{"id":"https://openalex.org/W2052426738","doi":"https://doi.org/10.1109/isit.2014.6875260","title":"On secure and reliable communications in wireless sensor networks: Towards k-connectivity under a random pairwise key predistribution scheme","display_name":"On secure and reliable communications in wireless sensor networks: Towards k-connectivity under a random pairwise key predistribution scheme","publication_year":2014,"publication_date":"2014-06-01","ids":{"openalex":"https://openalex.org/W2052426738","doi":"https://doi.org/10.1109/isit.2014.6875260","mag":"2052426738"},"language":"en","primary_location":{"id":"doi:10.1109/isit.2014.6875260","is_oa":false,"landing_page_url":"https://doi.org/10.1109/isit.2014.6875260","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2014 IEEE International Symposium on Information Theory","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5039548799","display_name":"Faruk Yavuz","orcid":null},"institutions":[{"id":"https://openalex.org/I74973139","display_name":"Carnegie Mellon University","ror":"https://ror.org/05x2bcf33","country_code":"US","type":"education","lineage":["https://openalex.org/I74973139"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Faruk Yavuz","raw_affiliation_strings":["Dept. of ECE and CyLab, Carnegie Mellon University, Moffett Field, CA","Dept. of ECE, Carnegie Mellon Univ., Moffett Field, CA, USA"],"affiliations":[{"raw_affiliation_string":"Dept. of ECE and CyLab, Carnegie Mellon University, Moffett Field, CA","institution_ids":["https://openalex.org/I74973139"]},{"raw_affiliation_string":"Dept. of ECE, Carnegie Mellon Univ., Moffett Field, CA, USA","institution_ids":["https://openalex.org/I74973139"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5071321132","display_name":"Jun Zhao","orcid":"https://orcid.org/0000-0002-3004-7091"},"institutions":[{"id":"https://openalex.org/I74973139","display_name":"Carnegie Mellon University","ror":"https://ror.org/05x2bcf33","country_code":"US","type":"education","lineage":["https://openalex.org/I74973139"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Jun Zhao","raw_affiliation_strings":["Dept. of ECE and CyLab, Carnegie Mellon University, Pittsburgh, PA","[Dept. of ECE, Carnegie Mellon University, Pittsburgh, PA, USA]"],"affiliations":[{"raw_affiliation_string":"Dept. of ECE and CyLab, Carnegie Mellon University, Pittsburgh, PA","institution_ids":["https://openalex.org/I74973139"]},{"raw_affiliation_string":"[Dept. of ECE, Carnegie Mellon University, Pittsburgh, PA, USA]","institution_ids":["https://openalex.org/I74973139"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5064066193","display_name":"Osman Ya\u011fan","orcid":"https://orcid.org/0000-0002-7057-2966"},"institutions":[{"id":"https://openalex.org/I74973139","display_name":"Carnegie Mellon University","ror":"https://ror.org/05x2bcf33","country_code":"US","type":"education","lineage":["https://openalex.org/I74973139"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Osman Yagan","raw_affiliation_strings":["Dept. of ECE and CyLab, Carnegie Mellon University, Moffett Field, CA","Dept. of ECE, Carnegie Mellon Univ., Moffett Field, CA, USA"],"affiliations":[{"raw_affiliation_string":"Dept. of ECE and CyLab, Carnegie Mellon University, Moffett Field, CA","institution_ids":["https://openalex.org/I74973139"]},{"raw_affiliation_string":"Dept. of ECE, Carnegie Mellon Univ., Moffett Field, CA, USA","institution_ids":["https://openalex.org/I74973139"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5113663304","display_name":"Virgil D. Gligor","orcid":null},"institutions":[{"id":"https://openalex.org/I74973139","display_name":"Carnegie Mellon University","ror":"https://ror.org/05x2bcf33","country_code":"US","type":"education","lineage":["https://openalex.org/I74973139"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Virgil Gligor","raw_affiliation_strings":["Dept. of ECE and CyLab, Carnegie Mellon University, Pittsburgh, PA","[Dept. of ECE, Carnegie Mellon University, Pittsburgh, PA, USA]"],"affiliations":[{"raw_affiliation_string":"Dept. of ECE and CyLab, Carnegie Mellon University, Pittsburgh, PA","institution_ids":["https://openalex.org/I74973139"]},{"raw_affiliation_string":"[Dept. of ECE, Carnegie Mellon University, Pittsburgh, PA, USA]","institution_ids":["https://openalex.org/I74973139"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5039548799"],"corresponding_institution_ids":["https://openalex.org/I74973139"],"apc_list":null,"apc_paid":null,"fwci":9.7123,"has_fulltext":false,"cited_by_count":36,"citation_normalized_percentile":{"value":0.98192837,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":99},"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9907000064849854,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10246","display_name":"Mobile Ad Hoc Networks","score":0.9894999861717224,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/wireless-sensor-network","display_name":"Wireless sensor network","score":0.6625645160675049},{"id":"https://openalex.org/keywords/pairwise-comparison","display_name":"Pairwise comparison","score":0.5851502418518066},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.5480157136917114},{"id":"https://openalex.org/keywords/node","display_name":"Node (physics)","score":0.5120533108711243},{"id":"https://openalex.org/keywords/key-distribution-in-wireless-sensor-networks","display_name":"Key distribution in wireless sensor networks","score":0.510246753692627},{"id":"https://openalex.org/keywords/wireless-network","display_name":"Wireless network","score":0.5083431601524353},{"id":"https://openalex.org/keywords/graph","display_name":"Graph","score":0.5037299990653992},{"id":"https://openalex.org/keywords/random-graph","display_name":"Random graph","score":0.4781447649002075},{"id":"https://openalex.org/keywords/topology","display_name":"Topology (electrical circuits)","score":0.47304338216781616},{"id":"https://openalex.org/keywords/random-geometric-graph","display_name":"Random geometric graph","score":0.46381446719169617},{"id":"https://openalex.org/keywords/connectivity","display_name":"Connectivity","score":0.4637022614479065},{"id":"https://openalex.org/keywords/wireless","display_name":"Wireless","score":0.4567367732524872},{"id":"https://openalex.org/keywords/wireless-ad-hoc-network","display_name":"Wireless ad hoc network","score":0.4358944892883301},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.41957640647888184},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.4124978184700012},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.37035703659057617},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.36784934997558594},{"id":"https://openalex.org/keywords/combinatorics","display_name":"Combinatorics","score":0.21359190344810486},{"id":"https://openalex.org/keywords/line-graph","display_name":"Line graph","score":0.1441216766834259},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.09691858291625977},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.07800626754760742},{"id":"https://openalex.org/keywords/physics","display_name":"Physics","score":0.07681137323379517}],"concepts":[{"id":"https://openalex.org/C24590314","wikidata":"https://www.wikidata.org/wiki/Q336038","display_name":"Wireless sensor network","level":2,"score":0.6625645160675049},{"id":"https://openalex.org/C184898388","wikidata":"https://www.wikidata.org/wiki/Q1435712","display_name":"Pairwise comparison","level":2,"score":0.5851502418518066},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5480157136917114},{"id":"https://openalex.org/C62611344","wikidata":"https://www.wikidata.org/wiki/Q1062658","display_name":"Node (physics)","level":2,"score":0.5120533108711243},{"id":"https://openalex.org/C41971633","wikidata":"https://www.wikidata.org/wiki/Q6398155","display_name":"Key distribution in wireless sensor networks","level":4,"score":0.510246753692627},{"id":"https://openalex.org/C108037233","wikidata":"https://www.wikidata.org/wiki/Q11375","display_name":"Wireless network","level":3,"score":0.5083431601524353},{"id":"https://openalex.org/C132525143","wikidata":"https://www.wikidata.org/wiki/Q141488","display_name":"Graph","level":2,"score":0.5037299990653992},{"id":"https://openalex.org/C47458327","wikidata":"https://www.wikidata.org/wiki/Q910404","display_name":"Random graph","level":3,"score":0.4781447649002075},{"id":"https://openalex.org/C184720557","wikidata":"https://www.wikidata.org/wiki/Q7825049","display_name":"Topology (electrical circuits)","level":2,"score":0.47304338216781616},{"id":"https://openalex.org/C30609935","wikidata":"https://www.wikidata.org/wiki/Q7291969","display_name":"Random geometric graph","level":5,"score":0.46381446719169617},{"id":"https://openalex.org/C76444178","wikidata":"https://www.wikidata.org/wiki/Q72897900","display_name":"Connectivity","level":3,"score":0.4637022614479065},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.4567367732524872},{"id":"https://openalex.org/C94523657","wikidata":"https://www.wikidata.org/wiki/Q4085781","display_name":"Wireless ad hoc network","level":3,"score":0.4358944892883301},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.41957640647888184},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.4124978184700012},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.37035703659057617},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.36784934997558594},{"id":"https://openalex.org/C114614502","wikidata":"https://www.wikidata.org/wiki/Q76592","display_name":"Combinatorics","level":1,"score":0.21359190344810486},{"id":"https://openalex.org/C203776342","wikidata":"https://www.wikidata.org/wiki/Q1378376","display_name":"Line graph","level":3,"score":0.1441216766834259},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.09691858291625977},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.07800626754760742},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.07681137323379517},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.0},{"id":"https://openalex.org/C22149727","wikidata":"https://www.wikidata.org/wiki/Q7940747","display_name":"Voltage graph","level":4,"score":0.0},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/isit.2014.6875260","is_oa":false,"landing_page_url":"https://doi.org/10.1109/isit.2014.6875260","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2014 IEEE International Symposium on Information Theory","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[{"id":"https://openalex.org/F4320310207","display_name":"Carnegie Mellon University","ror":"https://ror.org/05x2bcf33"},{"id":"https://openalex.org/F4320338281","display_name":"Army Research Office","ror":"https://ror.org/05epdh915"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":27,"referenced_works":["https://openalex.org/W390146837","https://openalex.org/W630423399","https://openalex.org/W1577466578","https://openalex.org/W1868819612","https://openalex.org/W1966695467","https://openalex.org/W2000444110","https://openalex.org/W2042784782","https://openalex.org/W2044927794","https://openalex.org/W2056254754","https://openalex.org/W2080765376","https://openalex.org/W2089421240","https://openalex.org/W2106612487","https://openalex.org/W2109721434","https://openalex.org/W2116269350","https://openalex.org/W2117984332","https://openalex.org/W2121278461","https://openalex.org/W2135988418","https://openalex.org/W2136926857","https://openalex.org/W2142195869","https://openalex.org/W2165958223","https://openalex.org/W2168452204","https://openalex.org/W2478722229","https://openalex.org/W2905110430","https://openalex.org/W3098413816","https://openalex.org/W3101839392","https://openalex.org/W3211513184","https://openalex.org/W6677374569"],"related_works":["https://openalex.org/W2782929340","https://openalex.org/W1590359421","https://openalex.org/W59125150","https://openalex.org/W2963133557","https://openalex.org/W2130919150","https://openalex.org/W2155003029","https://openalex.org/W2179240077","https://openalex.org/W1578200831","https://openalex.org/W57782380","https://openalex.org/W2726602488"],"abstract_inverted_index":{"We":[0],"study":[1],"the":[2,18,40,59,63,68,78,93,103,114,122,136,146,151,158],"secure":[3],"and":[4,27,29,50,67,109,119],"reliable":[5],"connectivity":[6],"of":[7,24,45,61,70,95,105,124,129,148,160],"wireless":[8,31,72],"sensor":[9],"networks.":[10],"Security":[11],"is":[12],"assumed":[13],"to":[14,112,142],"be":[15],"ensured":[16],"by":[17,35,42,117],"random":[19,47],"pairwise":[20],"key":[21],"predistribution":[22],"scheme":[23,64],"Chan,":[25],"Perrig,":[26],"Song,":[28],"unreliable":[30],"links":[32],"are":[33,100,110,140],"represented":[34],"independent":[36],"on/off":[37],"channels.":[38],"Modeling":[39],"network":[41],"an":[43,51],"intersection":[44],"a":[46,71,106],"K-out":[48],"graph":[49,80,154],"Erd\u00f6s-R\u00e9nyi":[52],"graph,":[53],"we":[54],"present":[55],"scaling":[56],"conditions":[57],"(on":[58],"number":[60,94],"nodes,":[62],"parameter":[65],"K,":[66],"probability":[69],"channel":[73],"being":[74],"on)":[75],"such":[76],"that":[77,153],"resulting":[79],"contains":[81],"no":[82],"node":[83],"with":[84,89,131],"degree":[85,132],"less":[86],"than":[87],"k":[88,162],"high":[90],"probability,":[91],"when":[92],"nodes":[96,126,130,165],"gets":[97],"large.":[98],"Results":[99],"given":[101],"in":[102],"form":[104],"zero-one":[107,138],"law":[108],"shown":[111,141],"improve":[113],"previous":[115],"results":[116],"Ya\u011fan":[118],"Makowski":[120],"on":[121],"absence":[123,128],"isolated":[125],"(i.e.,":[127],"zero).":[133],"Via":[134],"simulations,":[135],"established":[137],"laws":[139],"hold":[143],"also":[144],"for":[145],"property":[147,152],"k-connectivity;":[149],"i.e.,":[150],"remains":[155],"connected":[156],"despite":[157],"deletion":[159],"any":[161],"-":[163],"1":[164],"or":[166],"edges.":[167]},"counts_by_year":[{"year":2021,"cited_by_count":1},{"year":2019,"cited_by_count":2},{"year":2018,"cited_by_count":6},{"year":2017,"cited_by_count":3},{"year":2016,"cited_by_count":5},{"year":2015,"cited_by_count":10},{"year":2014,"cited_by_count":9}],"updated_date":"2026-04-05T17:49:38.594831","created_date":"2025-10-10T00:00:00"}
