{"id":"https://openalex.org/W2047892990","doi":"https://doi.org/10.1049/iet-ifs.2009.0197","title":"Physical layer assisted authentication for distributed ad hoc wireless sensor networks","display_name":"Physical layer assisted authentication for distributed ad hoc wireless sensor networks","publication_year":2010,"publication_date":"2010-12-09","ids":{"openalex":"https://openalex.org/W2047892990","doi":"https://doi.org/10.1049/iet-ifs.2009.0197","mag":"2047892990"},"language":"en","primary_location":{"is_oa":false,"landing_page_url":"https://doi.org/10.1049/iet-ifs.2009.0197","pdf_url":null,"source":{"id":"https://openalex.org/S58852226","display_name":"IET Information Security","issn_l":"1751-8709","issn":["1751-8709","1751-8717"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310311714","host_organization_name":"Institution of Engineering and Technology","host_organization_lineage":["https://openalex.org/P4310311714"],"host_organization_lineage_names":["Institution of Engineering and Technology"],"type":"journal"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false},"type":"article","type_crossref":"journal-article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5025970821","display_name":"Haiying Wen","orcid":"https://orcid.org/0000-0001-7096-7581"},"institutions":[{"id":"https://openalex.org/I151746483","display_name":"University of Waterloo","ror":"https://ror.org/01aff2v68","country_code":"CA","type":"education","lineage":["https://openalex.org/I151746483"]}],"countries":["CA"],"is_corresponding":false,"raw_author_name":"Haiying Wen","raw_affiliation_strings":["[Dept. of Electr. & Comput. Eng., Univ. of Waterloo, Waterloo, ON, Canada]"],"affiliations":[{"raw_affiliation_string":"[Dept. of Electr. & Comput. Eng., Univ. of Waterloo, Waterloo, ON, Canada]","institution_ids":["https://openalex.org/I151746483"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5109204460","display_name":"Pin-Han Ho","orcid":null},"institutions":[{"id":"https://openalex.org/I151746483","display_name":"University of Waterloo","ror":"https://ror.org/01aff2v68","country_code":"CA","type":"education","lineage":["https://openalex.org/I151746483"]}],"countries":["CA"],"is_corresponding":false,"raw_author_name":"Pin-Han Ho","raw_affiliation_strings":["Department of Electrical & Computer Engineering, University of Waterloo#TAB#"],"affiliations":[{"raw_affiliation_string":"Department of Electrical & Computer Engineering, University of Waterloo#TAB#","institution_ids":["https://openalex.org/I151746483"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5111564947","display_name":"Chun Qi","orcid":"https://orcid.org/0000-0003-1430-6011"},"institutions":[{"id":"https://openalex.org/I151746483","display_name":"University of Waterloo","ror":"https://ror.org/01aff2v68","country_code":"CA","type":"education","lineage":["https://openalex.org/I151746483"]}],"countries":["CA"],"is_corresponding":false,"raw_author_name":"Chun Qi","raw_affiliation_strings":["Department of Electrical & Computer Engineering, University of Waterloo#TAB#"],"affiliations":[{"raw_affiliation_string":"Department of Electrical & Computer Engineering, University of Waterloo#TAB#","institution_ids":["https://openalex.org/I151746483"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5036636567","display_name":"Guang Gong","orcid":"https://orcid.org/0000-0003-2684-9259"},"institutions":[{"id":"https://openalex.org/I151746483","display_name":"University of Waterloo","ror":"https://ror.org/01aff2v68","country_code":"CA","type":"education","lineage":["https://openalex.org/I151746483"]}],"countries":["CA"],"is_corresponding":false,"raw_author_name":"Guang Gong","raw_affiliation_strings":["Department of Electrical & Computer Engineering, University of Waterloo#TAB#"],"affiliations":[{"raw_affiliation_string":"Department of Electrical & Computer Engineering, University of Waterloo#TAB#","institution_ids":["https://openalex.org/I151746483"]}]}],"institution_assertions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":{"value":2000,"currency":"EUR","value_usd":2200,"provenance":"doaj"},"apc_paid":null,"fwci":1.401,"has_fulltext":true,"fulltext_origin":"ngrams","cited_by_count":39,"citation_normalized_percentile":{"value":0.878504,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":93,"max":94},"biblio":{"volume":"4","issue":"4","first_page":"390","last_page":"396"},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":0.9996,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":0.9996,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":0.9987,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9975,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[],"concepts":[{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.8013084},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7826077},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.65480894},{"id":"https://openalex.org/C21564112","wikidata":"https://www.wikidata.org/wiki/Q4825885","display_name":"Authentication protocol","level":3,"score":0.54505754},{"id":"https://openalex.org/C19247436","wikidata":"https://www.wikidata.org/wiki/Q192727","display_name":"Physical layer","level":3,"score":0.52976876},{"id":"https://openalex.org/C2779960059","wikidata":"https://www.wikidata.org/wiki/Q7113681","display_name":"Overhead (engineering)","level":2,"score":0.50954086},{"id":"https://openalex.org/C141492731","wikidata":"https://www.wikidata.org/wiki/Q1052621","display_name":"Message authentication code","level":3,"score":0.5058777},{"id":"https://openalex.org/C94523657","wikidata":"https://www.wikidata.org/wiki/Q4085781","display_name":"Wireless ad hoc network","level":3,"score":0.47815165},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.41346836},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.3934904},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.33851177},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.32270858},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.22846481},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.13723454},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.09116557},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"is_oa":false,"landing_page_url":"https://doi.org/10.1049/iet-ifs.2009.0197","pdf_url":null,"source":{"id":"https://openalex.org/S58852226","display_name":"IET Information Security","issn_l":"1751-8709","issn":["1751-8709","1751-8717"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310311714","host_organization_name":"Institution of Engineering and Technology","host_organization_lineage":["https://openalex.org/P4310311714"],"host_organization_lineage_names":["Institution of Engineering and Technology"],"type":"journal"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Industry, innovation and infrastructure","score":0.63,"id":"https://metadata.un.org/sdg/9"}],"grants":[],"datasets":[],"versions":[],"referenced_works_count":12,"referenced_works":["https://openalex.org/W1527059802","https://openalex.org/W1996360405","https://openalex.org/W2061285874","https://openalex.org/W2115735006","https://openalex.org/W2142613017","https://openalex.org/W2145577744","https://openalex.org/W2156214717","https://openalex.org/W2160015451","https://openalex.org/W2160152944","https://openalex.org/W2167504798","https://openalex.org/W2167770337","https://openalex.org/W4232836212"],"related_works":["https://openalex.org/W4285813075","https://openalex.org/W3136622342","https://openalex.org/W3131600677","https://openalex.org/W2946750750","https://openalex.org/W2283780021","https://openalex.org/W2129634231","https://openalex.org/W2118200228","https://openalex.org/W2116285675","https://openalex.org/W2061637199","https://openalex.org/W2033083292"],"abstract_inverted_index":{"The":[0,27],"paper":[1],"introduces":[2],"a":[3,12],"novel":[4],"message":[5,18,33],"authentication":[6,19,34,40,59,88],"framework":[7,29],"over":[8],"broadcast":[9],"channels,":[10],"where":[11],"symmetric":[13],"cryptography-based":[14],"physical":[15,38,51],"layer":[16,39,52,87],"assisted":[17],"(PLAA)":[20],"scheme":[21,83],"is":[22],"introduced":[23],"in":[24,50],"wireless":[25],"networks.":[26],"proposed":[28],"integrate":[30],"the":[31,37,62],"conventional":[32],"schemes":[35],"and":[36,47,71,84],"mechanisms":[41],"by":[42],"taking":[43],"advantage":[44],"of":[45],"temporal":[46],"spatial":[48],"uniqueness":[49],"channel":[53],"responses,":[54],"aiming":[55],"to":[56],"achieving":[57],"fast":[58],"while":[60],"minimising":[61],"packet":[63],"transmission":[64],"overhead.":[65],"Our":[66],"claims":[67],"through":[68],"extensive":[69],"analysis":[70],"simulation":[72],"will":[73],"be":[74],"verified":[75],"via":[76],"comparing":[77],"with":[78],"public":[79],"key":[80],"infrastructure-based":[81],"PLAA":[82],"traditional":[85],"upper":[86],"schemes.":[89]},"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W2047892990","counts_by_year":[{"year":2022,"cited_by_count":1},{"year":2021,"cited_by_count":12},{"year":2020,"cited_by_count":9},{"year":2019,"cited_by_count":2},{"year":2018,"cited_by_count":2},{"year":2017,"cited_by_count":3},{"year":2016,"cited_by_count":2},{"year":2015,"cited_by_count":2},{"year":2013,"cited_by_count":2},{"year":2012,"cited_by_count":2}],"updated_date":"2025-01-05T15:58:57.524658","created_date":"2016-06-24"}