{"id":"https://openalex.org/W2130348937","doi":"https://doi.org/10.1109/mahss.2008.4660126","title":"A framework for confronting key-swapping collusion attack on random pairwise key pre-distribution schemes for distributed sensor networks","display_name":"A framework for confronting key-swapping collusion attack on random pairwise key pre-distribution schemes for distributed sensor networks","publication_year":2008,"publication_date":"2008-09-01","ids":{"openalex":"https://openalex.org/W2130348937","doi":"https://doi.org/10.1109/mahss.2008.4660126","mag":"2130348937"},"language":"en","primary_location":{"id":"doi:10.1109/mahss.2008.4660126","is_oa":false,"landing_page_url":"https://doi.org/10.1109/mahss.2008.4660126","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2008 5th IEEE International Conference on Mobile Ad Hoc and Sensor Systems","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5111930211","display_name":"Tr\u1ea7n Thanh \u0110\u1ea1i","orcid":null},"institutions":[{"id":"https://openalex.org/I114017466","display_name":"University of Technology Sydney","ror":"https://ror.org/03f0f6041","country_code":"AU","type":"education","lineage":["https://openalex.org/I114017466"]}],"countries":["AU"],"is_corresponding":true,"raw_author_name":"Tran Thanh Dai","raw_affiliation_strings":["University of Technology, Sydney, Australia","University of Technology, Sydney, NSW"],"affiliations":[{"raw_affiliation_string":"University of Technology, Sydney, Australia","institution_ids":["https://openalex.org/I114017466"]},{"raw_affiliation_string":"University of Technology, Sydney, NSW","institution_ids":["https://openalex.org/I114017466"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5003350311","display_name":"Johnson I. Agbinya","orcid":"https://orcid.org/0009-0008-4569-7856"},"institutions":[{"id":"https://openalex.org/I114017466","display_name":"University of Technology Sydney","ror":"https://ror.org/03f0f6041","country_code":"AU","type":"education","lineage":["https://openalex.org/I114017466"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Johnson I. Agbinya","raw_affiliation_strings":["University of Technology, Sydney, Australia","University of Technology, Sydney, NSW"],"affiliations":[{"raw_affiliation_string":"University of Technology, Sydney, Australia","institution_ids":["https://openalex.org/I114017466"]},{"raw_affiliation_string":"University of Technology, Sydney, NSW","institution_ids":["https://openalex.org/I114017466"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5111930211"],"corresponding_institution_ids":["https://openalex.org/I114017466"],"apc_list":null,"apc_paid":null,"fwci":1.0998,"has_fulltext":false,"cited_by_count":3,"citation_normalized_percentile":{"value":0.8147039,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"3531","issue":null,"first_page":"815","last_page":"820"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10080","display_name":"Energy Efficient Wireless Sensor Networks","score":0.9781000018119812,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9056000113487244,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7895820140838623},{"id":"https://openalex.org/keywords/collusion","display_name":"Collusion","score":0.768394947052002},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.7372300028800964},{"id":"https://openalex.org/keywords/scalability","display_name":"Scalability","score":0.6769150495529175},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.6074894666671753},{"id":"https://openalex.org/keywords/pairwise-comparison","display_name":"Pairwise comparison","score":0.563766598701477},{"id":"https://openalex.org/keywords/wireless-sensor-network","display_name":"Wireless sensor network","score":0.5255212783813477},{"id":"https://openalex.org/keywords/node","display_name":"Node (physics)","score":0.525258481502533},{"id":"https://openalex.org/keywords/resilience","display_name":"Resilience (materials science)","score":0.5198531746864319},{"id":"https://openalex.org/keywords/software-deployment","display_name":"Software deployment","score":0.5188289880752563},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.511982262134552},{"id":"https://openalex.org/keywords/hash-function","display_name":"Hash function","score":0.46465104818344116},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3707125186920166},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.11138990521430969}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7895820140838623},{"id":"https://openalex.org/C2781198186","wikidata":"https://www.wikidata.org/wiki/Q701521","display_name":"Collusion","level":2,"score":0.768394947052002},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.7372300028800964},{"id":"https://openalex.org/C48044578","wikidata":"https://www.wikidata.org/wiki/Q727490","display_name":"Scalability","level":2,"score":0.6769150495529175},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.6074894666671753},{"id":"https://openalex.org/C184898388","wikidata":"https://www.wikidata.org/wiki/Q1435712","display_name":"Pairwise comparison","level":2,"score":0.563766598701477},{"id":"https://openalex.org/C24590314","wikidata":"https://www.wikidata.org/wiki/Q336038","display_name":"Wireless sensor network","level":2,"score":0.5255212783813477},{"id":"https://openalex.org/C62611344","wikidata":"https://www.wikidata.org/wiki/Q1062658","display_name":"Node (physics)","level":2,"score":0.525258481502533},{"id":"https://openalex.org/C2779585090","wikidata":"https://www.wikidata.org/wiki/Q3457762","display_name":"Resilience (materials science)","level":2,"score":0.5198531746864319},{"id":"https://openalex.org/C105339364","wikidata":"https://www.wikidata.org/wiki/Q2297740","display_name":"Software deployment","level":2,"score":0.5188289880752563},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.511982262134552},{"id":"https://openalex.org/C99138194","wikidata":"https://www.wikidata.org/wiki/Q183427","display_name":"Hash function","level":2,"score":0.46465104818344116},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3707125186920166},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.11138990521430969},{"id":"https://openalex.org/C175444787","wikidata":"https://www.wikidata.org/wiki/Q39072","display_name":"Microeconomics","level":1,"score":0.0},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.0},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.0},{"id":"https://openalex.org/C162324750","wikidata":"https://www.wikidata.org/wiki/Q8134","display_name":"Economics","level":0,"score":0.0},{"id":"https://openalex.org/C66938386","wikidata":"https://www.wikidata.org/wiki/Q633538","display_name":"Structural engineering","level":1,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C97355855","wikidata":"https://www.wikidata.org/wiki/Q11473","display_name":"Thermodynamics","level":1,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/mahss.2008.4660126","is_oa":false,"landing_page_url":"https://doi.org/10.1109/mahss.2008.4660126","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2008 5th IEEE International Conference on Mobile Ad Hoc and Sensor Systems","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":19,"referenced_works":["https://openalex.org/W1564608677","https://openalex.org/W1584201750","https://openalex.org/W1607519173","https://openalex.org/W1896250574","https://openalex.org/W1940397557","https://openalex.org/W1973225261","https://openalex.org/W2002054891","https://openalex.org/W2023337265","https://openalex.org/W2116269350","https://openalex.org/W2117781301","https://openalex.org/W2117984332","https://openalex.org/W2122053504","https://openalex.org/W2137075078","https://openalex.org/W2143536181","https://openalex.org/W2153343530","https://openalex.org/W2154532558","https://openalex.org/W3211513184","https://openalex.org/W6677374569","https://openalex.org/W6681151506"],"related_works":["https://openalex.org/W2009938035","https://openalex.org/W3143020802","https://openalex.org/W1491837399","https://openalex.org/W3122232980","https://openalex.org/W2272761499","https://openalex.org/W2363272970","https://openalex.org/W2120306875","https://openalex.org/W1699588379","https://openalex.org/W3143060468","https://openalex.org/W2272689892"],"abstract_inverted_index":{"Random":[0],"pairwise":[1,14],"key":[2,15],"pre-distribution":[3],"schemes":[4],"have":[5],"been":[6],"adopted":[7],"extensively":[8],"as":[9],"a":[10,49,59,126],"preferred":[11],"approach":[12],"to":[13,36,117,139],"agreement":[16],"problem":[17],"in":[18,97,129,144],"distributed":[19],"sensor":[20,147],"networks.":[21],"However,":[22],"their":[23],"practical":[24],"applicability":[25],"is":[26,35,58],"threatened":[27],"by":[28],"the":[29,54,93,98,101,107,130,134,145],"key-swapping":[30],"collusion":[31],"attack":[32,108],"whose":[33],"goal":[34],"ruin":[37],"critical":[38],"applications":[39],"that":[40],"require":[41],"collaborative":[42],"efforts.":[43],"In":[44],"this":[45],"paper,":[46],"we":[47],"propose":[48],"light-weight":[50],"framework":[51,57,71,102],"for":[52,142],"thwarting":[53],"attack.":[55],"Our":[56],"winning":[60],"combination":[61],"of":[62,76,113],"intermittent":[63],"deployment":[64],"strategy":[65],"and":[66,78],"one-way":[67],"hash":[68],"chain.":[69],"The":[70],"thereby":[72],"evades":[73],"undesirable":[74],"requirements":[75],"functionalities":[77],"resources,":[79],"topological":[80],"pre-deployment":[81],"knowledge,":[82],"or":[83],"costly":[84],"location-based":[85],"detection":[86],"algorithms,":[87],"yet":[88],"maintaining":[89],"network":[90,123],"scalability.":[91],"Moreover,":[92],"in-depth":[94],"analysis":[95],"shows":[96],"optimistic":[99],"situation":[100],"not":[103],"only":[104],"completely":[105],"defeats":[106],"but":[109],"also":[110],"diminishes":[111],"usability":[112],"non-collusion":[114],"compromised":[115],"nodes":[116],"attackers.":[118],"Meanwhile,":[119],"it":[120],"still":[121],"maintains":[122],"resilience":[124],"at":[125],"remarkable":[127],"level":[128],"worst":[131],"situation.":[132],"Finally,":[133],"performance":[135],"overheads":[136],"are":[137],"analysed":[138],"be":[140],"acceptable":[141],"use":[143],"current":[146],"node":[148],"generation.":[149]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
