{"id":"https://openalex.org/W2156554043","doi":"https://doi.org/10.1109/isecs.2008.216","title":"A Novel Tree-based Authenticated Dynamic Group Key Agreement Protocol for Wireless Sensor Network","display_name":"A Novel Tree-based Authenticated Dynamic Group Key Agreement Protocol for Wireless Sensor Network","publication_year":2008,"publication_date":"2008-01-01","ids":{"openalex":"https://openalex.org/W2156554043","doi":"https://doi.org/10.1109/isecs.2008.216","mag":"2156554043"},"language":"en","primary_location":{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/isecs.2008.216","pdf_url":null,"source":{"id":"https://openalex.org/S4306420136","display_name":"International Symposium on Electronic Commerce and Security","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_indexed_in_scopus":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false},"type":"article","type_crossref":"proceedings-article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5101831967","display_name":"Hong Tang","orcid":"https://orcid.org/0000-0003-0526-2571"},"institutions":[{"id":"https://openalex.org/I125839683","display_name":"Beijing Institute of Technology","ror":"https://ror.org/01skt4w74","country_code":"CN","type":"funder","lineage":["https://openalex.org/I125839683","https://openalex.org/I890469752"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Tang Hong","raw_affiliation_strings":["Beijing Key Laboratory of Intelligent Information, School of Computer Science and Technology, Beijing Institute of Technology, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Beijing Key Laboratory of Intelligent Information, School of Computer Science and Technology, Beijing Institute of Technology, Beijing, China","institution_ids":["https://openalex.org/I125839683"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5103460784","display_name":"Zhu Liehuang","orcid":null},"institutions":[{"id":"https://openalex.org/I125839683","display_name":"Beijing Institute of Technology","ror":"https://ror.org/01skt4w74","country_code":"CN","type":"funder","lineage":["https://openalex.org/I125839683","https://openalex.org/I890469752"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zhu Liehuang","raw_affiliation_strings":["Beijing Key Laboratory of Intelligent Information, School of Computer Science and Technology, Beijing Institute of Technology, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Beijing Key Laboratory of Intelligent Information, School of Computer Science and Technology, Beijing Institute of Technology, Beijing, China","institution_ids":["https://openalex.org/I125839683"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100294051","display_name":"Yuanda Cao","orcid":null},"institutions":[{"id":"https://openalex.org/I125839683","display_name":"Beijing Institute of Technology","ror":"https://ror.org/01skt4w74","country_code":"CN","type":"funder","lineage":["https://openalex.org/I125839683","https://openalex.org/I890469752"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Cao Yuanda","raw_affiliation_strings":["School of Software, Beijing Institute of Technology, Beijing, China"],"affiliations":[{"raw_affiliation_string":"School of Software, Beijing Institute of Technology, Beijing, China","institution_ids":["https://openalex.org/I125839683"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5021234470","display_name":"Wang Da-zhen","orcid":null},"institutions":[{"id":"https://openalex.org/I74525822","display_name":"Hubei University of Technology","ror":"https://ror.org/02d3fj342","country_code":"CN","type":"funder","lineage":["https://openalex.org/I74525822"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Wang Dazhen","raw_affiliation_strings":["Department of Computer Science, Hubei University of Technology, Wuhan, China"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, Hubei University of Technology, Wuhan, China","institution_ids":["https://openalex.org/I74525822"]}]}],"institution_assertions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.237,"has_fulltext":true,"fulltext_origin":"ngrams","cited_by_count":6,"citation_normalized_percentile":{"value":0.708474,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":80,"max":81},"biblio":{"volume":null,"issue":null,"first_page":"540","last_page":"544"},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":0.9995,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":0.9995,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9991,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.9943,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/group-key","display_name":"Group key","score":0.79245937},{"id":"https://openalex.org/keywords/key-agreement-protocol","display_name":"Key-agreement protocol","score":0.66044617},{"id":"https://openalex.org/keywords/session-key","display_name":"Session key","score":0.63315094},{"id":"https://openalex.org/keywords/oakley-protocol","display_name":"Oakley protocol","score":0.48845473},{"id":"https://openalex.org/keywords/forward-secrecy","display_name":"Forward secrecy","score":0.4594321},{"id":"https://openalex.org/keywords/tree","display_name":"Tree (set theory)","score":0.43293673},{"id":"https://openalex.org/keywords/diffie\u2013hellman-key-exchange","display_name":"Diffie\u2013Hellman key exchange","score":0.42833966}],"concepts":[{"id":"https://openalex.org/C2777513581","wikidata":"https://www.wikidata.org/wiki/Q5611239","display_name":"Group key","level":3,"score":0.79245937},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.76018256},{"id":"https://openalex.org/C135530808","wikidata":"https://www.wikidata.org/wiki/Q3306713","display_name":"Key-agreement protocol","level":5,"score":0.66044617},{"id":"https://openalex.org/C191197275","wikidata":"https://www.wikidata.org/wiki/Q1755775","display_name":"Session key","level":3,"score":0.63315094},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.6315042},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.6104652},{"id":"https://openalex.org/C62611344","wikidata":"https://www.wikidata.org/wiki/Q1062658","display_name":"Node (physics)","level":2,"score":0.5005572},{"id":"https://openalex.org/C126266803","wikidata":"https://www.wikidata.org/wiki/Q7074169","display_name":"Oakley protocol","level":5,"score":0.48845473},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.47355357},{"id":"https://openalex.org/C205009425","wikidata":"https://www.wikidata.org/wiki/Q935662","display_name":"Forward secrecy","level":4,"score":0.4594321},{"id":"https://openalex.org/C2780385302","wikidata":"https://www.wikidata.org/wiki/Q367158","display_name":"Protocol (science)","level":3,"score":0.4549243},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.44655576},{"id":"https://openalex.org/C113174947","wikidata":"https://www.wikidata.org/wiki/Q2859736","display_name":"Tree (set theory)","level":2,"score":0.43293673},{"id":"https://openalex.org/C29524669","wikidata":"https://www.wikidata.org/wiki/Q623447","display_name":"Diffie\u2013Hellman key exchange","level":5,"score":0.42833966},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.40152326},{"id":"https://openalex.org/C160333310","wikidata":"https://www.wikidata.org/wiki/Q6398153","display_name":"Key distribution","level":4,"score":0.30301392},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.14954871},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.13584477},{"id":"https://openalex.org/C71924100","wikidata":"https://www.wikidata.org/wiki/Q11190","display_name":"Medicine","level":0,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C204787440","wikidata":"https://www.wikidata.org/wiki/Q188504","display_name":"Alternative medicine","level":2,"score":0.0},{"id":"https://openalex.org/C66938386","wikidata":"https://www.wikidata.org/wiki/Q633538","display_name":"Structural engineering","level":1,"score":0.0},{"id":"https://openalex.org/C142724271","wikidata":"https://www.wikidata.org/wiki/Q7208","display_name":"Pathology","level":1,"score":0.0},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/isecs.2008.216","pdf_url":null,"source":{"id":"https://openalex.org/S4306420136","display_name":"International Symposium on Electronic Commerce and Security","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_indexed_in_scopus":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false}],"best_oa_location":null,"sustainable_development_goals":[],"grants":[],"datasets":[],"versions":[],"referenced_works_count":13,"referenced_works":["https://openalex.org/W1518270133","https://openalex.org/W1532836984","https://openalex.org/W1549244102","https://openalex.org/W1569083856","https://openalex.org/W1637905077","https://openalex.org/W1927099252","https://openalex.org/W1982833480","https://openalex.org/W2014239329","https://openalex.org/W2086042811","https://openalex.org/W2098996144","https://openalex.org/W2131123432","https://openalex.org/W2908207822","https://openalex.org/W2949912924"],"related_works":["https://openalex.org/W3091865558","https://openalex.org/W2907273444","https://openalex.org/W2739711964","https://openalex.org/W2359594577","https://openalex.org/W2158615491","https://openalex.org/W2156838002","https://openalex.org/W2072671478","https://openalex.org/W1984921958","https://openalex.org/W1514818157","https://openalex.org/W1503599280"],"abstract_inverted_index":{"Group":[0],"key":[1,47,69,84,90,108,115],"agreement":[2,48,70,85,109],"protocol":[3,112,138],"allows":[4],"all":[5,24],"the":[6,25,53,89],"members":[7],"to":[8,51,87],"agree":[9],"upon":[10],"a":[11,92,103],"common":[12],"session":[13],"key,":[14],"which":[15,94,117],"may":[16],"be":[17],"used":[18],"for":[19,125,135],"later":[20],"secure":[21],"communication":[22,148],"among":[23],"participants.":[26],"Since":[27],"TGDH":[28,118],"(tree":[29],"based":[30,72],"Diffie-Hellman)":[31],"has":[32,95],"been":[33],"proposed":[34,50],"by":[35],"Yongdae":[36],"Kim,":[37],"Adrian":[38],"Perrig,":[39],"and":[40,55,67,127,131,147],"Gene":[41],"Tsudik,":[42],"there":[43],"are":[44],"several":[45],"group":[46,107],"protocols":[49,71,86],"improve":[52],"security":[54],"performance":[56],"of":[57,91,145],"TGDH.":[58,150],"In":[59],"this":[60],"paper,":[61],"we":[62,101],"first":[63],"propose":[64,102],"authenticated":[65,78,106],"two-party":[66],"three-party":[68],"on":[73],"bilinear":[74,129],"pairing.":[75],"Then,":[76],"using":[77],"two":[79,96],"party":[80,83],"or":[81,97],"three":[82,98],"compute":[88],"node":[93],"child":[99],"nodes,":[100],"novel":[104],"tree-based":[105],"protocol.":[110],"Our":[111],"provides":[113],"implicit":[114],"authentication,":[116],"cannot":[119],"provide.":[120],"Through":[121],"substituting":[122,128],"ternary":[123],"tree":[124],"binary":[126],"pairing":[130],"ellipse":[132],"curve":[133],"DH":[134],"DH,":[136],"our":[137],"is":[139],"more":[140],"efficient":[141],"both":[142],"in":[143],"term":[144],"computation":[146],"than":[149]},"abstract_inverted_index_v3":null,"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W2156554043","counts_by_year":[{"year":2019,"cited_by_count":1},{"year":2016,"cited_by_count":1},{"year":2015,"cited_by_count":1},{"year":2013,"cited_by_count":1},{"year":2012,"cited_by_count":1}],"updated_date":"2025-04-03T15:53:36.354558","created_date":"2016-06-24"}