{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,1,27]],"date-time":"2025-01-27T05:34:50Z","timestamp":1737956090254,"version":"3.33.0"},"reference-count":16,"publisher":"Wiley","issue":"1","license":[{"start":{"date-parts":[[2008,2,1]],"date-time":"2008-02-01T00:00:00Z","timestamp":1201824000000},"content-version":"vor","delay-in-days":31,"URL":"http:\/\/onlinelibrary.wiley.com\/termsAndConditions#vor"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Security Comm Networks"],"published-print":{"date-parts":[[2008,1]]},"abstract":"<jats:title>Abstract<\/jats:title><jats:p>In this paper, we investigate optimal key management design for secure and survivable heterogeneous wireless sensor networks (HWSNs). In particular, we formulate the key management problem as a multi\u2010objective optimization problem, in which the cost of the sensor network, and the security and survivability metrics of the sensor network are taken into account. To solve the multi\u2010objective optimization model, we develop a genetic algorithm (GA)\u2010based approach that can efficiently obtain near\u2010optimal solutions. We show the performance of our scheme through extensive numerical results. With a small amount of powerful sensor nodes in HWSN, we can balance the cost of the sensor network and the resilience of the sensor network with the required security constraint in different hostile environment. Copyright \u00a9 2008 John Wiley &amp; Sons, Ltd.<\/jats:p>","DOI":"10.1002\/sec.3","type":"journal-article","created":{"date-parts":[[2008,2,1]],"date-time":"2008-02-01T16:16:42Z","timestamp":1201882602000},"page":"75-85","source":"Crossref","is-referenced-by-count":6,"title":["A design of optimal key management scheme for secure and survivable wireless sensor networks"],"prefix":"10.1002","volume":"1","author":[{"given":"Yi","family":"Qian","sequence":"first","affiliation":[]},{"given":"Kejie","family":"Lu","sequence":"additional","affiliation":[]},{"given":"Bo","family":"Rong","sequence":"additional","affiliation":[]},{"given":"David","family":"Tipper","sequence":"additional","affiliation":[]}],"member":"311","published-online":{"date-parts":[[2008,2]]},"reference":[{"key":"e_1_2_1_2_2","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2002.1024422"},{"volume-title":"Cryptography and Network Security: Principles and Practices","year":"2005","author":"Stallings W","key":"e_1_2_1_3_2"},{"key":"e_1_2_1_4_2","doi-asserted-by":"publisher","DOI":"10.1145\/586110.586117"},{"key":"e_1_2_1_5_2","unstructured":"ChanH PerrigA SongD.Random key predistribution schemes for sensor networks. InProceedings of IEEE Symposium on Research in Security and Privacy May2003."},{"key":"e_1_2_1_6_2","doi-asserted-by":"crossref","unstructured":"BlundoC SantisAD HerzbergA KuttenS VaccaroU YungM.Perfectly\u2010secure key distribution for dynamic conferences. In CRYPTO 92: Proceedings of the 12th Annual International Cryptology Conference on Advances in Cryptology 471\u2013486 London UK: Springer\u2010Verlag 1992.","DOI":"10.1007\/3-540-48071-4_33"},{"key":"e_1_2_1_7_2","doi-asserted-by":"crossref","unstructured":"LiuD NingP.Establishing pairwise keys in distributed sensor networks. InCCS 03: Proceedings of the 10th ACM conference on computer and communications security 2003;52\u201361 New York NY USA: ACM Press.","DOI":"10.1145\/948109.948119"},{"key":"e_1_2_1_8_2","doi-asserted-by":"crossref","unstructured":"DuW DengJ HanYS VarshneyPK.A pairwise key predistribution scheme for wireless sensor networks. InProceedings of the 10th ACM conference on computer and communications security October2003.","DOI":"10.1145\/948109.948118"},{"key":"e_1_2_1_9_2","doi-asserted-by":"crossref","unstructured":"DuW DengJ HanY ChenS VarshneyP.A key management scheme for wireless sensor networks using deployment knowledge. InProceedings of IEEE INFOCOM Vol. 1 7\u201311 March2004;586\u2013597.","DOI":"10.1109\/INFCOM.2004.1354530"},{"key":"e_1_2_1_10_2","doi-asserted-by":"crossref","unstructured":"ZhouY ZhangY FangY.LLK: a link\u2010layer key establishment scheme for wireless sensor networks. InProceedings of IEEE WCNC Vol. 4 13\u201317 March2005;1921\u20131926.","DOI":"10.1109\/WCNC.2005.1424813"},{"key":"e_1_2_1_11_2","unstructured":"ChanS\u2010P PoovendranR SunM\u2010T.A key management scheme in distributed sensor networks using attack probabilities. InProceedings of IEEE GLOBECOM Vol. 2 28 November\u20132 December2005;1007\u20131011."},{"key":"e_1_2_1_12_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-39867-7_3"},{"key":"e_1_2_1_13_2","doi-asserted-by":"crossref","unstructured":"ZhuS SetiaS JajodiaS.LEAP: efficient security mechanisms for large\u2010scale distributed sensor networks. InCCS 03: Proceedings of the 10th ACM conference on computer and communications security 2003;62\u201372 New York NY USA: ACM Press.","DOI":"10.1145\/948109.948120"},{"key":"e_1_2_1_14_2","doi-asserted-by":"crossref","unstructured":"YarvisM KushalnagarN SinghH RangarajanA LiuY SinghS.Exploiting heterogeneity in sensor networks. InProceedings of IEEE INFOCOM Vol. 2 13\u201317 March2005;878\u2013890.","DOI":"10.1109\/INFCOM.2005.1498318"},{"journal-title":"IEEE Transactions on Wireless Communications","article-title":"A distributed key management scheme in heterogeneous wireless sensor networks","author":"Lu K","key":"e_1_2_1_15_2"},{"key":"e_1_2_1_16_2","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2007.4396940"},{"key":"e_1_2_1_17_2","doi-asserted-by":"crossref","DOI":"10.7551\/mitpress\/3927.001.0001","volume-title":"An Introduction to Genetic Algorithms","author":"Mitchell M","year":"1996"}],"container-title":["Security and Communication Networks"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.wiley.com\/onlinelibrary\/tdm\/v1\/articles\/10.1002%2Fsec.3","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1002\/sec.3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,26]],"date-time":"2025-01-26T15:55:58Z","timestamp":1737906958000},"score":1,"resource":{"primary":{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/10.1002\/sec.3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008,1]]},"references-count":16,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2008,1]]}},"alternative-id":["10.1002\/sec.3"],"URL":"https:\/\/doi.org\/10.1002\/sec.3","archive":["Portico"],"relation":{},"ISSN":["1939-0114","1939-0122"],"issn-type":[{"type":"print","value":"1939-0114"},{"type":"electronic","value":"1939-0122"}],"subject":[],"published":{"date-parts":[[2008,1]]}}}