{"id":"https://openalex.org/W2127032843","doi":"https://doi.org/10.1093/comjnl/bxr022","title":"Self-Healing Key Distribution Schemes for Wireless Networks: A Survey","display_name":"Self-Healing Key Distribution Schemes for Wireless Networks: A Survey","publication_year":2011,"publication_date":"2011-03-20","ids":{"openalex":"https://openalex.org/W2127032843","doi":"https://doi.org/10.1093/comjnl/bxr022","mag":"2127032843"},"language":"en","primary_location":{"id":"doi:10.1093/comjnl/bxr022","is_oa":false,"landing_page_url":"https://doi.org/10.1093/comjnl/bxr022","pdf_url":null,"source":{"id":"https://openalex.org/S44643521","display_name":"The Computer Journal","issn_l":"0010-4620","issn":["0010-4620","1460-2067"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310311648","host_organization_name":"Oxford University Press","host_organization_lineage":["https://openalex.org/P4310311648","https://openalex.org/P4310311647"],"host_organization_lineage_names":["Oxford University Press","University of Oxford"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"The Computer Journal","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5090400552","display_name":"Bo Tian","orcid":"https://orcid.org/0000-0002-5249-4415"},"institutions":[{"id":"https://openalex.org/I205640436","display_name":"Curtin University","ror":"https://ror.org/02n415q13","country_code":"AU","type":"education","lineage":["https://openalex.org/I205640436"]}],"countries":["AU"],"is_corresponding":true,"raw_author_name":"B. Tian","raw_affiliation_strings":["DEBII Institute, Curtin University"],"affiliations":[{"raw_affiliation_string":"DEBII Institute, Curtin University","institution_ids":["https://openalex.org/I205640436"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5086688453","display_name":"Song Han","orcid":"https://orcid.org/0000-0001-7758-3679"},"institutions":[{"id":"https://openalex.org/I205640436","display_name":"Curtin University","ror":"https://ror.org/02n415q13","country_code":"AU","type":"education","lineage":["https://openalex.org/I205640436"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"S. Han","raw_affiliation_strings":["DEBII Institute, Curtin University"],"affiliations":[{"raw_affiliation_string":"DEBII Institute, Curtin University","institution_ids":["https://openalex.org/I205640436"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5024926465","display_name":"Sazia Parvin","orcid":"https://orcid.org/0000-0001-8597-4450"},"institutions":[{"id":"https://openalex.org/I205640436","display_name":"Curtin University","ror":"https://ror.org/02n415q13","country_code":"AU","type":"education","lineage":["https://openalex.org/I205640436"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"S. Parvin","raw_affiliation_strings":["DEBII Institute, Curtin University"],"affiliations":[{"raw_affiliation_string":"DEBII Institute, Curtin University","institution_ids":["https://openalex.org/I205640436"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5075234257","display_name":"Jiankun Hu","orcid":"https://orcid.org/0000-0003-0230-1432"},"institutions":[{"id":"https://openalex.org/I40053085","display_name":"Australian Defence Force Academy","ror":"https://ror.org/02j5s7g39","country_code":"AU","type":"education","lineage":["https://openalex.org/I31746571","https://openalex.org/I40053085","https://openalex.org/I4394709116"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"J. Hu","raw_affiliation_strings":["School of Engineering and Information Technology, UNSW@ADFA, Canberra, Australia","School of Engineering and Information Technology UNSW@ADFA Canberra Australia"],"affiliations":[{"raw_affiliation_string":"School of Engineering and Information Technology, UNSW@ADFA, Canberra, Australia","institution_ids":["https://openalex.org/I40053085"]},{"raw_affiliation_string":"School of Engineering and Information Technology UNSW@ADFA Canberra Australia","institution_ids":["https://openalex.org/I40053085"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5050881965","display_name":"Sajal K. Das","orcid":"https://orcid.org/0000-0002-9471-0868"},"institutions":[{"id":"https://openalex.org/I189196454","display_name":"The University of Texas at Arlington","ror":"https://ror.org/019kgqr73","country_code":"US","type":"education","lineage":["https://openalex.org/I189196454"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"S. Das","raw_affiliation_strings":["Center for Research in Wireless Mobility and Networking, University Texas at Arlington"],"affiliations":[{"raw_affiliation_string":"Center for Research in Wireless Mobility and Networking, University Texas at Arlington","institution_ids":["https://openalex.org/I189196454"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5090400552"],"corresponding_institution_ids":["https://openalex.org/I205640436"],"apc_list":{"value":2635,"currency":"GBP","value_usd":3232},"apc_paid":null,"fwci":5.5429,"has_fulltext":false,"cited_by_count":28,"citation_normalized_percentile":{"value":0.96002394,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":90,"max":98},"biblio":{"volume":"54","issue":"4","first_page":"549","last_page":"569"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.9944999814033508,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9922999739646912,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/key-distribution","display_name":"Key distribution","score":0.8313814401626587},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7648720741271973},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.5693539381027222},{"id":"https://openalex.org/keywords/key-management","display_name":"Key management","score":0.5620765089988708},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.5258779525756836},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5060750842094421},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.4917164146900177},{"id":"https://openalex.org/keywords/session-key","display_name":"Session key","score":0.4290786683559418},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.39435356855392456},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.3231314420700073},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.19762766361236572}],"concepts":[{"id":"https://openalex.org/C160333310","wikidata":"https://www.wikidata.org/wiki/Q6398153","display_name":"Key distribution","level":4,"score":0.8313814401626587},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7648720741271973},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.5693539381027222},{"id":"https://openalex.org/C17886624","wikidata":"https://www.wikidata.org/wiki/Q1320561","display_name":"Key management","level":3,"score":0.5620765089988708},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.5258779525756836},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5060750842094421},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.4917164146900177},{"id":"https://openalex.org/C191197275","wikidata":"https://www.wikidata.org/wiki/Q1755775","display_name":"Session key","level":3,"score":0.4290786683559418},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.39435356855392456},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.3231314420700073},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.19762766361236572}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1093/comjnl/bxr022","is_oa":false,"landing_page_url":"https://doi.org/10.1093/comjnl/bxr022","pdf_url":null,"source":{"id":"https://openalex.org/S44643521","display_name":"The Computer Journal","issn_l":"0010-4620","issn":["0010-4620","1460-2067"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310311648","host_organization_name":"Oxford University Press","host_organization_lineage":["https://openalex.org/P4310311648","https://openalex.org/P4310311647"],"host_organization_lineage_names":["Oxford University Press","University of Oxford"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"The Computer Journal","raw_type":"journal-article"},{"id":"pmh:oai:espace.curtin.edu.au:20.500.11937/27948","is_oa":false,"landing_page_url":"http://hdl.handle.net/20.500.11937/27948","pdf_url":null,"source":{"id":"https://openalex.org/S4306401790","display_name":"eSpace (Curtin University)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205640436","host_organization_name":"Curtin University","host_organization_lineage":["https://openalex.org/I205640436"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"Journal Article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/7","score":0.9100000262260437,"display_name":"Affordable and clean energy"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":36,"referenced_works":["https://openalex.org/W120499575","https://openalex.org/W1515054604","https://openalex.org/W1523757407","https://openalex.org/W1542525447","https://openalex.org/W1569083856","https://openalex.org/W1570520158","https://openalex.org/W1581949462","https://openalex.org/W1601623242","https://openalex.org/W1840475895","https://openalex.org/W1935313143","https://openalex.org/W1969480928","https://openalex.org/W1971166148","https://openalex.org/W1978793129","https://openalex.org/W1983512062","https://openalex.org/W1995875735","https://openalex.org/W1998330938","https://openalex.org/W2000263577","https://openalex.org/W2008102763","https://openalex.org/W2040325382","https://openalex.org/W2054251041","https://openalex.org/W2108653485","https://openalex.org/W2110566685","https://openalex.org/W2111389536","https://openalex.org/W2123918207","https://openalex.org/W2131139991","https://openalex.org/W2136032111","https://openalex.org/W2138114708","https://openalex.org/W2146560953","https://openalex.org/W2152924492","https://openalex.org/W2156781518","https://openalex.org/W2161804582","https://openalex.org/W2167728176","https://openalex.org/W2168571148","https://openalex.org/W2171574715","https://openalex.org/W2542171236","https://openalex.org/W4285719527"],"related_works":["https://openalex.org/W2001243781","https://openalex.org/W4229602839","https://openalex.org/W2358235859","https://openalex.org/W2397519148","https://openalex.org/W2382371199","https://openalex.org/W2289077600","https://openalex.org/W2091472755","https://openalex.org/W3093625357","https://openalex.org/W2380644876","https://openalex.org/W1581534272"],"abstract_inverted_index":{"The":[0],"objective":[1],"of":[2,36,45,52,80,110,132,149,171,181,196,232],"self-healing":[3,38,68,81,133,172,182,197,233],"key":[4,39,69,82,134,144,173,183,198,234],"distribution":[5,40,70,83,135,184,199,235],"is":[6,42,101,120,163],"to":[7,11,49,73,202,210,229],"enable":[8],"group":[9,23,143,148],"users":[10,92,150],"recover":[12],"session":[13],"keys":[14],"by":[15],"themselves,":[16],"without":[17],"requesting":[18],"additional":[19,54],"transmissions":[20],"from":[21,64],"the":[22,37,43,50,65,67,75,103,166,169,178,230],"manager":[24],"(GM),":[25],"even":[26],"when":[27],"they":[28],"miss":[29],"some":[30,58],"broadcast":[31,62,89,223],"messages.":[32],"One":[33],"major":[34],"benefit":[35],"mechanism":[41,71],"reduction":[44],"energy":[46,86,118],"consumption":[47],"due":[48],"elimination":[51],"such":[53],"transmission.":[55],"Also":[56],"in":[57,116,168],"applications,":[59],"e.g.,":[60],"uni-directional":[61],"channel":[63],"GM,":[66],"seems":[72],"be":[74],"ideal":[76],"solution.":[77],"Desired":[78],"features":[79,212],"schemes":[84,136,200],"include":[85],"awareness,":[87],"short":[88],"message,":[90],"efficient":[91],"addition,":[93],"revocation":[94],"and":[95,112,206,213,226,243,245],"so":[96],"on.":[97],"A":[98],"primary":[99],"challenge":[100],"managing":[102],"trade-off":[104],"between":[105],"providing":[106],"an":[107,152,208],"acceptable":[108],"level":[109],"security":[111,179],"conserving":[113],"scarce":[114],"resources":[115],"particular":[117],"which":[119],"critical":[121],"for":[122,140,186],"wireless":[123],"network":[124],"operations.":[125],"Over":[126],"a":[127,129,142,146,160,194],"decade,":[128],"great":[130],"number":[131],"have":[137],"been":[138],"proposed":[139],"establishing":[141],"amongst":[145],"dynamic":[147],"over":[151],"unreliable,":[153],"or":[154],"lossy,":[155],"network.":[156],"In":[157],"this":[158],"paper":[159],"comprehensive":[161],"survey":[162],"conducted":[164],"on":[165,222],"state-of-the-art":[167],"field":[170],"distribution.":[174],"First,":[175],"we":[176,192,216,239],"clarify":[177],"requirements":[180],"scheme":[185],"their":[187,211,241],"special":[188],"application":[189],"environment.":[190],"Then,":[191],"present":[193],"classification":[195],"according":[201],"different":[203],"cryptographic":[204],"primitives,":[205],"give":[207],"insight":[209],"goals.":[214],"Furthermore,":[215],"consider":[217],"several":[218,247],"problems,":[219],"namely":[220],"authentication":[221],"messages,":[224],"sponsorization":[225],"mutual-healing,":[227],"related":[228],"robustness":[231],"schemes.":[236],"At":[237],"last,":[238],"delineate":[240],"similarities":[242],"differences":[244],"outline":[246],"future":[248],"research":[249],"directions.":[250]},"counts_by_year":[{"year":2024,"cited_by_count":1},{"year":2019,"cited_by_count":2},{"year":2018,"cited_by_count":1},{"year":2017,"cited_by_count":1},{"year":2016,"cited_by_count":4},{"year":2015,"cited_by_count":4},{"year":2014,"cited_by_count":5},{"year":2013,"cited_by_count":4},{"year":2012,"cited_by_count":5}],"updated_date":"2026-03-10T16:38:18.471706","created_date":"2025-10-10T00:00:00"}
