{"id":"https://openalex.org/W2136086412","doi":"https://doi.org/10.1109/icppw.2003.1240395","title":"LKHW: a directed diffusion-based secure multicast scheme for wireless sensor networks","display_name":"LKHW: a directed diffusion-based secure multicast scheme for wireless sensor networks","publication_year":2003,"publication_date":"2003-01-01","ids":{"openalex":"https://openalex.org/W2136086412","doi":"https://doi.org/10.1109/icppw.2003.1240395","mag":"2136086412"},"language":"en","primary_location":{"id":"doi:10.1109/icppw.2003.1240395","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icppw.2003.1240395","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2003 International Conference on Parallel Processing Workshops, 2003. Proceedings.","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://research.tue.nl/en/publications/2f9f0b47-fa9a-469a-86bd-8616536a0c1c","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5065932621","display_name":"Roberto Di Pietro","orcid":"https://orcid.org/0000-0003-1909-0336"},"institutions":[{"id":"https://openalex.org/I861853513","display_name":"Sapienza University of Rome","ror":"https://ror.org/02be6w209","country_code":"IT","type":"education","lineage":["https://openalex.org/I861853513"]},{"id":"https://openalex.org/I119003972","display_name":"Roma Tre University","ror":"https://ror.org/05vf0dg29","country_code":"IT","type":"education","lineage":["https://openalex.org/I119003972"]}],"countries":["IT"],"is_corresponding":true,"raw_author_name":"R. Di Pietro","raw_affiliation_strings":["Dipto. di Informatica, Universita di Roma, Rome, Italy","Dip.to di Informatica, Universit\u00e0 di Roma \"La Sapienza\", Roma, Italy"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Dipto. di Informatica, Universita di Roma, Rome, Italy","institution_ids":["https://openalex.org/I119003972"]},{"raw_affiliation_string":"Dip.to di Informatica, Universit\u00e0 di Roma \"La Sapienza\", Roma, Italy","institution_ids":["https://openalex.org/I861853513"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5046905749","display_name":"Luigi V. Mancini","orcid":"https://orcid.org/0000-0003-4859-2191"},"institutions":[{"id":"https://openalex.org/I861853513","display_name":"Sapienza University of Rome","ror":"https://ror.org/02be6w209","country_code":"IT","type":"education","lineage":["https://openalex.org/I861853513"]},{"id":"https://openalex.org/I119003972","display_name":"Roma Tre University","ror":"https://ror.org/05vf0dg29","country_code":"IT","type":"education","lineage":["https://openalex.org/I119003972"]}],"countries":["IT"],"is_corresponding":false,"raw_author_name":"L.V. Mancini","raw_affiliation_strings":["Dipto. di Informatica, Universita di Roma, Rome, Italy","Dip.to di Informatica, Universit\u00e0 di Roma \"La Sapienza\", Roma, Italy"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Dipto. di Informatica, Universita di Roma, Rome, Italy","institution_ids":["https://openalex.org/I119003972"]},{"raw_affiliation_string":"Dip.to di Informatica, Universit\u00e0 di Roma \"La Sapienza\", Roma, Italy","institution_ids":["https://openalex.org/I861853513"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5020675850","display_name":"Yee Wei Law","orcid":"https://orcid.org/0000-0002-5665-0980"},"institutions":[{"id":"https://openalex.org/I94624287","display_name":"University of Twente","ror":"https://ror.org/006hf6230","country_code":"NL","type":"education","lineage":["https://openalex.org/I94624287"]}],"countries":["NL"],"is_corresponding":false,"raw_author_name":"Yee Wei Law","raw_affiliation_strings":["Faculty of EEMCS, University of Twente, Enschede, The Netherlands"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Faculty of EEMCS, University of Twente, Enschede, The Netherlands","institution_ids":["https://openalex.org/I94624287"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5052389888","display_name":"Sandro Etalle","orcid":null},"institutions":[{"id":"https://openalex.org/I94624287","display_name":"University of Twente","ror":"https://ror.org/006hf6230","country_code":"NL","type":"education","lineage":["https://openalex.org/I94624287"]}],"countries":["NL"],"is_corresponding":false,"raw_author_name":"S. Etalle","raw_affiliation_strings":["Faculty of EEMCS, University of Twente, Enschede, The Netherlands"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Faculty of EEMCS, University of Twente, Enschede, The Netherlands","institution_ids":["https://openalex.org/I94624287"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5022294206","display_name":"Pjm Havinga","orcid":null},"institutions":[{"id":"https://openalex.org/I94624287","display_name":"University of Twente","ror":"https://ror.org/006hf6230","country_code":"NL","type":"education","lineage":["https://openalex.org/I94624287"]}],"countries":["NL"],"is_corresponding":false,"raw_author_name":"P. Havinga","raw_affiliation_strings":["Faculty of EEMCS, University of Twente, Enschede, The Netherlands"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Faculty of EEMCS, University of Twente, Enschede, The Netherlands","institution_ids":["https://openalex.org/I94624287"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5065932621"],"corresponding_institution_ids":["https://openalex.org/I119003972","https://openalex.org/I861853513"],"apc_list":null,"apc_paid":null,"fwci":2.9803,"has_fulltext":true,"cited_by_count":148,"citation_normalized_percentile":{"value":0.92723701,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":90,"max":100},"biblio":{"volume":null,"issue":null,"first_page":"397","last_page":"406"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.9894000291824341,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10246","display_name":"Mobile Ad Hoc Networks","score":0.9879000186920166,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8040330410003662},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.7509232759475708},{"id":"https://openalex.org/keywords/secure-multicast","display_name":"Secure multicast","score":0.7152975797653198},{"id":"https://openalex.org/keywords/multicast","display_name":"Multicast","score":0.6760846376419067},{"id":"https://openalex.org/keywords/wireless-sensor-network","display_name":"Wireless sensor network","score":0.6136336326599121},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.5189840197563171},{"id":"https://openalex.org/keywords/forward-secrecy","display_name":"Forward secrecy","score":0.49183201789855957},{"id":"https://openalex.org/keywords/secrecy","display_name":"Secrecy","score":0.4852461814880371},{"id":"https://openalex.org/keywords/robustness","display_name":"Robustness (evolution)","score":0.4646897315979004},{"id":"https://openalex.org/keywords/routing-protocol","display_name":"Routing protocol","score":0.44877564907073975},{"id":"https://openalex.org/keywords/source-specific-multicast","display_name":"Source-specific multicast","score":0.2777782082557678},{"id":"https://openalex.org/keywords/routing","display_name":"Routing (electronic design automation)","score":0.24175956845283508},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.22724568843841553},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.2152584195137024},{"id":"https://openalex.org/keywords/reliable-multicast","display_name":"Reliable multicast","score":0.16474226117134094},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.11107730865478516}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8040330410003662},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.7509232759475708},{"id":"https://openalex.org/C2776147584","wikidata":"https://www.wikidata.org/wiki/Q2711392","display_name":"Secure multicast","level":5,"score":0.7152975797653198},{"id":"https://openalex.org/C32295351","wikidata":"https://www.wikidata.org/wiki/Q899288","display_name":"Multicast","level":2,"score":0.6760846376419067},{"id":"https://openalex.org/C24590314","wikidata":"https://www.wikidata.org/wiki/Q336038","display_name":"Wireless sensor network","level":2,"score":0.6136336326599121},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.5189840197563171},{"id":"https://openalex.org/C205009425","wikidata":"https://www.wikidata.org/wiki/Q935662","display_name":"Forward secrecy","level":4,"score":0.49183201789855957},{"id":"https://openalex.org/C2776452267","wikidata":"https://www.wikidata.org/wiki/Q1503443","display_name":"Secrecy","level":2,"score":0.4852461814880371},{"id":"https://openalex.org/C63479239","wikidata":"https://www.wikidata.org/wiki/Q7353546","display_name":"Robustness (evolution)","level":3,"score":0.4646897315979004},{"id":"https://openalex.org/C104954878","wikidata":"https://www.wikidata.org/wiki/Q1648707","display_name":"Routing protocol","level":3,"score":0.44877564907073975},{"id":"https://openalex.org/C18787934","wikidata":"https://www.wikidata.org/wiki/Q7565105","display_name":"Source-specific multicast","level":3,"score":0.2777782082557678},{"id":"https://openalex.org/C74172769","wikidata":"https://www.wikidata.org/wiki/Q1446839","display_name":"Routing (electronic design automation)","level":2,"score":0.24175956845283508},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.22724568843841553},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.2152584195137024},{"id":"https://openalex.org/C174174714","wikidata":"https://www.wikidata.org/wiki/Q7310997","display_name":"Reliable multicast","level":4,"score":0.16474226117134094},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.11107730865478516},{"id":"https://openalex.org/C185592680","wikidata":"https://www.wikidata.org/wiki/Q2329","display_name":"Chemistry","level":0,"score":0.0},{"id":"https://openalex.org/C55493867","wikidata":"https://www.wikidata.org/wiki/Q7094","display_name":"Biochemistry","level":1,"score":0.0},{"id":"https://openalex.org/C104317684","wikidata":"https://www.wikidata.org/wiki/Q7187","display_name":"Gene","level":2,"score":0.0}],"mesh":[],"locations_count":11,"locations":[{"id":"doi:10.1109/icppw.2003.1240395","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icppw.2003.1240395","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2003 International Conference on Parallel Processing Workshops, 2003. Proceedings.","raw_type":"proceedings-article"},{"id":"pmh:oai:pure.tue.nl:openaire/2f9f0b47-fa9a-469a-86bd-8616536a0c1c","is_oa":true,"landing_page_url":"https://research.tue.nl/en/publications/2f9f0b47-fa9a-469a-86bd-8616536a0c1c","pdf_url":null,"source":{"id":"https://openalex.org/S4406922641","display_name":"TU/e Research Portal","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Di Pietro, R, Mancini, L V, Law, Y W, Etalle, S & Havinga, P J M 2003, LKHW : a directed diffusion-based secure multicast scheme for wireless sensor networks. in 32nd International Conference on Parallel Processing Workshops (Proceedings ICPP 2003 Workshops, Kaohsiung, Taiwan, October 6-9, 2003). IEEE Computer Society, pp. 397-406. https://doi.org/10.1109/ICPPW.2003.1240395","raw_type":"info:eu-repo/semantics/publishedVersion"},{"id":"pmh:oai:ris.utwente.nl:publications/f1f3c9b6-922f-4ecf-9239-acae1bc5eaec","is_oa":true,"landing_page_url":"https://research.utwente.nl/en/publications/f1f3c9b6-922f-4ecf-9239-acae1bc5eaec","pdf_url":"https://ris.utwente.nl/ws/files/5406730/000000cc.pdf","source":{"id":"https://openalex.org/S4406922991","display_name":"University of Twente Research Information","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Di Pietro, R, Mancini, L V, Law, Y W, Etalle, S & Havinga, P J M 2003, LKHW: A Directed Diffusion-Based Secure Multicast Scheme for Wireless Sensor Networks. in C H Huang & J Ramanujam (eds), 32nd Int. Conf. on Parallel Processing Workshops (ICPP). IEEE, Los Alamitos, California, pp. 397-406, 32nd International Conference on Parallel Processing Workshops, ICPPW 2003, Kaohsiung, Taiwan, 6/10/03. https://doi.org/10.1109/ICPPW.2003.1240395","raw_type":"info:eu-repo/semantics/publishedVersion"},{"id":"pmh:668308","is_oa":false,"landing_page_url":"http://library.tue.nl/csp/dare/LinkToRepository.csp?recordnumber=668308","pdf_url":null,"source":{"id":"https://openalex.org/S4406923046","display_name":"TU/e Research Portal (Eindhoven University of Technology)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":""},{"id":"pmh:807534","is_oa":false,"landing_page_url":"http://library.tue.nl/csp/dare/LinkToRepository.csp?recordnumber=807534","pdf_url":null,"source":{"id":"https://openalex.org/S4406923046","display_name":"TU/e Research Portal (Eindhoven University of Technology)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"External research report"},{"id":"pmh:895760","is_oa":false,"landing_page_url":"http://library.tue.nl/csp/dare/LinkToRepository.csp?recordnumber=895760","pdf_url":null,"source":{"id":"https://openalex.org/S4406923046","display_name":"TU/e Research Portal (Eindhoven University of Technology)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"External research report"},{"id":"pmh:oai:CiteSeerX.psu:10.1.1.58.3114","is_oa":false,"landing_page_url":"http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.58.3114","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"http://wwwhome.cs.utwente.nl/~ywlaw/pub/dipietro03lkhw.pdf","raw_type":"text"},{"id":"pmh:oai:library.tue.nl:668308","is_oa":false,"landing_page_url":"http://repository.tue.nl/668308","pdf_url":null,"source":{"id":"https://openalex.org/S4406923046","display_name":"TU/e Research Portal (Eindhoven University of Technology)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":""},{"id":"pmh:oai:library.tue.nl:807534","is_oa":false,"landing_page_url":"http://repository.tue.nl/807534","pdf_url":null,"source":{"id":"https://openalex.org/S4406923046","display_name":"TU/e Research Portal (Eindhoven University of Technology)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"External research report"},{"id":"pmh:oai:library.tue.nl:895760","is_oa":false,"landing_page_url":"http://repository.tue.nl/895760","pdf_url":null,"source":{"id":"https://openalex.org/S4406923046","display_name":"TU/e Research Portal (Eindhoven University of Technology)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"External research report"},{"id":"pmh:oai:ris.utwente.nl:openaire_cris_publications/36dc3839-2897-4404-8f5c-647e60d7af71","is_oa":false,"landing_page_url":"https://research.utwente.nl/en/publications/36dc3839-2897-4404-8f5c-647e60d7af71","pdf_url":null,"source":{"id":"https://openalex.org/S4406922991","display_name":"University of Twente Research Information","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Di Pietro, R, Mancini, L V, Law, Y W, Etalle, S & Havinga, P J M 2003, LKHW: A Directed Diffusion-Based Secure Multicast Scheme for Wireless Sensor Networks. CTIT technical report series, no. TR-CTIT-03-29, Centre for Telematics and Information Technology (CTIT), Enschede. < http://eprints.eemcs.utwente.nl/secure2/5821/01/000000cc.pdf >","raw_type":"info:eu-repo/semantics/report"}],"best_oa_location":{"id":"pmh:oai:pure.tue.nl:openaire/2f9f0b47-fa9a-469a-86bd-8616536a0c1c","is_oa":true,"landing_page_url":"https://research.tue.nl/en/publications/2f9f0b47-fa9a-469a-86bd-8616536a0c1c","pdf_url":null,"source":{"id":"https://openalex.org/S4406922641","display_name":"TU/e Research Portal","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Di Pietro, R, Mancini, L V, Law, Y W, Etalle, S & Havinga, P J M 2003, LKHW : a directed diffusion-based secure multicast scheme for wireless sensor networks. in 32nd International Conference on Parallel Processing Workshops (Proceedings ICPP 2003 Workshops, Kaohsiung, Taiwan, October 6-9, 2003). IEEE Computer Society, pp. 397-406. https://doi.org/10.1109/ICPPW.2003.1240395","raw_type":"info:eu-repo/semantics/publishedVersion"},"sustainable_development_goals":[{"display_name":"Affordable and clean energy","score":0.8899999856948853,"id":"https://metadata.un.org/sdg/7"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":42,"referenced_works":["https://openalex.org/W25261110","https://openalex.org/W48121275","https://openalex.org/W1518306097","https://openalex.org/W1520914943","https://openalex.org/W1549202317","https://openalex.org/W1758159151","https://openalex.org/W1994704618","https://openalex.org/W1998350371","https://openalex.org/W2012168171","https://openalex.org/W2019267322","https://openalex.org/W2029693536","https://openalex.org/W2033751220","https://openalex.org/W2037515303","https://openalex.org/W2056651946","https://openalex.org/W2064967060","https://openalex.org/W2096372789","https://openalex.org/W2099574482","https://openalex.org/W2104532741","https://openalex.org/W2104748480","https://openalex.org/W2105338061","https://openalex.org/W2105514582","https://openalex.org/W2107905431","https://openalex.org/W2111799375","https://openalex.org/W2116269350","https://openalex.org/W2117984332","https://openalex.org/W2118048534","https://openalex.org/W2118357205","https://openalex.org/W2123918207","https://openalex.org/W2128381560","https://openalex.org/W2129876196","https://openalex.org/W2131524733","https://openalex.org/W2140372921","https://openalex.org/W2148251644","https://openalex.org/W2156186849","https://openalex.org/W2157457404","https://openalex.org/W2165482045","https://openalex.org/W2171574715","https://openalex.org/W2394489512","https://openalex.org/W2556128196","https://openalex.org/W4243443630","https://openalex.org/W6632993368","https://openalex.org/W6679458432"],"related_works":["https://openalex.org/W2392241939","https://openalex.org/W2379693083","https://openalex.org/W4285207525","https://openalex.org/W1600454606","https://openalex.org/W2382754013","https://openalex.org/W1970365264","https://openalex.org/W2370065598","https://openalex.org/W2390304198","https://openalex.org/W1977745377","https://openalex.org/W2373348596"],"abstract_inverted_index":{"In":[0,61],"this":[1],"paper,":[2],"we":[3,17,27,94],"present":[4],"a":[5],"mechanism":[6],"for":[7],"securing":[8],"group":[9,81],"communications":[10],"in":[11,48,105],"Wireless":[12],"Sensor":[13],"Networks":[14],"(WSN).":[15],"First,":[16],"derive":[18],"an":[19,72,106],"extension":[20,30],"of":[21,41,58],"logical":[22],"key":[23],"hierarchy":[24],"(LKH).":[25],"Then":[26],"merge":[28],"the":[29,39,53,80,85],"with":[31,79],"directed":[32,45,91,97],"diffusion.":[33],"The":[34],"resulting":[35],"protocol,":[36],"LKHW,":[37],"combines":[38],"advantages":[40],"both":[42,65],"LKH":[43],"and":[44,50,55,67,93],"diffusion:":[46],"robustness":[47],"routing,":[49],"security":[51,87,104],"from":[52],"tried":[54],"tested":[56],"concepts":[57],"secure":[59],"multicast.":[60],"particular,":[62],"LKHW":[63],"enforces":[64],"backward":[66],"forward":[68],"secrecy,":[69],"while":[70],"incurring":[71],"energy":[73],"cost":[74],"that":[75,89],"scales":[76],"roughly":[77],"logarithmically":[78],"size.":[82],"This":[83],"is":[84],"first":[86],"protocol":[88],"leverages":[90],"diffusion,":[92],"show":[95],"how":[96],"diffusion":[98],"can":[99],"be":[100],"extended":[101],"to":[102],"incorporate":[103],"efficient":[107],"manner.":[108]},"counts_by_year":[{"year":2025,"cited_by_count":2},{"year":2023,"cited_by_count":1},{"year":2021,"cited_by_count":4},{"year":2019,"cited_by_count":6},{"year":2018,"cited_by_count":3},{"year":2017,"cited_by_count":8},{"year":2016,"cited_by_count":5},{"year":2015,"cited_by_count":8},{"year":2014,"cited_by_count":12},{"year":2013,"cited_by_count":17},{"year":2012,"cited_by_count":11}],"updated_date":"2026-05-01T08:36:08.643496","created_date":"2025-10-10T00:00:00"}
