{"id":"https://openalex.org/W4200525023","doi":"https://doi.org/10.1109/cce53527.2021.9633037","title":"A Lightweight Security Protocol for Beacons BLE","display_name":"A Lightweight Security Protocol for Beacons BLE","publication_year":2021,"publication_date":"2021-11-10","ids":{"openalex":"https://openalex.org/W4200525023","doi":"https://doi.org/10.1109/cce53527.2021.9633037"},"language":"en","primary_location":{"id":"doi:10.1109/cce53527.2021.9633037","is_oa":false,"landing_page_url":"https://doi.org/10.1109/cce53527.2021.9633037","pdf_url":null,"source":{"id":"https://openalex.org/S4363608599","display_name":"2021 18th International Conference on Electrical Engineering, Computing Science and Automatic Control (CCE)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2021 18th International Conference on Electrical Engineering, Computing Science and Automatic Control (CCE)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5088003188","display_name":"Karla Jocelyn Campos-Cruz","orcid":null},"institutions":[{"id":"https://openalex.org/I68368234","display_name":"Center for Research and Advanced Studies of the National Polytechnic Institute","ror":"https://ror.org/009eqmr18","country_code":"MX","type":"facility","lineage":["https://openalex.org/I59361560","https://openalex.org/I68368234"]}],"countries":["MX"],"is_corresponding":true,"raw_author_name":"Karla Jocelyn Campos-Cruz","raw_affiliation_strings":["Departamento de Computaci\u00f3n Cinvestav,Mexico City,Mexico"],"affiliations":[{"raw_affiliation_string":"Departamento de Computaci\u00f3n Cinvestav,Mexico City,Mexico","institution_ids":["https://openalex.org/I68368234"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5027891270","display_name":"Cuauht\u00e9moc Mancillas-L\u00f3pez","orcid":"https://orcid.org/0000-0002-4602-074X"},"institutions":[{"id":"https://openalex.org/I68368234","display_name":"Center for Research and Advanced Studies of the National Polytechnic Institute","ror":"https://ror.org/009eqmr18","country_code":"MX","type":"facility","lineage":["https://openalex.org/I59361560","https://openalex.org/I68368234"]}],"countries":["MX"],"is_corresponding":false,"raw_author_name":"Cuauhtemoc Mancillas-Lopez","raw_affiliation_strings":["Cinvestav,Departamento de Computaci\u00f3n, Cinvestav,Mexico City,Mexico"],"affiliations":[{"raw_affiliation_string":"Cinvestav,Departamento de Computaci\u00f3n, Cinvestav,Mexico City,Mexico","institution_ids":["https://openalex.org/I68368234"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5060454596","display_name":"Brisbane Ovilla-Mart\u00ednez","orcid":"https://orcid.org/0000-0002-2861-8633"},"institutions":[{"id":"https://openalex.org/I68368234","display_name":"Center for Research and Advanced Studies of the National Polytechnic Institute","ror":"https://ror.org/009eqmr18","country_code":"MX","type":"facility","lineage":["https://openalex.org/I59361560","https://openalex.org/I68368234"]}],"countries":["MX"],"is_corresponding":false,"raw_author_name":"Brisbane Ovilla-Martinez","raw_affiliation_strings":["Departamento de Computaci\u00f3n Cinvestav,Mexico City,Mexico"],"affiliations":[{"raw_affiliation_string":"Departamento de Computaci\u00f3n Cinvestav,Mexico City,Mexico","institution_ids":["https://openalex.org/I68368234"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5088003188"],"corresponding_institution_ids":["https://openalex.org/I68368234"],"apc_list":null,"apc_paid":null,"fwci":1.232,"has_fulltext":false,"cited_by_count":5,"citation_normalized_percentile":{"value":0.75267479,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":97},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12801","display_name":"Bluetooth and Wireless Communication Technologies","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12801","display_name":"Bluetooth and Wireless Communication Technologies","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.9941999912261963,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9904000163078308,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/beacon","display_name":"Beacon","score":0.8347707986831665},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7405126094818115},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6901415586471558},{"id":"https://openalex.org/keywords/bluetooth","display_name":"Bluetooth","score":0.6473263502120972},{"id":"https://openalex.org/keywords/protocol","display_name":"Protocol (science)","score":0.4892749488353729},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.4812007546424866},{"id":"https://openalex.org/keywords/handshake","display_name":"Handshake","score":0.4562775194644928},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.4521992802619934},{"id":"https://openalex.org/keywords/cryptographic-protocol","display_name":"Cryptographic protocol","score":0.4317437410354614},{"id":"https://openalex.org/keywords/countermeasure","display_name":"Countermeasure","score":0.4242277145385742},{"id":"https://openalex.org/keywords/wireless","display_name":"Wireless","score":0.3827500641345978},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.3426746726036072},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.209753155708313},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.10360327363014221}],"concepts":[{"id":"https://openalex.org/C102168758","wikidata":"https://www.wikidata.org/wiki/Q7321258","display_name":"Beacon","level":2,"score":0.8347707986831665},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7405126094818115},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6901415586471558},{"id":"https://openalex.org/C546215728","wikidata":"https://www.wikidata.org/wiki/Q39531","display_name":"Bluetooth","level":3,"score":0.6473263502120972},{"id":"https://openalex.org/C2780385302","wikidata":"https://www.wikidata.org/wiki/Q367158","display_name":"Protocol (science)","level":3,"score":0.4892749488353729},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.4812007546424866},{"id":"https://openalex.org/C2778000800","wikidata":"https://www.wikidata.org/wiki/Q830043","display_name":"Handshake","level":3,"score":0.4562775194644928},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.4521992802619934},{"id":"https://openalex.org/C33884865","wikidata":"https://www.wikidata.org/wiki/Q1254335","display_name":"Cryptographic protocol","level":3,"score":0.4317437410354614},{"id":"https://openalex.org/C21593369","wikidata":"https://www.wikidata.org/wiki/Q1032176","display_name":"Countermeasure","level":2,"score":0.4242277145385742},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.3827500641345978},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.3426746726036072},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.209753155708313},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.10360327363014221},{"id":"https://openalex.org/C204787440","wikidata":"https://www.wikidata.org/wiki/Q188504","display_name":"Alternative medicine","level":2,"score":0.0},{"id":"https://openalex.org/C151319957","wikidata":"https://www.wikidata.org/wiki/Q752739","display_name":"Asynchronous communication","level":2,"score":0.0},{"id":"https://openalex.org/C71924100","wikidata":"https://www.wikidata.org/wiki/Q11190","display_name":"Medicine","level":0,"score":0.0},{"id":"https://openalex.org/C146978453","wikidata":"https://www.wikidata.org/wiki/Q3798668","display_name":"Aerospace engineering","level":1,"score":0.0},{"id":"https://openalex.org/C142724271","wikidata":"https://www.wikidata.org/wiki/Q7208","display_name":"Pathology","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/cce53527.2021.9633037","is_oa":false,"landing_page_url":"https://doi.org/10.1109/cce53527.2021.9633037","pdf_url":null,"source":{"id":"https://openalex.org/S4363608599","display_name":"2021 18th International Conference on Electrical Engineering, Computing Science and Automatic Control (CCE)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2021 18th International Conference on Electrical Engineering, Computing Science and Automatic Control (CCE)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.49000000953674316,"display_name":"Affordable and clean energy","id":"https://metadata.un.org/sdg/7"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":5,"referenced_works":["https://openalex.org/W1910751411","https://openalex.org/W2470929901","https://openalex.org/W2785537980","https://openalex.org/W3044079623","https://openalex.org/W6747707732"],"related_works":["https://openalex.org/W2353358273","https://openalex.org/W2369540926","https://openalex.org/W2373986985","https://openalex.org/W2055408232","https://openalex.org/W2365945961","https://openalex.org/W2351480425","https://openalex.org/W2148742293","https://openalex.org/W2352858694","https://openalex.org/W2023932343","https://openalex.org/W4200525023"],"abstract_inverted_index":{"The":[0],"increasing":[1],"interconnection":[2],"of":[3,10,83,112,120,132],"everyday":[4],"devices":[5,39],"in":[6,129],"the":[7,16,26,32,75,80,88,110,118],"so-called":[8],"internet":[9],"things":[11],"raises":[12],"several":[13],"concerns":[14],"regarding":[15],"security":[17,50,71,90,101,127],"and":[18,31,79,117],"privacy":[19],"that":[20,34,45,58],"must":[21],"be":[22],"considered":[23],"to":[24,74],"protect":[25],"information":[27],"emitted":[28],"by":[29,93],"them":[30],"applications":[33,94],"use":[35],"them.":[36],"Many":[37],"IoT":[38],"are":[40,66],"equipped":[41],"with":[42],"restricted":[43],"microcontrollers":[44],"do":[46],"not":[47],"have":[48],"efficient":[49],"systems.":[51],"One":[52],"such":[53],"device":[54],"is":[55,107],"a":[56,100,113,124],"beacon":[57],"emits":[59],"Bluetooth":[60,76,96],"low-energy":[61,77],"signals.":[62],"Applications":[63],"using":[64,95],"beacons":[65],"novel,":[67],"but":[68],"they":[69],"lack":[70],"mechanisms":[72],"due":[73],"specification":[78],"limited":[81],"resources":[82],"beacons.":[84,97],"This":[85],"paper":[86],"discusses":[87],"main":[89],"threats":[91,128],"faced":[92],"In":[98],"addition,":[99],"protocol":[102],"based":[103],"on":[104],"lightweight":[105],"cryptography":[106],"proposed":[108],"for":[109],"establishment":[111],"shared":[114],"secret":[115],"key":[116],"generation":[119],"ephemeral":[121],"identifiers":[122],"as":[123],"countermeasure":[125],"against":[126],"these":[130],"types":[131],"applications.":[133]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":3}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
