{"id":"https://openalex.org/W2082163531","doi":"https://doi.org/10.1109/trustcom.2013.252","title":"Secure Data Aggregation with MAC Authentication in Wireless Sensor Networks","display_name":"Secure Data Aggregation with MAC Authentication in Wireless Sensor Networks","publication_year":2013,"publication_date":"2013-07-01","ids":{"openalex":"https://openalex.org/W2082163531","doi":"https://doi.org/10.1109/trustcom.2013.252","mag":"2082163531"},"language":"en","primary_location":{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/trustcom.2013.252","pdf_url":null,"source":null,"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false},"type":"article","type_crossref":"proceedings-article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5060832078","display_name":"Ben Othman Soufiene","orcid":"https://orcid.org/0000-0001-8856-9450"},"institutions":[{"id":"https://openalex.org/I8636806","display_name":"University of Sousse","ror":"https://ror.org/00dmpgj58","country_code":"TN","type":"education","lineage":["https://openalex.org/I8636806"]}],"countries":["TN"],"is_corresponding":false,"raw_author_name":"Soufiene Ben Othman","raw_affiliation_strings":["ISITC, Univ. of Sousse, Sousse, Tunisia"],"affiliations":[{"raw_affiliation_string":"ISITC, Univ. of Sousse, Sousse, Tunisia","institution_ids":["https://openalex.org/I8636806"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5056423939","display_name":"Abdelbasset Trad","orcid":"https://orcid.org/0000-0003-0795-1151"},"institutions":[{"id":"https://openalex.org/I8636806","display_name":"University of Sousse","ror":"https://ror.org/00dmpgj58","country_code":"TN","type":"education","lineage":["https://openalex.org/I8636806"]}],"countries":["TN"],"is_corresponding":false,"raw_author_name":"Abdelbasset Trad","raw_affiliation_strings":["University of Sousse, Sousse, Tunisia"],"affiliations":[{"raw_affiliation_string":"University of Sousse, Sousse, Tunisia","institution_ids":["https://openalex.org/I8636806"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5005819428","display_name":"Habib Youssef","orcid":"https://orcid.org/0000-0001-9189-2654"},"institutions":[{"id":"https://openalex.org/I8636806","display_name":"University of Sousse","ror":"https://ror.org/00dmpgj58","country_code":"TN","type":"education","lineage":["https://openalex.org/I8636806"]}],"countries":["TN"],"is_corresponding":false,"raw_author_name":"Habib Youssef","raw_affiliation_strings":["University of Sousse, Sousse, Tunisia"],"affiliations":[{"raw_affiliation_string":"University of Sousse, Sousse, Tunisia","institution_ids":["https://openalex.org/I8636806"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5029357889","display_name":"Hani Alzaid","orcid":null},"institutions":[{"id":"https://openalex.org/I1284598098","display_name":"King Abdulaziz City for Science and Technology","ror":"https://ror.org/05tdz6m39","country_code":"SA","type":"facility","lineage":["https://openalex.org/I1284598098"]}],"countries":["SA"],"is_corresponding":false,"raw_author_name":"Hani Alzaid","raw_affiliation_strings":["King Abdulaziz City for Science and Technology, Riyadh, Saudi Arabia"],"affiliations":[{"raw_affiliation_string":"King Abdulaziz City for Science and Technology, Riyadh, Saudi Arabia","institution_ids":["https://openalex.org/I1284598098"]}]}],"institution_assertions":[],"countries_distinct_count":2,"institutions_distinct_count":2,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.916,"has_fulltext":true,"fulltext_origin":"ngrams","cited_by_count":19,"citation_normalized_percentile":{"value":0.880295,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":91},"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":0.9999,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":0.9999,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10080","display_name":"Wireless Sensor Networks: Survey and Applications","score":0.9993,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10246","display_name":"Ad Hoc Wireless Networks Research","score":0.9974,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/data-aggregator","display_name":"Data aggregator","score":0.79362893},{"id":"https://openalex.org/keywords/security-in-wireless-networks","display_name":"Security in Wireless Networks","score":0.598543},{"id":"https://openalex.org/keywords/data-aggregation","display_name":"Data Aggregation","score":0.564387},{"id":"https://openalex.org/keywords/mac-protocols","display_name":"MAC Protocols","score":0.556026},{"id":"https://openalex.org/keywords/secure-routing","display_name":"Secure Routing","score":0.545969},{"id":"https://openalex.org/keywords/wireless-sensor-networks","display_name":"Wireless Sensor Networks","score":0.532821},{"id":"https://openalex.org/keywords/homomorphic-encryption","display_name":"Homomorphic encryption","score":0.43599766}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8134304},{"id":"https://openalex.org/C82578977","wikidata":"https://www.wikidata.org/wiki/Q16773055","display_name":"Data aggregator","level":3,"score":0.79362893},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.7348595},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.66807985},{"id":"https://openalex.org/C2779960059","wikidata":"https://www.wikidata.org/wiki/Q7113681","display_name":"Overhead (engineering)","level":2,"score":0.6580843},{"id":"https://openalex.org/C24590314","wikidata":"https://www.wikidata.org/wiki/Q336038","display_name":"Wireless sensor network","level":2,"score":0.651456},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.59549165},{"id":"https://openalex.org/C141492731","wikidata":"https://www.wikidata.org/wiki/Q1052621","display_name":"Message authentication code","level":3,"score":0.4863599},{"id":"https://openalex.org/C41971633","wikidata":"https://www.wikidata.org/wiki/Q6398155","display_name":"Key distribution in wireless sensor networks","level":4,"score":0.43707743},{"id":"https://openalex.org/C158338273","wikidata":"https://www.wikidata.org/wiki/Q2154943","display_name":"Homomorphic encryption","level":3,"score":0.43599766},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.3614834},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.3406062},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3081262},{"id":"https://openalex.org/C108037233","wikidata":"https://www.wikidata.org/wiki/Q11375","display_name":"Wireless network","level":3,"score":0.23893845},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/trustcom.2013.252","pdf_url":null,"source":null,"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, justice, and strong institutions","id":"https://metadata.un.org/sdg/16","score":0.63}],"grants":[],"datasets":[],"versions":[],"referenced_works_count":24,"referenced_works":["https://openalex.org/W1479727008","https://openalex.org/W1520143916","https://openalex.org/W2000368779","https://openalex.org/W2013676739","https://openalex.org/W2019396864","https://openalex.org/W2045683888","https://openalex.org/W2061598619","https://openalex.org/W2102832611","https://openalex.org/W2106129384","https://openalex.org/W2110889959","https://openalex.org/W2114248007","https://openalex.org/W2120417050","https://openalex.org/W2125591151","https://openalex.org/W2127949150","https://openalex.org/W2132362924","https://openalex.org/W2137180374","https://openalex.org/W2139761368","https://openalex.org/W2139890752","https://openalex.org/W2154625773","https://openalex.org/W2164478452","https://openalex.org/W2167289038","https://openalex.org/W2168125208","https://openalex.org/W3144088531","https://openalex.org/W4205613121"],"related_works":["https://openalex.org/W2610450802","https://openalex.org/W2557309381","https://openalex.org/W2377996584","https://openalex.org/W2166668397","https://openalex.org/W2133974483","https://openalex.org/W2116285675","https://openalex.org/W2101056008","https://openalex.org/W2048910752","https://openalex.org/W1990998849","https://openalex.org/W1970057761"],"abstract_inverted_index":{"Recently,":[0],"several":[1],"data":[2,20,57,79],"aggregation":[3,21,29,80,94],"schemes":[4,22],"based":[5],"on":[6,15,47],"privacy":[7],"homomorphism":[8],"encryption":[9,65],"have":[10],"been":[11],"proposed":[12,92],"and":[13,66,75,99,102],"investigated":[14],"wireless":[16,82],"sensor":[17,83,109],"networks.":[18],"These":[19],"provide":[23],"better":[24],"security":[25],"compared":[26],"with":[27],"traditional":[28],"since":[30],"cluster":[31],"heads":[32],"(aggregator)":[33],"can":[34,103],"directly":[35],"aggregate":[36],"the":[37],"ciphertexts":[38],"without":[39],"decryption;":[40],"consequently,":[41],"transmission":[42],"overhead":[43,101],"is":[44,85],"reduced.":[45],"Based":[46],"our":[48,91],"survey":[49],"of":[50],"existing":[51],"research":[52],"efforts":[53],"for":[54,77],"ensuring":[55],"secure":[56,78,93],"aggregation,":[58],"a":[59],"novel":[60],"approach":[61],"that":[62,90],"uses":[63],"homomorphic":[64],"Message":[67],"Authentication":[68],"Codes":[69],"(MAC)":[70],"to":[71],"achieve":[72],"confidentiality,":[73],"authentication":[74],"integrity":[76],"in":[81,107],"networks":[84],"proposed.":[86],"Our":[87],"experiments":[88],"show":[89],"method":[95],"significantly":[96],"reduces":[97],"computation":[98],"communication":[100],"be":[104],"practically":[105],"implemented":[106],"on-the-shelf":[108],"platforms.":[110]},"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W2082163531","counts_by_year":[{"year":2024,"cited_by_count":2},{"year":2021,"cited_by_count":4},{"year":2020,"cited_by_count":2},{"year":2019,"cited_by_count":3},{"year":2018,"cited_by_count":2},{"year":2017,"cited_by_count":1},{"year":2016,"cited_by_count":1},{"year":2015,"cited_by_count":3},{"year":2014,"cited_by_count":1}],"updated_date":"2024-11-23T21:43:20.587138","created_date":"2016-06-24"}