{"id":"https://openalex.org/W2183381320","doi":"https://doi.org/10.1109/cns.2015.7346809","title":"A novel and scalable communication-history-based Knapsack authentication framework for IEEE 802.11 networks","display_name":"A novel and scalable communication-history-based Knapsack authentication framework for IEEE 802.11 networks","publication_year":2015,"publication_date":"2015-09-01","ids":{"openalex":"https://openalex.org/W2183381320","doi":"https://doi.org/10.1109/cns.2015.7346809","mag":"2183381320"},"language":"en","primary_location":{"id":"doi:10.1109/cns.2015.7346809","is_oa":false,"landing_page_url":"https://doi.org/10.1109/cns.2015.7346809","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2015 IEEE Conference on Communications and Network Security (CNS)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100609703","display_name":"Changmin Lee","orcid":"https://orcid.org/0000-0002-9870-3956"},"institutions":[{"id":"https://openalex.org/I193531525","display_name":"George Washington University","ror":"https://ror.org/00y4zzh67","country_code":"US","type":"education","lineage":["https://openalex.org/I193531525"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Changmin Lee","raw_affiliation_strings":["Department of Computer Science, George Washington University, USA"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, George Washington University, USA","institution_ids":["https://openalex.org/I193531525"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101460938","display_name":"Chen Shen","orcid":"https://orcid.org/0000-0003-1081-0405"},"institutions":[{"id":"https://openalex.org/I193531525","display_name":"George Washington University","ror":"https://ror.org/00y4zzh67","country_code":"US","type":"education","lineage":["https://openalex.org/I193531525"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Chen Shen","raw_affiliation_strings":["Department of Computer Science, George Washington University, USA"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, George Washington University, USA","institution_ids":["https://openalex.org/I193531525"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5026424088","display_name":"G\u00f6khan \u015eahin","orcid":"https://orcid.org/0000-0003-2977-3632"},"institutions":[{"id":"https://openalex.org/I83328450","display_name":"Miami University","ror":"https://ror.org/05nbqxr67","country_code":"US","type":"education","lineage":["https://openalex.org/I83328450"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Gokhan Sahin","raw_affiliation_strings":["Department of Electrical & Computer Engineering, Miami University, USA"],"affiliations":[{"raw_affiliation_string":"Department of Electrical & Computer Engineering, Miami University, USA","institution_ids":["https://openalex.org/I83328450"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5032596907","display_name":"Kwanghee Choi","orcid":null},"institutions":[{"id":"https://openalex.org/I4210122441","display_name":"National Information Society Agency","ror":"https://ror.org/02hjfaw18","country_code":"KR","type":"other","lineage":["https://openalex.org/I4210122441"]}],"countries":["KR"],"is_corresponding":false,"raw_author_name":"Kwanghee Choi","raw_affiliation_strings":["Korea Internet & Security Agency (KISA), Korea"],"affiliations":[{"raw_affiliation_string":"Korea Internet & Security Agency (KISA), Korea","institution_ids":["https://openalex.org/I4210122441"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5103910452","display_name":"Hyeong\u2010Ah Choi","orcid":null},"institutions":[{"id":"https://openalex.org/I193531525","display_name":"George Washington University","ror":"https://ror.org/00y4zzh67","country_code":"US","type":"education","lineage":["https://openalex.org/I193531525"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Hyeong-Ah Choi","raw_affiliation_strings":["Department of Computer Science, George Washington University, USA"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, George Washington University, USA","institution_ids":["https://openalex.org/I193531525"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5100609703"],"corresponding_institution_ids":["https://openalex.org/I193531525"],"apc_list":null,"apc_paid":null,"fwci":0.3328,"has_fulltext":false,"cited_by_count":6,"citation_normalized_percentile":{"value":0.66119934,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"44","last_page":"52"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.998199999332428,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":0.9943000078201294,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8261784315109253},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.5814746022224426},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.5763843059539795},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.544032633304596},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.5122005343437195}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8261784315109253},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.5814746022224426},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.5763843059539795},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.544032633304596},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.5122005343437195}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/cns.2015.7346809","is_oa":false,"landing_page_url":"https://doi.org/10.1109/cns.2015.7346809","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2015 IEEE Conference on Communications and Network Security (CNS)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":23,"referenced_works":["https://openalex.org/W22266696","https://openalex.org/W41804080","https://openalex.org/W1548327136","https://openalex.org/W1559870601","https://openalex.org/W1590099998","https://openalex.org/W1970429723","https://openalex.org/W1972574759","https://openalex.org/W1982366917","https://openalex.org/W2026089663","https://openalex.org/W2041404167","https://openalex.org/W2089695767","https://openalex.org/W2091729149","https://openalex.org/W2106287110","https://openalex.org/W2113475664","https://openalex.org/W2115478312","https://openalex.org/W2115735006","https://openalex.org/W2145417574","https://openalex.org/W2148167522","https://openalex.org/W2166735779","https://openalex.org/W2978725006","https://openalex.org/W4205426033","https://openalex.org/W4210493863","https://openalex.org/W6633508899"],"related_works":["https://openalex.org/W2748952813","https://openalex.org/W2390279801","https://openalex.org/W2358668433","https://openalex.org/W2376932109","https://openalex.org/W2001405890","https://openalex.org/W2382290278","https://openalex.org/W2478288626","https://openalex.org/W2350741829","https://openalex.org/W2530322880","https://openalex.org/W2912135041"],"abstract_inverted_index":{"Wi-Fi":[0,46],"technology":[1],"is":[2,104,153,177,192,221],"one":[3],"of":[4,8,18,20,22,27,80,93,185,263],"the":[5,9,16,41,44,78,97,100,124,131,156,164,173,209,260],"key":[6,67,139],"enablers":[7],"Internet-of-Things":[10],"(IoT)":[11],"revolution":[12],"that":[13,118,249,281],"will":[14],"allow":[15],"interaction":[17],"tens":[19],"billions":[21],"smart":[23],"devices.":[24],"The":[25],"lack":[26],"authentication":[28,114,151,217,236,293],"for":[29,40,116,229,295],"management":[30,61,143,149,165,296],"frames":[31,62,144,297],"in":[32,49,96,135,167,252,298],"IEEE":[33],"802.11":[34,117],"creates":[35],"a":[36,64,84,91,102,108,112,137,288],"major":[37],"cyber-security":[38],"vulnerability":[39],"IoT":[42],"and":[43,58,133,140,161,187,191,203,225,243,247,269,291,300],"whole":[45],"ecosystem.":[47],"While":[48],"recent":[50],"amendments":[51],"WPA2":[52],"may":[53],"be":[54,170,196],"used":[55],"to":[56,76,106,163,169,180,195,198,213,223,254],"encrypt":[57],"authenticate":[59],"deauthentication/disassociation":[60],"if":[63],"shared":[65,138],"secret":[66,266],"has":[68],"already":[69],"been":[70],"established,":[71],"no":[72],"such":[73],"mechanism":[74],"exists":[75],"verify":[77],"legitimacy":[79],"an":[81,88],"AP":[82,89],"with":[83,90,182,200,242],"known":[85],"name,":[86],"i.e,":[87],"history":[92,126,241,257,284],"legitimate":[94],"connections":[95],"past,":[98],"at":[99,130,155,172],"time":[101],"client":[103],"trying":[105],"establish":[107],"connection.":[109],"We":[110,206,233],"propose":[111],"novel":[113],"framework":[115,176],"solves":[119],"this":[120,159],"problem":[121],"by":[122],"utilizing":[123],"communication":[125,215,283],"information":[127],"readily":[128],"available":[129],"transmitter":[132,157],"receiver":[134],"establishing":[136],"protects":[141],"all":[142],"from":[145],"spoofing":[146],"attacks.":[147,275],"A":[148],"frame":[150,166],"code":[152],"generated":[154],"using":[158,238,250],"information,":[160,246],"attached":[162],"order":[168],"verified":[171],"receiver.":[174],"Our":[175],"flexible":[178],"enough":[179,194],"work":[181],"various":[183],"types":[184],"application":[186,231,239],"PHY":[188],"layer":[189,240],"data,":[190],"scalable":[193,292],"applied":[197],"devices":[199],"different":[201],"computing":[202],"processing":[204],"capabilities.":[205],"have":[207],"adapted":[208],"well-known":[210],"Knapsack":[211],"cryptosystem":[212],"our":[214,230,235,282],"history-based":[216],"scheme,":[218],"as":[219],"it":[220],"simple":[222],"implement":[224],"provides":[226,287],"strong":[227],"security":[228],"scenarios.":[232],"evaluate":[234],"scheme":[237],"without":[244],"RSSI":[245,251],"show":[248,280],"addition":[253],"data":[255],"packet":[256,273],"can":[258],"provide":[259],"combined":[261],"benefits":[262],"high":[264],"entropy":[265],"bit":[267],"generation":[268],"increased":[270],"protection":[271],"against":[272],"sniffing":[274],"Through":[276],"experimental":[277],"work,":[278],"we":[279],"based":[285],"approach":[286],"robust,":[289],"low-complexity,":[290],"method":[294],"802.11,":[299],"potentially":[301],"other":[302],"wireless":[303],"networks.":[304]},"counts_by_year":[{"year":2023,"cited_by_count":1},{"year":2021,"cited_by_count":1},{"year":2020,"cited_by_count":1},{"year":2019,"cited_by_count":2},{"year":2018,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
