{"id":"https://openalex.org/W2953774480","doi":"https://doi.org/10.1186/s13673-019-0186-5","title":"A provably secure cluster-based hybrid hierarchical group key agreement for large wireless ad hoc networks","display_name":"A provably secure cluster-based hybrid hierarchical group key agreement for large wireless ad hoc networks","publication_year":2019,"publication_date":"2019-07-08","ids":{"openalex":"https://openalex.org/W2953774480","doi":"https://doi.org/10.1186/s13673-019-0186-5","mag":"2953774480"},"language":"en","primary_location":{"id":"doi:10.1186/s13673-019-0186-5","is_oa":true,"landing_page_url":"https://doi.org/10.1186/s13673-019-0186-5","pdf_url":null,"source":{"id":"https://openalex.org/S2497168432","display_name":"Human-centric Computing and Information Sciences","issn_l":"2192-1962","issn":["2192-1962"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Human-centric Computing and Information Sciences","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"hybrid","oa_url":"https://doi.org/10.1186/s13673-019-0186-5","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5058248739","display_name":"Vankamamidi S. Naresh","orcid":"https://orcid.org/0000-0002-6273-9041"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Vankamamidi S. Naresh","raw_affiliation_strings":["Department of Computer Science and Engineering, Sri Vasavi Engineering College, Tadepalligudem, Andhra Pradesh, 534101, India"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Engineering, Sri Vasavi Engineering College, Tadepalligudem, Andhra Pradesh, 534101, India","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5057180395","display_name":"Sivaranjani Reddi","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Sivaranjani Reddi","raw_affiliation_strings":["Department of Computer Science and Engineering, Anil Neerukonda Institute of Technology & Science, Visakhapatnam, Andhra Pradesh, 530003, India"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Engineering, Anil Neerukonda Institute of Technology & Science, Visakhapatnam, Andhra Pradesh, 530003, India","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5013027239","display_name":"Nistala V. E. S. Murthy","orcid":"https://orcid.org/0000-0003-2738-9362"},"institutions":[{"id":"https://openalex.org/I100887729","display_name":"Andhra University","ror":"https://ror.org/049skhf47","country_code":"IN","type":"education","lineage":["https://openalex.org/I100887729"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Nistala V. E. S. Murthy","raw_affiliation_strings":["Department of Mathematics, Andhra University, Visakhapatnam, Andhra Pradesh, 530003, India"],"affiliations":[{"raw_affiliation_string":"Department of Mathematics, Andhra University, Visakhapatnam, Andhra Pradesh, 530003, India","institution_ids":["https://openalex.org/I100887729"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5058248739"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":2.2242,"has_fulltext":false,"cited_by_count":15,"citation_normalized_percentile":{"value":0.88982247,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":98},"biblio":{"volume":"9","issue":"1","first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9976999759674072,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10246","display_name":"Mobile Ad Hoc Networks","score":0.9629999995231628,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/group-key","display_name":"Group key","score":0.8221004009246826},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7261710166931152},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.6647505164146423},{"id":"https://openalex.org/keywords/wireless-ad-hoc-network","display_name":"Wireless ad hoc network","score":0.586250364780426},{"id":"https://openalex.org/keywords/communication-in-small-groups","display_name":"Communication in small groups","score":0.5336459875106812},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.5285947322845459},{"id":"https://openalex.org/keywords/key-management","display_name":"Key management","score":0.5281394124031067},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.497967004776001},{"id":"https://openalex.org/keywords/multicast","display_name":"Multicast","score":0.44500941038131714},{"id":"https://openalex.org/keywords/mobile-ad-hoc-network","display_name":"Mobile ad hoc network","score":0.4357507526874542},{"id":"https://openalex.org/keywords/key-exchange","display_name":"Key exchange","score":0.41817939281463623},{"id":"https://openalex.org/keywords/scalability","display_name":"Scalability","score":0.4147326350212097},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.38648730516433716},{"id":"https://openalex.org/keywords/wireless","display_name":"Wireless","score":0.34314483404159546},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.22788658738136292},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.22307905554771423},{"id":"https://openalex.org/keywords/network-packet","display_name":"Network packet","score":0.17890068888664246},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.08234524726867676}],"concepts":[{"id":"https://openalex.org/C2777513581","wikidata":"https://www.wikidata.org/wiki/Q5611239","display_name":"Group key","level":3,"score":0.8221004009246826},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7261710166931152},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.6647505164146423},{"id":"https://openalex.org/C94523657","wikidata":"https://www.wikidata.org/wiki/Q4085781","display_name":"Wireless ad hoc network","level":3,"score":0.586250364780426},{"id":"https://openalex.org/C44871818","wikidata":"https://www.wikidata.org/wiki/Q5154139","display_name":"Communication in small groups","level":2,"score":0.5336459875106812},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.5285947322845459},{"id":"https://openalex.org/C17886624","wikidata":"https://www.wikidata.org/wiki/Q1320561","display_name":"Key management","level":3,"score":0.5281394124031067},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.497967004776001},{"id":"https://openalex.org/C32295351","wikidata":"https://www.wikidata.org/wiki/Q899288","display_name":"Multicast","level":2,"score":0.44500941038131714},{"id":"https://openalex.org/C91280400","wikidata":"https://www.wikidata.org/wiki/Q4085781","display_name":"Mobile ad hoc network","level":3,"score":0.4357507526874542},{"id":"https://openalex.org/C99674996","wikidata":"https://www.wikidata.org/wiki/Q1414155","display_name":"Key exchange","level":4,"score":0.41817939281463623},{"id":"https://openalex.org/C48044578","wikidata":"https://www.wikidata.org/wiki/Q727490","display_name":"Scalability","level":2,"score":0.4147326350212097},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.38648730516433716},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.34314483404159546},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.22788658738136292},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.22307905554771423},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.17890068888664246},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.08234524726867676},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1186/s13673-019-0186-5","is_oa":true,"landing_page_url":"https://doi.org/10.1186/s13673-019-0186-5","pdf_url":null,"source":{"id":"https://openalex.org/S2497168432","display_name":"Human-centric Computing and Information Sciences","issn_l":"2192-1962","issn":["2192-1962"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Human-centric Computing and Information Sciences","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:09007f8f41de44bcbcb215d2728b5aa1","is_oa":true,"landing_page_url":"https://doaj.org/article/09007f8f41de44bcbcb215d2728b5aa1","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Human-Centric Computing and Information Sciences, Vol 9, Iss 1, Pp 1-32 (2019)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1186/s13673-019-0186-5","is_oa":true,"landing_page_url":"https://doi.org/10.1186/s13673-019-0186-5","pdf_url":null,"source":{"id":"https://openalex.org/S2497168432","display_name":"Human-centric Computing and Information Sciences","issn_l":"2192-1962","issn":["2192-1962"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Human-centric Computing and Information Sciences","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":47,"referenced_works":["https://openalex.org/W148492866","https://openalex.org/W1491237688","https://openalex.org/W1509959864","https://openalex.org/W1511530643","https://openalex.org/W1513854171","https://openalex.org/W1515956306","https://openalex.org/W1518871948","https://openalex.org/W1532836984","https://openalex.org/W1535945812","https://openalex.org/W1568953355","https://openalex.org/W1603147471","https://openalex.org/W1637905077","https://openalex.org/W1709517452","https://openalex.org/W1787734157","https://openalex.org/W1868337811","https://openalex.org/W1869920308","https://openalex.org/W1982833480","https://openalex.org/W1985647316","https://openalex.org/W2014411916","https://openalex.org/W2022181750","https://openalex.org/W2056712355","https://openalex.org/W2066576548","https://openalex.org/W2088440151","https://openalex.org/W2094592604","https://openalex.org/W2100646129","https://openalex.org/W2126848915","https://openalex.org/W2131123432","https://openalex.org/W2131961371","https://openalex.org/W2135475645","https://openalex.org/W2140510944","https://openalex.org/W2140626418","https://openalex.org/W2148717592","https://openalex.org/W2148802272","https://openalex.org/W2152924492","https://openalex.org/W2154671641","https://openalex.org/W2156186849","https://openalex.org/W2158993128","https://openalex.org/W2164913688","https://openalex.org/W2165635244","https://openalex.org/W2225212480","https://openalex.org/W2361524492","https://openalex.org/W2406646694","https://openalex.org/W2561675875","https://openalex.org/W2625752091","https://openalex.org/W2950784951","https://openalex.org/W3029986252","https://openalex.org/W4285719527"],"related_works":["https://openalex.org/W2742453577","https://openalex.org/W2112577440","https://openalex.org/W2168181220","https://openalex.org/W2396651488","https://openalex.org/W2105521385","https://openalex.org/W3011162534","https://openalex.org/W2385528031","https://openalex.org/W903765576","https://openalex.org/W2123905133","https://openalex.org/W2376468856"],"abstract_inverted_index":{"Abstract":[0],"Group":[1,74,117],"key":[2,14,106,179,222],"agreement":[3,107,180],"protocol":[4,182,206],"permits":[5],"a":[6,12,92,102,112,133,137,155],"set":[7],"of":[8,19,24,59,140,147,149,163],"users":[9],"to":[10,15,110,191,210,223,260],"create":[11],"common":[13],"make":[16],"sure":[17],"security":[18,36,277],"information":[20],"exchange":[21],"among":[22,208],"members":[23,226],"the":[25,53,69,144,150,160,164,169,198,212,220,246,280],"group.":[26],"It":[27],"is":[28,49,89,129,152,166,272],"extensively":[29],"used":[30],"in":[31,81,120,142,184,187,189,196,275],"secure":[32,274],"multiparty":[33],"computation,":[34],"resource":[35],"sharing,":[37],"and":[38,56,63,67,94,159,194,203,244,251,262,271],"distributed":[39],"collaborative":[40],"computing":[41,54],"etc.":[42],"For":[43,71],"large":[44,84,121,134],"wireless":[45,85,122],"ad-hoc":[46,86],"network,":[47],"there":[48],"no":[50],"authentication":[51],"center,":[52],"power":[55],"communication":[57,263],"distance":[58],"terminals":[60],"are":[61],"constrained,":[62],"nodes":[64],"frequently":[65],"join":[66],"exit":[68],"network.":[70],"these":[72,201],"reasons,":[73],"Key":[75],"Management":[76],"for":[77,115],"securing":[78],"multicast":[79],"communications":[80],"an":[82],"energy-constrained":[83],"network":[87],"environment":[88],"still":[90],"remains":[91],"critical":[93],"challenging":[95],"issue.":[96],"In":[97,233],"this":[98,234],"direction,":[99],"we":[100,174,237],"propose":[101],"cluster-based":[103,240],"hybrid":[104],"hierarchical-group":[105],"(CHH-GKA)":[108],"framework":[109],"provide":[111],"scalable":[113],"solution":[114],"Secure":[116],"Communication":[118],"(SGC)":[119],"ad":[123],"hoc":[124],"networks":[125],"(WANETs).":[126],"This":[127],"technique":[128],"based":[130],"on":[131,176],"splitting":[132],"group":[135,165,170,214,221],"into":[136],"certain":[138],"number":[139],"clusters":[141,151],"which":[143],"last":[145,161],"member":[146,162],"each":[148,217],"designated":[153,167],"as":[154,168],"cluster":[156,186],"head":[157],"(CH)":[158],"controller":[171],"(GC).":[172],"First":[173],"apply":[175],"hand":[177],"Naresh\u2013Murthy-group":[178],"(NM-GKA)":[181],"locally":[183],"every":[185],"parallel":[188],"level-I":[190],"generate":[192],"CKs":[193,202],"then":[195],"level-II,":[197],"CHs\u2019":[199],"use":[200],"implement":[204],"NM-GKA":[205],"again":[207],"them":[209,250],"form":[211],"complete":[213],"key.":[215],"Finally":[216],"CH":[218],"distributes":[219],"all":[224],"its":[225],"through":[227],"their":[228],"respective":[229],"CK":[230],"encrypted":[231],"links.":[232],"process,":[235],"first":[236],"survey":[238],"several":[239],"hierarchical":[241],"GKA":[242],"protocols":[243],"compare":[245],"proposed":[247],"one":[248],"with":[249,258],"show":[252],"that":[253],"it":[254,266],"provides":[255],"optimal":[256],"performance":[257],"regard":[259],"computation":[261],"expenses.":[264],"Further,":[265],"also":[267],"handles":[268],"dynamic":[269],"events":[270],"provably":[273],"formal":[276],"model":[278],"under":[279],"cryptographic":[281],"suppositions.":[282]},"counts_by_year":[{"year":2024,"cited_by_count":2},{"year":2023,"cited_by_count":1},{"year":2022,"cited_by_count":5},{"year":2021,"cited_by_count":4},{"year":2020,"cited_by_count":3}],"updated_date":"2026-03-20T23:20:44.827607","created_date":"2025-10-10T00:00:00"}
