{"id":"https://openalex.org/W4390098891","doi":"https://doi.org/10.1109/commnet60167.2023.10365286","title":"A Hardware Validation Framework for a Networked Dynamic Multi-factor Security Protocol","display_name":"A Hardware Validation Framework for a Networked Dynamic Multi-factor Security Protocol","publication_year":2023,"publication_date":"2023-12-11","ids":{"openalex":"https://openalex.org/W4390098891","doi":"https://doi.org/10.1109/commnet60167.2023.10365286"},"language":"en","primary_location":{"id":"doi:10.1109/commnet60167.2023.10365286","is_oa":false,"landing_page_url":"http://dx.doi.org/10.1109/commnet60167.2023.10365286","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2023 6th International Conference on Advanced Communication Technologies and Networking (CommNet)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5066248772","display_name":"Cheng\u2010Yen Lee","orcid":"https://orcid.org/0000-0003-4535-2213"},"institutions":[{"id":"https://openalex.org/I91045830","display_name":"Texas A&M University","ror":"https://ror.org/01f5ytq51","country_code":"US","type":"education","lineage":["https://openalex.org/I91045830"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Cheng-Yen Lee","raw_affiliation_strings":["Texas A&#x0026;M University,Department of Electrical and Computer Engineering,College Station,TX,USA"],"affiliations":[{"raw_affiliation_string":"Texas A&#x0026;M University,Department of Electrical and Computer Engineering,College Station,TX,USA","institution_ids":["https://openalex.org/I91045830"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5063469592","display_name":"Kyler R. Scott","orcid":"https://orcid.org/0000-0002-8872-6177"},"institutions":[{"id":"https://openalex.org/I91045830","display_name":"Texas A&M University","ror":"https://ror.org/01f5ytq51","country_code":"US","type":"education","lineage":["https://openalex.org/I91045830"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Kyler R. Scott","raw_affiliation_strings":["Texas A&#x0026;M University,Department of Electrical and Computer Engineering,College Station,TX,USA"],"affiliations":[{"raw_affiliation_string":"Texas A&#x0026;M University,Department of Electrical and Computer Engineering,College Station,TX,USA","institution_ids":["https://openalex.org/I91045830"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5021685706","display_name":"Sunil P. Khatri","orcid":"https://orcid.org/0000-0001-7134-9929"},"institutions":[{"id":"https://openalex.org/I91045830","display_name":"Texas A&M University","ror":"https://ror.org/01f5ytq51","country_code":"US","type":"education","lineage":["https://openalex.org/I91045830"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Sunil P. Khatri","raw_affiliation_strings":["Texas A&#x0026;M University,Department of Electrical and Computer Engineering,College Station,TX,USA"],"affiliations":[{"raw_affiliation_string":"Texas A&#x0026;M University,Department of Electrical and Computer Engineering,College Station,TX,USA","institution_ids":["https://openalex.org/I91045830"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5014049864","display_name":"Ali Ghrayeb","orcid":"https://orcid.org/0000-0002-6808-5886"},"institutions":[{"id":"https://openalex.org/I58152225","display_name":"Texas A&M University at Qatar","ror":"https://ror.org/03vb4dm14","country_code":"QA","type":"education","lineage":["https://openalex.org/I58152225","https://openalex.org/I91045830"]}],"countries":["QA"],"is_corresponding":false,"raw_author_name":"Ali Ghrayeb","raw_affiliation_strings":["Texas A&#x0026;M University at Qatar,Department of Electrical and Computer Engineering,Doha,Qatar"],"affiliations":[{"raw_affiliation_string":"Texas A&#x0026;M University at Qatar,Department of Electrical and Computer Engineering,Doha,Qatar","institution_ids":["https://openalex.org/I58152225"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5066248772"],"corresponding_institution_ids":["https://openalex.org/I91045830"],"apc_list":null,"apc_paid":null,"fwci":0.123,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.4515462,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":94},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"7"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9987000226974487,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9983000159263611,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8291919231414795},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.6112138032913208},{"id":"https://openalex.org/keywords/multicast","display_name":"Multicast","score":0.5365588068962097},{"id":"https://openalex.org/keywords/unicast","display_name":"Unicast","score":0.5359756350517273},{"id":"https://openalex.org/keywords/protocol","display_name":"Protocol (science)","score":0.5280947089195251},{"id":"https://openalex.org/keywords/communications-protocol","display_name":"Communications protocol","score":0.4774106740951538},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.45438870787620544},{"id":"https://openalex.org/keywords/internet-group-management-protocol","display_name":"Internet Group Management Protocol","score":0.43887701630592346},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.4359840750694275},{"id":"https://openalex.org/keywords/scalability","display_name":"Scalability","score":0.43042367696762085},{"id":"https://openalex.org/keywords/link-control-protocol","display_name":"Link Control Protocol","score":0.416852742433548},{"id":"https://openalex.org/keywords/user-datagram-protocol","display_name":"User Datagram Protocol","score":0.3324604630470276},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.32998988032341003},{"id":"https://openalex.org/keywords/internet-protocol-suite","display_name":"Internet protocol suite","score":0.30603569746017456},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.24175116419792175},{"id":"https://openalex.org/keywords/inter-domain","display_name":"Inter-domain","score":0.15090101957321167},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.13177543878555298},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.11783707141876221},{"id":"https://openalex.org/keywords/source-specific-multicast","display_name":"Source-specific multicast","score":0.10955682396888733}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8291919231414795},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.6112138032913208},{"id":"https://openalex.org/C32295351","wikidata":"https://www.wikidata.org/wiki/Q899288","display_name":"Multicast","level":2,"score":0.5365588068962097},{"id":"https://openalex.org/C11704745","wikidata":"https://www.wikidata.org/wiki/Q918337","display_name":"Unicast","level":3,"score":0.5359756350517273},{"id":"https://openalex.org/C2780385302","wikidata":"https://www.wikidata.org/wiki/Q367158","display_name":"Protocol (science)","level":3,"score":0.5280947089195251},{"id":"https://openalex.org/C12269588","wikidata":"https://www.wikidata.org/wiki/Q132364","display_name":"Communications protocol","level":2,"score":0.4774106740951538},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.45438870787620544},{"id":"https://openalex.org/C49375483","wikidata":"https://www.wikidata.org/wiki/Q14149","display_name":"Internet Group Management Protocol","level":5,"score":0.43887701630592346},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.4359840750694275},{"id":"https://openalex.org/C48044578","wikidata":"https://www.wikidata.org/wiki/Q727490","display_name":"Scalability","level":2,"score":0.43042367696762085},{"id":"https://openalex.org/C41150092","wikidata":"https://www.wikidata.org/wiki/Q1826817","display_name":"Link Control Protocol","level":5,"score":0.416852742433548},{"id":"https://openalex.org/C20636137","wikidata":"https://www.wikidata.org/wiki/Q11163","display_name":"User Datagram Protocol","level":4,"score":0.3324604630470276},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.32998988032341003},{"id":"https://openalex.org/C65567647","wikidata":"https://www.wikidata.org/wiki/Q81414","display_name":"Internet protocol suite","level":3,"score":0.30603569746017456},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.24175116419792175},{"id":"https://openalex.org/C5111613","wikidata":"https://www.wikidata.org/wiki/Q3799443","display_name":"Inter-domain","level":4,"score":0.15090101957321167},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.13177543878555298},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.11783707141876221},{"id":"https://openalex.org/C18787934","wikidata":"https://www.wikidata.org/wiki/Q7565105","display_name":"Source-specific multicast","level":3,"score":0.10955682396888733},{"id":"https://openalex.org/C204787440","wikidata":"https://www.wikidata.org/wiki/Q188504","display_name":"Alternative medicine","level":2,"score":0.0},{"id":"https://openalex.org/C142724271","wikidata":"https://www.wikidata.org/wiki/Q7208","display_name":"Pathology","level":1,"score":0.0},{"id":"https://openalex.org/C71924100","wikidata":"https://www.wikidata.org/wiki/Q11190","display_name":"Medicine","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/commnet60167.2023.10365286","is_oa":false,"landing_page_url":"http://dx.doi.org/10.1109/commnet60167.2023.10365286","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2023 6th International Conference on Advanced Communication Technologies and Networking (CommNet)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[{"id":"https://openalex.org/F4320332753","display_name":"Qatar National Research Fund","ror":"https://ror.org/01svaqq28"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":17,"referenced_works":["https://openalex.org/W1517403092","https://openalex.org/W2029029052","https://openalex.org/W2057038101","https://openalex.org/W2064437724","https://openalex.org/W2066175361","https://openalex.org/W2122440889","https://openalex.org/W2129722359","https://openalex.org/W2134295053","https://openalex.org/W2537686001","https://openalex.org/W2738500181","https://openalex.org/W2891996570","https://openalex.org/W2971887892","https://openalex.org/W3012167541","https://openalex.org/W3097177013","https://openalex.org/W3173338225","https://openalex.org/W4200380698","https://openalex.org/W4280603496"],"related_works":["https://openalex.org/W4382656179","https://openalex.org/W2363540078","https://openalex.org/W2482253865","https://openalex.org/W2057600829","https://openalex.org/W2972607515","https://openalex.org/W3020890620","https://openalex.org/W2900860220","https://openalex.org/W2972131078","https://openalex.org/W2136177528","https://openalex.org/W2798797702"],"abstract_inverted_index":{"As":[0],"the":[1,12,39,69,101,110,133,147,154,187,205,213],"use":[2],"of":[3,6,14,41,65,72,112,117,153,164,181,189,212],"low-power":[4],"Internet":[5],"Things":[7],"(IoT)":[8],"devices":[9],"becomes":[10],"widespread,":[11],"volume":[13],"data":[15,25,55],"generated":[16],"and":[17,47,149,168,175,196,221,231],"transmitted":[18],"is":[19,51,159,169],"increasing":[20],"rapidly.":[21],"However,":[22],"transmitting":[23,54],"sensitive":[24],"over":[26],"unreliable":[27],"wireless":[28],"networks":[29],"gives":[30],"rise":[31],"to":[32,38,67,130,171,185,192,203],"an":[33,201],"increased":[34],"attack":[35],"surface":[36],"due":[37],"lack":[40],"secure":[42,48,75,240],"communication.":[43],"Accordingly,":[44],"a":[45,73,121,139,162,209],"lightweight":[46],"communication":[49,76,151,241],"protocol":[50,77,86,97,119],"required":[52],"for":[53,90,107,127,208,239,242],"between":[56],"IoT":[57,244],"devices.":[58],"In":[59,142],"this":[60,118],"paper,":[61],"we":[62,183],"present":[63,179,200],"results":[64,180,216],"experiments":[66,145,182],"conduct":[68],"hardware":[70,157,210],"validation":[71],"novel":[74],"which":[78,92],"was":[79],"introduced":[80],"in":[81],"[1].":[82],"This":[83],"previously":[84],"developed":[85],"utilizes":[87,120],"multiple":[88],"factors":[89,103,134],"authentication,":[91],"are":[93,104,135,224],"updated":[94],"after":[95],"every":[96],"iteration.":[98],"Ensuring":[99],"that":[100,132,218],"same":[102],"not":[105,136],"reused":[106],"authentication":[108],"reduces":[109],"risk":[111],"potential":[113],"attacks.":[114],"Our":[115,156,215],"implementation":[116,191,211],"True":[122],"Random":[123],"Number":[124],"Generator":[125],"(TRNG)":[126],"factor":[128],"updates":[129],"ensure":[131],"based":[137,160],"on":[138,161],"deterministic":[140],"algorithm.":[141],"addition,":[143],"our":[144,190,219,236],"validate":[146],"unicast":[148,220],"multicast":[150,222],"features":[152],"protocol.":[155,214],"platform":[158],"network":[163,194],"Raspberry":[165],"Pi":[166],"boards":[167],"designed":[170],"be":[172],"both":[173],"fast":[174],"computationally":[176],"lightweight.":[177],"We":[178,198],"conducted":[184],"assess":[186],"ability":[188],"withstand":[193],"errors":[195],"delays.":[197],"also":[199],"approach":[202,237],"choose":[204],"timeout":[206],"value":[207],"demonstrate":[217],"implementations":[223],"scalable,":[225],"while":[226],"exhibiting":[227],"good":[228],"power,":[229],"energy,":[230],"delay":[232],"characteristics,":[233],"thereby":[234],"making":[235],"suitable":[238],"smart":[243],"applications.":[245]},"counts_by_year":[{"year":2024,"cited_by_count":1}],"updated_date":"2025-12-21T01:58:51.020947","created_date":"2025-10-10T00:00:00"}
