Transactions papers a routing-driven Elliptic Curve Cryptography based key management scheme for Heterogeneous Sensor Networks

Previous research on sensor network security mainly considers homogeneous sensor networks, where all sensor nodes have the same capabilities. Research has shown that homogeneous ad hoc networks have poor performance and scalability. The many-to-one traffic pattern dominates in sensor networks, and h...

Full description

Saved in:
Bibliographic Details
Published inIEEE transactions on wireless communications Vol. 8; no. 3; pp. 1223 - 1229
Main Authors Xiaojiang Du, Guizani, M., Yang Xiao, Hsiao-Hwa Chen
Format Journal Article
LanguageEnglish
Published New York IEEE 01.03.2009
The Institute of Electrical and Electronics Engineers, Inc. (IEEE)
Subjects
Online AccessGet full text

Cover

Loading…
Abstract Previous research on sensor network security mainly considers homogeneous sensor networks, where all sensor nodes have the same capabilities. Research has shown that homogeneous ad hoc networks have poor performance and scalability. The many-to-one traffic pattern dominates in sensor networks, and hence a sensor may only communicate with a small portion of its neighbors. Key management is a fundamental security operation. Most existing key management schemes try to establish shared keys for all pairs of neighbor sensors, no matter whether these nodes communicate with each other or not, and this causes large overhead. In this paper, we adopt a Heterogeneous Sensor Network (HSN) model for better performance and security. We propose a novel routing-driven key management scheme, which only establishes shared keys for neighbor sensors that communicate with each other. We utilize Elliptic Curve Cryptography in the design of an efficient key management scheme for sensor nodes. The performance evaluation and security analysis show that our key management scheme can provide better security with significant reductions on communication overhead, storage space and energy consumption than other key management schemes.
AbstractList Previous research on sensor network security mainly considers homogeneous sensor networks, where all sensor nodes have the same capabilities. Research has shown that homogeneous ad hoc networks have poor performance and scalability. The many-to-one traffic pattern dominates in sensor networks, and hence a sensor may only communicate with a small portion of its neighbors. Key management is a fundamental security operation. Most existing key management schemes try to establish shared keys for all pairs of neighbor sensors, no matter whether these nodes communicate with each other or not, and this causes large overhead. In this paper, we adopt a Heterogeneous Sensor Network (HSN) model for better performance and security. We propose a novel routing-driven key management scheme, which only establishes shared keys for neighbor sensors that communicate with each other. We utilize Elliptic Curve Cryptography in the design of an efficient key management scheme for sensor nodes. The performance evaluation and security analysis show that our key management scheme can provide better security with significant reductions on communication overhead, storage space and energy consumption than other key management schemes.
Previous research on sensor network security mainly considers homogeneous sensor networks, where all sensor nodes have the same capabilities. Research has shown that homogeneous ad hoc networks have poor performance and scalability. The many-to-one [abstract truncated by publisher].
The performance evaluation and security analysis show that our key management scheme can provide better security with significant reductions on communication overhead, storage space and energy consumption than other key management schemes.
Author Xiaojiang Du
Guizani, M.
Hsiao-Hwa Chen
Yang Xiao
Author_xml – sequence: 1
  surname: Xiaojiang Du
  fullname: Xiaojiang Du
  organization: Dept. of Comput. Sci., North Dakota State Univ., Fargo, ND
– sequence: 2
  givenname: M.
  surname: Guizani
  fullname: Guizani, M.
  organization: Dept. of Comput. Sci., Western Michigan Univ., Kalamazoo, MI
– sequence: 3
  surname: Yang Xiao
  fullname: Yang Xiao
  organization: Dept. of Comput. Sci., Univ. of Alabama, Tuscaloosa, AL
– sequence: 4
  surname: Hsiao-Hwa Chen
  fullname: Hsiao-Hwa Chen
  organization: Dept. of Eng. Sci., Nat. Cheng Kung Univ., Tainan
BookMark eNp9kb1vFDEQxa0oSPmAmoLGooBqL_b6a7dEq5AgRVDkIkrLZ89enOzZi-0Nuoa_PbscokiRakaj3xvNm3eGjkMMgNB7SlaUkvZi_bNb1YS0KyKJaJsjdEqFaKq65s3x0jNZ0VrJE3SW8wMhVEkhTtGfdTIhG1t8DBmPZoSUscEpTsWHbeWSf4KAL4fBj8Vb3E3pCXCX9mOJ22TG-z3emAwOP8Ie70wwW9hBKDjb-7nBfUz4GgqkuIUAccr4FkKeh9-h_I7pMb9Fb3ozZHj3r56ju6-X6-66uvlx9a37clNZxupStapnjCpLGWeq5YaDI9Q1zhnabmxvWtEzp4BaZ6WD2bZQGyYsZ3RDetUodo4-H_aOKf6aIBe989nCMJi_Z-lGCVJLUS_kp1dJxgVnjPAZ_PgCfIhTCrML3UhKZM25nCFxgGyKOSfotfXFLM8uyfhBU6KX8PQcnl7C04fwZt3FC92Y_M6k_SuKDweFB4D_NG8I5UqwZ5NyqLA
CODEN ITWCAX
CitedBy_id crossref_primary_10_1109_ACCESS_2019_2939490
crossref_primary_10_1109_ACCESS_2018_2870663
crossref_primary_10_1109_ACCESS_2019_2952585
crossref_primary_10_3390_app10010413
crossref_primary_10_3390_e25010047
crossref_primary_10_1142_S0129054119400161
crossref_primary_10_1109_MNET_001_1900140
crossref_primary_10_1109_TVT_2019_2910217
crossref_primary_10_1109_JIOT_2020_2977910
crossref_primary_10_1109_JIOT_2019_2901840
crossref_primary_10_1016_j_future_2019_01_058
crossref_primary_10_1016_j_ins_2018_02_015
crossref_primary_10_1109_TVT_2018_2828651
crossref_primary_10_1109_ACCESS_2019_2909048
crossref_primary_10_1109_ACCESS_2019_2915956
crossref_primary_10_1142_S0129054119400173
crossref_primary_10_3390_app8122506
crossref_primary_10_1109_MNET_001_1900035
crossref_primary_10_1109_MNET_001_1900156
crossref_primary_10_1109_ACCESS_2018_2869543
crossref_primary_10_1109_ACCESS_2019_2900125
crossref_primary_10_3390_s19061274
crossref_primary_10_1145_3351261
crossref_primary_10_1109_ACCESS_2020_2966399
crossref_primary_10_1016_j_comnet_2017_10_005
crossref_primary_10_1016_j_comnet_2018_12_018
crossref_primary_10_1109_JIOT_2021_3060508
crossref_primary_10_1109_TII_2019_2907754
crossref_primary_10_1016_j_ins_2019_12_007
crossref_primary_10_1109_MNET_2019_1800083
crossref_primary_10_3390_s20030657
crossref_primary_10_1109_MCOM_2018_1701310
crossref_primary_10_1109_MWC_001_1900123
crossref_primary_10_1177_1550147719899374
crossref_primary_10_15803_ijnc_7_1_50
crossref_primary_10_1109_JIOT_2019_2941638
crossref_primary_10_1142_S0129054119400197
crossref_primary_10_1016_j_ins_2019_01_068
crossref_primary_10_3390_s19153362
crossref_primary_10_1016_j_future_2020_04_021
crossref_primary_10_1109_TPDS_2010_94
crossref_primary_10_1002_cpe_4528
crossref_primary_10_1007_s11036_020_01656_7
crossref_primary_10_1016_j_jnca_2019_02_018
crossref_primary_10_1109_JIOT_2019_2951620
crossref_primary_10_1109_MWC_2019_1800449
crossref_primary_10_1109_ACCESS_2019_2900708
crossref_primary_10_3390_s18124500
crossref_primary_10_1109_MCOM_2019_1700859
crossref_primary_10_1007_s11042_024_19497_x
crossref_primary_10_1109_ACCESS_2018_2833163
crossref_primary_10_1109_JIOT_2020_3027048
crossref_primary_10_1109_JIOT_2018_2803111
crossref_primary_10_1109_MWC_2019_1700441
crossref_primary_10_1002_ett_3689
crossref_primary_10_1016_j_ins_2018_10_056
crossref_primary_10_1109_ACCESS_2019_2897617
crossref_primary_10_1177_1550147720920478
crossref_primary_10_1155_2020_8864301
crossref_primary_10_1109_ACCESS_2019_2926404
crossref_primary_10_1109_JIOT_2018_2878406
crossref_primary_10_1016_j_future_2018_05_055
crossref_primary_10_3390_s19051235
crossref_primary_10_1016_j_jpdc_2019_06_001
crossref_primary_10_1002_wcm_2675
crossref_primary_10_3390_s18082630
crossref_primary_10_1109_ACCESS_2018_2802783
crossref_primary_10_3390_app9081561
crossref_primary_10_1109_TITS_2020_2970610
crossref_primary_10_1109_JIOT_2019_2900661
crossref_primary_10_1142_S0129054119400136
crossref_primary_10_1109_TVT_2018_2884525
crossref_primary_10_1016_j_future_2018_12_054
crossref_primary_10_1109_ACCESS_2019_2946482
crossref_primary_10_2174_1872212118666230428105619
crossref_primary_10_26634_jse_5_3_1383
crossref_primary_10_1002_dac_4749
crossref_primary_10_1109_MNET_001_1900204
crossref_primary_10_1016_j_adhoc_2018_07_015
crossref_primary_10_1109_ACCESS_2019_2935144
crossref_primary_10_1109_JIOT_2020_3028598
crossref_primary_10_3390_s18082727
crossref_primary_10_1109_TMC_2016_2641219
crossref_primary_10_1109_ACCESS_2017_2785444
crossref_primary_10_4304_jcp_7_8_1847_1852
crossref_primary_10_1109_ACCESS_2019_2961997
crossref_primary_10_25046_aj030412
crossref_primary_10_1109_ACCESS_2018_2859767
crossref_primary_10_1109_TII_2018_2794442
crossref_primary_10_1109_JIOT_2019_2906186
crossref_primary_10_1109_ACCESS_2019_2942335
crossref_primary_10_1109_TVT_2019_2894290
crossref_primary_10_1109_MNET_011_1900165
crossref_primary_10_3390_app8122351
crossref_primary_10_3390_electronics13122425
crossref_primary_10_1109_ACCESS_2018_2881719
crossref_primary_10_1109_MWC_001_1900298
crossref_primary_10_1016_j_jpdc_2012_10_004
crossref_primary_10_1109_ACCESS_2018_2878792
crossref_primary_10_3390_app9010175
crossref_primary_10_1109_JAS_2021_1004207
crossref_primary_10_1109_ACCESS_2019_2899558
crossref_primary_10_1109_ACCESS_2018_2797102
crossref_primary_10_3390_s20061543
crossref_primary_10_1109_TII_2019_2943331
crossref_primary_10_1109_ACCESS_2019_2931917
crossref_primary_10_1016_j_ins_2019_02_038
crossref_primary_10_4018_ijwnbt_2015010103
crossref_primary_10_1007_s00521_019_04042_x
crossref_primary_10_1109_JIOT_2020_2969326
crossref_primary_10_1016_j_future_2019_09_027
crossref_primary_10_1109_JIOT_2018_2828463
crossref_primary_10_1109_TVT_2020_3042794
crossref_primary_10_1109_JSEN_2019_2925719
crossref_primary_10_1007_s11280_020_00822_x
crossref_primary_10_3390_s19040821
crossref_primary_10_1109_JIOT_2018_2888636
crossref_primary_10_1155_2021_9961925
crossref_primary_10_1109_JIOT_2020_3044966
crossref_primary_10_3390_app9050848
crossref_primary_10_1007_s00500_017_2745_x
crossref_primary_10_1109_MWC_2019_1800505
crossref_primary_10_1109_TCOMM_2017_2778718
crossref_primary_10_1016_j_cose_2020_101863
crossref_primary_10_3390_app9010031
crossref_primary_10_1109_TII_2019_2938778
crossref_primary_10_3390_s18051539
crossref_primary_10_1007_s00607_020_00832_7
crossref_primary_10_1016_j_comnet_2018_11_008
crossref_primary_10_1109_JSEN_2020_3035846
crossref_primary_10_1155_2019_4074272
crossref_primary_10_1109_JSAC_2018_2804138
crossref_primary_10_1007_s11432_019_1508_6
crossref_primary_10_1016_j_future_2019_02_002
crossref_primary_10_1109_TII_2019_2901011
crossref_primary_10_1080_02522667_2016_1220092
crossref_primary_10_1109_MNET_2019_1800362
crossref_primary_10_1109_TCCN_2019_2950242
crossref_primary_10_1109_TCCN_2019_2893360
crossref_primary_10_3390_electronics8080859
crossref_primary_10_1007_s11276_016_1228_9
crossref_primary_10_1109_ACCESS_2019_2906076
crossref_primary_10_1155_2022_4275243
crossref_primary_10_3390_app9030437
crossref_primary_10_1109_TIFS_2016_2601061
crossref_primary_10_1016_j_compeleceng_2019_106493
crossref_primary_10_1002_dac_3476
crossref_primary_10_1109_JIOT_2018_2871607
crossref_primary_10_1109_MCOM_2018_1701086
crossref_primary_10_1177_1550147720903628
crossref_primary_10_1109_TDSC_2019_2919517
crossref_primary_10_3390_app9010132
crossref_primary_10_1109_ACCESS_2019_2911202
crossref_primary_10_1109_ACCESS_2018_2854822
crossref_primary_10_1016_j_future_2019_08_016
crossref_primary_10_1109_MNET_001_1800503
crossref_primary_10_1186_s13638_019_1589_8
crossref_primary_10_1109_MCOM_2018_1700422
crossref_primary_10_1109_MNET_2018_1700330
crossref_primary_10_1109_TWC_2012_032812_110433
crossref_primary_10_1109_ACCESS_2019_2923538
crossref_primary_10_3390_s140814786
crossref_primary_10_1007_s11042_019_07822_8
crossref_primary_10_1109_ACCESS_2021_3136332
crossref_primary_10_1016_j_comnet_2018_10_015
crossref_primary_10_1109_TVT_2017_2764999
crossref_primary_10_1142_S0129054119400094
crossref_primary_10_1109_MNET_011_1900635
crossref_primary_10_1109_ACCESS_2018_2884766
crossref_primary_10_3390_electronics9122096
crossref_primary_10_1016_j_measurement_2019_107139
crossref_primary_10_1109_JIOT_2021_3112883
crossref_primary_10_1016_j_future_2020_11_025
crossref_primary_10_1109_JIOT_2020_2966047
crossref_primary_10_1109_ACCESS_2018_2876146
crossref_primary_10_1109_ACCESS_2018_2805783
crossref_primary_10_1109_TWC_2012_030812_111857
crossref_primary_10_3390_s19051184
crossref_primary_10_3390_jsan7020021
crossref_primary_10_1109_ACCESS_2023_3324875
crossref_primary_10_3390_s19040974
crossref_primary_10_1109_MCOM_2018_1700401
crossref_primary_10_1109_MWC_2017_1800062
crossref_primary_10_3923_itj_2010_1361_1368
crossref_primary_10_1016_j_adhoc_2013_11_008
crossref_primary_10_1109_ACCESS_2019_2950598
crossref_primary_10_1109_JIOT_2020_3002255
crossref_primary_10_1002_spy2_33
crossref_primary_10_1109_ACCESS_2022_3233443
crossref_primary_10_1007_s11042_020_08614_1
crossref_primary_10_1177_1550147720921636
crossref_primary_10_1109_MNET_001_1900173
crossref_primary_10_1109_TVT_2019_2954887
crossref_primary_10_1109_ACCESS_2019_2948954
Cites_doi 10.1016/S1389-1286(03)00357-8
10.1017/CBO9781107360211
10.1155/WCN.2005.565
10.1145/345910.345953
10.1145/1031495.1031519
10.1016/S0743-7315(02)00058-8
10.1504/IJWMC.2006.012471
10.1109/18.825799
10.1109/IPSN.2005.1440928
10.1007/978-1-4419-8592-7
10.1145/1023646.1023650
10.1090/S0025-5718-1987-0866109-5
10.1109/SECPRI.2003.1199337
10.1145/990064.990079
10.1145/586115.586117
10.1145/313451.313558
10.1109/INFCOM.2005.1498318
ContentType Journal Article
Copyright Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2009
Copyright_xml – notice: Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2009
DBID 97E
RIA
RIE
AAYXX
CITATION
7SC
7SP
8FD
JQ2
L7M
L~C
L~D
F28
FR3
DOI 10.1109/TWC.2009.060598
DatabaseName IEEE Xplore (IEEE)
IEEE All-Society Periodicals Package (ASPP) 1998–Present
IEEE Electronic Library (IEL)
CrossRef
Computer and Information Systems Abstracts
Electronics & Communications Abstracts
Technology Research Database
ProQuest Computer Science Collection
Advanced Technologies Database with Aerospace
Computer and Information Systems Abstracts – Academic
Computer and Information Systems Abstracts Professional
ANTE: Abstracts in New Technology & Engineering
Engineering Research Database
DatabaseTitle CrossRef
Technology Research Database
Computer and Information Systems Abstracts – Academic
Electronics & Communications Abstracts
ProQuest Computer Science Collection
Computer and Information Systems Abstracts
Advanced Technologies Database with Aerospace
Computer and Information Systems Abstracts Professional
Engineering Research Database
ANTE: Abstracts in New Technology & Engineering
DatabaseTitleList Technology Research Database
Technology Research Database

Technology Research Database
Database_xml – sequence: 1
  dbid: RIE
  name: IEEE Electronic Library (IEL)
  url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/
  sourceTypes: Publisher
DeliveryMethod fulltext_linktorsrc
Discipline Engineering
EISSN 1558-2248
EndPage 1229
ExternalDocumentID 2315004591
10_1109_TWC_2009_060598
4801475
Genre orig-research
GroupedDBID -~X
0R~
29I
4.4
5GY
5VS
6IK
97E
AAJGR
AARMG
AASAJ
AAWTH
ABAZT
ABQJQ
ABVLG
ACGFO
ACGFS
ACIWK
AENEX
AETIX
AGQYO
AGSQL
AHBIQ
AIBXA
AKJIK
AKQYR
ALMA_UNASSIGNED_HOLDINGS
ATWAV
BEFXN
BFFAM
BGNUA
BKEBE
BPEOZ
CS3
DU5
EBS
EJD
HZ~
H~9
IES
IFIPE
IPLJI
JAVBF
LAI
M43
O9-
OCL
P2P
RIA
RIE
RNS
AAYXX
CITATION
RIG
7SC
7SP
8FD
JQ2
L7M
L~C
L~D
F28
FR3
ID FETCH-LOGICAL-c332t-97f3317c1343794a4ed01d8dda19bcfa95f3d7e1cdc6de55857b35c431b0f7873
IEDL.DBID RIE
ISSN 1536-1276
IngestDate Thu Jul 10 18:56:24 EDT 2025
Thu Jul 10 23:16:30 EDT 2025
Sun Jun 29 14:25:04 EDT 2025
Tue Jul 01 01:38:13 EDT 2025
Thu Apr 24 23:12:23 EDT 2025
Wed Aug 27 02:52:44 EDT 2025
IsPeerReviewed true
IsScholarly true
Issue 3
Language English
License https://ieeexplore.ieee.org/Xplorehelp/downloads/license-information/IEEE.html
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c332t-97f3317c1343794a4ed01d8dda19bcfa95f3d7e1cdc6de55857b35c431b0f7873
Notes ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 14
ObjectType-Article-2
ObjectType-Feature-1
content type line 23
PQID 861062446
PQPubID 23500
PageCount 7
ParticipantIDs proquest_journals_861062446
crossref_citationtrail_10_1109_TWC_2009_060598
proquest_miscellaneous_875026527
proquest_miscellaneous_34543304
ieee_primary_4801475
crossref_primary_10_1109_TWC_2009_060598
ProviderPackageCode CITATION
AAYXX
PublicationCentury 2000
PublicationDate 2009-03-00
PublicationDateYYYYMMDD 2009-03-01
PublicationDate_xml – month: 03
  year: 2009
  text: 2009-03-00
PublicationDecade 2000
PublicationPlace New York
PublicationPlace_xml – name: New York
PublicationTitle IEEE transactions on wireless communications
PublicationTitleAbbrev TWC
PublicationYear 2009
Publisher IEEE
The Institute of Electrical and Electronics Engineers, Inc. (IEEE)
Publisher_xml – name: IEEE
– name: The Institute of Electrical and Electronics Engineers, Inc. (IEEE)
References ref13
ref15
(ref20) 0
ref14
ref10
ref2
ref1
ref17
ref16
(ref19) 0
ref18
ref8
chan (ref7) 2003
gura (ref11) 2004
ref9
ref4
ref3
ref6
ref5
koblitz (ref12) 1994; 114
References_xml – ident: ref2
  doi: 10.1016/S1389-1286(03)00357-8
– ident: ref13
  doi: 10.1017/CBO9781107360211
– year: 0
  ident: ref20
  publication-title: MICA2 mote datasheet
– ident: ref15
  doi: 10.1155/WCN.2005.565
– ident: ref18
  doi: 10.1145/345910.345953
– ident: ref4
  doi: 10.1145/1031495.1031519
– ident: ref3
  doi: 10.1016/S0743-7315(02)00058-8
– year: 0
  ident: ref19
  publication-title: QualNet Simulator
– ident: ref16
  doi: 10.1504/IJWMC.2006.012471
– year: 2004
  ident: ref11
  article-title: Comparing elliptic curve cryptography and RSA on 8-bit CPUs
  publication-title: Proc Workshop Cryptographic Hardware and Embedded Systems
– ident: ref1
  doi: 10.1109/18.825799
– ident: ref17
  doi: 10.1109/IPSN.2005.1440928
– volume: 114
  year: 1994
  ident: ref12
  publication-title: Graduate Texts in Mathematics
  doi: 10.1007/978-1-4419-8592-7
– ident: ref14
  doi: 10.1145/1023646.1023650
– ident: ref10
  doi: 10.1090/S0025-5718-1987-0866109-5
– start-page: 197
  year: 2003
  ident: ref7
  article-title: Random key predistribution schemes for sensor networks
  publication-title: Proc 2003 IEEE Symposium on Security and Privacy
  doi: 10.1109/SECPRI.2003.1199337
– ident: ref9
  doi: 10.1145/990064.990079
– ident: ref6
  doi: 10.1145/586115.586117
– ident: ref8
  doi: 10.1145/313451.313558
– ident: ref5
  doi: 10.1109/INFCOM.2005.1498318
SSID ssj0017655
Score 2.467509
Snippet Previous research on sensor network security mainly considers homogeneous sensor networks, where all sensor nodes have the same capabilities. Research has...
The performance evaluation and security analysis show that our key management scheme can provide better security with significant reductions on communication...
SourceID proquest
crossref
ieee
SourceType Aggregation Database
Enrichment Source
Index Database
Publisher
StartPage 1223
SubjectTerms Ad hoc networks
Cryptography
Design engineering
Electronic mail systems
Elliptic curve cryptography
Energy consumption
Energy management
Energy storage
key management
Keys
Management
Network security
Networks
Performance analysis
Scalability
Secure storage
Security
sensor networks
Sensors
Telecommunication traffic
Wireless communication
Title Transactions papers a routing-driven Elliptic Curve Cryptography based key management scheme for Heterogeneous Sensor Networks
URI https://ieeexplore.ieee.org/document/4801475
https://www.proquest.com/docview/861062446
https://www.proquest.com/docview/34543304
https://www.proquest.com/docview/875026527
Volume 8
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1LT-MwEB4VTnBYnqsNTx847IGUpE7i-ogqUIVULhQtt8jPy-42VZogwYHfzthJw1viZjmOYmXG4288428ATiRCVAQiKjSGRmFi2SAU2BdaxPqZwT038o7i5Dob3yZXd-ldD067uzDGGJ98Zvqu6WP5ulC1Oyo781QnLF2BFXTcmrtaXcSAZb7CKS5gV1eGZS2NTxzxs-mfUUtMididD9_sQL6kygc77DeXyw2YLKfV5JT87deV7KvHd4yN3533JvxoUSY5b9RiC3pmtg3rr7gHd-Bp-lIpfEHmYo44kAhSFrVLhA516cwgcSkdaFQUGdXlvSGj8mFetSTXxG2AmqARIP-7HBqCzjI2CEJhMnaZNgUqqCnqBblBfxk7r5u088Uu3F5eTEfjsC3GECpKB1XImaWINVRMHYNhIhKjo1gPtRYxl8oKnlqqmYmVVpk2KXohTNJUIT6RkUWrQH_C6qyYmV9ABkJaSxE3KTtENKak1FrbBIGN4JxJG0B_KaBctUzlrmDGv9x7LBHPUaKufibPG4kG8Lt7Yd6QdHw9dMfJpxvWiiaA_aUG5O0iXuRDhJYZwp8sgOPuKa4-F1IR_t_lNEkTdyIUAPliBPqD6OamA7b3-Zf3Ya0JULm0tgNYrcraHCLOqeSRV_BnWYf9Gw
linkProvider IEEE
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwzV27btRAFL0KoYAU4RFQTIBMARKNN7bH9uwUFGgh2pBkGzYinZlnQ7Je-RGUFHwJv8K_cWfsNc-Ukegse2xL4-N7z_UcnwvwQiJFRSKiQmNoFKaWJaHAfaFFrp8bzLmRLxSPZ_n0JH1_mp2uwbfhXxhjjBefmZHb9Gv5ulSt-1S2561O2EpCeWguv2CBVr8-eItP82WS7L-bT6Zh30MgVJQmTciZpZgiVUyd8V4qUqOjWI-1FjGXygqeWaqZiZVWuTYZkmcmaaYwrcrIIpgpXvcW3EaekSXd32HDGgXLfU9VDBmukw3Le-OgOOJ784-T3goTqwU-_i3n-SYuf0V-n87278H31UR0KpbPo7aRI3X1h0fk_zpT92Gz59HkTQf8B7BmFg9h4xd3xS34Ov_ZC70mS7FEpksEqcrWSb1DXblAT5xoBcOmIpO2ujBkUl0um97Gm7gUrwmGOXI-qIRIjTA_NwTJPpk6LVGJr6Ap25p8MIsad846YX39CE5uZAIew_qiXJhtIImQ1lJkhsqOkW8qKbXWFjGUCs6ZtAGMVoAoVO_F7lqCnBW-Jot4gQhyHUJ50SEogFfDCcvOhuT6oVsOD8OwHgoB7KwQV_Rhqi7GSJ5zJHh5ALvDUYwvbtFI-LkraJql7ptXAOSaEVjxYiGfJezJv--8C3em8-Oj4uhgdrgDd7vlOCfiewrrTdWaZ8jqGvncv1wEPt00Rn8AitFbAA
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Transactions+papers+a+routing-driven+Elliptic+Curve+Cryptography+based+key+management+scheme+for+Heterogeneous+Sensor+Networks&rft.jtitle=IEEE+transactions+on+wireless+communications&rft.au=Xiaojiang+Du&rft.au=Guizani%2C+M.&rft.au=Yang+Xiao&rft.au=Hsiao-Hwa+Chen&rft.date=2009-03-01&rft.pub=IEEE&rft.issn=1536-1276&rft.volume=8&rft.issue=3&rft.spage=1223&rft.epage=1229&rft_id=info:doi/10.1109%2FTWC.2009.060598&rft.externalDocID=4801475
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1536-1276&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1536-1276&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1536-1276&client=summon