{"id":"https://openalex.org/W2783779115","doi":"https://doi.org/10.1109/etfa.2017.8247567","title":"Security for building automation with hardware-based node authentication","display_name":"Security for building automation with hardware-based node authentication","publication_year":2017,"publication_date":"2017-09-01","ids":{"openalex":"https://openalex.org/W2783779115","doi":"https://doi.org/10.1109/etfa.2017.8247567","mag":"2783779115"},"language":"en","primary_location":{"id":"doi:10.1109/etfa.2017.8247567","is_oa":false,"landing_page_url":"https://doi.org/10.1109/etfa.2017.8247567","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2017 22nd IEEE International Conference on Emerging Technologies and Factory Automation (ETFA)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5059422050","display_name":"Thomas Fischer","orcid":"https://orcid.org/0000-0002-8363-9613"},"institutions":[{"id":"https://openalex.org/I4210131793","display_name":"Infineon Technologies (Austria)","ror":"https://ror.org/03msng824","country_code":"AT","type":"company","lineage":["https://openalex.org/I137594350","https://openalex.org/I4210131793"]}],"countries":["AT"],"is_corresponding":true,"raw_author_name":"Thomas Fischer","raw_affiliation_strings":["Infineon Technologies, Design Center Graz, AG, Austria"],"affiliations":[{"raw_affiliation_string":"Infineon Technologies, Design Center Graz, AG, Austria","institution_ids":["https://openalex.org/I4210131793"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5072908528","display_name":"Christian Lesjak","orcid":null},"institutions":[{"id":"https://openalex.org/I4210131793","display_name":"Infineon Technologies (Austria)","ror":"https://ror.org/03msng824","country_code":"AT","type":"company","lineage":["https://openalex.org/I137594350","https://openalex.org/I4210131793"]}],"countries":["AT"],"is_corresponding":false,"raw_author_name":"Christian Lesjak","raw_affiliation_strings":["Infineon Technologies, Design Center Graz, AG, Austria"],"affiliations":[{"raw_affiliation_string":"Infineon Technologies, Design Center Graz, AG, Austria","institution_ids":["https://openalex.org/I4210131793"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5016574940","display_name":"Andrea Hoeller","orcid":null},"institutions":[{"id":"https://openalex.org/I4210131793","display_name":"Infineon Technologies (Austria)","ror":"https://ror.org/03msng824","country_code":"AT","type":"company","lineage":["https://openalex.org/I137594350","https://openalex.org/I4210131793"]}],"countries":["AT"],"is_corresponding":false,"raw_author_name":"Andrea Hoeller","raw_affiliation_strings":["Infineon Technologies, Design Center Graz, AG, Austria"],"affiliations":[{"raw_affiliation_string":"Infineon Technologies, Design Center Graz, AG, Austria","institution_ids":["https://openalex.org/I4210131793"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5048811541","display_name":"Christian Steger","orcid":"https://orcid.org/0000-0002-4441-266X"},"institutions":[{"id":"https://openalex.org/I4092182","display_name":"Graz University of Technology","ror":"https://ror.org/00d7xrm67","country_code":"AT","type":"education","lineage":["https://openalex.org/I4092182"]}],"countries":["AT"],"is_corresponding":false,"raw_author_name":"Christian Steger","raw_affiliation_strings":["Institute for Technical Informatics, Graz University of Technology"],"affiliations":[{"raw_affiliation_string":"Institute for Technical Informatics, Graz University of Technology","institution_ids":["https://openalex.org/I4092182"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5059422050"],"corresponding_institution_ids":["https://openalex.org/I4210131793"],"apc_list":null,"apc_paid":null,"fwci":0.4836,"has_fulltext":false,"cited_by_count":3,"citation_normalized_percentile":{"value":0.76630276,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9987000226974487,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9987000226974487,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12801","display_name":"Bluetooth and Wireless Communication Technologies","score":0.9976000189781189,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12222","display_name":"IoT-based Smart Home Systems","score":0.9934999942779541,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7475371360778809},{"id":"https://openalex.org/keywords/protocol-stack","display_name":"Protocol stack","score":0.609931468963623},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.5809065699577332},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5806188583374023},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.5043033361434937},{"id":"https://openalex.org/keywords/attack-surface","display_name":"Attack surface","score":0.47681018710136414},{"id":"https://openalex.org/keywords/security-service","display_name":"Security service","score":0.44934141635894775},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.44625550508499146},{"id":"https://openalex.org/keywords/protocol","display_name":"Protocol (science)","score":0.4430783987045288},{"id":"https://openalex.org/keywords/node","display_name":"Node (physics)","score":0.4262411296367645},{"id":"https://openalex.org/keywords/home-automation","display_name":"Home automation","score":0.42140278220176697},{"id":"https://openalex.org/keywords/enterprise-information-security-architecture","display_name":"Enterprise information security architecture","score":0.41645729541778564},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.2016659379005432},{"id":"https://openalex.org/keywords/information-security","display_name":"Information security","score":0.1851506531238556},{"id":"https://openalex.org/keywords/wireless-sensor-network","display_name":"Wireless sensor network","score":0.18110859394073486},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.1344825029373169}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7475371360778809},{"id":"https://openalex.org/C38601921","wikidata":"https://www.wikidata.org/wiki/Q1757693","display_name":"Protocol stack","level":3,"score":0.609931468963623},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.5809065699577332},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5806188583374023},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.5043033361434937},{"id":"https://openalex.org/C2776576444","wikidata":"https://www.wikidata.org/wiki/Q303569","display_name":"Attack surface","level":2,"score":0.47681018710136414},{"id":"https://openalex.org/C29983905","wikidata":"https://www.wikidata.org/wiki/Q7445066","display_name":"Security service","level":3,"score":0.44934141635894775},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.44625550508499146},{"id":"https://openalex.org/C2780385302","wikidata":"https://www.wikidata.org/wiki/Q367158","display_name":"Protocol (science)","level":3,"score":0.4430783987045288},{"id":"https://openalex.org/C62611344","wikidata":"https://www.wikidata.org/wiki/Q1062658","display_name":"Node (physics)","level":2,"score":0.4262411296367645},{"id":"https://openalex.org/C507571656","wikidata":"https://www.wikidata.org/wiki/Q848436","display_name":"Home automation","level":2,"score":0.42140278220176697},{"id":"https://openalex.org/C31139447","wikidata":"https://www.wikidata.org/wiki/Q5380386","display_name":"Enterprise information security architecture","level":2,"score":0.41645729541778564},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.2016659379005432},{"id":"https://openalex.org/C527648132","wikidata":"https://www.wikidata.org/wiki/Q189900","display_name":"Information security","level":2,"score":0.1851506531238556},{"id":"https://openalex.org/C24590314","wikidata":"https://www.wikidata.org/wiki/Q336038","display_name":"Wireless sensor network","level":2,"score":0.18110859394073486},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.1344825029373169},{"id":"https://openalex.org/C71924100","wikidata":"https://www.wikidata.org/wiki/Q11190","display_name":"Medicine","level":0,"score":0.0},{"id":"https://openalex.org/C204787440","wikidata":"https://www.wikidata.org/wiki/Q188504","display_name":"Alternative medicine","level":2,"score":0.0},{"id":"https://openalex.org/C142724271","wikidata":"https://www.wikidata.org/wiki/Q7208","display_name":"Pathology","level":1,"score":0.0},{"id":"https://openalex.org/C66938386","wikidata":"https://www.wikidata.org/wiki/Q633538","display_name":"Structural engineering","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/etfa.2017.8247567","is_oa":false,"landing_page_url":"https://doi.org/10.1109/etfa.2017.8247567","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2017 22nd IEEE International Conference on Emerging Technologies and Factory Automation (ETFA)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":7,"referenced_works":["https://openalex.org/W1926983183","https://openalex.org/W2200485565","https://openalex.org/W2517394792","https://openalex.org/W2573675698","https://openalex.org/W2576261600","https://openalex.org/W2589570111","https://openalex.org/W2597442687"],"related_works":["https://openalex.org/W2625762372","https://openalex.org/W3177693645","https://openalex.org/W2363878185","https://openalex.org/W2076689609","https://openalex.org/W2370240436","https://openalex.org/W198076453","https://openalex.org/W2358731390","https://openalex.org/W2998865675","https://openalex.org/W1987900397","https://openalex.org/W4205533699"],"abstract_inverted_index":{"Providing":[0],"reasonable":[1,172],"security":[2,40,113,162,173],"is":[3,86],"a":[4,27,39,119,155],"fundamental":[5],"requirement":[6],"in":[7,42,52,74,139,185],"building":[8],"and":[9,91,158,161,177],"home":[10],"automation.":[11],"The":[12,124,164],"authenticity":[13],"of":[14,67,150,188],"devices":[15,24],"must":[16],"be":[17,136],"protected":[18],"to":[19,89,97,102,143],"prevent":[20],"cloned":[21],"or":[22,56,101],"corrupted":[23],"from":[25],"joining":[26],"private":[28],"network.":[29],"State-of-the-art":[30],"systems":[31],"already":[32],"provide":[33],"secured":[34],"communication":[35,81],"links":[36],"either":[37],"by":[38,57,153],"layer":[41],"the":[43,48,59,68,80,84,99,104,148,151,168,186],"interface":[44,69],"protocol":[45,64],"stack":[46],"(e.g.":[47],"Security":[49,62],"Manager":[50],"Protocol":[51],"Bluetooth":[53],"Low":[54],"Energy)":[55],"using":[58],"Transport":[60],"Layer":[61],"(TLS)":[63],"on":[65],"top":[66],"protocol.":[70],"These":[71],"solutions":[72],"have":[73],"common":[75],"that":[76,95,116,167],"they":[77],"only":[78],"protect":[79],"links.":[82],"Thus":[83],"system":[85],"still":[87],"vulnerable":[88],"active":[90],"passive":[92],"physical":[93],"attacks":[94],"aim":[96],"clone":[98],"device":[100,120],"extract":[103],"used":[105],"keys.":[106],"We":[107,146],"show":[108],"an":[109,140],"approach":[110,152],"with":[111,130],"off-the-shelf":[112],"trust":[114],"anchors":[115],"allows":[117,127],"securing":[118],"against":[121],"such":[122],"attacks.":[123],"proposed":[125,169],"solution":[126],"product":[128],"authentication":[129],"low-cost":[131],"ready-to-use":[132],"components":[133],"which":[134],"can":[135,178],"easily":[137],"integrated":[138],"architecture":[141,170],"similar":[142],"existing":[144],"proposals.":[145],"demonstrate":[147],"feasibility":[149],"presenting":[154],"prototype":[156],"implementation":[157],"discuss":[159],"performance":[160],"implications.":[163],"results":[165],"indicate":[166],"provides":[171],"at":[174],"acceptable":[175],"costs":[176],"serve":[179],"as":[180],"template":[181],"for":[182],"many":[183],"applications":[184],"Internet":[187],"Things":[189],"(IoT)":[190],"context.":[191]},"counts_by_year":[{"year":2023,"cited_by_count":1},{"year":2021,"cited_by_count":1},{"year":2019,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
