{"id":"https://openalex.org/W4392904997","doi":"https://doi.org/10.1109/ccnc51664.2024.10454706","title":"Distributed Hardware-Assisted Authentication and Key Agreement Protocol for Internet of Things","display_name":"Distributed Hardware-Assisted Authentication and Key Agreement Protocol for Internet of Things","publication_year":2024,"publication_date":"2024-01-06","ids":{"openalex":"https://openalex.org/W4392904997","doi":"https://doi.org/10.1109/ccnc51664.2024.10454706"},"language":"en","primary_location":{"id":"doi:10.1109/ccnc51664.2024.10454706","is_oa":false,"landing_page_url":"https://doi.org/10.1109/ccnc51664.2024.10454706","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2024 IEEE 21st Consumer Communications &amp; Networking Conference (CCNC)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5045986114","display_name":"Abdulaziz Alshaeri","orcid":"https://orcid.org/0000-0002-9911-5953"},"institutions":[{"id":"https://openalex.org/I126744593","display_name":"University of Maryland, Baltimore","ror":"https://ror.org/04rq5mt64","country_code":"US","type":"education","lineage":["https://openalex.org/I126744593"]},{"id":"https://openalex.org/I79272384","display_name":"University of Maryland, Baltimore County","ror":"https://ror.org/02qskvh78","country_code":"US","type":"education","lineage":["https://openalex.org/I79272384"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Abdulaziz Alshaeri","raw_affiliation_strings":["University of Maryland Blatimore County,Department of Computer Science and Electrical Engineering,Baltimore,USA","Department of Computer Science and Electrical Engineering, University of Maryland Blatimore County, Baltimore, USA"],"affiliations":[{"raw_affiliation_string":"University of Maryland Blatimore County,Department of Computer Science and Electrical Engineering,Baltimore,USA","institution_ids":["https://openalex.org/I79272384","https://openalex.org/I126744593"]},{"raw_affiliation_string":"Department of Computer Science and Electrical Engineering, University of Maryland Blatimore County, Baltimore, USA","institution_ids":["https://openalex.org/I79272384","https://openalex.org/I126744593"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5042965957","display_name":"Mohamed Younis","orcid":"https://orcid.org/0000-0003-3865-9217"},"institutions":[{"id":"https://openalex.org/I79272384","display_name":"University of Maryland, Baltimore County","ror":"https://ror.org/02qskvh78","country_code":"US","type":"education","lineage":["https://openalex.org/I79272384"]},{"id":"https://openalex.org/I126744593","display_name":"University of Maryland, Baltimore","ror":"https://ror.org/04rq5mt64","country_code":"US","type":"education","lineage":["https://openalex.org/I126744593"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Mohamed Younis","raw_affiliation_strings":["University of Maryland Blatimore County,Department of Computer Science and Electrical Engineering,Baltimore,USA","Department of Computer Science and Electrical Engineering, University of Maryland Blatimore County, Baltimore, USA"],"affiliations":[{"raw_affiliation_string":"University of Maryland Blatimore County,Department of Computer Science and Electrical Engineering,Baltimore,USA","institution_ids":["https://openalex.org/I79272384","https://openalex.org/I126744593"]},{"raw_affiliation_string":"Department of Computer Science and Electrical Engineering, University of Maryland Blatimore County, Baltimore, USA","institution_ids":["https://openalex.org/I79272384","https://openalex.org/I126744593"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5045986114"],"corresponding_institution_ids":["https://openalex.org/I126744593","https://openalex.org/I79272384"],"apc_list":null,"apc_paid":null,"fwci":1.0371,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.72141399,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":91,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"152","last_page":"158"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.9977999925613403,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.9977999925613403,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10273","display_name":"IoT and Edge/Fog Computing","score":0.9947999715805054,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.9908999800682068,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7334637641906738},{"id":"https://openalex.org/keywords/internet-of-things","display_name":"Internet of Things","score":0.6765452027320862},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.6539461612701416},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.6082355380058289},{"id":"https://openalex.org/keywords/protocol","display_name":"Protocol (science)","score":0.6042755246162415},{"id":"https://openalex.org/keywords/authentication-protocol","display_name":"Authentication protocol","score":0.5086449384689331},{"id":"https://openalex.org/keywords/key-agreement-protocol","display_name":"Key-agreement protocol","score":0.5053644776344299},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.46687573194503784},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.448227196931839},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.4230573773384094},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.40177056193351746},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.29127198457717896},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.1954268515110016},{"id":"https://openalex.org/keywords/key-distribution","display_name":"Key distribution","score":0.102495938539505},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.09614893794059753}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7334637641906738},{"id":"https://openalex.org/C81860439","wikidata":"https://www.wikidata.org/wiki/Q251212","display_name":"Internet of Things","level":2,"score":0.6765452027320862},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.6539461612701416},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.6082355380058289},{"id":"https://openalex.org/C2780385302","wikidata":"https://www.wikidata.org/wiki/Q367158","display_name":"Protocol (science)","level":3,"score":0.6042755246162415},{"id":"https://openalex.org/C21564112","wikidata":"https://www.wikidata.org/wiki/Q4825885","display_name":"Authentication protocol","level":3,"score":0.5086449384689331},{"id":"https://openalex.org/C135530808","wikidata":"https://www.wikidata.org/wiki/Q3306713","display_name":"Key-agreement protocol","level":5,"score":0.5053644776344299},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.46687573194503784},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.448227196931839},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.4230573773384094},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.40177056193351746},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.29127198457717896},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.1954268515110016},{"id":"https://openalex.org/C160333310","wikidata":"https://www.wikidata.org/wiki/Q6398153","display_name":"Key distribution","level":4,"score":0.102495938539505},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.09614893794059753},{"id":"https://openalex.org/C71924100","wikidata":"https://www.wikidata.org/wiki/Q11190","display_name":"Medicine","level":0,"score":0.0},{"id":"https://openalex.org/C142724271","wikidata":"https://www.wikidata.org/wiki/Q7208","display_name":"Pathology","level":1,"score":0.0},{"id":"https://openalex.org/C204787440","wikidata":"https://www.wikidata.org/wiki/Q188504","display_name":"Alternative medicine","level":2,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/ccnc51664.2024.10454706","is_oa":false,"landing_page_url":"https://doi.org/10.1109/ccnc51664.2024.10454706","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2024 IEEE 21st Consumer Communications &amp; Networking Conference (CCNC)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":23,"referenced_works":["https://openalex.org/W2134295053","https://openalex.org/W2218489740","https://openalex.org/W2399463525","https://openalex.org/W2801237935","https://openalex.org/W2887900476","https://openalex.org/W2899752644","https://openalex.org/W2952624816","https://openalex.org/W2971824249","https://openalex.org/W2997068921","https://openalex.org/W3003952334","https://openalex.org/W3007112828","https://openalex.org/W3007203290","https://openalex.org/W3087662407","https://openalex.org/W3092270095","https://openalex.org/W3094312506","https://openalex.org/W3191544426","https://openalex.org/W3193967641","https://openalex.org/W3201826149","https://openalex.org/W3202573027","https://openalex.org/W4290996828","https://openalex.org/W4312523380","https://openalex.org/W4320029355","https://openalex.org/W6931288921"],"related_works":["https://openalex.org/W2034419863","https://openalex.org/W2296396257","https://openalex.org/W3007106793","https://openalex.org/W2132505069","https://openalex.org/W2054202867","https://openalex.org/W1965515427","https://openalex.org/W2116285675","https://openalex.org/W2109882692","https://openalex.org/W2547137208","https://openalex.org/W2061637199"],"abstract_inverted_index":{"Physically":[0],"Unclonable":[1,90],"Functions":[2],"(PUFs)":[3],"are":[4,57,118],"lightweight":[5],"hardware":[6],"primitives":[7],"that":[8,123],"provide":[9],"an":[10,79,135],"effective":[11,103],"secure-by-design":[12],"solution":[13],"for":[14,105],"mutual":[15],"authentication":[16,55],"of":[17,21,31,37,73,158],"the":[18,29,35,68,74,115,127,130],"resource-constrained":[19],"Internet":[20],"Things":[22],"(IoT)":[23],"devices.":[24],"By":[25],"embedding":[26],"PUFs":[27],"in":[28],"design":[30],"each":[32],"IoT":[33],"device,":[34],"identity":[36],"devices":[38],"could":[39,63],"be":[40,64],"validated":[41,174],"using":[42,120,162,175],"unique":[43],"device":[44,76,111],"fingerprints,":[45],"known":[46],"as":[47],"challenge":[48],"and":[49,70,93,102,110,129,137,168],"response":[50],"pairs":[51],"(CRPs).":[52],"Unfortunately,":[53],"PUF-based":[54],"protocols":[56],"susceptible":[58],"to":[59,66],"CRP":[60,106],"disclosure":[61,143],"which":[62],"exploited":[65],"model":[67],"PUF":[69,108,116,132,181],"allow":[71],"impersonation":[72],"associated":[75],"by":[77,145],"either":[78],"external":[80],"adversary":[81],"or":[82,149],"compromised":[83,147],"nodes.":[84],"This":[85],"paper":[86],"presents":[87,99],"a":[88,100,146,163,179],"Distributed":[89],"Hardware-assisted":[91],"Authentication":[92],"Key":[94],"Agreement":[95],"Protocol":[96],"(DUHAP).":[97],"DUHAP":[98,159],"novel":[101],"mitigation":[104],"disclosure,":[107],"modeling,":[109],"impersonation.":[112],"In":[113],"particular,":[114],"responses":[117],"obfuscated":[119],"varying":[121],"salt":[122],"is":[124,160,173],"dependent":[125],"on":[126],"verifier":[128],"actual":[131],"response.":[133],"Such":[134],"identity-":[136],"response-based":[138],"obfuscation":[139],"technique":[140],"withstands":[141],"CRPs":[142],"attempts":[144],"node":[148],"multiple":[150],"colluding":[151],"nodes":[152],"through":[153],"reverse":[154],"engineering.":[155],"The":[156],"security":[157],"analyzed":[161],"prominent":[164],"protocol":[165],"validation":[166],"tool,":[167],"its":[169],"resiliency":[170],"against":[171],"modeling":[172],"data":[176],"collected":[177],"from":[178],"popular":[180],"cryptanalysis":[182],"toolbox.":[183]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
