{"id":"https://openalex.org/W3046202155","doi":"https://doi.org/10.1109/icc40277.2020.9148835","title":"Secure Authentication and Key Agreement Protocol for Tactile Internet-based Tele-Surgery Ecosystem","display_name":"Secure Authentication and Key Agreement Protocol for Tactile Internet-based Tele-Surgery Ecosystem","publication_year":2020,"publication_date":"2020-06-01","ids":{"openalex":"https://openalex.org/W3046202155","doi":"https://doi.org/10.1109/icc40277.2020.9148835","mag":"3046202155"},"language":"en","primary_location":{"id":"doi:10.1109/icc40277.2020.9148835","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icc40277.2020.9148835","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"ICC 2020 - 2020 IEEE International Conference on Communications (ICC)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5091365209","display_name":"Kuljeet Kaur","orcid":"https://orcid.org/0000-0003-4597-1700"},"institutions":[{"id":"https://openalex.org/I9736820","display_name":"\u00c9cole de Technologie Sup\u00e9rieure","ror":"https://ror.org/0020snb74","country_code":"CA","type":"education","lineage":["https://openalex.org/I49663120","https://openalex.org/I9736820"]}],"countries":["CA"],"is_corresponding":true,"raw_author_name":"Kuljeet Kaur","raw_affiliation_strings":["Electrical Engineering Department, \u00c9cole de technologie sup\u00e9rieure, Montr\u00e9al, QC, Canada"],"affiliations":[{"raw_affiliation_string":"Electrical Engineering Department, \u00c9cole de technologie sup\u00e9rieure, Montr\u00e9al, QC, Canada","institution_ids":["https://openalex.org/I9736820"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5005877741","display_name":"Sahil Garg","orcid":"https://orcid.org/0000-0003-0229-608X"},"institutions":[{"id":"https://openalex.org/I9736820","display_name":"\u00c9cole de Technologie Sup\u00e9rieure","ror":"https://ror.org/0020snb74","country_code":"CA","type":"education","lineage":["https://openalex.org/I49663120","https://openalex.org/I9736820"]}],"countries":["CA"],"is_corresponding":false,"raw_author_name":"Sahil Garg","raw_affiliation_strings":["Electrical Engineering Department, \u00c9cole de technologie sup\u00e9rieure, Montr\u00e9al, QC, Canada"],"affiliations":[{"raw_affiliation_string":"Electrical Engineering Department, \u00c9cole de technologie sup\u00e9rieure, Montr\u00e9al, QC, Canada","institution_ids":["https://openalex.org/I9736820"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5032243366","display_name":"Georges Kaddoum","orcid":"https://orcid.org/0000-0002-5025-6624"},"institutions":[{"id":"https://openalex.org/I9736820","display_name":"\u00c9cole de Technologie Sup\u00e9rieure","ror":"https://ror.org/0020snb74","country_code":"CA","type":"education","lineage":["https://openalex.org/I49663120","https://openalex.org/I9736820"]}],"countries":["CA"],"is_corresponding":false,"raw_author_name":"Georges Kaddoum","raw_affiliation_strings":["Electrical Engineering Department, \u00c9cole de technologie sup\u00e9rieure, Montr\u00e9al, QC, Canada"],"affiliations":[{"raw_affiliation_string":"Electrical Engineering Department, \u00c9cole de technologie sup\u00e9rieure, Montr\u00e9al, QC, Canada","institution_ids":["https://openalex.org/I9736820"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5057916222","display_name":"Mohsen Guizani","orcid":"https://orcid.org/0000-0002-8972-8094"},"institutions":[{"id":"https://openalex.org/I60342839","display_name":"Qatar University","ror":"https://ror.org/00yhnba62","country_code":"QA","type":"education","lineage":["https://openalex.org/I60342839"]}],"countries":["QA"],"is_corresponding":false,"raw_author_name":"Mohsen Guizani","raw_affiliation_strings":["Department of Computer Science and Engineering, Qatar University, Doha, Qatar"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Engineering, Qatar University, Doha, Qatar","institution_ids":["https://openalex.org/I60342839"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5091365209"],"corresponding_institution_ids":["https://openalex.org/I9736820"],"apc_list":null,"apc_paid":null,"fwci":1.2334,"has_fulltext":false,"cited_by_count":16,"citation_normalized_percentile":{"value":0.81159153,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":96,"max":98},"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.9965000152587891,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.9965000152587891,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11932","display_name":"Wireless Body Area Networks","score":0.9919999837875366,"subfield":{"id":"https://openalex.org/subfields/2204","display_name":"Biomedical Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10273","display_name":"IoT and Edge/Fog Computing","score":0.9886999726295471,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7156784534454346},{"id":"https://openalex.org/keywords/authentication-protocol","display_name":"Authentication protocol","score":0.6301031708717346},{"id":"https://openalex.org/keywords/password","display_name":"Password","score":0.6264001131057739},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6118898391723633},{"id":"https://openalex.org/keywords/mutual-authentication","display_name":"Mutual authentication","score":0.5565181970596313},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.5075982809066772},{"id":"https://openalex.org/keywords/replay-attack","display_name":"Replay attack","score":0.49027565121650696},{"id":"https://openalex.org/keywords/key-agreement-protocol","display_name":"Key-agreement protocol","score":0.471593976020813},{"id":"https://openalex.org/keywords/challenge-handshake-authentication-protocol","display_name":"Challenge-Handshake Authentication Protocol","score":0.4671577513217926},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.43592801690101624},{"id":"https://openalex.org/keywords/protocol","display_name":"Protocol (science)","score":0.42090314626693726},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.41813552379608154},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.23691964149475098},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.1739204227924347},{"id":"https://openalex.org/keywords/key-distribution","display_name":"Key distribution","score":0.08278056979179382}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7156784534454346},{"id":"https://openalex.org/C21564112","wikidata":"https://www.wikidata.org/wiki/Q4825885","display_name":"Authentication protocol","level":3,"score":0.6301031708717346},{"id":"https://openalex.org/C109297577","wikidata":"https://www.wikidata.org/wiki/Q161157","display_name":"Password","level":2,"score":0.6264001131057739},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6118898391723633},{"id":"https://openalex.org/C2781221063","wikidata":"https://www.wikidata.org/wiki/Q6944186","display_name":"Mutual authentication","level":3,"score":0.5565181970596313},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.5075982809066772},{"id":"https://openalex.org/C11560541","wikidata":"https://www.wikidata.org/wiki/Q1756025","display_name":"Replay attack","level":3,"score":0.49027565121650696},{"id":"https://openalex.org/C135530808","wikidata":"https://www.wikidata.org/wiki/Q3306713","display_name":"Key-agreement protocol","level":5,"score":0.471593976020813},{"id":"https://openalex.org/C207828512","wikidata":"https://www.wikidata.org/wiki/Q1060131","display_name":"Challenge-Handshake Authentication Protocol","level":4,"score":0.4671577513217926},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.43592801690101624},{"id":"https://openalex.org/C2780385302","wikidata":"https://www.wikidata.org/wiki/Q367158","display_name":"Protocol (science)","level":3,"score":0.42090314626693726},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.41813552379608154},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.23691964149475098},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.1739204227924347},{"id":"https://openalex.org/C160333310","wikidata":"https://www.wikidata.org/wiki/Q6398153","display_name":"Key distribution","level":4,"score":0.08278056979179382},{"id":"https://openalex.org/C204787440","wikidata":"https://www.wikidata.org/wiki/Q188504","display_name":"Alternative medicine","level":2,"score":0.0},{"id":"https://openalex.org/C142724271","wikidata":"https://www.wikidata.org/wiki/Q7208","display_name":"Pathology","level":1,"score":0.0},{"id":"https://openalex.org/C71924100","wikidata":"https://www.wikidata.org/wiki/Q11190","display_name":"Medicine","level":0,"score":0.0}],"mesh":[],"locations_count":3,"locations":[{"id":"doi:10.1109/icc40277.2020.9148835","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icc40277.2020.9148835","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"ICC 2020 - 2020 IEEE International Conference on Communications (ICC)","raw_type":"proceedings-article"},{"id":"pmh:oai:espace2.etsmtl.ca:21022","is_oa":false,"landing_page_url":"https://espace2.etsmtl.ca/id/eprint/21022/","pdf_url":null,"source":{"id":"https://openalex.org/S4306402392","display_name":"Espace \u00c9TS (ETS)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I1341030882","host_organization_name":"Educational Testing Service","host_organization_lineage":["https://openalex.org/I1341030882"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"Compte rendu de conf\u00e9rence"},{"id":"pmh:oai:qspace.qu.edu.qa:10576/36943","is_oa":false,"landing_page_url":"http://hdl.handle.net/10576/36943","pdf_url":null,"source":{"id":"https://openalex.org/S4306400014","display_name":"Qatar University QSpace (Qatar University)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I60342839","host_organization_name":"Qatar University","host_organization_lineage":["https://openalex.org/I60342839"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"Conference"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":28,"referenced_works":["https://openalex.org/W2002110658","https://openalex.org/W2340597701","https://openalex.org/W2402312219","https://openalex.org/W2748361805","https://openalex.org/W2753121224","https://openalex.org/W2783774416","https://openalex.org/W2811040154","https://openalex.org/W2824530277","https://openalex.org/W2902504913","https://openalex.org/W2915099783","https://openalex.org/W2918900760","https://openalex.org/W2921008479","https://openalex.org/W2924305987","https://openalex.org/W2928018723","https://openalex.org/W2940575758","https://openalex.org/W2954321248","https://openalex.org/W2962855623","https://openalex.org/W2962860309","https://openalex.org/W2963302706","https://openalex.org/W2971877239","https://openalex.org/W2972154437","https://openalex.org/W2974280033","https://openalex.org/W2975092553","https://openalex.org/W2979126598","https://openalex.org/W6704168218","https://openalex.org/W6764714055","https://openalex.org/W6767411762","https://openalex.org/W6768243020"],"related_works":["https://openalex.org/W2379241680","https://openalex.org/W2588022061","https://openalex.org/W4211089996","https://openalex.org/W3159404701","https://openalex.org/W87692798","https://openalex.org/W4295916777","https://openalex.org/W1565108533","https://openalex.org/W2359412810","https://openalex.org/W2972399556","https://openalex.org/W2365213152"],"abstract_inverted_index":{"With":[0],"the":[1,18,32,40,53,60,105,110,115,118,131,150,153,156,164,167,170,174,189,192],"recent":[2],"advancements":[3],"in":[4,27,31,37],"wireless":[5],"communications,":[6],"Tactile":[7],"Internet":[8],"(TI)":[9],"has":[10],"witnessed":[11],"a":[12,69],"major":[13],"blow.":[14],"TI":[15],"is":[16,44,65],"considered":[17],"next":[19],"big":[20],"evolution":[21],"that":[22],"will":[23],"provide":[24],"real-time":[25],"control":[26],"industrial":[28],"setups,":[29],"particularly":[30],"domain":[33],"of":[34,42,56,62,120,166,173,191,206],"tele-surgery.":[35,77],"However,":[36],"remote-surgery":[38],"ecosystems":[39],"transmission":[41],"data":[43],"prone":[45],"to":[46,51,67],"different":[47],"attack":[48],"vectors.":[49],"Thus,":[50],"realize":[52],"true":[54],"potential":[55],"secure":[57,70,86,102],"tele-surgery":[58],"under":[59],"umbrella":[61],"TI,":[63],"it":[64],"required":[66],"design":[68],"authentication":[71,88,144],"and":[72,85,89,109,125,141,145,155,182],"key":[73,146],"agreement":[74,147],"protocol":[75,92,100,116,128,176,193],"for":[76,93],"In":[78],"this":[79],"paper,":[80],"we":[81],"present":[82],"an":[83],"effective":[84],"mutual":[87,143],"session":[90],"establishment":[91],"TI-driven":[94],"remote":[95],"surgery":[96],"setups.":[97],"The":[98,127,185],"designed":[99,175],"enables":[101],"communications":[103],"between":[104],"surgeon,":[106],"robotic":[107,157],"arm,":[108],"trusted":[111],"authority":[112],"(TA);":[113],"where":[114],"leverages":[117],"advantages":[119],"Elliptic":[121],"Curve":[122],"Cryptography":[123],"(ECC)":[124],"biometrics.":[126],"operates":[129],"along":[130],"following":[132],"three":[133],"phases:":[134],"i)":[135],"setup":[136],"phase,":[137,140,152],"ii)":[138],"registration":[139],"iii)":[142],"phase.":[148],"During":[149],"third":[151],"surgeon":[154],"arm":[158],"mutually":[159],"authenticate":[160],"each":[161],"other":[162],"with":[163],"help":[165],"TA.":[168],"Further,":[169],"security":[171],"features":[172],"have":[177],"been":[178],"established":[179],"using":[180],"formal":[181],"informal":[183],"means.":[184],"obtained":[186],"results":[187],"indicate":[188],"resiliency":[190],"against":[194],"offline":[195],"password":[196],"guessing":[197],"attacks,":[198,200,202,204,208],"replay":[199],"impersonation":[201],"man-in-the-middle":[203],"denial":[205],"service":[207],"etc.":[209]},"counts_by_year":[{"year":2025,"cited_by_count":5},{"year":2024,"cited_by_count":3},{"year":2023,"cited_by_count":4},{"year":2022,"cited_by_count":4}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
