{"id":"https://openalex.org/W2126373699","doi":"https://doi.org/10.1109/ccnc.2011.5766509","title":"Hummingbird key establishment protocol for low-power ZigBee","display_name":"Hummingbird key establishment protocol for low-power ZigBee","publication_year":2011,"publication_date":"2011-01-01","ids":{"openalex":"https://openalex.org/W2126373699","doi":"https://doi.org/10.1109/ccnc.2011.5766509","mag":"2126373699"},"language":"en","primary_location":{"id":"doi:10.1109/ccnc.2011.5766509","is_oa":false,"landing_page_url":"https://doi.org/10.1109/ccnc.2011.5766509","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2011 IEEE Consumer Communications and Networking Conference (CCNC)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5066049003","display_name":"Sai Seshabhattar","orcid":null},"institutions":[{"id":"https://openalex.org/I4210146033","display_name":"Crystal Technology and Industries (United States)","ror":"https://ror.org/04dckkc60","country_code":"US","type":"company","lineage":["https://openalex.org/I4210146033"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Sai Seshabhattar","raw_affiliation_strings":["Revere Security, Addison, TX, USA","Revere Security, 4500 Westgrove Drive, Suite 335, Addison, TX 75001, USA"],"affiliations":[{"raw_affiliation_string":"Revere Security, Addison, TX, USA","institution_ids":[]},{"raw_affiliation_string":"Revere Security, 4500 Westgrove Drive, Suite 335, Addison, TX 75001, USA","institution_ids":["https://openalex.org/I4210146033"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5061383328","display_name":"Priyanka Yenigalla","orcid":null},"institutions":[{"id":"https://openalex.org/I4210139236","display_name":"Ericsson (United States)","ror":"https://ror.org/03q3bdj78","country_code":"US","type":"company","lineage":["https://openalex.org/I1306339040","https://openalex.org/I4210139236"]},{"id":"https://openalex.org/I1306339040","display_name":"Ericsson (Sweden)","ror":"https://ror.org/05a7rhx54","country_code":"SE","type":"company","lineage":["https://openalex.org/I1306339040"]}],"countries":["SE","US"],"is_corresponding":false,"raw_author_name":"Priyanka Yenigalla","raw_affiliation_strings":["Ericsson, Plano, TX, USA","Ericsson, 6300 Legacy Dr., Plano, TX 75024, USA"],"affiliations":[{"raw_affiliation_string":"Ericsson, Plano, TX, USA","institution_ids":["https://openalex.org/I4210139236"]},{"raw_affiliation_string":"Ericsson, 6300 Legacy Dr., Plano, TX 75024, USA","institution_ids":["https://openalex.org/I1306339040"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5074505470","display_name":"Paul Krier","orcid":null},"institutions":[{"id":"https://openalex.org/I178169726","display_name":"Southern Methodist University","ror":"https://ror.org/042tdr378","country_code":"US","type":"education","lineage":["https://openalex.org/I178169726"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Paul Krier","raw_affiliation_strings":["High Assurance Computing and Networking Laboratories, Department of Computer Science and Engineering, Southern Methodist University, Dallas, TX, USA"],"affiliations":[{"raw_affiliation_string":"High Assurance Computing and Networking Laboratories, Department of Computer Science and Engineering, Southern Methodist University, Dallas, TX, USA","institution_ids":["https://openalex.org/I178169726"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5111964903","display_name":"Daniel W. Engels","orcid":null},"institutions":[{"id":"https://openalex.org/I4210146033","display_name":"Crystal Technology and Industries (United States)","ror":"https://ror.org/04dckkc60","country_code":"US","type":"company","lineage":["https://openalex.org/I4210146033"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Daniel Engels","raw_affiliation_strings":["Revere Security, Addison, TX, USA","Revere Security, 4500 Westgrove Drive, Suite 335, Addison, TX 75001, USA"],"affiliations":[{"raw_affiliation_string":"Revere Security, Addison, TX, USA","institution_ids":[]},{"raw_affiliation_string":"Revere Security, 4500 Westgrove Drive, Suite 335, Addison, TX 75001, USA","institution_ids":["https://openalex.org/I4210146033"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5066049003"],"corresponding_institution_ids":["https://openalex.org/I4210146033"],"apc_list":null,"apc_paid":null,"fwci":0.8552,"has_fulltext":false,"cited_by_count":5,"citation_normalized_percentile":{"value":0.8040875,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":"152","issue":null,"first_page":"447","last_page":"451"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.992900013923645,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9911999702453613,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/hummingbird","display_name":"Hummingbird","score":0.8456834554672241},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.715379536151886},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6034168601036072},{"id":"https://openalex.org/keywords/protocol","display_name":"Protocol (science)","score":0.5994443893432617},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.48965078592300415},{"id":"https://openalex.org/keywords/power","display_name":"Power (physics)","score":0.42630690336227417},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.32156944274902344},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.21575728058815002},{"id":"https://openalex.org/keywords/medicine","display_name":"Medicine","score":0.05743333697319031},{"id":"https://openalex.org/keywords/physics","display_name":"Physics","score":0.04488474130630493}],"concepts":[{"id":"https://openalex.org/C2780610420","wikidata":"https://www.wikidata.org/wiki/Q43624","display_name":"Hummingbird","level":2,"score":0.8456834554672241},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.715379536151886},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6034168601036072},{"id":"https://openalex.org/C2780385302","wikidata":"https://www.wikidata.org/wiki/Q367158","display_name":"Protocol (science)","level":3,"score":0.5994443893432617},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.48965078592300415},{"id":"https://openalex.org/C163258240","wikidata":"https://www.wikidata.org/wiki/Q25342","display_name":"Power (physics)","level":2,"score":0.42630690336227417},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.32156944274902344},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.21575728058815002},{"id":"https://openalex.org/C71924100","wikidata":"https://www.wikidata.org/wiki/Q11190","display_name":"Medicine","level":0,"score":0.05743333697319031},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.04488474130630493},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C142724271","wikidata":"https://www.wikidata.org/wiki/Q7208","display_name":"Pathology","level":1,"score":0.0},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.0},{"id":"https://openalex.org/C18903297","wikidata":"https://www.wikidata.org/wiki/Q7150","display_name":"Ecology","level":1,"score":0.0},{"id":"https://openalex.org/C204787440","wikidata":"https://www.wikidata.org/wiki/Q188504","display_name":"Alternative medicine","level":2,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/ccnc.2011.5766509","is_oa":false,"landing_page_url":"https://doi.org/10.1109/ccnc.2011.5766509","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2011 IEEE Consumer Communications and Networking Conference (CCNC)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":5,"referenced_works":["https://openalex.org/W1972617203","https://openalex.org/W2100374917","https://openalex.org/W2113053085","https://openalex.org/W2161048573","https://openalex.org/W6675220201"],"related_works":["https://openalex.org/W85491885","https://openalex.org/W4214722162","https://openalex.org/W2887867988","https://openalex.org/W4320718718","https://openalex.org/W2108421468","https://openalex.org/W2172377849","https://openalex.org/W2749979394","https://openalex.org/W4394407690","https://openalex.org/W4242397257","https://openalex.org/W4237692487"],"abstract_inverted_index":{"From":[0],"the":[1,7,50,65,93],"\u201cSmart":[2],"Grid\u201d":[3],"to":[4,44,114,141],"smart":[5],"buildings,":[6],"ZigBee":[8,48,70,98,126],"communication":[9,165],"standard":[10],"for":[11,92,156],"wireless":[12],"personal":[13],"area":[14],"networks":[15,33],"(WPAN)":[16],"is":[17,34,56],"being":[18],"adopted":[19],"by":[20],"applications":[21,53],"that":[22,77,96],"deal":[23],"with":[24,82,118,163,177],"highly":[25,157],"sensitive":[26],"data.":[27],"Because":[28],"all":[29],"traffic":[30],"in":[31],"these":[32],"broadcast,":[35],"issues":[36],"like":[37],"eavesdropping":[38],"and":[39,46,52,55,67,110,121,148,161,183],"injection":[40],"are":[41],"serious":[42],"concerns":[43],"security":[45,176],"privacy.":[47],"specifies":[49,64],"network":[51],"layers":[54],"built":[57],"on":[58,107,116],"top":[59],"of":[60,85,169,172],"IEEE":[61],"802.15.4":[62],"which":[63],"link":[66],"physical":[68],"layers.":[69],"also":[71],"provides":[72,174],"a":[73,101,130,149],"key":[74,104,133,143],"establishment":[75,134],"service":[76],"relies":[78],"upon":[79],"AES.":[80],"AES,":[81],"block":[83],"sizes":[84],"128-bits":[86],"or":[87],"greater,":[88],"was":[89,111],"not":[90],"designed":[91,112],"resource-constrained":[94],"devices":[95,117],"form":[97],"networks.":[99],"Hummingbird,":[100],"rotor-based":[102],"symmetric":[103],"algorithm,":[105],"operates":[106],"16-bit":[108],"blocks":[109],"specifically":[113],"work":[115],"minimal":[119],"memory":[120],"processing":[122],"capabilities":[123],"such":[124],"as":[125],"deivces.":[127],"We":[128],"present":[129],"mutually":[131],"authenticated":[132],"procedure":[135],"named":[136],"Hummingbird":[137,170],"Key":[138],"Establishment":[139],"(HBKE)":[140],"secure":[142],"agreement":[144],"between":[145],"an":[146],"initiator":[147],"responder":[150],"device.":[151],"Hummingbird's":[152],"state-based":[153],"cipher":[154],"allows":[155],"efficient":[158],"mutual":[159],"authentication":[160],"privacy,":[162],"little":[164],"overhead.":[166],"The":[167],"use":[168],"instead":[171],"AES":[173],"high":[175],"smaller":[178,184],"hardware":[179],"sizes,":[180],"faster":[181],"operation,":[182],"power":[185],"consumption.":[186]},"counts_by_year":[{"year":2019,"cited_by_count":1},{"year":2017,"cited_by_count":1},{"year":2016,"cited_by_count":1},{"year":2014,"cited_by_count":1},{"year":2013,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
