{"id":"https://openalex.org/W2890119689","doi":"https://doi.org/10.1016/j.icte.2018.08.002","title":"Proposing packet-key based end-to-end security architecture for the post-LTE networks","display_name":"Proposing packet-key based end-to-end security architecture for the post-LTE networks","publication_year":2018,"publication_date":"2018-09-05","ids":{"openalex":"https://openalex.org/W2890119689","doi":"https://doi.org/10.1016/j.icte.2018.08.002","mag":"2890119689"},"language":"en","primary_location":{"is_oa":true,"landing_page_url":"https://doi.org/10.1016/j.icte.2018.08.002","pdf_url":null,"source":{"id":"https://openalex.org/S2898368220","display_name":"ICT Express","issn_l":"2405-9595","issn":["2405-9595"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310320990","host_organization_name":"Elsevier BV","host_organization_lineage":["https://openalex.org/P4310320990"],"host_organization_lineage_names":["Elsevier BV"],"type":"journal"},"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true},"type":"article","type_crossref":"journal-article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://doi.org/10.1016/j.icte.2018.08.002","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5054431013","display_name":"Akanksha Saini","orcid":"https://orcid.org/0000-0002-7191-2854"},"institutions":[{"id":"https://openalex.org/I149704539","display_name":"Deakin University","ror":"https://ror.org/02czsnj07","country_code":"AU","type":"education","lineage":["https://openalex.org/I149704539"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Akanksha Saini","raw_affiliation_strings":["Deakin University, School of Information Technology, Victoria, VIC 3125, Australia"],"affiliations":[{"raw_affiliation_string":"Deakin University, School of Information Technology, Victoria, VIC 3125, Australia","institution_ids":["https://openalex.org/I149704539"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5028341363","display_name":"Enrique D. Festijo","orcid":null},"institutions":[{"id":"https://openalex.org/I95350115","display_name":"Technological Institute of the Philippines","ror":"https://ror.org/02p79p790","country_code":"PH","type":"education","lineage":["https://openalex.org/I95350115"]}],"countries":["PH"],"is_corresponding":false,"raw_author_name":"Enrique Festijo","raw_affiliation_strings":["Department of Electrical Engineering, Technological Institute of the Philippines, 1338 Arlegui St. Quiapo, Manila, Philippines"],"affiliations":[{"raw_affiliation_string":"Department of Electrical Engineering, Technological Institute of the Philippines, 1338 Arlegui St. Quiapo, Manila, Philippines","institution_ids":["https://openalex.org/I95350115"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5043869954","display_name":"Younchan Jung","orcid":"https://orcid.org/0000-0002-5242-7087"},"institutions":[{"id":"https://openalex.org/I87111246","display_name":"Catholic University of Korea","ror":"https://ror.org/01fpnj063","country_code":"KR","type":"education","lineage":["https://openalex.org/I87111246"]}],"countries":["KR"],"is_corresponding":true,"raw_author_name":"Younchan Jung","raw_affiliation_strings":["The Catholic University of Korea, School of Information, Communications, and Electronics Engineering, 43 Jibong-ro, Wonmi-gu, Bucheon-si, Gyeonggi-do 14662, South Korea"],"affiliations":[{"raw_affiliation_string":"The Catholic University of Korea, School of Information, Communications, and Electronics Engineering, 43 Jibong-ro, Wonmi-gu, Bucheon-si, Gyeonggi-do 14662, South Korea","institution_ids":["https://openalex.org/I87111246"]}]}],"institution_assertions":[],"countries_distinct_count":3,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5043869954"],"corresponding_institution_ids":["https://openalex.org/I87111246"],"apc_list":{"value":1500,"currency":"USD","value_usd":1500,"provenance":"doaj"},"apc_paid":{"value":1500,"currency":"USD","value_usd":1500,"provenance":"doaj"},"fwci":0.161,"has_fulltext":true,"fulltext_origin":"pdf","cited_by_count":1,"citation_normalized_percentile":{"value":0.483341,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":62,"max":70},"biblio":{"volume":"5","issue":"2","first_page":"124","last_page":"130"},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T10796","display_name":"Cooperative Communication and Network Coding","score":0.994,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10796","display_name":"Cooperative Communication and Network Coding","score":0.994,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.992,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9911,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/end-to-end-delay","display_name":"End-to-end delay","score":0.5544344},{"id":"https://openalex.org/keywords/end-to-end-principle","display_name":"End-to-end principle","score":0.47713232},{"id":"https://openalex.org/keywords/session-key","display_name":"Session key","score":0.43926716},{"id":"https://openalex.org/keywords/packet-analyzer","display_name":"Packet analyzer","score":0.41114643}],"concepts":[{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.77894735},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.76726305},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.61210454},{"id":"https://openalex.org/C37624559","wikidata":"https://www.wikidata.org/wiki/Q5375776","display_name":"End-to-end delay","level":3,"score":0.5544344},{"id":"https://openalex.org/C21434264","wikidata":"https://www.wikidata.org/wiki/Q7247320","display_name":"Processing delay","level":4,"score":0.49449894},{"id":"https://openalex.org/C74296488","wikidata":"https://www.wikidata.org/wiki/Q2527392","display_name":"End-to-end principle","level":2,"score":0.47713232},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.474143},{"id":"https://openalex.org/C191197275","wikidata":"https://www.wikidata.org/wiki/Q1755775","display_name":"Session key","level":3,"score":0.43926716},{"id":"https://openalex.org/C95362637","wikidata":"https://www.wikidata.org/wiki/Q54366","display_name":"Packet analyzer","level":3,"score":0.41114643},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.38863593},{"id":"https://openalex.org/C108921912","wikidata":"https://www.wikidata.org/wiki/Q7834639","display_name":"Transmission delay","level":3,"score":0.32278737},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.20153764}],"mesh":[],"locations_count":4,"locations":[{"is_oa":true,"landing_page_url":"https://doi.org/10.1016/j.icte.2018.08.002","pdf_url":null,"source":{"id":"https://openalex.org/S2898368220","display_name":"ICT Express","issn_l":"2405-9595","issn":["2405-9595"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310320990","host_organization_name":"Elsevier BV","host_organization_lineage":["https://openalex.org/P4310320990"],"host_organization_lineage_names":["Elsevier BV"],"type":"journal"},"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true},{"is_oa":false,"landing_page_url":"https://doaj.org/article/6180108b96a54b14bab05631620db424","pdf_url":null,"source":{"id":"https://openalex.org/S4306401280","display_name":"DOAJ (DOAJ: Directory of Open Access Journals)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false},{"is_oa":true,"landing_page_url":"https://figshare.com/articles/journal_contribution/Proposing_packet-key_based_end-to-end_security_architecture_for_the_post-LTE_networks/20748181","pdf_url":"https://figshare.com/articles/journal_contribution/Proposing_packet-key_based_end-to-end_security_architecture_for_the_post-LTE_networks/20748181/2/files/36983092.pdf","source":{"id":"https://openalex.org/S4306400572","display_name":"OPAL (Open@LaTrobe) (La Trobe University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I196829312","host_organization_name":"La Trobe University","host_organization_lineage":["https://openalex.org/I196829312"],"host_organization_lineage_names":["La Trobe University"],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true},{"is_oa":true,"landing_page_url":"https://hdl.handle.net/10536/DRO/DU:30140810","pdf_url":"https://dro.deakin.edu.au/articles/journal_contribution/Proposing_packet-key_based_end-to-end_security_architecture_for_the_post-LTE_networks/20748181/2/files/36983092.pdf","source":{"id":"https://openalex.org/S4306401102","display_name":"Own your potential (DEAKIN)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I149704539","host_organization_name":"Deakin University","host_organization_lineage":["https://openalex.org/I149704539"],"host_organization_lineage_names":["Deakin University"],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"publishedVersion","is_accepted":true,"is_published":true}],"best_oa_location":{"is_oa":true,"landing_page_url":"https://doi.org/10.1016/j.icte.2018.08.002","pdf_url":null,"source":{"id":"https://openalex.org/S2898368220","display_name":"ICT Express","issn_l":"2405-9595","issn":["2405-9595"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310320990","host_organization_name":"Elsevier BV","host_organization_lineage":["https://openalex.org/P4310320990"],"host_organization_lineage_names":["Elsevier BV"],"type":"journal"},"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true},"sustainable_development_goals":[{"display_name":"Responsible consumption and production","score":0.54,"id":"https://metadata.un.org/sdg/12"}],"grants":[{"funder":"https://openalex.org/F4320321379","funder_display_name":"Catholic University of Korea","award_id":null},{"funder":"https://openalex.org/F4320322120","funder_display_name":"National Research Foundation of Korea","award_id":null},{"funder":"https://openalex.org/F4320322349","funder_display_name":"Ministry of Education, Science and Technology","award_id":"2017R1A2B4006086"}],"datasets":[],"versions":[],"referenced_works_count":9,"referenced_works":["https://openalex.org/W1635678085","https://openalex.org/W1991229679","https://openalex.org/W1998188340","https://openalex.org/W2021209934","https://openalex.org/W2090112451","https://openalex.org/W2112778826","https://openalex.org/W2148552335","https://openalex.org/W2340699204","https://openalex.org/W2401188266"],"related_works":["https://openalex.org/W3141462331","https://openalex.org/W3011083237","https://openalex.org/W2380501345","https://openalex.org/W2368891221","https://openalex.org/W2029984094","https://openalex.org/W2019508539","https://openalex.org/W2008110221","https://openalex.org/W1605133625","https://openalex.org/W1601094230","https://openalex.org/W115996890"],"abstract_inverted_index":{"This":[0,112],"paper":[1,113],"proposes":[2],"the":[3,24,47,86,90,99,105,116,120,128,133],"end-to-end":[4,58,109],"security":[5,101,106,117],"scheme":[6,102],"with":[7],"packet":[8,68,72,78,83,91,97,122,137,141],"key":[9,39,92,123],"mechanism":[10],"to":[11,23,65,76],"perform":[12],"ciphering":[13],"of":[14,89,119,130],"user":[15],"traffic":[16],"between":[17,46],"two":[18,57],"User":[19],"Equipments":[20],"(UEs)":[21],"attached":[22],"different":[25,71],"Long":[26],"Term":[27],"Evolution":[28],"(LTE)":[29],"networks.":[30],"In":[31,54],"LTE":[32,52,110],"system,":[33],"each":[34],"UE":[35,48],"derives":[36],"its":[37,50],"master":[38,63],"after":[40],"a":[41,82,96],"mutual":[42],"authentication":[43],"is":[44,93],"performed":[45],"and":[49,139],"local":[51],"network.":[53],"this":[55],"paper,":[56],"UEs":[59],"use":[60],"their":[61],"own":[62],"keys":[64,69,73],"generate":[66],"real-time":[67,136,140],"where":[70],"are":[74],"applied":[75],"encrypt":[77],"stream":[79],"data":[80],"on":[81],"basis.":[84],"Because":[85],"life":[87],"cycle":[88],"same":[94],"as":[95,125,127],"period,":[98],"proposed":[100,121],"significantly":[103],"improves":[104],"strength":[107,118],"for":[108,132],"users.":[111],"also":[114],"analyzes":[115],"system":[124],"well":[126],"degree":[129],"latency":[131],"session":[134],"initialization,":[135],"encryption,":[138],"decryption.":[142]},"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W2890119689","counts_by_year":[{"year":2019,"cited_by_count":1}],"updated_date":"2024-12-18T00:10:48.864609","created_date":"2018-09-27"}