{"id":"https://openalex.org/W2901978791","doi":"https://doi.org/10.1109/desec.2018.8625142","title":"SlimIoT: Scalable Lightweight Attestation Protocol for the Internet of Things","display_name":"SlimIoT: Scalable Lightweight Attestation Protocol for the Internet of Things","publication_year":2018,"publication_date":"2018-12-01","ids":{"openalex":"https://openalex.org/W2901978791","doi":"https://doi.org/10.1109/desec.2018.8625142","mag":"2901978791"},"language":"en","primary_location":{"id":"doi:10.1109/desec.2018.8625142","is_oa":false,"landing_page_url":"https://doi.org/10.1109/desec.2018.8625142","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2018 IEEE Conference on Dependable and Secure Computing (DSC)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=8614461","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5060045073","display_name":"Mahmoud Ammar","orcid":"https://orcid.org/0000-0002-4963-5854"},"institutions":[{"id":"https://openalex.org/I196972281","display_name":"Imec the Netherlands","ror":"https://ror.org/01ezq2j76","country_code":"NL","type":"facility","lineage":["https://openalex.org/I196972281"]},{"id":"https://openalex.org/I99464096","display_name":"KU Leuven","ror":"https://ror.org/05f950310","country_code":"BE","type":"education","lineage":["https://openalex.org/I99464096"]}],"countries":["BE","NL"],"is_corresponding":true,"raw_author_name":"Mahmoud Ammar","raw_affiliation_strings":["Imec-DistriNet, KU, Leuven"],"affiliations":[{"raw_affiliation_string":"Imec-DistriNet, KU, Leuven","institution_ids":["https://openalex.org/I196972281","https://openalex.org/I99464096"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5087962420","display_name":"Mahdi Washha","orcid":null},"institutions":[{"id":"https://openalex.org/I134560555","display_name":"Universit\u00e9 Toulouse III - Paul Sabatier","ror":"https://ror.org/02v6kpv12","country_code":"FR","type":"education","lineage":["https://openalex.org/I134560555"]},{"id":"https://openalex.org/I3131550300","display_name":"Universit\u00e9 Toulouse-I-Capitole","ror":"https://ror.org/0443n9e75","country_code":"FR","type":"education","lineage":["https://openalex.org/I3131550300"]},{"id":"https://openalex.org/I4210119061","display_name":"Institut de Recherche en Informatique de Toulouse","ror":"https://ror.org/01rx4qw44","country_code":"FR","type":"facility","lineage":["https://openalex.org/I1294671590","https://openalex.org/I205747304","https://openalex.org/I205747304","https://openalex.org/I4210119061","https://openalex.org/I4387153255","https://openalex.org/I4405258862","https://openalex.org/I4405258862"]},{"id":"https://openalex.org/I4210152422","display_name":"Universit\u00e9 Toulouse - Jean Jaur\u00e8s","ror":"https://ror.org/04ezk3x31","country_code":"FR","type":"education","lineage":["https://openalex.org/I4210152422","https://openalex.org/I4405258862"]},{"id":"https://openalex.org/I4210160189","display_name":"Institut Polytechnique de Bordeaux","ror":"https://ror.org/054qv7y42","country_code":"FR","type":"education","lineage":["https://openalex.org/I4210160189"]}],"countries":["FR"],"is_corresponding":false,"raw_author_name":"Mahdi Washha","raw_affiliation_strings":["IRIT, Toulouse University"],"affiliations":[{"raw_affiliation_string":"IRIT, Toulouse University","institution_ids":["https://openalex.org/I4210119061","https://openalex.org/I134560555","https://openalex.org/I3131550300","https://openalex.org/I4210160189","https://openalex.org/I4210152422"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5112400014","display_name":"Gowri Sankar Ramabhadran","orcid":null},"institutions":[{"id":"https://openalex.org/I1174212","display_name":"University of Southern California","ror":"https://ror.org/03taz7m60","country_code":"US","type":"education","lineage":["https://openalex.org/I1174212"]},{"id":"https://openalex.org/I2800817003","display_name":"California Southern University","ror":"https://ror.org/058zz0t50","country_code":"US","type":"education","lineage":["https://openalex.org/I2800817003"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Gowri Sankar Ramabhadran","raw_affiliation_strings":["University of Southern California"],"affiliations":[{"raw_affiliation_string":"University of Southern California","institution_ids":["https://openalex.org/I2800817003","https://openalex.org/I1174212"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5076845058","display_name":"Bruno Crispo","orcid":"https://orcid.org/0000-0002-1252-8465"},"institutions":[{"id":"https://openalex.org/I193223587","display_name":"University of Trento","ror":"https://ror.org/05trd4x28","country_code":"IT","type":"education","lineage":["https://openalex.org/I193223587"]}],"countries":["IT"],"is_corresponding":false,"raw_author_name":"Bruno Crispo","raw_affiliation_strings":["Imec-DistriNet, University of Trento, Italy"],"affiliations":[{"raw_affiliation_string":"Imec-DistriNet, University of Trento, Italy","institution_ids":["https://openalex.org/I193223587"]}]}],"institutions":[],"countries_distinct_count":5,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5060045073"],"corresponding_institution_ids":["https://openalex.org/I196972281","https://openalex.org/I99464096"],"apc_list":null,"apc_paid":null,"fwci":2.5383,"has_fulltext":false,"cited_by_count":22,"citation_normalized_percentile":{"value":0.919663,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":90,"max":98},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"8"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8361278772354126},{"id":"https://openalex.org/keywords/scalability","display_name":"Scalability","score":0.80626380443573},{"id":"https://openalex.org/keywords/overhead","display_name":"Overhead (engineering)","score":0.5872622728347778},{"id":"https://openalex.org/keywords/protocol","display_name":"Protocol (science)","score":0.5644176006317139},{"id":"https://openalex.org/keywords/internet-of-things","display_name":"Internet of Things","score":0.5075143575668335},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.48256057500839233},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.480328232049942},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.480059951543808},{"id":"https://openalex.org/keywords/direct-anonymous-attestation","display_name":"Direct Anonymous Attestation","score":0.4512650966644287},{"id":"https://openalex.org/keywords/memory-footprint","display_name":"Memory footprint","score":0.4273957908153534},{"id":"https://openalex.org/keywords/adversary","display_name":"Adversary","score":0.42088454961776733},{"id":"https://openalex.org/keywords/attack-surface","display_name":"Attack surface","score":0.42070791125297546},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.3497313857078552},{"id":"https://openalex.org/keywords/trusted-computing","display_name":"Trusted Computing","score":0.3414752781391144},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.12445810437202454}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8361278772354126},{"id":"https://openalex.org/C48044578","wikidata":"https://www.wikidata.org/wiki/Q727490","display_name":"Scalability","level":2,"score":0.80626380443573},{"id":"https://openalex.org/C2779960059","wikidata":"https://www.wikidata.org/wiki/Q7113681","display_name":"Overhead (engineering)","level":2,"score":0.5872622728347778},{"id":"https://openalex.org/C2780385302","wikidata":"https://www.wikidata.org/wiki/Q367158","display_name":"Protocol (science)","level":3,"score":0.5644176006317139},{"id":"https://openalex.org/C81860439","wikidata":"https://www.wikidata.org/wiki/Q251212","display_name":"Internet of Things","level":2,"score":0.5075143575668335},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.48256057500839233},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.480328232049942},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.480059951543808},{"id":"https://openalex.org/C169796023","wikidata":"https://www.wikidata.org/wiki/Q3708936","display_name":"Direct Anonymous Attestation","level":3,"score":0.4512650966644287},{"id":"https://openalex.org/C74912251","wikidata":"https://www.wikidata.org/wiki/Q6815727","display_name":"Memory footprint","level":2,"score":0.4273957908153534},{"id":"https://openalex.org/C41065033","wikidata":"https://www.wikidata.org/wiki/Q2825412","display_name":"Adversary","level":2,"score":0.42088454961776733},{"id":"https://openalex.org/C2776576444","wikidata":"https://www.wikidata.org/wiki/Q303569","display_name":"Attack surface","level":2,"score":0.42070791125297546},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.3497313857078552},{"id":"https://openalex.org/C2776831232","wikidata":"https://www.wikidata.org/wiki/Q966812","display_name":"Trusted Computing","level":2,"score":0.3414752781391144},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.12445810437202454},{"id":"https://openalex.org/C71924100","wikidata":"https://www.wikidata.org/wiki/Q11190","display_name":"Medicine","level":0,"score":0.0},{"id":"https://openalex.org/C204787440","wikidata":"https://www.wikidata.org/wiki/Q188504","display_name":"Alternative medicine","level":2,"score":0.0},{"id":"https://openalex.org/C142724271","wikidata":"https://www.wikidata.org/wiki/Q7208","display_name":"Pathology","level":1,"score":0.0}],"mesh":[],"locations_count":3,"locations":[{"id":"doi:10.1109/desec.2018.8625142","is_oa":false,"landing_page_url":"https://doi.org/10.1109/desec.2018.8625142","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2018 IEEE Conference on Dependable and Secure Computing (DSC)","raw_type":"proceedings-article"},{"id":"pmh:oai:iris.unitn.it:11572/228511","is_oa":true,"landing_page_url":"http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=8614461","pdf_url":null,"source":{"id":"https://openalex.org/S4306401913","display_name":"Institutional Research Information System (Universit\u00e0 degli Studi di Trento)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I193223587","host_organization_name":"University of Trento","host_organization_lineage":["https://openalex.org/I193223587"],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"info:eu-repo/semantics/conferenceObject"},{"id":"pmh:oai:lirias2repo.kuleuven.be:123456789/626421","is_oa":false,"landing_page_url":"https://lirias.kuleuven.be/bitstream/123456789/626421/2/attestation.pdf","pdf_url":null,"source":{"id":"https://openalex.org/S4306401954","display_name":"Lirias (KU Leuven)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I99464096","host_organization_name":"KU Leuven","host_organization_lineage":["https://openalex.org/I99464096"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"The 2018 IEEE Conference on Dependable and Secure Computing (DSC), Kaohsiung, Taiwan, 10-13 December 2018","raw_type":"info:eu-repo/semantics/publishedVersion"}],"best_oa_location":{"id":"pmh:oai:iris.unitn.it:11572/228511","is_oa":true,"landing_page_url":"http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=8614461","pdf_url":null,"source":{"id":"https://openalex.org/S4306401913","display_name":"Institutional Research Information System (Universit\u00e0 degli Studi di Trento)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I193223587","host_organization_name":"University of Trento","host_organization_lineage":["https://openalex.org/I193223587"],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"info:eu-repo/semantics/conferenceObject"},"sustainable_development_goals":[{"score":0.5299999713897705,"id":"https://metadata.un.org/sdg/9","display_name":"Industry, innovation and infrastructure"}],"awards":[],"funders":[{"id":"https://openalex.org/F4320322308","display_name":"KU Leuven","ror":"https://ror.org/05f950310"},{"id":"https://openalex.org/F4320327336","display_name":"Vlaamse regering","ror":null}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":29,"referenced_works":["https://openalex.org/W1479727008","https://openalex.org/W1522249641","https://openalex.org/W1524068846","https://openalex.org/W1964970915","https://openalex.org/W1968465951","https://openalex.org/W1991756896","https://openalex.org/W2039427951","https://openalex.org/W2112525087","https://openalex.org/W2140372921","https://openalex.org/W2146244799","https://openalex.org/W2152605584","https://openalex.org/W2289689155","https://openalex.org/W2291790378","https://openalex.org/W2472201937","https://openalex.org/W2529194337","https://openalex.org/W2534678535","https://openalex.org/W2602856088","https://openalex.org/W2736210006","https://openalex.org/W2771820100","https://openalex.org/W2790003555","https://openalex.org/W2805525585","https://openalex.org/W2808465942","https://openalex.org/W2963034167","https://openalex.org/W4236995802","https://openalex.org/W4403526275","https://openalex.org/W6631362052","https://openalex.org/W6648250834","https://openalex.org/W6676474364","https://openalex.org/W6682198590"],"related_works":["https://openalex.org/W2372678089","https://openalex.org/W2695299078","https://openalex.org/W2355956995","https://openalex.org/W2390768934","https://openalex.org/W2350048275","https://openalex.org/W2086874776","https://openalex.org/W1497930374","https://openalex.org/W2168345601","https://openalex.org/W2028268185","https://openalex.org/W2377235694"],"abstract_inverted_index":{"The":[0],"Internet":[1],"of":[2,42,143,170,198,200],"Things":[3],"(IoT)":[4],"is":[5,28,85,97,117,132,183],"increasingly":[6],"intertwined":[7],"with":[8,112,123],"critical":[9],"industrial":[10],"processes,":[11],"yet":[12],"contemporary":[13],"IoT":[14,65,101,128,202],"devices":[15],"offer":[16],"limited":[17,62],"security":[18],"features,":[19],"creating":[20],"a":[21,29,43,48,91,120,165],"large":[22],"new":[23],"attack":[24],"surface.":[25],"Remote":[26],"attestation":[27,52,94],"well-known":[30],"technique":[31],"to":[32,126,189],"detect":[33],"cyber":[34],"threats":[35],"by":[36],"remotely":[37],"verifying":[38],"the":[39,127,135,140,147,158,176],"internal":[40],"state":[41],"networked":[44],"embedded":[45],"device":[46,145],"through":[47],"trusted":[49],"entity.":[50],"Multi-device":[51],"has":[53,70],"received":[54],"little":[55],"attention":[56],"although":[57],"current":[58],"single-device":[59],"approaches":[60],"show":[61,164],"scalability":[63],"in":[64,134,146,168,192],"applications.":[66],"Though":[67],"recent":[68],"work":[69],"yielded":[71],"some":[72],"proposals":[73],"for":[74,99],"scalable":[75,92],"attestation,":[76],"several":[77],"aspects":[78],"remain":[79],"unexplored,":[80],"and":[81,151,173,186,194],"thus":[82],"more":[83],"research":[84],"required.":[86],"This":[87],"paper":[88],"presents":[89],"slimIoT,":[90],"lightweight":[93],"protocol":[95,131],"that":[96,137,181],"suitable":[98],"all":[100],"devices.":[102,203],"slimIoT":[103,153,182],"depends":[104],"on":[105],"an":[106],"efficient":[107,188],"broadcast":[108],"authentication":[109],"scheme":[110],"along":[111],"symmetric":[113],"key":[114],"cryptography.":[115],"It":[116],"resilient":[118],"against":[119],"strong":[121],"adversary":[122],"physical":[124],"access":[125],"device.":[129],"Our":[130],"informative":[133],"sense":[136],"it":[138],"identifies":[139],"precise":[141],"status":[142],"every":[144],"network.":[148],"We":[149],"implement":[150],"evaluate":[152],"considering":[154],"many":[155],"factors.":[156],"On":[157,175],"one":[159],"hand,":[160,178],"our":[161],"evaluation":[162],"results":[163],"low":[166],"overhead":[167],"terms":[169],"memory":[171],"footprint":[172],"runtime.":[174],"other":[177],"simulations":[179],"demonstrate":[180],"scalable,":[184],"robust":[185],"highly":[187],"be":[190],"used":[191],"static":[193],"dynamic":[195],"networks":[196],"consisting":[197],"thousands":[199],"heterogenous":[201]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":4},{"year":2023,"cited_by_count":2},{"year":2021,"cited_by_count":7},{"year":2020,"cited_by_count":5},{"year":2019,"cited_by_count":1},{"year":2018,"cited_by_count":2}],"updated_date":"2026-03-26T06:05:38.182114","created_date":"2025-10-10T00:00:00"}
