{"id":"https://openalex.org/W1997854653","doi":"https://doi.org/10.1109/ispacs.2013.6704596","title":"Secure connectivity through key predistribution with directional antennas to cope with jamming in sensor networks","display_name":"Secure connectivity through key predistribution with directional antennas to cope with jamming in sensor networks","publication_year":2013,"publication_date":"2013-11-01","ids":{"openalex":"https://openalex.org/W1997854653","doi":"https://doi.org/10.1109/ispacs.2013.6704596","mag":"1997854653"},"language":"en","primary_location":{"id":"doi:10.1109/ispacs.2013.6704596","is_oa":false,"landing_page_url":"https://doi.org/10.1109/ispacs.2013.6704596","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2013 International Symposium on Intelligent Signal Processing and Communication Systems","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5047944285","display_name":"Korporn Panyim","orcid":"https://orcid.org/0009-0003-1921-616X"},"institutions":[{"id":"https://openalex.org/I25399158","display_name":"Mahidol University","ror":"https://ror.org/01znkr924","country_code":"TH","type":"education","lineage":["https://openalex.org/I25399158"]}],"countries":["TH"],"is_corresponding":true,"raw_author_name":"Korporn Panyim","raw_affiliation_strings":["Electrical Engineering Department, Mahidol University, Thailand","Electr. Eng. Dept., Mahidol Univ., Bangkok, Thailand"],"affiliations":[{"raw_affiliation_string":"Electrical Engineering Department, Mahidol University, Thailand","institution_ids":["https://openalex.org/I25399158"]},{"raw_affiliation_string":"Electr. Eng. Dept., Mahidol Univ., Bangkok, Thailand","institution_ids":["https://openalex.org/I25399158"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5113675239","display_name":"Prashant Krishnamurthy","orcid":null},"institutions":[{"id":"https://openalex.org/I170201317","display_name":"University of Pittsburgh","ror":"https://ror.org/01an3r305","country_code":"US","type":"education","lineage":["https://openalex.org/I170201317"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Prashant Krishnamurthy","raw_affiliation_strings":["School of Information Sciences, University of Pittsburgh, USA","Sch. of Inf. Sci., Univ. of Pittsburgh, Pittsburgh, PA, USA#TAB#"],"affiliations":[{"raw_affiliation_string":"School of Information Sciences, University of Pittsburgh, USA","institution_ids":["https://openalex.org/I170201317"]},{"raw_affiliation_string":"Sch. of Inf. Sci., Univ. of Pittsburgh, Pittsburgh, PA, USA#TAB#","institution_ids":["https://openalex.org/I170201317"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5020779526","display_name":"Anh L\u00ea","orcid":"https://orcid.org/0000-0003-1970-8781"},"institutions":[{"id":"https://openalex.org/I170201317","display_name":"University of Pittsburgh","ror":"https://ror.org/01an3r305","country_code":"US","type":"education","lineage":["https://openalex.org/I170201317"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Anh Le","raw_affiliation_strings":["School of Information Sciences, University of Pittsburgh, USA","Sch. of Inf. Sci., Univ. of Pittsburgh, Pittsburgh, PA, USA#TAB#"],"affiliations":[{"raw_affiliation_string":"School of Information Sciences, University of Pittsburgh, USA","institution_ids":["https://openalex.org/I170201317"]},{"raw_affiliation_string":"Sch. of Inf. Sci., Univ. of Pittsburgh, Pittsburgh, PA, USA#TAB#","institution_ids":["https://openalex.org/I170201317"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5047944285"],"corresponding_institution_ids":["https://openalex.org/I25399158"],"apc_list":null,"apc_paid":null,"fwci":0.377,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.65132829,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":94},"biblio":{"volume":null,"issue":null,"first_page":"471","last_page":"475"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":0.9437999725341797,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10080","display_name":"Energy Efficient Wireless Sensor Networks","score":0.9078999757766724,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/jamming","display_name":"Jamming","score":0.8395199179649353},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7546288371086121},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.6815584897994995},{"id":"https://openalex.org/keywords/wireless-sensor-network","display_name":"Wireless sensor network","score":0.5991569757461548},{"id":"https://openalex.org/keywords/beamforming","display_name":"Beamforming","score":0.5967251062393188},{"id":"https://openalex.org/keywords/node","display_name":"Node (physics)","score":0.5210744142532349},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.5089719295501709},{"id":"https://openalex.org/keywords/secure-transmission","display_name":"Secure transmission","score":0.5017118453979492},{"id":"https://openalex.org/keywords/secure-communication","display_name":"Secure communication","score":0.47751206159591675},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.47272175550460815},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.43981078267097473},{"id":"https://openalex.org/keywords/transmission","display_name":"Transmission (telecommunications)","score":0.4247600734233856},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.2216804027557373},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.20990538597106934},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.12835538387298584}],"concepts":[{"id":"https://openalex.org/C2779079576","wikidata":"https://www.wikidata.org/wiki/Q17092823","display_name":"Jamming","level":2,"score":0.8395199179649353},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7546288371086121},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.6815584897994995},{"id":"https://openalex.org/C24590314","wikidata":"https://www.wikidata.org/wiki/Q336038","display_name":"Wireless sensor network","level":2,"score":0.5991569757461548},{"id":"https://openalex.org/C54197355","wikidata":"https://www.wikidata.org/wiki/Q5782992","display_name":"Beamforming","level":2,"score":0.5967251062393188},{"id":"https://openalex.org/C62611344","wikidata":"https://www.wikidata.org/wiki/Q1062658","display_name":"Node (physics)","level":2,"score":0.5210744142532349},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.5089719295501709},{"id":"https://openalex.org/C2779814227","wikidata":"https://www.wikidata.org/wiki/Q7444882","display_name":"Secure transmission","level":3,"score":0.5017118453979492},{"id":"https://openalex.org/C510870077","wikidata":"https://www.wikidata.org/wiki/Q7444868","display_name":"Secure communication","level":3,"score":0.47751206159591675},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.47272175550460815},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.43981078267097473},{"id":"https://openalex.org/C761482","wikidata":"https://www.wikidata.org/wiki/Q118093","display_name":"Transmission (telecommunications)","level":2,"score":0.4247600734233856},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.2216804027557373},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.20990538597106934},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.12835538387298584},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C97355855","wikidata":"https://www.wikidata.org/wiki/Q11473","display_name":"Thermodynamics","level":1,"score":0.0},{"id":"https://openalex.org/C66938386","wikidata":"https://www.wikidata.org/wiki/Q633538","display_name":"Structural engineering","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/ispacs.2013.6704596","is_oa":false,"landing_page_url":"https://doi.org/10.1109/ispacs.2013.6704596","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2013 International Symposium on Intelligent Signal Processing and Communication Systems","raw_type":"proceedings-article"},{"id":"pmh:oai:d-scholarship.pitt.edu:22151","is_oa":false,"landing_page_url":"http://d-scholarship.pitt.edu/22151/1/licence.txt","pdf_url":null,"source":{"id":"https://openalex.org/S4306402375","display_name":"D-Scholarship@Pitt (University of Pittsburgh)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I170201317","host_organization_name":"University of Pittsburgh","host_organization_lineage":["https://openalex.org/I170201317"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"acceptedVersion","is_accepted":true,"is_published":false,"raw_source_name":"","raw_type":"Article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":14,"referenced_works":["https://openalex.org/W170281260","https://openalex.org/W1991113998","https://openalex.org/W2073380669","https://openalex.org/W2096264245","https://openalex.org/W2107713629","https://openalex.org/W2111892549","https://openalex.org/W2116269350","https://openalex.org/W2122285088","https://openalex.org/W2154788472","https://openalex.org/W2163516538","https://openalex.org/W2168010420","https://openalex.org/W2168017017","https://openalex.org/W3211513184","https://openalex.org/W6684541087"],"related_works":["https://openalex.org/W2996753265","https://openalex.org/W2594293391","https://openalex.org/W2792562999","https://openalex.org/W3005809458","https://openalex.org/W3159852908","https://openalex.org/W2566795117","https://openalex.org/W2504171572","https://openalex.org/W2040789709","https://openalex.org/W2909823901","https://openalex.org/W4212953983"],"abstract_inverted_index":{"One":[0],"of":[1,71,81],"the":[2,38,72,79,94,117,135],"first":[3],"steps":[4],"to":[5,12,28,47,52,57,99,110,128,159],"provide":[6],"security":[7],"for":[8,19],"sensor":[9,17,39],"networks":[10],"is":[11],"pre-distribute":[13],"cryptographic":[14],"keys":[15,27],"among":[16],"nodes":[18,111,130,154],"bootstrapping":[20],"security.":[21],"Each":[22],"node":[23,122],"can":[24,43,105],"use":[25],"stored":[26],"establish":[29],"secure":[30,69,85,145],"links":[31,109,127],"with":[32,101,156,161],"surrounding":[33],"neighbors":[34],"once":[35],"deployed":[36],"in":[37,55,68,144],"field.":[40],"Jamming":[41],"attacks":[42,83],"force":[44],"a":[45,121],"network":[46,95],"perform":[48],"different":[49,89,149],"coping":[50],"techniques":[51,64],"avoid":[53],"jamming":[54,82,162],"order":[56],"continue":[58],"data":[59],"transmission":[60],"tasks.":[61],"Performing":[62],"such":[63],"may":[65,123],"cause":[66],"change":[67],"connectivity":[70,86,146],"network.":[73],"In":[74],"this":[75],"paper,":[76],"we":[77],"study":[78],"impact":[80],"on":[84],"(provided":[87,147],"by":[88,148],"key":[90,150],"predistribution":[91,151],"schemes)":[92,152],"when":[93,153],"uses":[96],"directional":[97,157],"antennas":[98,158],"cope":[100,160],"jamming.":[102],"Directional":[103],"transmissions":[104],"perhaps":[106],"create":[107],"more":[108],"that":[112,131],"are":[113,132],"further":[114],"away":[115],"(within":[116],"beamforming":[118],"direction).":[119],"However,":[120],"also":[124],"lose":[125],"some":[126],"nearby":[129],"not":[133],"within":[134],"main":[136],"beam":[137],"or":[138],"strong":[139],"side":[140],"beam.We":[141],"investigate":[142],"changes":[143],"transmit":[155],"attacks.":[163]},"counts_by_year":[{"year":2019,"cited_by_count":1},{"year":2016,"cited_by_count":1}],"updated_date":"2026-04-17T18:11:37.981687","created_date":"2025-10-10T00:00:00"}
