{"id":"https://openalex.org/W2097840215","doi":"https://doi.org/10.1145/1288107.1288120","title":"A random perturbation-based scheme for pairwise key establishment in sensor networks","display_name":"A random perturbation-based scheme for pairwise key establishment in sensor networks","publication_year":2007,"publication_date":"2007-09-09","ids":{"openalex":"https://openalex.org/W2097840215","doi":"https://doi.org/10.1145/1288107.1288120","mag":"2097840215"},"language":"en","primary_location":{"id":"doi:10.1145/1288107.1288120","is_oa":false,"landing_page_url":"https://doi.org/10.1145/1288107.1288120","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 8th ACM international symposium on Mobile ad hoc networking and computing","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100729019","display_name":"Wensheng Zhang","orcid":"https://orcid.org/0000-0001-8742-8736"},"institutions":[{"id":"https://openalex.org/I173911158","display_name":"Iowa State University","ror":"https://ror.org/04rswrd78","country_code":"US","type":"education","lineage":["https://openalex.org/I173911158"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Wensheng Zhang","raw_affiliation_strings":["Iowa State University, Ames, IA"],"affiliations":[{"raw_affiliation_string":"Iowa State University, Ames, IA","institution_ids":["https://openalex.org/I173911158"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5111571514","display_name":"Minh Tran","orcid":null},"institutions":[{"id":"https://openalex.org/I173911158","display_name":"Iowa State University","ror":"https://ror.org/04rswrd78","country_code":"US","type":"education","lineage":["https://openalex.org/I173911158"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Minh Tran","raw_affiliation_strings":["Iowa State University, Ames, IA"],"affiliations":[{"raw_affiliation_string":"Iowa State University, Ames, IA","institution_ids":["https://openalex.org/I173911158"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101952501","display_name":"Sencun Zhu","orcid":"https://orcid.org/0000-0002-1047-7967"},"institutions":[{"id":"https://openalex.org/I130769515","display_name":"Pennsylvania State University","ror":"https://ror.org/04p491231","country_code":"US","type":"education","lineage":["https://openalex.org/I130769515"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Sencun Zhu","raw_affiliation_strings":["The Pennsylvania State University, University Park, PA","THE PENNSYLVANIA STATE UNIVERSITY, UNIVERSITY PARK, PA"],"affiliations":[{"raw_affiliation_string":"The Pennsylvania State University, University Park, PA","institution_ids":["https://openalex.org/I130769515"]},{"raw_affiliation_string":"THE PENNSYLVANIA STATE UNIVERSITY, UNIVERSITY PARK, PA","institution_ids":["https://openalex.org/I130769515"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5102287047","display_name":"Guohong Cao","orcid":null},"institutions":[{"id":"https://openalex.org/I130769515","display_name":"Pennsylvania State University","ror":"https://ror.org/04p491231","country_code":"US","type":"education","lineage":["https://openalex.org/I130769515"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Guohong Cao","raw_affiliation_strings":["The Pennsylvania State University, University Park, PA","THE PENNSYLVANIA STATE UNIVERSITY, UNIVERSITY PARK, PA"],"affiliations":[{"raw_affiliation_string":"The Pennsylvania State University, University Park, PA","institution_ids":["https://openalex.org/I130769515"]},{"raw_affiliation_string":"THE PENNSYLVANIA STATE UNIVERSITY, UNIVERSITY PARK, PA","institution_ids":["https://openalex.org/I130769515"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5100729019"],"corresponding_institution_ids":["https://openalex.org/I173911158"],"apc_list":null,"apc_paid":null,"fwci":12.7982,"has_fulltext":false,"cited_by_count":100,"citation_normalized_percentile":{"value":0.98843573,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":91,"max":100},"biblio":{"volume":null,"issue":null,"first_page":"90","last_page":"99"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10080","display_name":"Energy Efficient Wireless Sensor Networks","score":0.9803000092506409,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9754999876022339,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6970888376235962},{"id":"https://openalex.org/keywords/pairwise-comparison","display_name":"Pairwise comparison","score":0.6691340804100037},{"id":"https://openalex.org/keywords/wireless-sensor-network","display_name":"Wireless sensor network","score":0.6348971128463745},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.5563515424728394},{"id":"https://openalex.org/keywords/overhead","display_name":"Overhead (engineering)","score":0.5338650345802307},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.5335173010826111},{"id":"https://openalex.org/keywords/node","display_name":"Node (physics)","score":0.5208307504653931},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.4802682399749756},{"id":"https://openalex.org/keywords/key-space","display_name":"Key space","score":0.47091054916381836},{"id":"https://openalex.org/keywords/key-generation","display_name":"Key generation","score":0.46038058400154114},{"id":"https://openalex.org/keywords/resilience","display_name":"Resilience (materials science)","score":0.451058954000473},{"id":"https://openalex.org/keywords/network-topology","display_name":"Network topology","score":0.4413672983646393},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.42140719294548035},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.41247978806495667},{"id":"https://openalex.org/keywords/topology","display_name":"Topology (electrical circuits)","score":0.396106481552124},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.24377602338790894},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.21256276965141296},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.19382691383361816},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.11375635862350464},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.06940650939941406}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6970888376235962},{"id":"https://openalex.org/C184898388","wikidata":"https://www.wikidata.org/wiki/Q1435712","display_name":"Pairwise comparison","level":2,"score":0.6691340804100037},{"id":"https://openalex.org/C24590314","wikidata":"https://www.wikidata.org/wiki/Q336038","display_name":"Wireless sensor network","level":2,"score":0.6348971128463745},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.5563515424728394},{"id":"https://openalex.org/C2779960059","wikidata":"https://www.wikidata.org/wiki/Q7113681","display_name":"Overhead (engineering)","level":2,"score":0.5338650345802307},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.5335173010826111},{"id":"https://openalex.org/C62611344","wikidata":"https://www.wikidata.org/wiki/Q1062658","display_name":"Node (physics)","level":2,"score":0.5208307504653931},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.4802682399749756},{"id":"https://openalex.org/C105322999","wikidata":"https://www.wikidata.org/wiki/Q1557574","display_name":"Key space","level":3,"score":0.47091054916381836},{"id":"https://openalex.org/C163173736","wikidata":"https://www.wikidata.org/wiki/Q3308558","display_name":"Key generation","level":3,"score":0.46038058400154114},{"id":"https://openalex.org/C2779585090","wikidata":"https://www.wikidata.org/wiki/Q3457762","display_name":"Resilience (materials science)","level":2,"score":0.451058954000473},{"id":"https://openalex.org/C199845137","wikidata":"https://www.wikidata.org/wiki/Q145490","display_name":"Network topology","level":2,"score":0.4413672983646393},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.42140719294548035},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.41247978806495667},{"id":"https://openalex.org/C184720557","wikidata":"https://www.wikidata.org/wiki/Q7825049","display_name":"Topology (electrical circuits)","level":2,"score":0.396106481552124},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.24377602338790894},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.21256276965141296},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.19382691383361816},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.11375635862350464},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.06940650939941406},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C97355855","wikidata":"https://www.wikidata.org/wiki/Q11473","display_name":"Thermodynamics","level":1,"score":0.0},{"id":"https://openalex.org/C114614502","wikidata":"https://www.wikidata.org/wiki/Q76592","display_name":"Combinatorics","level":1,"score":0.0},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.0},{"id":"https://openalex.org/C66938386","wikidata":"https://www.wikidata.org/wiki/Q633538","display_name":"Structural engineering","level":1,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1145/1288107.1288120","is_oa":false,"landing_page_url":"https://doi.org/10.1145/1288107.1288120","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 8th ACM international symposium on Mobile ad hoc networking and computing","raw_type":"proceedings-article"},{"id":"pmh:oai:CiteSeerX.psu:10.1.1.75.7681","is_oa":false,"landing_page_url":"http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.75.7681","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"http://siis.cse.psu.edu/pubs/ztz07.pdf","raw_type":"text"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":31,"referenced_works":["https://openalex.org/W1500356409","https://openalex.org/W1514361308","https://openalex.org/W1544574054","https://openalex.org/W1583816927","https://openalex.org/W1608762865","https://openalex.org/W1896250574","https://openalex.org/W1956043843","https://openalex.org/W2002054891","https://openalex.org/W2033751220","https://openalex.org/W2041610068","https://openalex.org/W2048402311","https://openalex.org/W2052050157","https://openalex.org/W2053134894","https://openalex.org/W2104532741","https://openalex.org/W2110936068","https://openalex.org/W2116090163","https://openalex.org/W2116269350","https://openalex.org/W2117339995","https://openalex.org/W2117781301","https://openalex.org/W2117984332","https://openalex.org/W2121347685","https://openalex.org/W2127596159","https://openalex.org/W2140011697","https://openalex.org/W2141420453","https://openalex.org/W2143536181","https://openalex.org/W2164478452","https://openalex.org/W2167569963","https://openalex.org/W4243443630","https://openalex.org/W6629828591","https://openalex.org/W6632689664","https://openalex.org/W6634881901"],"related_works":["https://openalex.org/W2120598334","https://openalex.org/W2760845093","https://openalex.org/W1980134735","https://openalex.org/W2554901794","https://openalex.org/W2108355720","https://openalex.org/W3203834545","https://openalex.org/W2133941549","https://openalex.org/W2362653998","https://openalex.org/W2992521683","https://openalex.org/W2004372160"],"abstract_inverted_index":{"A":[0],"prerequisite":[1],"for":[2,37,169],"secure":[3],"communications":[4],"between":[5,194],"two":[6,79,196],"sensor":[7,173,180],"nodes":[8,12,80,100,110],"is":[9,139,164],"that":[10,77,143,160],"these":[11,61,146],"exclusively":[13],"share":[14],"a":[15,44,65,84,96,179,188],"pairwise":[16,20,85,105,189],"key.":[17],"Although":[18],"numerous":[19],"key":[21,39,86,153,190],"establishment":[22],"(PKE)":[23],"schemes":[24],"have":[25,34,101],"been":[26,102],"proposed":[27],"in":[28,71,120],"recent":[29],"years,":[30],"most":[31],"of":[32,47,99,133,172,191,206],"them":[33],"no":[35,41,50],"guarantee":[36],"direct":[38],"establishment,":[40],"resilience":[42,51],"to":[43,52,91,118,177,184],"large":[45,97],"number":[46,98],"node":[48],"compromises,":[49],"dynamic":[53],"network":[54,121,181],"topology,":[55],"or":[56],"high":[57],"overhead.":[58,129],"To":[59,130],"address":[60],"limitations,":[62],"we":[63,158],"propose":[64],"novel":[66],"random":[67],"perturbation-based":[68],"(RPB)":[69],"scheme":[70,75,116,138,163],"this":[72],"paper.":[73],"The":[74],"guarantees":[76],"any":[78,89,195],"can":[81],"directly":[82],"establish":[83],"without":[87,149],"exposing":[88],"secret":[90],"other":[92],"nodes.":[93,174],"Even":[94],"after":[95],"compromised,":[103],"the":[104,115,131,136,140,161],"keys":[106],"shared":[107],"by":[108],"non-compromised":[109],"remain":[111],"highly":[112,165],"secure.":[113],"Moreover,":[114],"adapts":[117],"changes":[119],"topology":[122],"and":[123,127,167,213],"incurs":[124],"low":[125],"computation":[126],"communication":[128],"best":[132],"our":[134],"knowledge,":[135],"RPB":[137,162],"only":[141,201],"one":[142],"provides":[144],"all":[145],"salient":[147],"features":[148],"relying":[150],"on":[151],"public":[152],"cryptography.":[154],"Through":[155],"prototype-based":[156],"evaluation,":[157],"show":[159],"efficient":[166],"practical":[168],"current":[170],"generation":[171],"In":[175],"particular,":[176],"support":[178],"with":[182],"up":[183],"216":[185],"nodes,":[186],"establishing":[187],"80":[192],"bits":[193],"8-bit,":[197],"7.37-MHz":[198],"MICA2":[199],"motes":[200],"requires":[202],"about":[203],"0.13":[204],"second":[205],"CPU":[207],"time,":[208],"0.33":[209],"KB":[210,215],"RAM":[211],"space,":[212],"15":[214],"ROM":[216],"space":[217],"per":[218],"node.":[219]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2019,"cited_by_count":2},{"year":2018,"cited_by_count":2},{"year":2017,"cited_by_count":5},{"year":2016,"cited_by_count":4},{"year":2015,"cited_by_count":6},{"year":2014,"cited_by_count":16},{"year":2013,"cited_by_count":5},{"year":2012,"cited_by_count":11}],"updated_date":"2026-04-04T16:13:02.066488","created_date":"2025-10-10T00:00:00"}
