way hash key chain. This new one is based on a one-way hash key chain. The key pool satisfies the security requirements for key generation and updating. After theoretical analysis and simulation, it is proved that node connectivity, node storage energy consumption, and anti-capture capability in the proposed improvement scheme are better than the original one.<\/jats:p>","DOI":"10.3233\/978-1-61499-927-0-824","type":"book-chapter","created":{"date-parts":[[2025,2,20]],"date-time":"2025-02-20T12:06:08Z","timestamp":1740053168000},"source":"Crossref","is-referenced-by-count":0,"title":["A Pre-Shared Key Pool Scheme for Wireless Sensor Networks Based on Time"],"prefix":"10.3233","author":[{"family":"Zhou Meixiu","sequence":"additional","affiliation":[]},{"family":"Chen Hanying","sequence":"additional","affiliation":[]},{"family":"Liu Xiaoli","sequence":"additional","affiliation":[]}],"member":"7437","container-title":["Frontiers in Artificial Intelligence and Applications","Fuzzy Systems and Data Mining IV"],"original-title":[],"deposited":{"date-parts":[[2025,2,20]],"date-time":"2025-02-20T12:30:47Z","timestamp":1740054647000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.medra.org\/servlet\/aliasResolver?alias=iospressISBN&isbn=978-1-61499-926-3&spage=824&doi=10.3233\/978-1-61499-927-0-824"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"references-count":0,"URL":"https:\/\/doi.org\/10.3233\/978-1-61499-927-0-824","relation":{},"ISSN":["0922-6389"],"issn-type":[{"value":"0922-6389","type":"print"}],"subject":[],"published":{"date-parts":[[2018]]}}}