{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2023,6,19]],"date-time":"2023-06-19T21:51:36Z","timestamp":1687211496776},"reference-count":17,"publisher":"SAGE Publications","issue":"9","license":[{"start":{"date-parts":[[2012,9,10]],"date-time":"2012-09-10T00:00:00Z","timestamp":1347235200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/journals.sagepub.com\/page\/policies\/text-and-data-mining-license"}],"funder":[{"DOI":"10.13039\/501100002858","name":"China Postdoctoral Science Foundation","doi-asserted-by":"publisher","award":["2012M510367","2011ZX03005-002"],"id":[{"id":"10.13039\/501100002858","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["journals.sagepub.com"],"crossmark-restriction":true},"short-container-title":["International Journal of Distributed Sensor Networks"],"published-print":{"date-parts":[[2012,9,10]]},"abstract":" Due to the vulnerable environment, limited recourse and open communication channel, wireless sensor networks (WSNs) are necessary to be protected from various attacks. The key management is an important way to protect the communication in WSNs. In this paper, we present a hierarchical key management scheme (HKMS) which can efficiently enhance the security and survivability for the clustered WSNs. Different from previous works, the HKMS distributes keys based on hop counts and one-way function by the clustered architecture, which not only localizes the key things but also has no overhead. The HKMS provides the session keys among sensors and the cluster key between the cluster head and member nodes. The HKMS dynamically generates different keys based on different hops in different periods which can protect the network from the compromised nodes and reduce the high probability of the common keys without any special sensors (such as the anchor nodes). The security analysis and simulation show the HKMS can prevent several attacks effectively and reduce the energy consumption. <\/jats:p>","DOI":"10.1155\/2012\/547471","type":"journal-article","created":{"date-parts":[[2012,9,23]],"date-time":"2012-09-23T21:02:09Z","timestamp":1348434129000},"page":"547471","update-policy":"http:\/\/dx.doi.org\/10.1177\/sage-journals-update-policy","source":"Crossref","is-referenced-by-count":14,"title":["A Secure Hierarchical Key Management Scheme in Wireless Sensor Network"],"prefix":"10.1177","volume":"8","author":[{"given":"Yiying","family":"Zhang","sequence":"first","affiliation":[{"name":"School of Electronic Engineering, Beijing University of Posts and Telecommunications, Beijing 100876, China"},{"name":"Department of Production & Technology, State Grid Information & Telecommunication Company Ltd., Beijing 100761, China"}]},{"given":"Xiangzhen","family":"Li","sequence":"additional","affiliation":[{"name":"IoT Center, State Grid Electric Power Research Institute, Nanjing 210003, China"}]},{"given":"Jianming","family":"Liu","sequence":"additional","affiliation":[{"name":"Department of Production & Technology, State Grid Information & Telecommunication Company Ltd., Beijing 100761, China"}]},{"given":"Jucheng","family":"Yang","sequence":"additional","affiliation":[{"name":"College of Computer Science & Information Engineering, Tianjin University of Science & Technology, Tianjin 300222, China"}]},{"given":"Baojiang","family":"Cui","sequence":"additional","affiliation":[{"name":"School of Electronic Engineering, Beijing University of Posts and Telecommunications, Beijing 100876, China"}]}],"member":"179","published-online":{"date-parts":[[2012,9,23]]},"reference":[{"key":"B1-2012-547471","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2008.4625802"},{"key":"B2-2012-547471","first-page":"141","volume-title":"Proceedings of the 12th International Conference on Advanced Communication Technology (ICACT '10)","author":"Banihashemian S."},{"key":"B3-2012-547471","doi-asserted-by":"publisher","DOI":"10.1007\/s11276-008-0145-y"},{"key":"B4-2012-547471","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2006.05.012"},{"key":"B5-2012-547471","doi-asserted-by":"publisher","DOI":"10.1109\/CNSR.2010.46"},{"key":"B6-2012-547471","doi-asserted-by":"publisher","DOI":"10.1145\/1236360.1236421"},{"key":"B13-2012-547471","first-page":"586","volume-title":"Proceedings of the 23rd Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM '04)","author":"Du W."},{"key":"B14-2012-547471","first-page":"197","volume-title":"Proceedings of the IEEE Symposium on Security And Privacy","author":"Chan H."},{"issue":"4","key":"B8-2012-547471","first-page":"745","volume":"2","author":"Vivek K.","year":"2011","journal-title":"International Journal of Advanced Networking and Applications"},{"key":"B9-2012-547471","doi-asserted-by":"publisher","DOI":"10.5121\/ijcses.2011.2411"},{"key":"B10-2012-547471","first-page":"306","author":"Ray A.","year":"2012","journal-title":"Recent Advances in Information Technology"},{"key":"B7-2012-547471","doi-asserted-by":"publisher","DOI":"10.1145\/1218556.1218559"},{"key":"B11-2012-547471","first-page":"2009","volume-title":"Proceedings of the 15th international workshop on parallel and distributed computing issues in wireless networks and mobile computing","author":"Manjeshwar A."},{"key":"B16-2012-547471","doi-asserted-by":"publisher","DOI":"10.4304\/jnw.5.8.964-970"},{"key":"B12-2012-547471","first-page":"127","volume-title":"Proceedings of The 6th International Conference on Systems and Networks Communications (ICSNC '11)","author":"Seyed H. N."},{"key":"B17-2012-547471","doi-asserted-by":"publisher","DOI":"10.3724\/SP.J.1001.2010.03585"},{"key":"B15-2012-547471","first-page":"1713","volume-title":"Proceedings of the 22nd Annual Joint Conference on the IEEE Computer and Communications Societies (INFOCOM '03)","author":"Bandyopadhyay S."}],"container-title":["International Journal of Distributed Sensor Networks"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/journals.sagepub.com\/doi\/pdf\/10.1155\/2012\/547471","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/journals.sagepub.com\/doi\/full-xml\/10.1155\/2012\/547471","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/journals.sagepub.com\/doi\/pdf\/10.1155\/2012\/547471","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,16]],"date-time":"2021-05-16T17:31:35Z","timestamp":1621186295000},"score":1,"resource":{"primary":{"URL":"http:\/\/journals.sagepub.com\/doi\/10.1155\/2012\/547471"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,9,10]]},"references-count":17,"journal-issue":{"issue":"9","published-print":{"date-parts":[[2012,9,10]]}},"alternative-id":["10.1155\/2012\/547471"],"URL":"https:\/\/doi.org\/10.1155\/2012\/547471","relation":{},"ISSN":["1550-1477","1550-1477"],"issn-type":[{"value":"1550-1477","type":"print"},{"value":"1550-1477","type":"electronic"}],"subject":[],"published":{"date-parts":[[2012,9,10]]}}}