{"id":"https://openalex.org/W2045246095","doi":"https://doi.org/10.1109/ccnc.2013.6488463","title":"A novel clustering paradigm for key pre-distribution: Toward a better security in homogenous WSNs","display_name":"A novel clustering paradigm for key pre-distribution: Toward a better security in homogenous WSNs","publication_year":2013,"publication_date":"2013-01-01","ids":{"openalex":"https://openalex.org/W2045246095","doi":"https://doi.org/10.1109/ccnc.2013.6488463","mag":"2045246095"},"language":"en","primary_location":{"id":"doi:10.1109/ccnc.2013.6488463","is_oa":false,"landing_page_url":"https://doi.org/10.1109/ccnc.2013.6488463","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2013 IEEE 10th Consumer Communications and Networking Conference (CCNC)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://zenodo.org/record/1265570","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5023684521","display_name":"Mohammad Rezaeirad","orcid":null},"institutions":[{"id":"https://openalex.org/I79516672","display_name":"University of Louisiana at Lafayette","ror":"https://ror.org/01x8rc503","country_code":"US","type":"education","lineage":["https://openalex.org/I2799628689","https://openalex.org/I79516672"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"M. Rezaeirad","raw_affiliation_strings":["The Center for Advanced Computer Studies, University of Louisiana, Lafayette, Lafayette, LA, USA","Center for Advanced Computer Studies, University of Louisiana at Lafayette, Lafayette, LA, USA#TAB#"],"affiliations":[{"raw_affiliation_string":"The Center for Advanced Computer Studies, University of Louisiana, Lafayette, Lafayette, LA, USA","institution_ids":["https://openalex.org/I79516672"]},{"raw_affiliation_string":"Center for Advanced Computer Studies, University of Louisiana at Lafayette, Lafayette, LA, USA#TAB#","institution_ids":["https://openalex.org/I79516672"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5065367784","display_name":"Mahdi Orooji","orcid":"https://orcid.org/0000-0003-1129-0667"},"institutions":[{"id":"https://openalex.org/I121820613","display_name":"Louisiana State University","ror":"https://ror.org/05ect4e57","country_code":"US","type":"education","lineage":["https://openalex.org/I121820613"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"M. Orooji","raw_affiliation_strings":["Dept. of Electr. & Comput. Eng., Louisiana State Univ., Baton Rouge, LA, USA"],"affiliations":[{"raw_affiliation_string":"Dept. of Electr. & Comput. Eng., Louisiana State Univ., Baton Rouge, LA, USA","institution_ids":["https://openalex.org/I121820613"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5017095721","display_name":"Sahar Mazloom","orcid":null},"institutions":[{"id":"https://openalex.org/I79516672","display_name":"University of Louisiana at Lafayette","ror":"https://ror.org/01x8rc503","country_code":"US","type":"education","lineage":["https://openalex.org/I2799628689","https://openalex.org/I79516672"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"S. Mazloom","raw_affiliation_strings":["The Center for Advanced Computer Studies, University of Louisiana, Lafayette, Lafayette, LA, USA","Center for Advanced Computer Studies, University of Louisiana at Lafayette, Lafayette, LA, USA#TAB#"],"affiliations":[{"raw_affiliation_string":"The Center for Advanced Computer Studies, University of Louisiana, Lafayette, Lafayette, LA, USA","institution_ids":["https://openalex.org/I79516672"]},{"raw_affiliation_string":"Center for Advanced Computer Studies, University of Louisiana at Lafayette, Lafayette, LA, USA#TAB#","institution_ids":["https://openalex.org/I79516672"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5105929455","display_name":"Dmitri Perkins","orcid":"https://orcid.org/0000-0003-0329-7914"},"institutions":[{"id":"https://openalex.org/I79516672","display_name":"University of Louisiana at Lafayette","ror":"https://ror.org/01x8rc503","country_code":"US","type":"education","lineage":["https://openalex.org/I2799628689","https://openalex.org/I79516672"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"D. Perkins","raw_affiliation_strings":["The Center for Advanced Computer Studies, University of Louisiana, Lafayette, Lafayette, LA, USA","Center for Advanced Computer Studies, University of Louisiana at Lafayette, Lafayette, LA, USA#TAB#"],"affiliations":[{"raw_affiliation_string":"The Center for Advanced Computer Studies, University of Louisiana, Lafayette, Lafayette, LA, USA","institution_ids":["https://openalex.org/I79516672"]},{"raw_affiliation_string":"Center for Advanced Computer Studies, University of Louisiana at Lafayette, Lafayette, LA, USA#TAB#","institution_ids":["https://openalex.org/I79516672"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5010023744","display_name":"Magdy Bayoumi","orcid":"https://orcid.org/0000-0002-0630-5273"},"institutions":[{"id":"https://openalex.org/I79516672","display_name":"University of Louisiana at Lafayette","ror":"https://ror.org/01x8rc503","country_code":"US","type":"education","lineage":["https://openalex.org/I2799628689","https://openalex.org/I79516672"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"M. Bayoumi","raw_affiliation_strings":["The Center for Advanced Computer Studies, University of Louisiana, Lafayette, Lafayette, LA, USA","Center for Advanced Computer Studies, University of Louisiana at Lafayette, Lafayette, LA, USA#TAB#"],"affiliations":[{"raw_affiliation_string":"The Center for Advanced Computer Studies, University of Louisiana, Lafayette, Lafayette, LA, USA","institution_ids":["https://openalex.org/I79516672"]},{"raw_affiliation_string":"Center for Advanced Computer Studies, University of Louisiana at Lafayette, Lafayette, LA, USA#TAB#","institution_ids":["https://openalex.org/I79516672"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5023684521"],"corresponding_institution_ids":["https://openalex.org/I79516672"],"apc_list":null,"apc_paid":null,"fwci":1.1399,"has_fulltext":false,"cited_by_count":3,"citation_normalized_percentile":{"value":0.81197648,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":96},"biblio":{"volume":"33","issue":null,"first_page":"308","last_page":"316"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10080","display_name":"Energy Efficient Wireless Sensor Networks","score":0.9782999753952026,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9384999871253967,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7814213633537292},{"id":"https://openalex.org/keywords/wireless-sensor-network","display_name":"Wireless sensor network","score":0.7438700199127197},{"id":"https://openalex.org/keywords/node","display_name":"Node (physics)","score":0.6916918158531189},{"id":"https://openalex.org/keywords/cluster-analysis","display_name":"Cluster analysis","score":0.6749470233917236},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.6131247878074646},{"id":"https://openalex.org/keywords/key-management","display_name":"Key management","score":0.6106643676757812},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.6066763997077942},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.5344136953353882},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.5024120807647705},{"id":"https://openalex.org/keywords/key-distribution","display_name":"Key distribution","score":0.49416711926460266},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3617929220199585},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.2687166929244995},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.0957595705986023},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.09467008709907532},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.07953870296478271}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7814213633537292},{"id":"https://openalex.org/C24590314","wikidata":"https://www.wikidata.org/wiki/Q336038","display_name":"Wireless sensor network","level":2,"score":0.7438700199127197},{"id":"https://openalex.org/C62611344","wikidata":"https://www.wikidata.org/wiki/Q1062658","display_name":"Node (physics)","level":2,"score":0.6916918158531189},{"id":"https://openalex.org/C73555534","wikidata":"https://www.wikidata.org/wiki/Q622825","display_name":"Cluster analysis","level":2,"score":0.6749470233917236},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.6131247878074646},{"id":"https://openalex.org/C17886624","wikidata":"https://www.wikidata.org/wiki/Q1320561","display_name":"Key management","level":3,"score":0.6106643676757812},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.6066763997077942},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.5344136953353882},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.5024120807647705},{"id":"https://openalex.org/C160333310","wikidata":"https://www.wikidata.org/wiki/Q6398153","display_name":"Key distribution","level":4,"score":0.49416711926460266},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3617929220199585},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.2687166929244995},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.0957595705986023},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.09467008709907532},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.07953870296478271},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C66938386","wikidata":"https://www.wikidata.org/wiki/Q633538","display_name":"Structural engineering","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/ccnc.2013.6488463","is_oa":false,"landing_page_url":"https://doi.org/10.1109/ccnc.2013.6488463","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2013 IEEE 10th Consumer Communications and Networking Conference (CCNC)","raw_type":"proceedings-article"},{"id":"pmh:oai:zenodo.org:1265570","is_oa":true,"landing_page_url":"https://zenodo.org/record/1265570","pdf_url":null,"source":{"id":"https://openalex.org/S4306400562","display_name":"Zenodo (CERN European Organization for Nuclear Research)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I67311998","host_organization_name":"European Organization for Nuclear Research","host_organization_lineage":["https://openalex.org/I67311998"],"host_organization_lineage_names":[],"type":"repository"},"license":"public-domain","license_id":"https://openalex.org/licenses/public-domain","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"info:eu-repo/semantics/conferencePaper"}],"best_oa_location":{"id":"pmh:oai:zenodo.org:1265570","is_oa":true,"landing_page_url":"https://zenodo.org/record/1265570","pdf_url":null,"source":{"id":"https://openalex.org/S4306400562","display_name":"Zenodo (CERN European Organization for Nuclear Research)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I67311998","host_organization_name":"European Organization for Nuclear Research","host_organization_lineage":["https://openalex.org/I67311998"],"host_organization_lineage_names":[],"type":"repository"},"license":"public-domain","license_id":"https://openalex.org/licenses/public-domain","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"info:eu-repo/semantics/conferencePaper"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":33,"referenced_works":["https://openalex.org/W1514361308","https://openalex.org/W1540058325","https://openalex.org/W1822822445","https://openalex.org/W1973225261","https://openalex.org/W2008102763","https://openalex.org/W2019330379","https://openalex.org/W2057513415","https://openalex.org/W2080765376","https://openalex.org/W2083544997","https://openalex.org/W2085627628","https://openalex.org/W2090249029","https://openalex.org/W2097840215","https://openalex.org/W2098832361","https://openalex.org/W2103239965","https://openalex.org/W2107619464","https://openalex.org/W2111664921","https://openalex.org/W2116089521","https://openalex.org/W2116269350","https://openalex.org/W2117752678","https://openalex.org/W2117984332","https://openalex.org/W2119596466","https://openalex.org/W2122053504","https://openalex.org/W2135988418","https://openalex.org/W2136974547","https://openalex.org/W2138317466","https://openalex.org/W2143536181","https://openalex.org/W2148717592","https://openalex.org/W2150695275","https://openalex.org/W2156781518","https://openalex.org/W2167725891","https://openalex.org/W3211513184","https://openalex.org/W6676496441","https://openalex.org/W6681151506"],"related_works":["https://openalex.org/W4229602839","https://openalex.org/W2382371199","https://openalex.org/W2791490729","https://openalex.org/W2081422519","https://openalex.org/W2358235859","https://openalex.org/W1980610025","https://openalex.org/W2007231272","https://openalex.org/W2025816190","https://openalex.org/W4214592145","https://openalex.org/W1997645629"],"abstract_inverted_index":{"Homogeneous":[0],"wireless":[1],"sensor":[2,79,133,174],"networks":[3],"(HWSNs)":[4],"are":[5,187],"a":[6,55,96,104,116,158,169],"class":[7],"of":[8,36,47,78],"WSNs":[9,24],"in":[10,91,103],"which":[11],"nodes":[12,80,134,148,151],"have":[13],"identical":[14],"hardware":[15],"configurations.":[16],"A":[17],"HWSN":[18],"inherits":[19],"the":[20,33,69,72,128,136,154,164],"same":[21],"constraints":[22],"from":[23,152],"such":[25,63,87],"as":[26,64,149],"limited":[27,73],"processing":[28],"capacity":[29],"and":[30,75,139,177,183],"resources.":[31],"However,":[32],"unique":[34],"characteristic":[35],"HWSNs":[37],"gets":[38],"more":[39],"attention":[40],"for":[41,111,172],"recent":[42],"security":[43,52,61,88,129],"applications.":[44],"The":[45],"environment":[46],"these":[48],"applications":[49],"mandates":[50],"lightweight":[51],"provisions,":[53],"especially":[54],"key":[56,105,107,118],"management":[57,108],"protocol":[58],"that":[59],"endures":[60],"threats":[62],"node":[65,175,180],"capture":[66,181],"attack.":[67],"On":[68],"other":[70],"hand,":[71],"computation":[74],"communication":[76],"capabilities":[77],"make":[81],"it":[82],"hard":[83],"to":[84,100,135,142,156,163],"deal":[85],"with":[86],"threats.":[89],"Thus,":[90],"this":[92,122],"paper,":[93],"we":[94,114,167],"introduce":[95],"novel":[97],"clustering":[98],"paradigm":[99],"be":[101,143],"used":[102],"pre-distribution":[106,119],"scheme":[109,126],"designed":[110],"HWSNs.":[112],"Then,":[113],"develop":[115],"cluster-based":[117],"based":[120],"on":[121],"paradigm.":[123],"Our":[124],"developed":[125],"improves":[127],"dramatically":[130],"by":[131],"partitioning":[132],"disjointed":[137],"clusters":[138,141,155],"letting":[140],"inter-connected":[144],"via":[145],"randomly":[146],"selected":[147],"consular":[150],"all":[153],"form":[157],"universal":[159],"cluster.":[160],"As":[161],"opposed":[162],"adopted":[165],"schemes,":[166],"provide":[168],"comprehensive":[170],"analysis":[171],"both":[173],"connectivity,":[176],"resiliency":[178],"against":[179],"attack,":[182],"also":[184],"computational":[185],"results":[186],"presented.":[188]},"counts_by_year":[{"year":2016,"cited_by_count":1},{"year":2014,"cited_by_count":2}],"updated_date":"2026-03-20T23:20:44.827607","created_date":"2025-10-10T00:00:00"}
