{"id":"https://openalex.org/W2766496241","doi":"https://doi.org/10.1109/access.2017.2766090","title":"Seamless Key Agreement Framework for Mobile-Sink in IoT Based Cloud-Centric Secured Public Safety Sensor Networks","display_name":"Seamless Key Agreement Framework for Mobile-Sink in IoT Based Cloud-Centric Secured Public Safety Sensor Networks","publication_year":2017,"publication_date":"2017-01-01","ids":{"openalex":"https://openalex.org/W2766496241","doi":"https://doi.org/10.1109/access.2017.2766090","mag":"2766496241"},"language":"en","primary_location":{"is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2017.2766090","pdf_url":null,"source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_indexed_in_scopus":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true},"type":"article","type_crossref":"journal-article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://doi.org/10.1109/access.2017.2766090","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5066044089","display_name":"Fadi Al\u2010Turjman","orcid":"https://orcid.org/0000-0001-5418-873X"},"institutions":[{"id":"https://openalex.org/I201799495","display_name":"Middle East Technical University","ror":"https://ror.org/014weej12","country_code":"TR","type":"education","lineage":["https://openalex.org/I201799495"]}],"countries":["TR"],"is_corresponding":false,"raw_author_name":"Fadi Al-Turjman","raw_affiliation_strings":["Computer Engineering Program, Middle East Technical University Northern Cyprus Campus, Mersin, Turkey"],"affiliations":[{"raw_affiliation_string":"Computer Engineering Program, Middle East Technical University Northern Cyprus Campus, Mersin, Turkey","institution_ids":["https://openalex.org/I201799495"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5027227694","display_name":"Yoney Kirsal Ever","orcid":"https://orcid.org/0000-0002-8129-9846"},"institutions":[{"id":"https://openalex.org/I69050122","display_name":"Near East University","ror":"https://ror.org/02x8svs93","country_code":"CY","type":"education","lineage":["https://openalex.org/I69050122"]}],"countries":["CY"],"is_corresponding":false,"raw_author_name":"Yoney Kirsal Ever","raw_affiliation_strings":["Near East University, Nicosia, CY"],"affiliations":[{"raw_affiliation_string":"Near East University, Nicosia, CY","institution_ids":["https://openalex.org/I69050122"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5081317029","display_name":"Enver Ever","orcid":"https://orcid.org/0000-0001-6516-2770"},"institutions":[{"id":"https://openalex.org/I201799495","display_name":"Middle East Technical University","ror":"https://ror.org/014weej12","country_code":"TR","type":"education","lineage":["https://openalex.org/I201799495"]}],"countries":["TR"],"is_corresponding":false,"raw_author_name":"Enver Ever","raw_affiliation_strings":["Computer Engineering Program, Middle East Technical University Northern Cyprus Campus, Mersin, Turkey"],"affiliations":[{"raw_affiliation_string":"Computer Engineering Program, Middle East Technical University Northern Cyprus Campus, Mersin, Turkey","institution_ids":["https://openalex.org/I201799495"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5061828397","display_name":"Huan X. Nguyen","orcid":"https://orcid.org/0000-0002-4105-2558"},"institutions":[{"id":"https://openalex.org/I60488453","display_name":"Middlesex University","ror":"https://ror.org/01rv4p989","country_code":"GB","type":"education","lineage":["https://openalex.org/I60488453"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Huan X. Nguyen","raw_affiliation_strings":["Design Engineering and Maths Department, Middlesex University, London, U.K."],"affiliations":[{"raw_affiliation_string":"Design Engineering and Maths Department, Middlesex University, London, U.K.","institution_ids":["https://openalex.org/I60488453"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5035735165","display_name":"B. D. Deebak","orcid":"https://orcid.org/0000-0002-4008-6350"},"institutions":[{"id":"https://openalex.org/I201799495","display_name":"Middle East Technical University","ror":"https://ror.org/014weej12","country_code":"TR","type":"education","lineage":["https://openalex.org/I201799495"]}],"countries":["TR"],"is_corresponding":false,"raw_author_name":"Deebak Bakkiam David","raw_affiliation_strings":["Computer Engineering Program, Middle East Technical University Northern Cyprus Campus, Mersin, Turkey"],"affiliations":[{"raw_affiliation_string":"Computer Engineering Program, Middle East Technical University Northern Cyprus Campus, Mersin, Turkey","institution_ids":["https://openalex.org/I201799495"]}]}],"institution_assertions":[],"countries_distinct_count":3,"institutions_distinct_count":3,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":{"value":1850,"currency":"USD","value_usd":1850,"provenance":"doaj"},"apc_paid":{"value":1850,"currency":"USD","value_usd":1850,"provenance":"doaj"},"fwci":8.255,"has_fulltext":true,"fulltext_origin":"ngrams","cited_by_count":89,"citation_normalized_percentile":{"value":0.88022,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":98,"max":99},"biblio":{"volume":"5","issue":null,"first_page":"24617","last_page":"24631"},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":0.9993,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":0.9993,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.9991,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9909,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/mutual-authentication","display_name":"Mutual authentication","score":0.71332085},{"id":"https://openalex.org/keywords/session-key","display_name":"Session key","score":0.6002659},{"id":"https://openalex.org/keywords/replay-attack","display_name":"Replay attack","score":0.45835298}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.80885947},{"id":"https://openalex.org/C2781221063","wikidata":"https://www.wikidata.org/wiki/Q6944186","display_name":"Mutual authentication","level":3,"score":0.71332085},{"id":"https://openalex.org/C191197275","wikidata":"https://www.wikidata.org/wiki/Q1755775","display_name":"Session key","level":3,"score":0.6002659},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5758088},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.52237755},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.4714262},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.47056982},{"id":"https://openalex.org/C11560541","wikidata":"https://www.wikidata.org/wiki/Q1756025","display_name":"Replay attack","level":3,"score":0.45835298},{"id":"https://openalex.org/C167615521","wikidata":"https://www.wikidata.org/wiki/Q1048911","display_name":"Elliptic curve cryptography","level":4,"score":0.42954904},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.41436094},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.41076437},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.21940401},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2017.2766090","pdf_url":null,"source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_indexed_in_scopus":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true},{"is_oa":false,"landing_page_url":"https://doaj.org/article/f1f906c8724b429ca1095ae383b567c5","pdf_url":null,"source":{"id":"https://openalex.org/S4306401280","display_name":"DOAJ (DOAJ: Directory of Open Access Journals)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_indexed_in_scopus":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false}],"best_oa_location":{"is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2017.2766090","pdf_url":null,"source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_indexed_in_scopus":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true},"sustainable_development_goals":[{"score":0.62,"display_name":"Climate action","id":"https://metadata.un.org/sdg/13"}],"grants":[{"funder":"https://openalex.org/F4320312420","funder_display_name":"Newton Fund","award_id":"216429427"},{"funder":"https://openalex.org/F4320320025","funder_display_name":"British Council","award_id":null}],"datasets":[],"versions":[],"referenced_works_count":52,"referenced_works":["https://openalex.org/W1510811198","https://openalex.org/W1880212920","https://openalex.org/W1967308747","https://openalex.org/W1992007967","https://openalex.org/W1994248320","https://openalex.org/W2007287631","https://openalex.org/W2010939995","https://openalex.org/W2015207020","https://openalex.org/W2015934728","https://openalex.org/W2018300500","https://openalex.org/W2019883396","https://openalex.org/W2022066803","https://openalex.org/W2047413095","https://openalex.org/W2053134894","https://openalex.org/W2055473620","https://openalex.org/W2063939659","https://openalex.org/W2065192516","https://openalex.org/W2069514153","https://openalex.org/W2086576140","https://openalex.org/W2092258731","https://openalex.org/W2095054754","https://openalex.org/W2105103777","https://openalex.org/W211083189","https://openalex.org/W2112534360","https://openalex.org/W2116269350","https://openalex.org/W2117984332","https://openalex.org/W2122126819","https://openalex.org/W2138295925","https://openalex.org/W2140668977","https://openalex.org/W2148566536","https://openalex.org/W2159574436","https://openalex.org/W2161219541","https://openalex.org/W2169054797","https://openalex.org/W2170239483","https://openalex.org/W2291360251","https://openalex.org/W2338828827","https://openalex.org/W2402457987","https://openalex.org/W2403828610","https://openalex.org/W2531486221","https://openalex.org/W2546496699","https://openalex.org/W2556560382","https://openalex.org/W2559094099","https://openalex.org/W2568808500","https://openalex.org/W2575789609","https://openalex.org/W2605601615","https://openalex.org/W2611153588","https://openalex.org/W3211513184","https://openalex.org/W4232274958","https://openalex.org/W4252595028","https://openalex.org/W4307015383","https://openalex.org/W590625283","https://openalex.org/W766082629"],"related_works":["https://openalex.org/W2978473185","https://openalex.org/W2953104516","https://openalex.org/W2799836388","https://openalex.org/W2559950795","https://openalex.org/W2352353578","https://openalex.org/W2167743049","https://openalex.org/W2140125353","https://openalex.org/W211083189","https://openalex.org/W1542859216","https://openalex.org/W141692544"],"abstract_inverted_index":{"Recently,":[0],"the":[1,36,67,96,101,139,155,162,173,186,189],"Internet":[2,13],"of":[3,26,62,69,118],"Things":[4],"(IoT)":[5],"has":[6],"emerged":[7],"as":[8,105,107],"a":[9,60,144],"significant":[10,116],"advancement":[11],"for":[12,54,66],"and":[14,79,87,104,135,157,181,188],"mobile":[15,55],"networks":[16,152],"with":[17,124],"various":[18],"public":[19],"safety":[20],"network":[21],"applications.":[22],"An":[23],"important":[24],"use":[25],"IoT-based":[27],"solutions":[28],"is":[29,64,90,93,170],"its":[30],"application":[31],"in":[32,57,161],"post-disaster":[33],"management,":[34],"where":[35],"traditional":[37],"telecommunication":[38],"systems":[39],"may":[40],"be":[41],"either":[42],"completely":[43],"or":[44],"partially":[45],"damaged.":[46],"Since":[47],"enabling":[48],"technologies":[49],"have":[50],"restricted":[51],"authentication":[52,71,78,148,180],"privileges":[53],"users,":[56],"this":[58],"paper,":[59],"strategy":[61],"mobile-sink":[63,187],"introduced":[65],"extension":[68],"user":[70,131],"over":[72,149],"cloud-based":[73],"environments.":[74],"A":[75],"seamless":[76,145],"secure":[77],"key":[80,136,183],"agreement":[81,184],"(S-SAKA)":[82],"approach":[83,99,141],"using":[84,166],"bilinear":[85],"pairing":[86],"elliptic-curve":[88],"cryptosystems":[89],"presented.":[91],"It":[92],"shown":[94],"that":[95,172],"proposed":[97,140,174],"S-SAKA":[98,175],"satisfies":[100],"security":[102],"properties,":[103],"well":[106],"being":[108],"resilient":[109],"to":[110,153],"nodecapture":[111],"attacks,":[112],"it":[113,169],"also":[114],"resists":[115],"numbers":[117],"other":[119],"well-known":[120],"potential":[121],"attacks":[122],"related":[123],"data":[125],"confidentiality,":[126],"mutual":[127,179],"authentication,":[128],"session-key":[129],"agreement,":[130],"anonymity,":[132],"password":[133],"guessing,":[134],"impersonation.":[137],"Moreover,":[138],"can":[142],"provide":[143],"connectivity":[146],"through":[147],"wireless":[150],"sensor":[151],"alleviate":[154],"computation":[156],"communication":[158],"cost":[159],"constraints":[160],"system.":[163],"In":[164],"addition,":[165],"Burrows-Abadi-Needham":[167],"logic,":[168],"demonstrated":[171],"framework":[176],"offers":[177],"proper":[178],"session":[182],"between":[185],"base":[190],"station.":[191]},"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W2766496241","counts_by_year":[{"year":2024,"cited_by_count":2},{"year":2023,"cited_by_count":23},{"year":2022,"cited_by_count":7},{"year":2021,"cited_by_count":13},{"year":2020,"cited_by_count":20},{"year":2019,"cited_by_count":10},{"year":2018,"cited_by_count":14}],"updated_date":"2025-01-18T07:27:00.550458","created_date":"2017-11-10"}