{"id":"https://openalex.org/W2119786893","doi":"https://doi.org/10.1109/isads.2009.5207366","title":"Secure decentralized data transfer against node capture attacks for wireless sensor networks","display_name":"Secure decentralized data transfer against node capture attacks for wireless sensor networks","publication_year":2009,"publication_date":"2009-03-01","ids":{"openalex":"https://openalex.org/W2119786893","doi":"https://doi.org/10.1109/isads.2009.5207366","mag":"2119786893"},"language":"en","primary_location":{"id":"doi:10.1109/isads.2009.5207366","is_oa":false,"landing_page_url":"https://doi.org/10.1109/isads.2009.5207366","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2009 International Symposium on Autonomous Decentralized Systems","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5012130677","display_name":"Eitaro Kohno","orcid":null},"institutions":[{"id":"https://openalex.org/I57930482","display_name":"Hiroshima City University","ror":"https://ror.org/001et4e78","country_code":"JP","type":"education","lineage":["https://openalex.org/I57930482"]}],"countries":["JP"],"is_corresponding":true,"raw_author_name":"Eitaro Kohno","raw_affiliation_strings":["Graduate School of Information Sciences, Hiroshima City University, Hiroshima, Japan","Graduate School of Information Sciences, Hiroshima City University, 3-4-1, Ozuka-higashi, Asaminami-ku, Japan 731-3194"],"affiliations":[{"raw_affiliation_string":"Graduate School of Information Sciences, Hiroshima City University, Hiroshima, Japan","institution_ids":["https://openalex.org/I57930482"]},{"raw_affiliation_string":"Graduate School of Information Sciences, Hiroshima City University, 3-4-1, Ozuka-higashi, Asaminami-ku, Japan 731-3194","institution_ids":["https://openalex.org/I57930482"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100832002","display_name":"Tomoyuki Ohta","orcid":null},"institutions":[{"id":"https://openalex.org/I57930482","display_name":"Hiroshima City University","ror":"https://ror.org/001et4e78","country_code":"JP","type":"education","lineage":["https://openalex.org/I57930482"]}],"countries":["JP"],"is_corresponding":false,"raw_author_name":"Tomoyuki Ohta","raw_affiliation_strings":["Graduate School of Information Sciences, Hiroshima City University, Hiroshima, Japan","Graduate School of Information Sciences, Hiroshima City University, 3-4-1, Ozuka-higashi, Asaminami-ku, Japan 731-3194"],"affiliations":[{"raw_affiliation_string":"Graduate School of Information Sciences, Hiroshima City University, Hiroshima, Japan","institution_ids":["https://openalex.org/I57930482"]},{"raw_affiliation_string":"Graduate School of Information Sciences, Hiroshima City University, 3-4-1, Ozuka-higashi, Asaminami-ku, Japan 731-3194","institution_ids":["https://openalex.org/I57930482"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5034764743","display_name":"Yoshiaki Kakuda","orcid":null},"institutions":[{"id":"https://openalex.org/I57930482","display_name":"Hiroshima City University","ror":"https://ror.org/001et4e78","country_code":"JP","type":"education","lineage":["https://openalex.org/I57930482"]}],"countries":["JP"],"is_corresponding":false,"raw_author_name":"Yoshiaki Kakuda","raw_affiliation_strings":["Graduate School of Information Sciences, Hiroshima City University, Hiroshima, Japan","Graduate School of Information Sciences, Hiroshima City University, 3-4-1, Ozuka-higashi, Asaminami-ku, Japan 731-3194"],"affiliations":[{"raw_affiliation_string":"Graduate School of Information Sciences, Hiroshima City University, Hiroshima, Japan","institution_ids":["https://openalex.org/I57930482"]},{"raw_affiliation_string":"Graduate School of Information Sciences, Hiroshima City University, 3-4-1, Ozuka-higashi, Asaminami-ku, Japan 731-3194","institution_ids":["https://openalex.org/I57930482"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5012130677"],"corresponding_institution_ids":["https://openalex.org/I57930482"],"apc_list":null,"apc_paid":null,"fwci":3.7713,"has_fulltext":false,"cited_by_count":31,"citation_normalized_percentile":{"value":0.93694797,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":98},"biblio":{"volume":"48","issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10080","display_name":"Energy Efficient Wireless Sensor Networks","score":0.9958000183105469,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10246","display_name":"Mobile Ad Hoc Networks","score":0.9957000017166138,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7983914613723755},{"id":"https://openalex.org/keywords/wireless-sensor-network","display_name":"Wireless sensor network","score":0.6958612203598022},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.6895955204963684},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.6166542768478394},{"id":"https://openalex.org/keywords/node","display_name":"Node (physics)","score":0.521460235118866},{"id":"https://openalex.org/keywords/key-distribution-in-wireless-sensor-networks","display_name":"Key distribution in wireless sensor networks","score":0.4864937663078308},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.48638561367988586},{"id":"https://openalex.org/keywords/data-security","display_name":"Data security","score":0.4244154989719391},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3849760591983795},{"id":"https://openalex.org/keywords/wireless","display_name":"Wireless","score":0.35127347707748413},{"id":"https://openalex.org/keywords/wireless-network","display_name":"Wireless network","score":0.30538591742515564},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.1122882068157196},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.06834077835083008}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7983914613723755},{"id":"https://openalex.org/C24590314","wikidata":"https://www.wikidata.org/wiki/Q336038","display_name":"Wireless sensor network","level":2,"score":0.6958612203598022},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.6895955204963684},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.6166542768478394},{"id":"https://openalex.org/C62611344","wikidata":"https://www.wikidata.org/wiki/Q1062658","display_name":"Node (physics)","level":2,"score":0.521460235118866},{"id":"https://openalex.org/C41971633","wikidata":"https://www.wikidata.org/wiki/Q6398155","display_name":"Key distribution in wireless sensor networks","level":4,"score":0.4864937663078308},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.48638561367988586},{"id":"https://openalex.org/C10511746","wikidata":"https://www.wikidata.org/wiki/Q899388","display_name":"Data security","level":3,"score":0.4244154989719391},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3849760591983795},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.35127347707748413},{"id":"https://openalex.org/C108037233","wikidata":"https://www.wikidata.org/wiki/Q11375","display_name":"Wireless network","level":3,"score":0.30538591742515564},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.1122882068157196},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.06834077835083008},{"id":"https://openalex.org/C66938386","wikidata":"https://www.wikidata.org/wiki/Q633538","display_name":"Structural engineering","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/isads.2009.5207366","is_oa":false,"landing_page_url":"https://doi.org/10.1109/isads.2009.5207366","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2009 International Symposium on Autonomous Decentralized Systems","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":25,"referenced_works":["https://openalex.org/W621271578","https://openalex.org/W1593318668","https://openalex.org/W1973225261","https://openalex.org/W1993319811","https://openalex.org/W2061987730","https://openalex.org/W2104532741","https://openalex.org/W2107905431","https://openalex.org/W2114495437","https://openalex.org/W2116269350","https://openalex.org/W2117781301","https://openalex.org/W2117984332","https://openalex.org/W2122053504","https://openalex.org/W2141420453","https://openalex.org/W2166462894","https://openalex.org/W2168452204","https://openalex.org/W2171427043","https://openalex.org/W2481816478","https://openalex.org/W2970097841","https://openalex.org/W3211513184","https://openalex.org/W4213165937","https://openalex.org/W4245435048","https://openalex.org/W6635385780","https://openalex.org/W6677374569","https://openalex.org/W6698135423","https://openalex.org/W6721792485"],"related_works":["https://openalex.org/W2100090372","https://openalex.org/W4361205702","https://openalex.org/W2385965183","https://openalex.org/W2013342653","https://openalex.org/W2901818815","https://openalex.org/W350349969","https://openalex.org/W3214026606","https://openalex.org/W2809887432","https://openalex.org/W3110687098","https://openalex.org/W2057612674"],"abstract_inverted_index":{"In":[0,89,108],"wireless":[1,136],"sensor":[2,4,137],"networks,":[3],"nodes":[5,54,64],"have":[6,47],"limited":[7],"computational":[8],"power":[9],"and":[10],"memory":[11],"size.":[12],"The":[13],"data":[14,66],"is":[15,29,130],"vulnerable":[16],"to":[17,20,56,67,118,144],"attack":[18],"due":[19],"the":[21,24,68,73,79,104,113,131,142],"nature":[22],"of":[23,51,72,87,115,135],"systems,":[25],"so":[26],"maintaining":[27],"confidentiality":[28],"an":[30],"important":[31],"problem.":[32],"Most":[33],"security":[34,133],"methods":[35,46],"are":[36],"based":[37],"on":[38],"common":[39],"or":[40],"public":[41],"key":[42,147],"cryptosystems.":[43],"However,":[44],"these":[45],"problems":[48],"with":[49,127],"encryption":[50],"data.":[52],"When":[53,63],"try":[55],"encrypt":[57],"data,":[58],"they":[59],"must":[60],"preestablish":[61],"keys.":[62],"send":[65],"sink":[69,80],"node,":[70],"all":[71],"exchanged":[74],"information":[75],"will":[76,111],"concentrate":[77],"in":[78],"node.":[81],"This":[82],"creates":[83],"a":[84,94],"single":[85],"point":[86],"failure.":[88],"this":[90],"paper,":[91],"we":[92,110,140],"propose":[93],"new":[95],"distribution":[96],"method":[97,117],"resilient":[98],"against":[99,121],"node":[100,122],"capture":[101,123],"attacks":[102],"using":[103],"secret":[105],"sharing":[106],"scheme.":[107],"addition,":[109],"confirm":[112],"ability":[114],"our":[116],"improve":[119],"resiliency":[120,143],"attacks,":[124],"comparing":[125],"it":[126],"TinySec,":[128],"which":[129],"major":[132],"architecture":[134],"networks.":[138],"Also,":[139],"compare":[141],"existing":[145],"pairwise":[146],"establishment":[148],"methods.":[149]},"counts_by_year":[{"year":2024,"cited_by_count":1},{"year":2022,"cited_by_count":1},{"year":2021,"cited_by_count":3},{"year":2020,"cited_by_count":1},{"year":2019,"cited_by_count":1},{"year":2017,"cited_by_count":2},{"year":2016,"cited_by_count":1},{"year":2015,"cited_by_count":2},{"year":2014,"cited_by_count":4},{"year":2013,"cited_by_count":4},{"year":2012,"cited_by_count":3}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
