{"id":"https://openalex.org/W4396879223","doi":"https://doi.org/10.1145/3638025.3638033","title":"Blockchain-based Secure Key Distribution for WSNs in Soil Monitoring","display_name":"Blockchain-based Secure Key Distribution for WSNs in Soil Monitoring","publication_year":2023,"publication_date":"2023-11-10","ids":{"openalex":"https://openalex.org/W4396879223","doi":"https://doi.org/10.1145/3638025.3638033"},"language":"en","primary_location":{"id":"doi:10.1145/3638025.3638033","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3638025.3638033","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2023 5th International Conference on Blockchain Technology","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5083635873","display_name":"H. H. Huang","orcid":"https://orcid.org/0009-0006-7766-5299"},"institutions":[{"id":"https://openalex.org/I5343935","display_name":"Guilin University of Electronic Technology","ror":"https://ror.org/05arjae42","country_code":"CN","type":"education","lineage":["https://openalex.org/I5343935"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Haosong Huang","raw_affiliation_strings":["Guilin University of Electronic Technology, Guangxi Key Laboratory of Cryptography and Information Security, China"],"affiliations":[{"raw_affiliation_string":"Guilin University of Electronic Technology, Guangxi Key Laboratory of Cryptography and Information Security, China","institution_ids":["https://openalex.org/I5343935"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5078775578","display_name":"Yong Ding","orcid":"https://orcid.org/0000-0002-3571-7576"},"institutions":[{"id":"https://openalex.org/I5343935","display_name":"Guilin University of Electronic Technology","ror":"https://ror.org/05arjae42","country_code":"CN","type":"education","lineage":["https://openalex.org/I5343935"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yong Ding","raw_affiliation_strings":["Guilin University of Electronic Technology, Guangxi Key Laboratory of Cryptography and Information Security, China"],"affiliations":[{"raw_affiliation_string":"Guilin University of Electronic Technology, Guangxi Key Laboratory of Cryptography and Information Security, China","institution_ids":["https://openalex.org/I5343935"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100700688","display_name":"Yujue Wang","orcid":"https://orcid.org/0000-0002-0951-8880"},"institutions":[{"id":"https://openalex.org/I82880672","display_name":"Beihang University","ror":"https://ror.org/00wk2mp56","country_code":"CN","type":"education","lineage":["https://openalex.org/I82880672"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yujue Wang","raw_affiliation_strings":["Hangzhou Innovation Institute of Beihang University, Hangzhou Innovation Institute of Beihang University, China"],"affiliations":[{"raw_affiliation_string":"Hangzhou Innovation Institute of Beihang University, Hangzhou Innovation Institute of Beihang University, China","institution_ids":["https://openalex.org/I82880672"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5036065691","display_name":"Changsong Yang","orcid":"https://orcid.org/0000-0002-3391-3151"},"institutions":[{"id":"https://openalex.org/I5343935","display_name":"Guilin University of Electronic Technology","ror":"https://ror.org/05arjae42","country_code":"CN","type":"education","lineage":["https://openalex.org/I5343935"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Changsong Yang","raw_affiliation_strings":["Guilin University of Electronic Technology, Guangxi Key Laboratory of Cryptography and Information Security, China"],"affiliations":[{"raw_affiliation_string":"Guilin University of Electronic Technology, Guangxi Key Laboratory of Cryptography and Information Security, China","institution_ids":["https://openalex.org/I5343935"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5055652863","display_name":"Hai Liang","orcid":"https://orcid.org/0000-0002-7369-5398"},"institutions":[{"id":"https://openalex.org/I5343935","display_name":"Guilin University of Electronic Technology","ror":"https://ror.org/05arjae42","country_code":"CN","type":"education","lineage":["https://openalex.org/I5343935"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Hai Liang","raw_affiliation_strings":["Guilin University of Electronic Technology, Guangxi Key Laboratory of Cryptography and Information Security, China"],"affiliations":[{"raw_affiliation_string":"Guilin University of Electronic Technology, Guangxi Key Laboratory of Cryptography and Information Security, China","institution_ids":["https://openalex.org/I5343935"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5018915353","display_name":"Huiyong Wang","orcid":"https://orcid.org/0000-0001-5886-9647"},"institutions":[{"id":"https://openalex.org/I5343935","display_name":"Guilin University of Electronic Technology","ror":"https://ror.org/05arjae42","country_code":"CN","type":"education","lineage":["https://openalex.org/I5343935"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Huiyong Wang","raw_affiliation_strings":["Guilin University of Electronic Technology, Guangxi Key Laboratory of Cryptography and Information Security, China"],"affiliations":[{"raw_affiliation_string":"Guilin University of Electronic Technology, Guangxi Key Laboratory of Cryptography and Information Security, China","institution_ids":["https://openalex.org/I5343935"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5083635873"],"corresponding_institution_ids":["https://openalex.org/I5343935"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.27028873,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"29","last_page":"35"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":0.9983000159263611,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":0.9983000159263611,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.9729999899864197,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9702000021934509,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7200037240982056},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.7030627131462097},{"id":"https://openalex.org/keywords/wireless-sensor-network","display_name":"Wireless sensor network","score":0.6563892364501953},{"id":"https://openalex.org/keywords/blockchain","display_name":"Blockchain","score":0.6049506068229675},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.5621598362922668},{"id":"https://openalex.org/keywords/initialization","display_name":"Initialization","score":0.5394137501716614},{"id":"https://openalex.org/keywords/key-distribution","display_name":"Key distribution","score":0.5362659692764282},{"id":"https://openalex.org/keywords/upload","display_name":"Upload","score":0.5178173184394836},{"id":"https://openalex.org/keywords/consistency","display_name":"Consistency (knowledge bases)","score":0.4647926688194275},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.447482705116272},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.44457700848579407},{"id":"https://openalex.org/keywords/key-distribution-in-wireless-sensor-networks","display_name":"Key distribution in wireless sensor networks","score":0.42560920119285583},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.4251175820827484},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.3524518609046936},{"id":"https://openalex.org/keywords/wireless","display_name":"Wireless","score":0.26798754930496216},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.19304099678993225},{"id":"https://openalex.org/keywords/wireless-network","display_name":"Wireless network","score":0.16262376308441162},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.08182734251022339}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7200037240982056},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.7030627131462097},{"id":"https://openalex.org/C24590314","wikidata":"https://www.wikidata.org/wiki/Q336038","display_name":"Wireless sensor network","level":2,"score":0.6563892364501953},{"id":"https://openalex.org/C2779687700","wikidata":"https://www.wikidata.org/wiki/Q20514253","display_name":"Blockchain","level":2,"score":0.6049506068229675},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.5621598362922668},{"id":"https://openalex.org/C114466953","wikidata":"https://www.wikidata.org/wiki/Q6034165","display_name":"Initialization","level":2,"score":0.5394137501716614},{"id":"https://openalex.org/C160333310","wikidata":"https://www.wikidata.org/wiki/Q6398153","display_name":"Key distribution","level":4,"score":0.5362659692764282},{"id":"https://openalex.org/C71901391","wikidata":"https://www.wikidata.org/wiki/Q7126699","display_name":"Upload","level":2,"score":0.5178173184394836},{"id":"https://openalex.org/C2776436953","wikidata":"https://www.wikidata.org/wiki/Q5163215","display_name":"Consistency (knowledge bases)","level":2,"score":0.4647926688194275},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.447482705116272},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.44457700848579407},{"id":"https://openalex.org/C41971633","wikidata":"https://www.wikidata.org/wiki/Q6398155","display_name":"Key distribution in wireless sensor networks","level":4,"score":0.42560920119285583},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.4251175820827484},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.3524518609046936},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.26798754930496216},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.19304099678993225},{"id":"https://openalex.org/C108037233","wikidata":"https://www.wikidata.org/wiki/Q11375","display_name":"Wireless network","level":3,"score":0.16262376308441162},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.08182734251022339},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3638025.3638033","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3638025.3638033","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2023 5th International Conference on Blockchain Technology","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/15","score":0.6700000166893005,"display_name":"Life in Land"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":20,"referenced_works":["https://openalex.org/W1572194399","https://openalex.org/W1901278359","https://openalex.org/W1997230722","https://openalex.org/W2039043123","https://openalex.org/W2092155715","https://openalex.org/W2117984332","https://openalex.org/W2150002633","https://openalex.org/W2156168933","https://openalex.org/W2166462813","https://openalex.org/W2397117500","https://openalex.org/W2533407942","https://openalex.org/W2919603771","https://openalex.org/W2998977406","https://openalex.org/W3000455992","https://openalex.org/W3184707328","https://openalex.org/W3193305397","https://openalex.org/W3213070675","https://openalex.org/W4210510291","https://openalex.org/W4295873461","https://openalex.org/W4312820296"],"related_works":["https://openalex.org/W2350695503","https://openalex.org/W2245180907","https://openalex.org/W2906840093","https://openalex.org/W2181631410","https://openalex.org/W2129711340","https://openalex.org/W2117667232","https://openalex.org/W2147172043","https://openalex.org/W2162703844","https://openalex.org/W1566404745","https://openalex.org/W2008916606"],"abstract_inverted_index":{"With":[0],"the":[1,14,34,69,72,76,81,85,88,95,104],"rapid":[2],"development":[3],"of":[4,16,36,75,87,106],"society":[5],"and":[6,42,47,49,91,112,120],"economy,":[7],"soil":[8,25],"issues":[9],"have":[10],"been":[11],"emphasized.":[12],"As":[13],"front-end":[15],"data":[17],"collection,":[18],"sensor":[19,31,37,77],"networks":[20,32],"are":[21],"used":[22],"in":[23],"various":[24],"monitoring":[26],"applications.":[27],"However,":[28],"current":[29],"wireless":[30],"face":[33],"difficulty":[35],"authentication":[38,45,89,96],"when":[39],"forming":[40],"clusters,":[41],"lack":[43],"effective":[44],"methods":[46],"efficient":[48,119],"secure":[50],"key":[51,64,108],"distribution":[52,65,100],"mechanisms.":[53],"To":[54],"address":[55],"these":[56],"issues,":[57],"this":[58],"paper":[59],"proposes":[60],"a":[61],"blockchain-based":[62],"polynomial":[63],"scheme":[66],"(PCD).":[67],"During":[68],"initialization":[70],"process,":[71],"identification":[73],"information":[74,90],"is":[78,118],"uploaded":[79],"into":[80],"blockchain":[82],"to":[83],"ensure":[84],"consistency":[86],"provide":[92],"security":[93],"for":[94],"process.":[97],"The":[98],"polynomial-based":[99],"mechanism":[101],"further":[102],"improves":[103],"efficiency":[105],"cluster":[107],"distribution.":[109],"Experimental":[110],"analysis":[111],"comparison":[113],"prove":[114],"that":[115],"our":[116],"construction":[117],"practical.":[121]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
