{"id":"https://openalex.org/W3049574240","doi":"https://doi.org/10.1109/tsp49548.2020.9163573","title":"A Secure and Lightweight Authenticated Key Agreement Protocol for Distributed IoT Applications","display_name":"A Secure and Lightweight Authenticated Key Agreement Protocol for Distributed IoT Applications","publication_year":2020,"publication_date":"2020-07-01","ids":{"openalex":"https://openalex.org/W3049574240","doi":"https://doi.org/10.1109/tsp49548.2020.9163573","mag":"3049574240"},"language":"en","primary_location":{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/tsp49548.2020.9163573","pdf_url":null,"source":null,"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false},"type":"preprint","type_crossref":"proceedings-article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5054878481","display_name":"Pierre E. Abi-Char","orcid":"https://orcid.org/0000-0001-9722-2571"},"institutions":[{"id":"https://openalex.org/I2803079837","display_name":"American University of the Middle East","ror":"https://ror.org/02gqgne03","country_code":"KW","type":"education","lineage":["https://openalex.org/I2803079837"]}],"countries":["KW"],"is_corresponding":false,"raw_author_name":"Pierre E. Abi-Char","raw_affiliation_strings":["American University of The Middle East [Eqaila]"],"affiliations":[{"raw_affiliation_string":"American University of The Middle East [Eqaila]","institution_ids":["https://openalex.org/I2803079837"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5021730250","display_name":"Patric Nader","orcid":"https://orcid.org/0000-0002-7310-0120"},"institutions":[{"id":"https://openalex.org/I2803079837","display_name":"American University of the Middle East","ror":"https://ror.org/02gqgne03","country_code":"KW","type":"education","lineage":["https://openalex.org/I2803079837"]}],"countries":["KW"],"is_corresponding":false,"raw_author_name":"Patrick Nader","raw_affiliation_strings":["American University of The Middle East [Eqaila]","Laboratoire Mod\u00e9lisation et S\u00fbret\u00e9 des Syst\u00e8mes"],"affiliations":[{"raw_affiliation_string":"Laboratoire Mod\u00e9lisation et S\u00fbret\u00e9 des Syst\u00e8mes","institution_ids":[]},{"raw_affiliation_string":"American University of The Middle East [Eqaila]","institution_ids":["https://openalex.org/I2803079837"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5108843623","display_name":"Sandy Mahfouz","orcid":"https://orcid.org/0000-0002-6332-3283"},"institutions":[{"id":"https://openalex.org/I2803079837","display_name":"American University of the Middle East","ror":"https://ror.org/02gqgne03","country_code":"KW","type":"education","lineage":["https://openalex.org/I2803079837"]}],"countries":["KW"],"is_corresponding":false,"raw_author_name":"Sandy Mahfouz","raw_affiliation_strings":["American University of The Middle East [Eqaila]","Laboratoire Mod\u00e9lisation et S\u00fbret\u00e9 des Syst\u00e8mes"],"affiliations":[{"raw_affiliation_string":"Laboratoire Mod\u00e9lisation et S\u00fbret\u00e9 des Syst\u00e8mes","institution_ids":[]},{"raw_affiliation_string":"American University of The Middle East [Eqaila]","institution_ids":["https://openalex.org/I2803079837"]}]}],"institution_assertions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":null,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.806804,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":69,"max":73},"biblio":{"volume":null,"issue":null,"first_page":"50","last_page":"56"},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.9998,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.9998,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9988,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9911,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8507875},{"id":"https://openalex.org/C2780385302","wikidata":"https://www.wikidata.org/wiki/Q367158","display_name":"Protocol (science)","level":3,"score":0.5847145},{"id":"https://openalex.org/C167615521","wikidata":"https://www.wikidata.org/wiki/Q1048911","display_name":"Elliptic curve cryptography","level":4,"score":0.50916165},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.5046085},{"id":"https://openalex.org/C81860439","wikidata":"https://www.wikidata.org/wiki/Q251212","display_name":"Internet of Things","level":2,"score":0.482061},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.47344825},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.47077084},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.4578454},{"id":"https://openalex.org/C21564112","wikidata":"https://www.wikidata.org/wiki/Q4825885","display_name":"Authentication protocol","level":3,"score":0.43201518},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.41389632},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.35650203},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.25782913},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.12846223},{"id":"https://openalex.org/C71924100","wikidata":"https://www.wikidata.org/wiki/Q11190","display_name":"Medicine","level":0,"score":0.0},{"id":"https://openalex.org/C204787440","wikidata":"https://www.wikidata.org/wiki/Q188504","display_name":"Alternative medicine","level":2,"score":0.0},{"id":"https://openalex.org/C142724271","wikidata":"https://www.wikidata.org/wiki/Q7208","display_name":"Pathology","level":1,"score":0.0}],"mesh":[],"locations_count":3,"locations":[{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/tsp49548.2020.9163573","pdf_url":null,"source":null,"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false},{"is_oa":false,"landing_page_url":"https://hal-utt.archives-ouvertes.fr/hal-03323902","pdf_url":null,"source":{"id":"https://openalex.org/S4306402512","display_name":"HAL (Le Centre pour la Communication Scientifique Directe)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I1294671590","host_organization_name":"Centre National de la Recherche Scientifique","host_organization_lineage":["https://openalex.org/I1294671590"],"host_organization_lineage_names":["Centre National de la Recherche Scientifique"],"type":"repository"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false},{"is_oa":false,"landing_page_url":"https://utt.hal.science/hal-03323902","pdf_url":null,"source":null,"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Affordable and clean energy","score":0.63,"id":"https://metadata.un.org/sdg/7"}],"grants":[],"datasets":[],"versions":[],"referenced_works_count":24,"referenced_works":["https://openalex.org/W1486351179","https://openalex.org/W1763440353","https://openalex.org/W1880212920","https://openalex.org/W1967399643","https://openalex.org/W1994248320","https://openalex.org/W1996912680","https://openalex.org/W2002294620","https://openalex.org/W2007287631","https://openalex.org/W2035686709","https://openalex.org/W2051201663","https://openalex.org/W2053249018","https://openalex.org/W2079983098","https://openalex.org/W2091299352","https://openalex.org/W2141446237","https://openalex.org/W2158298409","https://openalex.org/W2279777762","https://openalex.org/W2289218694","https://openalex.org/W2337833343","https://openalex.org/W2530759338","https://openalex.org/W2625958646","https://openalex.org/W2656881249","https://openalex.org/W2734893110","https://openalex.org/W2779269988","https://openalex.org/W2912120935"],"related_works":["https://openalex.org/W4322486674","https://openalex.org/W3007106793","https://openalex.org/W2547137208","https://openalex.org/W2296396257","https://openalex.org/W2132505069","https://openalex.org/W2116285675","https://openalex.org/W2109882692","https://openalex.org/W2054202867","https://openalex.org/W2034419863","https://openalex.org/W1965515427"],"abstract_inverted_index":{"Internet":[0],"of":[1,143,160,177],"Things":[2],"(IoT)":[3],"is":[4,10,28,92,104,147],"growing":[5],"too":[6],"fast":[7,77],"and":[8,35,54,69,78,113,121,132,149,182],"it":[9],"being":[11],"deployed":[12],"in":[13,25,65,175],"various":[14],"domains":[15],"such":[16],"as":[17,30],"Smart":[18,20],"Homes,":[19],"City,":[21],"Healthcare,":[22],"etc.":[23],"Security":[24],"IoT":[26,33,43,58,96,114],"environments":[27],"critical,":[29],"information":[31,134],"between":[32],"devices":[34,59],"end-users":[36],"needs":[37],"to":[38,106,118,186],"be":[39],"shared":[40],"securely.":[41],"Therefore,":[42,98],"systems":[44],"require":[45],"protecting":[46],"two":[47],"critical":[48],"aspects,":[49],"which":[50],"are":[51,126],"confidential":[52],"data":[53],"identity":[55],"management.":[56],"However,":[57],"have":[60],"many":[61,187],"constraints,":[62],"including":[63],"limitations":[64],"computation,":[66],"power,":[67],"memory":[68],"energy.":[70],"In":[71],"this":[72],"paper,":[73],"we":[74],"present":[75],"a":[76,99,158],"secure":[79],"authenticated":[80,189],"key":[81],"agreement":[82],"protocol":[83,91,146,155,164],"based":[84],"on":[85],"elliptic":[86],"curve":[87],"cryptography.":[88],"The":[89,140],"proposed":[90,145,163],"used":[93,105],"for":[94,111],"distributed":[95,119],"applications.":[97],"Trusted":[100],"Third":[101],"Party":[102],"(TTP)":[103],"perform":[107],"the":[108,123,128,137,144,150,178],"registration":[109,124],"phases":[110,125],"users":[112],"devices.":[115],"With":[116],"respect":[117],"networks,":[120],"after":[122],"accomplished,":[127],"end-user":[129],"can":[130,156],"communicate":[131],"obtain":[133],"straightaway":[135],"from":[136],"sensor":[138],"nodes.":[139],"informal":[141],"security":[142],"analyzed,":[148],"analysis":[151],"shows":[152],"that":[153],"our":[154],"resist":[157],"variety":[159],"attacks.":[161],"Our":[162],"uses":[165],"ECDigital":[166],"Signature":[167],"Algorithm":[168],"(EC-DSA).":[169],"It":[170],"offers":[171],"significantly":[172],"improved":[173],"performance,":[174],"terms":[176],"required":[179],"computational":[180],"amount":[181],"energy":[183],"usage,":[184],"compared":[185],"other":[188],"protocols.":[190]},"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W3049574240","counts_by_year":[{"year":2023,"cited_by_count":1},{"year":2020,"cited_by_count":1}],"updated_date":"2025-01-17T17:55:10.711427","created_date":"2020-08-21"}