{"id":"https://openalex.org/W4286698788","doi":"https://doi.org/10.1002/ett.4605","title":"A novel communication\u2010aware adaptive key management approach for ensuring security in IoT networks","display_name":"A novel communication\u2010aware adaptive key management approach for ensuring security in IoT networks","publication_year":2022,"publication_date":"2022-07-22","ids":{"openalex":"https://openalex.org/W4286698788","doi":"https://doi.org/10.1002/ett.4605"},"language":"en","primary_location":{"id":"doi:10.1002/ett.4605","is_oa":false,"landing_page_url":"https://doi.org/10.1002/ett.4605","pdf_url":null,"source":{"id":"https://openalex.org/S4306425600","display_name":"Transactions on Emerging Telecommunications Technologies","issn_l":"2161-3915","issn":["2161-3915","2161-5748"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Transactions on Emerging Telecommunications Technologies","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5026668901","display_name":"C. Tamizhselvan","orcid":null},"institutions":[{"id":"https://openalex.org/I85461943","display_name":"Saveetha University","ror":"https://ror.org/0034me914","country_code":"IN","type":"education","lineage":["https://openalex.org/I85461943"]}],"countries":["IN"],"is_corresponding":true,"raw_author_name":"C. Tamizhselvan","raw_affiliation_strings":["Assistant Professor (SG), Department of Electronics and Communication Engineering Saveetha School of Engineering, Saveetha University, SIMATS  Chennai Tamil Nadu India","Assistant Professor (SG), Department of Electronics and Communication Engineering, Saveetha School of Engineering, Saveetha University, SIMATS, Chennai, Tamil Nadu, India"],"affiliations":[{"raw_affiliation_string":"Assistant Professor (SG), Department of Electronics and Communication Engineering Saveetha School of Engineering, Saveetha University, SIMATS  Chennai Tamil Nadu India","institution_ids":["https://openalex.org/I85461943"]},{"raw_affiliation_string":"Assistant Professor (SG), Department of Electronics and Communication Engineering, Saveetha School of Engineering, Saveetha University, SIMATS, Chennai, Tamil Nadu, India","institution_ids":["https://openalex.org/I85461943"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5026668901"],"corresponding_institution_ids":["https://openalex.org/I85461943"],"apc_list":null,"apc_paid":null,"fwci":0.4144,"has_fulltext":false,"cited_by_count":3,"citation_normalized_percentile":{"value":0.61799027,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":91,"max":96},"biblio":{"volume":"33","issue":"11","first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.9990000128746033,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.9990000128746033,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":0.998199999332428,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.996399998664856,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7928965091705322},{"id":"https://openalex.org/keywords/key-management","display_name":"Key management","score":0.6153634786605835},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.596994936466217},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.5767708420753479},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5652019381523132},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.5422476530075073},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.49202486872673035},{"id":"https://openalex.org/keywords/security-association","display_name":"Security association","score":0.49118873476982117},{"id":"https://openalex.org/keywords/elliptic-curve-cryptography","display_name":"Elliptic curve cryptography","score":0.46869659423828125},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.3894274830818176},{"id":"https://openalex.org/keywords/cloud-computing-security","display_name":"Cloud computing security","score":0.21246522665023804},{"id":"https://openalex.org/keywords/security-information-and-event-management","display_name":"Security information and event management","score":0.21126362681388855},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.1767040491104126},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.16683214902877808}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7928965091705322},{"id":"https://openalex.org/C17886624","wikidata":"https://www.wikidata.org/wiki/Q1320561","display_name":"Key management","level":3,"score":0.6153634786605835},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.596994936466217},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.5767708420753479},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5652019381523132},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.5422476530075073},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.49202486872673035},{"id":"https://openalex.org/C130881749","wikidata":"https://www.wikidata.org/wiki/Q586894","display_name":"Security association","level":5,"score":0.49118873476982117},{"id":"https://openalex.org/C167615521","wikidata":"https://www.wikidata.org/wiki/Q1048911","display_name":"Elliptic curve cryptography","level":4,"score":0.46869659423828125},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.3894274830818176},{"id":"https://openalex.org/C184842701","wikidata":"https://www.wikidata.org/wiki/Q370563","display_name":"Cloud computing security","level":3,"score":0.21246522665023804},{"id":"https://openalex.org/C103377522","wikidata":"https://www.wikidata.org/wiki/Q3493999","display_name":"Security information and event management","level":4,"score":0.21126362681388855},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.1767040491104126},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.16683214902877808},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1002/ett.4605","is_oa":false,"landing_page_url":"https://doi.org/10.1002/ett.4605","pdf_url":null,"source":{"id":"https://openalex.org/S4306425600","display_name":"Transactions on Emerging Telecommunications Technologies","issn_l":"2161-3915","issn":["2161-3915","2161-5748"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Transactions on Emerging Telecommunications Technologies","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":25,"referenced_works":["https://openalex.org/W2559094099","https://openalex.org/W2562086057","https://openalex.org/W2769200374","https://openalex.org/W2771418843","https://openalex.org/W2889531475","https://openalex.org/W2897964703","https://openalex.org/W2906578628","https://openalex.org/W2940698126","https://openalex.org/W2953759867","https://openalex.org/W2972878892","https://openalex.org/W2997599690","https://openalex.org/W3007630910","https://openalex.org/W3018908910","https://openalex.org/W3020427544","https://openalex.org/W3021476248","https://openalex.org/W3096978936","https://openalex.org/W3097761912","https://openalex.org/W3106643019","https://openalex.org/W3116944216","https://openalex.org/W3118436442","https://openalex.org/W3119161496","https://openalex.org/W3135081412","https://openalex.org/W3142026016","https://openalex.org/W3184424580","https://openalex.org/W6786297682"],"related_works":["https://openalex.org/W3170888429","https://openalex.org/W2579503083","https://openalex.org/W2747959438","https://openalex.org/W121290600","https://openalex.org/W127464279","https://openalex.org/W1995609086","https://openalex.org/W2338862072","https://openalex.org/W1744547499","https://openalex.org/W1546414440","https://openalex.org/W2585546733"],"abstract_inverted_index":{"Abstract":[0],"Internet":[1],"of":[2,71,78,98,125,135],"Things":[3],"(IoT)":[4],"encompasses":[5],"heterogeneous":[6],"communication":[7],"devices":[8,28],"and":[9,34,48,83,91,129,147,154,162,164,171,206],"wireless":[10,38],"technologies":[11],"to":[12,44,67,131,175],"provide":[13],"ubiquitous":[14],"access":[15,33],"using":[16,88],"end\u2010user":[17],"devices.":[18],"It":[19],"operates":[20],"on":[21,122],"a":[22,59],"common":[23],"website":[24],"for":[25,112],"connecting":[26],"versatile":[27],"with":[29,223],"seamless":[30],"communication,":[31],"data":[32,50],"sharing.":[35],"Communication":[36],"through":[37],"medium":[39],"requires":[40],"enormous":[41],"security":[42,72,79,150,193,204,213,222],"features":[43],"protect":[45],"both":[46,81],"public":[47,199],"private":[49],"across":[51],"different":[52],"interconnected":[53],"resources.":[54],"Therefore,":[55],"in":[56,73,191,202,211],"this":[57],"article,":[58],"communication\u2010aware":[60,105],"adaptive":[61,106],"key":[62,92,107,166,189,200],"management":[63,108,190],"(CAKM)":[64],"is":[65,86],"proposed":[66,139,217],"ensure":[68],"two":[69],"levels":[70],"IoT":[74,192,203,212],"communication.":[75],"The":[76,138],"two\u2010levels":[77],"include":[80],"device":[82,114,118],"message":[84,110,158],"that":[85],"facilitated":[87],"certificate":[89],"authority":[90],"management.":[93],"By":[94],"exploiting":[95],"the":[96,104,113,117,123,132,136,176,216],"benefits":[97],"hyper":[99,195],"elliptic":[100,196],"curve":[101,197],"cryptography":[102],"(HECC),":[103],"ensures":[109],"authentication":[111,210],"requests.":[115],"Initially,":[116],"requests":[119],"are":[120],"classified":[121],"basis":[124],"its":[126],"service":[127],"time":[128,144,168],"correlated":[130],"time\u2010to\u2010live":[133],"period":[134],"certificate.":[137],"method":[140,218],"attains":[141],"low":[142,165,224],"computational":[143,225],"10.9%,":[145,152,160,169],"30.2%,":[146,153,161,170],"54.3%,":[148,155],"high":[149,156],"level":[151],"successful":[157],"rate":[159],"54.3%":[163,172],"agreement":[167],"when":[173],"compared":[174],"three":[177],"existing":[178],"methods,":[179],"such":[180],"as":[181],"bilateral":[182],"generalization":[183],"inhomogeneous":[184],"short":[185],"integer":[186],"solution":[187],"(Bi\u2010GISIS)\u2010based":[188],"(Bi\u2010GISIS\u2010IoT),":[194],"based":[198],"cryptosystem":[201],"(HCCPK\u2010IoT)":[205],"enhanced":[207],"symmetric":[208],"key\u2010based":[209],"(ESKA\u2010IoT).":[214],"Finally,":[215],"provides":[219],"an":[220],"efficient":[221],"time.":[226]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
