{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,29]],"date-time":"2025-10-29T18:37:58Z","timestamp":1761763078842,"version":"3.40.5"},"reference-count":25,"publisher":"IGI Global","issue":"3","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019,7]]},"abstract":"<jats:p>The Internet of Things (IoT) is getting the reputation as one of the most optimistic networking paradigms that is reducing the gap between the cyber world and physical world. Most of the participating nodes in IoT network are sensors, which are limited in terms of resource such as energy, computation power, memory and so on. In IoT network, nodes communicate with each other via wireless medium, which makes the IoT network vulnerable to many security threats including eavesdropping. The IoT network is deployed in a large area and work on 24\/7 hours, so an energy efficient scheme is one of the major issues in IoT. To achieve secure and energy efficient network, this article contributes: (1) A hierarchical topology for IoT network deployment; (2) symmetric matrix-based pair-wise key generation for secure communication; (3) A secure and energy efficient secure routing algorithm for the proposed model.<\/jats:p>","DOI":"10.4018\/ijisp.201907010106","type":"journal-article","created":{"date-parts":[[2019,6,26]],"date-time":"2019-06-26T14:50:10Z","timestamp":1561560610000},"page":"91-105","source":"Crossref","is-referenced-by-count":6,"title":["A Matrix-Based Pair-Wise Key Establishment for Secure and Energy Efficient WSN-Assisted IoT"],"prefix":"10.4018","volume":"13","author":[{"given":"Anurag Shukla","family":"Shukla","sequence":"first","affiliation":[{"name":"NIT Raipur, Raipur, India"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0873-2102","authenticated-orcid":true,"given":"Sarsij","family":"Tripathi","sequence":"additional","affiliation":[{"name":"NIT Raipur, Raipur, India"}]}],"member":"2432","reference":[{"key":"IJISP.201907010106-0","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2007.05.024"},{"key":"IJISP.201907010106-1","doi-asserted-by":"publisher","DOI":"10.1109\/TETC.2013.2278698"},{"key":"IJISP.201907010106-2","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2010.05.010"},{"key":"IJISP.201907010106-3","first-page":"335","article-title":"An optimal class of symmetric key generation systems.","author":"R.Blom","year":"1984","journal-title":"Workshop on the Theory and Application of of Cryptographic Techniques"},{"key":"IJISP.201907010106-4","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2006.2"},{"key":"IJISP.201907010106-5","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2011.020211.00058"},{"key":"IJISP.201907010106-6","doi-asserted-by":"crossref","unstructured":"Galuba, W., Papadimitratos, P., Poturalski, M., Aberer, K., Despotovic, Z., & Kellerer, W. (2010, March). Castor: Scalable secure routing for ad hoc networks. In INFOCOM, 2010 Proceedings IEEE (pp. 1-9). IEEE.","DOI":"10.1109\/INFCOM.2010.5462115"},{"key":"IJISP.201907010106-7","article-title":"The IoT energy challenge: A software perspective.","author":"K.Georgiou","year":"2017","journal-title":"IEEE Embedded Systems Letters"},{"key":"IJISP.201907010106-8","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2002.804190"},{"key":"IJISP.201907010106-9","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2014.2301819"},{"key":"IJISP.201907010106-10","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2011.07.005"},{"key":"IJISP.201907010106-11","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2009.08.002"},{"key":"IJISP.201907010106-12","unstructured":"Lee, S., Yoo, J., & Chung, T. (2004, November). Distance-based energy efficient clustering for wireless sensor networks. In 29th Annual IEEE International Conference on Local Computer Networks (pp. 567-568). IEEE."},{"key":"IJISP.201907010106-13","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2012.6195494"},{"key":"IJISP.201907010106-14","doi-asserted-by":"publisher","DOI":"10.1109\/BWCCA.2013.34"},{"key":"IJISP.201907010106-15","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-17679-1_27"},{"key":"IJISP.201907010106-16","doi-asserted-by":"publisher","DOI":"10.3390\/s151128603"},{"key":"IJISP.201907010106-17","doi-asserted-by":"crossref","unstructured":"Ren, K., Zeng, K., & Lou, W. (2006). A new approach for random key pre\u2010distribution in large\u2010scale wireless sensor networks. Wireless communications and mobile computing, 6(3), 307-318.","DOI":"10.1002\/wcm.397"},{"journal-title":"SEP: A stable election protocol for clustered heterogeneous wireless sensor networks","year":"2004","author":"G.Smaragdakis","key":"IJISP.201907010106-18"},{"key":"IJISP.201907010106-19","unstructured":"Sukumar, S. (2013). Computational analysis of modified Blom's scheme. arXiv:1303.7457"},{"key":"IJISP.201907010106-20","doi-asserted-by":"publisher","DOI":"10.1145\/2140522.2140528"},{"key":"IJISP.201907010106-21","doi-asserted-by":"publisher","DOI":"10.1109\/PERCOM.2005.18"},{"key":"IJISP.201907010106-22","doi-asserted-by":"publisher","DOI":"10.1109\/ICCSEE.2012.150"},{"key":"IJISP.201907010106-23","doi-asserted-by":"publisher","DOI":"10.1109\/SENSORCOMM.2007.4394931"},{"key":"IJISP.201907010106-24","doi-asserted-by":"publisher","DOI":"10.1109\/TETC.2013.2287196"}],"container-title":["International Journal of Information Security and Privacy"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.igi-global.com\/viewtitle.aspx?TitleId=232671","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,5]],"date-time":"2022-05-05T19:59:14Z","timestamp":1651780754000},"score":1,"resource":{"primary":{"URL":"http:\/\/services.igi-global.com\/resolvedoi\/resolve.aspx?doi=10.4018\/IJISP.201907010106"}},"subtitle":[""],"short-title":[],"issued":{"date-parts":[[2019,7]]},"references-count":25,"journal-issue":{"issue":"3"},"URL":"https:\/\/doi.org\/10.4018\/ijisp.201907010106","relation":{},"ISSN":["1930-1650","1930-1669"],"issn-type":[{"type":"print","value":"1930-1650"},{"type":"electronic","value":"1930-1669"}],"subject":[],"published":{"date-parts":[[2019,7]]}}}