{"id":"https://openalex.org/W4200170024","doi":"https://doi.org/10.1109/commnet52204.2021.9641895","title":"A Time-Bound Continuous Authentication Protocol for Mesh Networking","display_name":"A Time-Bound Continuous Authentication Protocol for Mesh Networking","publication_year":2021,"publication_date":"2021-12-03","ids":{"openalex":"https://openalex.org/W4200170024","doi":"https://doi.org/10.1109/commnet52204.2021.9641895"},"language":"en","primary_location":{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/commnet52204.2021.9641895","pdf_url":null,"source":null,"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false},"type":"article","type_crossref":"proceedings-article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5022729359","display_name":"Selina Shrestha","orcid":null},"institutions":[{"id":"https://openalex.org/I4210087059","display_name":"Technology Innovation Institute","ror":"https://ror.org/001kv2y39","country_code":"AE","type":"facility","lineage":["https://openalex.org/I4210087059"]},{"id":"https://openalex.org/I176601375","display_name":"Khalifa University of Science and Technology","ror":"https://ror.org/05hffr360","country_code":"AE","type":"education","lineage":["https://openalex.org/I176601375"]}],"countries":["AE"],"is_corresponding":false,"raw_author_name":"Selina Shrestha","raw_affiliation_strings":["Khalifa University, Abu Dhabi, United Arab Emirates","Secure Systems Research Center (SSRC), Technology Innovation Institute (TII), Abu Dhabi, United Arab Emirates"],"affiliations":[{"raw_affiliation_string":"Secure Systems Research Center (SSRC), Technology Innovation Institute (TII), Abu Dhabi, United Arab Emirates","institution_ids":["https://openalex.org/I4210087059"]},{"raw_affiliation_string":"Khalifa University, Abu Dhabi, United Arab Emirates","institution_ids":["https://openalex.org/I176601375"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5025235658","display_name":"Martin Andreoni Lopez","orcid":"https://orcid.org/0000-0002-4170-4341"},"institutions":[{"id":"https://openalex.org/I4210087059","display_name":"Technology Innovation Institute","ror":"https://ror.org/001kv2y39","country_code":"AE","type":"facility","lineage":["https://openalex.org/I4210087059"]}],"countries":["AE"],"is_corresponding":false,"raw_author_name":"Martin Andreoni Lopez","raw_affiliation_strings":["Secure Systems Research Center (SSRC), Technology Innovation Institute (TII), Abu Dhabi, United Arab Emirates"],"affiliations":[{"raw_affiliation_string":"Secure Systems Research Center (SSRC), Technology Innovation Institute (TII), Abu Dhabi, United Arab Emirates","institution_ids":["https://openalex.org/I4210087059"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5064918197","display_name":"Michael Baddeley","orcid":"https://orcid.org/0000-0002-9202-8582"},"institutions":[{"id":"https://openalex.org/I4210087059","display_name":"Technology Innovation Institute","ror":"https://ror.org/001kv2y39","country_code":"AE","type":"facility","lineage":["https://openalex.org/I4210087059"]}],"countries":["AE"],"is_corresponding":false,"raw_author_name":"Michael Baddeley","raw_affiliation_strings":["Secure Systems Research Center (SSRC), Technology Innovation Institute (TII), Abu Dhabi, United Arab Emirates"],"affiliations":[{"raw_affiliation_string":"Secure Systems Research Center (SSRC), Technology Innovation Institute (TII), Abu Dhabi, United Arab Emirates","institution_ids":["https://openalex.org/I4210087059"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5004034156","display_name":"Sami Muhaidat","orcid":"https://orcid.org/0000-0003-4649-9399"},"institutions":[{"id":"https://openalex.org/I176601375","display_name":"Khalifa University of Science and Technology","ror":"https://ror.org/05hffr360","country_code":"AE","type":"education","lineage":["https://openalex.org/I176601375"]}],"countries":["AE"],"is_corresponding":false,"raw_author_name":"Sami Muhaidat","raw_affiliation_strings":["Khalifa University, Abu Dhabi, United Arab Emirates"],"affiliations":[{"raw_affiliation_string":"Khalifa University, Abu Dhabi, United Arab Emirates","institution_ids":["https://openalex.org/I176601375"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5086637926","display_name":"Jean\u2010Pierre Giacalone","orcid":null},"institutions":[{"id":"https://openalex.org/I4210087059","display_name":"Technology Innovation Institute","ror":"https://ror.org/001kv2y39","country_code":"AE","type":"facility","lineage":["https://openalex.org/I4210087059"]}],"countries":["AE"],"is_corresponding":false,"raw_author_name":"Jean-Pierre Giacalone","raw_affiliation_strings":["Secure Systems Research Center (SSRC), Technology Innovation Institute (TII), Abu Dhabi, United Arab Emirates"],"affiliations":[{"raw_affiliation_string":"Secure Systems Research Center (SSRC), Technology Innovation Institute (TII), Abu Dhabi, United Arab Emirates","institution_ids":["https://openalex.org/I4210087059"]}]}],"institution_assertions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.559,"has_fulltext":false,"cited_by_count":3,"citation_normalized_percentile":{"value":0.768257,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":72,"max":76},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9997,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9997,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.9997,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":0.9972,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.815959},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.7320192},{"id":"https://openalex.org/C21564112","wikidata":"https://www.wikidata.org/wiki/Q4825885","display_name":"Authentication protocol","level":3,"score":0.55578864},{"id":"https://openalex.org/C100485629","wikidata":"https://www.wikidata.org/wiki/Q1669397","display_name":"Hash-based message authentication code","level":4,"score":0.5318159},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.5249438},{"id":"https://openalex.org/C99138194","wikidata":"https://www.wikidata.org/wiki/Q183427","display_name":"Hash function","level":2,"score":0.464587},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.43285337},{"id":"https://openalex.org/C141492731","wikidata":"https://www.wikidata.org/wiki/Q1052621","display_name":"Message authentication code","level":3,"score":0.42239645},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.3522758},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.34193283}],"mesh":[],"locations_count":1,"locations":[{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/commnet52204.2021.9641895","pdf_url":null,"source":null,"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, justice, and strong institutions","score":0.44,"id":"https://metadata.un.org/sdg/16"}],"grants":[],"datasets":[],"versions":[],"referenced_works_count":17,"referenced_works":["https://openalex.org/W2014986199","https://openalex.org/W2025434161","https://openalex.org/W2037325971","https://openalex.org/W2101026822","https://openalex.org/W2141420453","https://openalex.org/W2156091798","https://openalex.org/W2158298409","https://openalex.org/W2169360434","https://openalex.org/W2273943897","https://openalex.org/W2549484948","https://openalex.org/W2565429718","https://openalex.org/W2772619223","https://openalex.org/W2791180050","https://openalex.org/W2795482797","https://openalex.org/W2964137134","https://openalex.org/W3089303131","https://openalex.org/W3217768034"],"related_works":["https://openalex.org/W4312776354","https://openalex.org/W3210438939","https://openalex.org/W2783731972","https://openalex.org/W2771872416","https://openalex.org/W2280933377","https://openalex.org/W2157901542","https://openalex.org/W2116285675","https://openalex.org/W1582906022","https://openalex.org/W1550771246","https://openalex.org/W1511774205"],"abstract_inverted_index":{"This":[0],"paper":[1],"proposes":[2],"a":[3,33,61,65,91,124,164],"novel":[4],"lightweight":[5,117,173],"authentication":[6,13,26,52,119,186],"protocol":[7,167],"for":[8,90,114,151],"fast":[9],"and":[10,64,95,132,174],"efficient":[11],"continuous":[12,51,118],"of":[14,17,32,75,100,144,156,159,184],"constrained":[15],"Internet":[16],"Things":[18],"(IoT)":[19],"mesh":[20,165],"network":[21],"devices.":[22],"An":[23],"initial":[24],"static":[25],"takes":[27],"place":[28],"at":[29,111],"the":[30,37,46,50,58,73,76,97,101,108,112,135,146,181],"beginning":[31],"session,":[34],"during":[35],"which":[36,86],"secret":[38,110],"is":[39,48,120,148],"securely":[40],"shared":[41,59],"between":[42],"two":[43],"parties.":[44],"Once":[45],"session":[47],"established,":[49],"scheme":[53],"generates":[54],"time-bound":[55,84],"tokens":[56],"using":[57,122],"secret,":[60],"time-varying":[62],"component,":[63],"random":[66],"value.":[67],"These":[68,83],"are":[69],"used":[70],"to":[71,107,137],"verify":[72],"identity":[74],"connected":[77],"device":[78],"in":[79],"fixed":[80],"time":[81,93],"intervals.":[82],"tokens,":[85],"only":[87,123],"remain":[88],"valid":[89],"predetermined":[92],"frame":[94],"ensure":[96],"continuity":[98],"aspect":[99],"mechanism,":[102],"can":[103],"be":[104],"linked":[105],"back":[106],"original":[109],"server":[113],"verification.":[115],"Therefore,":[116],"achieved":[121],"few":[125],"low":[126,175],"complexity":[127],"cryptographic":[128,140],"operations,":[129],"like":[130],"hash":[131],"MAC,":[133],"without":[134],"need":[136],"perform":[138],"costly":[139],"operations.":[141],"In":[142],"case":[143],"failure,":[145],"node":[147],"temporarily":[149],"blocked":[150],"an":[152,185],"exponential":[153],"function":[154],"period":[155],"past":[157],"occurrences":[158],"failure.":[160],"Performance":[161],"evaluation":[162],"over":[163],"routing":[166],"shows":[168],"that":[169],"our":[170],"proposal":[171],"fulfills":[172],"bandwidth":[176],"constraining":[177],"requirements":[178,183],"while":[179],"satisfying":[180],"security":[182],"scheme.":[187]},"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W4200170024","counts_by_year":[{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":1}],"updated_date":"2024-12-20T06:54:24.279993","created_date":"2021-12-31"}