{"id":"https://openalex.org/W3213272398","doi":"https://doi.org/10.1109/wf-iot51360.2021.9596024","title":"Reverse Sequence Hash Chain based Multicast Authentication for IoT Firmware Updates","display_name":"Reverse Sequence Hash Chain based Multicast Authentication for IoT Firmware Updates","publication_year":2021,"publication_date":"2021-06-14","ids":{"openalex":"https://openalex.org/W3213272398","doi":"https://doi.org/10.1109/wf-iot51360.2021.9596024","mag":"3213272398"},"language":"en","primary_location":{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/wf-iot51360.2021.9596024","pdf_url":null,"source":null,"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false},"type":"article","type_crossref":"proceedings-article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5057198948","display_name":"Jiye Park","orcid":null},"institutions":[{"id":"https://openalex.org/I62318514","display_name":"University of Duisburg-Essen","ror":"https://ror.org/04mz5ra38","country_code":"DE","type":"education","lineage":["https://openalex.org/I62318514"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Jiye Park","raw_affiliation_strings":["University of Duisburg-Essen, Essen, Germany"],"affiliations":[{"raw_affiliation_string":"University of Duisburg-Essen, Essen, Germany","institution_ids":["https://openalex.org/I62318514"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5071595184","display_name":"Dongha Lee","orcid":"https://orcid.org/0000-0003-2173-3476"},"institutions":[{"id":"https://openalex.org/I62318514","display_name":"University of Duisburg-Essen","ror":"https://ror.org/04mz5ra38","country_code":"DE","type":"education","lineage":["https://openalex.org/I62318514"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Dongha Lee","raw_affiliation_strings":["University of Duisburg-Essen, Munich, Germany"],"affiliations":[{"raw_affiliation_string":"University of Duisburg-Essen, Munich, Germany","institution_ids":["https://openalex.org/I62318514"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5001587704","display_name":"Gerhard Maierbacher","orcid":null},"institutions":[{"id":"https://openalex.org/I62318514","display_name":"University of Duisburg-Essen","ror":"https://ror.org/04mz5ra38","country_code":"DE","type":"education","lineage":["https://openalex.org/I62318514"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Gerhard Maierbacher","raw_affiliation_strings":["University of Duisburg-Essen, Munich, Germany"],"affiliations":[{"raw_affiliation_string":"University of Duisburg-Essen, Munich, Germany","institution_ids":["https://openalex.org/I62318514"]}]}],"institution_assertions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.0,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":0,"max":57},"biblio":{"volume":"5","issue":null,"first_page":"518","last_page":"523"},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":0.9991,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":0.9991,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9979,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.9974,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/firmware","display_name":"Firmware","score":0.63396436},{"id":"https://openalex.org/keywords/communication-source","display_name":"Communication source","score":0.41171777}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.85170895},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.6819612},{"id":"https://openalex.org/C99138194","wikidata":"https://www.wikidata.org/wiki/Q183427","display_name":"Hash function","level":2,"score":0.6534967},{"id":"https://openalex.org/C32295351","wikidata":"https://www.wikidata.org/wiki/Q899288","display_name":"Multicast","level":2,"score":0.6443276},{"id":"https://openalex.org/C67212190","wikidata":"https://www.wikidata.org/wiki/Q104851","display_name":"Firmware","level":2,"score":0.63396436},{"id":"https://openalex.org/C135783594","wikidata":"https://www.wikidata.org/wiki/Q5678864","display_name":"Hash chain","level":3,"score":0.6090606},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.573485},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.5309719},{"id":"https://openalex.org/C141492731","wikidata":"https://www.wikidata.org/wiki/Q1052621","display_name":"Message authentication code","level":3,"score":0.50601023},{"id":"https://openalex.org/C21564112","wikidata":"https://www.wikidata.org/wiki/Q4825885","display_name":"Authentication protocol","level":3,"score":0.447889},{"id":"https://openalex.org/C7608002","wikidata":"https://www.wikidata.org/wiki/Q477202","display_name":"Cryptographic hash function","level":3,"score":0.44449884},{"id":"https://openalex.org/C100485629","wikidata":"https://www.wikidata.org/wiki/Q1669397","display_name":"Hash-based message authentication code","level":4,"score":0.42187557},{"id":"https://openalex.org/C198104137","wikidata":"https://www.wikidata.org/wiki/Q974688","display_name":"Communication source","level":2,"score":0.41171777},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.37828436},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.3314857},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.33044654},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.10738072}],"mesh":[],"locations_count":1,"locations":[{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/wf-iot51360.2021.9596024","pdf_url":null,"source":null,"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false}],"best_oa_location":null,"sustainable_development_goals":[],"grants":[],"datasets":[],"versions":[],"referenced_works_count":15,"referenced_works":["https://openalex.org/W1850704191","https://openalex.org/W1974303722","https://openalex.org/W2069836575","https://openalex.org/W2110081058","https://openalex.org/W2140372921","https://openalex.org/W2234639732","https://openalex.org/W2240045799","https://openalex.org/W2507130841","https://openalex.org/W2509809689","https://openalex.org/W2743937508","https://openalex.org/W2744532080","https://openalex.org/W2769253994","https://openalex.org/W2903376235","https://openalex.org/W2907056717","https://openalex.org/W3089929362"],"related_works":["https://openalex.org/W4312776354","https://openalex.org/W2506519536","https://openalex.org/W2390538912","https://openalex.org/W2387100713","https://openalex.org/W2280933377","https://openalex.org/W2157901542","https://openalex.org/W2139378575","https://openalex.org/W1989379795","https://openalex.org/W1674074891","https://openalex.org/W1528628021"],"abstract_inverted_index":{"The":[0,71],"possibility":[1],"to":[2,36,47,75,130],"perform":[3],"remote,":[4],"yet":[5],"secure":[6],"firmware":[7,33],"updates":[8],"in":[9,98],"Internet":[10],"of":[11,21,27,51,82,105,134,152],"Things":[12],"(IoT)":[13],"scenarios":[14],"is":[15,26,66,74],"relevant":[16],"for":[17,62,68],"a":[18,31,40,48,59,77],"broad":[19],"spectrum":[20],"applications.":[22],"Secure":[23],"multicast":[24],"communication":[25],"particular":[28],"relevance":[29],"as":[30],"large":[32,49],"file":[34],"needs":[35],"be":[37,120],"distributed":[38],"over":[39],"constrained,":[41],"unreliable":[42],"and":[43,108,143,148],"potentially":[44],"insecure":[45],"network":[46],"number":[50],"constrained":[52],"devices.":[53],"In":[54,128],"this":[55],"work,":[56],"we":[57,138,144],"propose":[58],"lightweight":[60],"method":[61],"source":[63],"authentication":[64],"that":[65],"suitable":[67],"such":[69],"scenarios.":[70],"main":[72],"idea":[73],"use":[76],"reverse":[78],"sequence":[79],"hash":[80],"chain":[81],"the":[83,88,99,103,111,116,123,132],"entire":[84],"packets":[85],"which":[86],"only":[87],"legitimated":[89],"sender":[90],"knows.":[91],"With":[92],"one":[93],"time":[94],"signature":[95],"verification,":[96],"receivers":[97],"group":[100],"can":[101,109,119],"authenticate":[102],"origin":[104],"each":[106],"packet":[107],"check":[110],"integrity.":[112],"We":[113],"show":[114],"how":[115],"proposed":[117,136],"scheme":[118],"integrated":[121],"with":[122],"Constrained":[124],"Application":[125],"Protocol":[126],"(CoAP).":[127],"order":[129],"underline":[131],"capabilities":[133],"our":[135],"solution,":[137],"provide":[139],"security":[140],"evaluation":[141],"results,":[142],"demonstrate":[145],"its":[146],"practicability":[147],"effectiveness":[149],"by":[150],"means":[151],"hardware":[153],"experiments.":[154]},"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W3213272398","counts_by_year":[],"updated_date":"2024-12-08T07:17:05.253381","created_date":"2021-11-22"}