{"id":"https://openalex.org/W3172388096","doi":"https://doi.org/10.1007/s10207-021-00570-7","title":"Pragmatic authenticated key agreement for IEEE Std 802.15.6","display_name":"Pragmatic authenticated key agreement for IEEE Std 802.15.6","publication_year":2021,"publication_date":"2021-10-27","ids":{"openalex":"https://openalex.org/W3172388096","doi":"https://doi.org/10.1007/s10207-021-00570-7","mag":"3172388096"},"language":"en","primary_location":{"id":"doi:10.1007/s10207-021-00570-7","is_oa":true,"landing_page_url":"https://doi.org/10.1007/s10207-021-00570-7","pdf_url":"https://link.springer.com/content/pdf/10.1007/s10207-021-00570-7.pdf","source":{"id":"https://openalex.org/S164062316","display_name":"International Journal of Information Security","issn_l":"1615-5262","issn":["1615-5262","1615-5270"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Information Security","raw_type":"journal-article"},"type":"preprint","indexed_in":["crossref","datacite"],"open_access":{"is_oa":true,"oa_status":"hybrid","oa_url":"https://link.springer.com/content/pdf/10.1007/s10207-021-00570-7.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5047495285","display_name":"Haibat Khan","orcid":"https://orcid.org/0000-0002-2948-4964"},"institutions":[{"id":"https://openalex.org/I4210143942","display_name":"National University of Technology","ror":"https://ror.org/05e21fw44","country_code":"PK","type":"education","lineage":["https://openalex.org/I4210143942"]},{"id":"https://openalex.org/I184558857","display_name":"Royal Holloway University of London","ror":"https://ror.org/04g2vpn86","country_code":"GB","type":"education","lineage":["https://openalex.org/I124357947","https://openalex.org/I184558857"]},{"id":"https://openalex.org/I929597975","display_name":"National University of Sciences and Technology","ror":"https://ror.org/03w2j5y17","country_code":"PK","type":"education","lineage":["https://openalex.org/I929597975"]}],"countries":["GB","PK"],"is_corresponding":true,"raw_author_name":"Haibat Khan","raw_affiliation_strings":["Department of Avionics Engineering, College of Aeronautical Engineering, National University of Sciences and Technology, Islamabad, 44000, Pakistan","Information Security Group, Royal Holloway, University of London, London, UK","Department of Avionics Engineering, College of Aeronautical Engineering, National University of Sciences and Technology, Islamabad, Pakistan"],"affiliations":[{"raw_affiliation_string":"Department of Avionics Engineering, College of Aeronautical Engineering, National University of Sciences and Technology, Islamabad, 44000, Pakistan","institution_ids":["https://openalex.org/I4210143942"]},{"raw_affiliation_string":"Information Security Group, Royal Holloway, University of London, London, UK","institution_ids":["https://openalex.org/I184558857"]},{"raw_affiliation_string":"Department of Avionics Engineering, College of Aeronautical Engineering, National University of Sciences and Technology, Islamabad, Pakistan","institution_ids":["https://openalex.org/I929597975"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5015282175","display_name":"Benjamin Dowling","orcid":"https://orcid.org/0000-0003-3234-6527"},"institutions":[{"id":"https://openalex.org/I35440088","display_name":"ETH Zurich","ror":"https://ror.org/05a28rw58","country_code":"CH","type":"education","lineage":["https://openalex.org/I2799323385","https://openalex.org/I35440088"]}],"countries":["CH"],"is_corresponding":false,"raw_author_name":"Benjamin Dowling","raw_affiliation_strings":["Department of Computer Science, ETH Zurich, Zurich, Switzerland","Department of Computer Science, ETH Z\u00fcrich, Zurich, Switzerland"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, ETH Zurich, Zurich, Switzerland","institution_ids":["https://openalex.org/I35440088"]},{"raw_affiliation_string":"Department of Computer Science, ETH Z\u00fcrich, Zurich, Switzerland","institution_ids":["https://openalex.org/I35440088"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5028969043","display_name":"Keith M. Martin","orcid":"https://orcid.org/0000-0001-7877-9075"},"institutions":[{"id":"https://openalex.org/I184558857","display_name":"Royal Holloway University of London","ror":"https://ror.org/04g2vpn86","country_code":"GB","type":"education","lineage":["https://openalex.org/I124357947","https://openalex.org/I184558857"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Keith M. Martin","raw_affiliation_strings":["Information Security Group, Royal Holloway, University of London, London, UK","Information Security Group, Royal Holloway,  University of London, London, UK"],"affiliations":[{"raw_affiliation_string":"Information Security Group, Royal Holloway, University of London, London, UK","institution_ids":["https://openalex.org/I184558857"]},{"raw_affiliation_string":"Information Security Group, Royal Holloway,  University of London, London, UK","institution_ids":["https://openalex.org/I184558857"]}]}],"institutions":[],"countries_distinct_count":3,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5047495285"],"corresponding_institution_ids":["https://openalex.org/I184558857","https://openalex.org/I4210143942","https://openalex.org/I929597975"],"apc_list":{"value":2590,"currency":"EUR","value_usd":3190},"apc_paid":{"value":2590,"currency":"EUR","value_usd":3190},"fwci":0.0,"has_fulltext":true,"cited_by_count":0,"citation_normalized_percentile":{"value":0.09206774,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"21","issue":"3","first_page":"577","last_page":"595"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.9894000291824341,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.9894000291824341,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11932","display_name":"Wireless Body Area Networks","score":0.9692000150680542,"subfield":{"id":"https://openalex.org/subfields/2204","display_name":"Biomedical Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7696483135223389},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6317398548126221},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.6296736598014832},{"id":"https://openalex.org/keywords/anonymity","display_name":"Anonymity","score":0.5610102415084839},{"id":"https://openalex.org/keywords/provisioning","display_name":"Provisioning","score":0.5433611869812012},{"id":"https://openalex.org/keywords/key-agreement-protocol","display_name":"Key-agreement protocol","score":0.5034982562065125},{"id":"https://openalex.org/keywords/protocol","display_name":"Protocol (science)","score":0.4699680507183075},{"id":"https://openalex.org/keywords/cryptographic-protocol","display_name":"Cryptographic protocol","score":0.41906577348709106},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.41647979617118835},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.26853081583976746},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.2652992010116577},{"id":"https://openalex.org/keywords/key-distribution","display_name":"Key distribution","score":0.2008742094039917},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.11433547735214233}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7696483135223389},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6317398548126221},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.6296736598014832},{"id":"https://openalex.org/C178005623","wikidata":"https://www.wikidata.org/wiki/Q308859","display_name":"Anonymity","level":2,"score":0.5610102415084839},{"id":"https://openalex.org/C172191483","wikidata":"https://www.wikidata.org/wiki/Q1071806","display_name":"Provisioning","level":2,"score":0.5433611869812012},{"id":"https://openalex.org/C135530808","wikidata":"https://www.wikidata.org/wiki/Q3306713","display_name":"Key-agreement protocol","level":5,"score":0.5034982562065125},{"id":"https://openalex.org/C2780385302","wikidata":"https://www.wikidata.org/wiki/Q367158","display_name":"Protocol (science)","level":3,"score":0.4699680507183075},{"id":"https://openalex.org/C33884865","wikidata":"https://www.wikidata.org/wiki/Q1254335","display_name":"Cryptographic protocol","level":3,"score":0.41906577348709106},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.41647979617118835},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.26853081583976746},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.2652992010116577},{"id":"https://openalex.org/C160333310","wikidata":"https://www.wikidata.org/wiki/Q6398153","display_name":"Key distribution","level":4,"score":0.2008742094039917},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.11433547735214233},{"id":"https://openalex.org/C71924100","wikidata":"https://www.wikidata.org/wiki/Q11190","display_name":"Medicine","level":0,"score":0.0},{"id":"https://openalex.org/C142724271","wikidata":"https://www.wikidata.org/wiki/Q7208","display_name":"Pathology","level":1,"score":0.0},{"id":"https://openalex.org/C204787440","wikidata":"https://www.wikidata.org/wiki/Q188504","display_name":"Alternative medicine","level":2,"score":0.0}],"mesh":[],"locations_count":4,"locations":[{"id":"doi:10.1007/s10207-021-00570-7","is_oa":true,"landing_page_url":"https://doi.org/10.1007/s10207-021-00570-7","pdf_url":"https://link.springer.com/content/pdf/10.1007/s10207-021-00570-7.pdf","source":{"id":"https://openalex.org/S164062316","display_name":"International Journal of Information Security","issn_l":"1615-5262","issn":["1615-5262","1615-5270"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Information Security","raw_type":"journal-article"},{"id":"pmh:oai:www.research-collection.ethz.ch:20.500.11850/519193","is_oa":true,"landing_page_url":"http://hdl.handle.net/20.500.11850/519193","pdf_url":null,"source":{"id":"https://openalex.org/S4306402302","display_name":"Repository for Publications and Research Data (ETH Zurich)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I35440088","host_organization_name":"ETH Zurich","host_organization_lineage":["https://openalex.org/I35440088"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"International Journal of Information Security, 21 (3)","raw_type":"info:eu-repo/semantics/publishedVersion"},{"id":"doi:10.3929/ethz-b-000519193","is_oa":true,"landing_page_url":"https://doi.org/10.3929/ethz-b-000519193","pdf_url":null,"source":{"id":"https://openalex.org/S7407051236","display_name":"ETH Z\u00fcrich Research Collection","issn_l":null,"issn":[],"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":null,"raw_source_name":null,"raw_type":"article-journal"},{"id":"mag:3172388096","is_oa":false,"landing_page_url":null,"pdf_url":null,"source":null,"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":null,"raw_source_name":null,"raw_type":null}],"best_oa_location":{"id":"doi:10.1007/s10207-021-00570-7","is_oa":true,"landing_page_url":"https://doi.org/10.1007/s10207-021-00570-7","pdf_url":"https://link.springer.com/content/pdf/10.1007/s10207-021-00570-7.pdf","source":{"id":"https://openalex.org/S164062316","display_name":"International Journal of Information Security","issn_l":"1615-5262","issn":["1615-5262","1615-5270"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Information Security","raw_type":"journal-article"},"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","score":0.5,"display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W3172388096.pdf","grobid_xml":"https://content.openalex.org/works/W3172388096.grobid-xml"},"referenced_works_count":24,"referenced_works":["https://openalex.org/W1414681669","https://openalex.org/W1502577962","https://openalex.org/W1518174933","https://openalex.org/W1523228572","https://openalex.org/W1542059364","https://openalex.org/W1601460119","https://openalex.org/W1607643969","https://openalex.org/W1763440353","https://openalex.org/W1905187848","https://openalex.org/W1927099252","https://openalex.org/W1994386233","https://openalex.org/W2002826159","https://openalex.org/W2005541978","https://openalex.org/W2022883996","https://openalex.org/W2029693536","https://openalex.org/W2112320278","https://openalex.org/W2117455301","https://openalex.org/W2170334586","https://openalex.org/W2337833343","https://openalex.org/W2523739949","https://openalex.org/W2547930318","https://openalex.org/W2596876870","https://openalex.org/W2891588606","https://openalex.org/W3029680783"],"related_works":["https://openalex.org/W2788473962","https://openalex.org/W1527077352","https://openalex.org/W2159302907","https://openalex.org/W1982334890","https://openalex.org/W2591777068","https://openalex.org/W1607589769","https://openalex.org/W2008965715","https://openalex.org/W2166027506","https://openalex.org/W2746057058","https://openalex.org/W2157939520","https://openalex.org/W97208845","https://openalex.org/W2148167522","https://openalex.org/W2113373913","https://openalex.org/W1976000498","https://openalex.org/W1496314816","https://openalex.org/W2750407136","https://openalex.org/W2023708504","https://openalex.org/W2809727329","https://openalex.org/W2063391066","https://openalex.org/W1541979851"],"abstract_inverted_index":{"Abstract":[0],"The":[1,15],"IEEE":[2,65],"Std":[3,66],"802.15.6":[4],"is":[5,22],"the":[6,61,90,113],"latest":[7],"international":[8],"standard":[9,21],"for":[10,64],"Wireless":[11],"Body":[12],"Area":[13],"Networks.":[14],"security":[16,38,86,102],"of":[17,94],"communication":[18],"in":[19,78,106,117],"this":[20,69,118],"based":[23],"upon":[24],"four":[25],"elliptic-curve-based":[26],"key":[27,52,72],"agreement":[28,53,73],"protocols.":[29],"These":[30],"protocols":[31,74,115],"have":[32],"been":[33,56],"shown":[34],"to":[35,80],"exhibit":[36],"serious":[37],"vulnerabilities":[39],"but":[40],"surprisingly,":[41],"do":[42],"not":[43],"provision":[44],"any":[45],"privacy":[46,92,104],"guarantees.":[47],"To":[48],"date,":[49],"no":[50],"suitable":[51],"protocol":[54],"has":[55],"proposed":[57,114],"which":[58],"fulfills":[59],"all":[60],"requisite":[62],"objectives":[63],"802.15.6.":[67],"In":[68],"paper,":[70],"two":[71],"are":[75],"presented":[76],"which,":[77],"addition":[79],"being":[81],"efficient":[82],"and":[83,96,103,111],"provisioning":[84],"advance":[85],"properties,":[87],"also":[88],"offer":[89],"essential":[91],"attributes":[93],"anonymity":[95],"unlinkability.":[97],"We":[98],"develop":[99],"a":[100],"formal":[101],"model":[105],"an":[107],"appropriate":[108],"complexity-theoretic":[109],"framework":[110],"prove":[112],"secure":[116],"model.":[119]},"counts_by_year":[],"updated_date":"2026-03-20T23:20:44.827607","created_date":"2025-10-10T00:00:00"}
