{"id":"https://openalex.org/W2786694322","doi":"https://doi.org/10.1109/icecs.2017.8292056","title":"A novel secure conference communication in IoT devices based on memristors","display_name":"A novel secure conference communication in IoT devices based on memristors","publication_year":2017,"publication_date":"2017-12-01","ids":{"openalex":"https://openalex.org/W2786694322","doi":"https://doi.org/10.1109/icecs.2017.8292056","mag":"2786694322"},"language":"en","primary_location":{"id":"doi:10.1109/icecs.2017.8292056","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icecs.2017.8292056","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2017 24th IEEE International Conference on Electronics, Circuits and Systems (ICECS)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5006143958","display_name":"Heba Abunahla","orcid":"https://orcid.org/0000-0002-5357-2374"},"institutions":[{"id":"https://openalex.org/I176601375","display_name":"Khalifa University of Science and Technology","ror":"https://ror.org/05hffr360","country_code":"AE","type":"education","lineage":["https://openalex.org/I176601375"]}],"countries":["AE"],"is_corresponding":true,"raw_author_name":"Heba Abunahla","raw_affiliation_strings":["Department of Electrical and Computer Engineering, Khalifa University of Science and Technology, Abu Dhabi, UAE"],"affiliations":[{"raw_affiliation_string":"Department of Electrical and Computer Engineering, Khalifa University of Science and Technology, Abu Dhabi, UAE","institution_ids":["https://openalex.org/I176601375"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5050289622","display_name":"Dina Shehada","orcid":"https://orcid.org/0000-0002-7711-5389"},"institutions":[{"id":"https://openalex.org/I176601375","display_name":"Khalifa University of Science and Technology","ror":"https://ror.org/05hffr360","country_code":"AE","type":"education","lineage":["https://openalex.org/I176601375"]}],"countries":["AE"],"is_corresponding":false,"raw_author_name":"Dina Shehada","raw_affiliation_strings":["Department of Electrical and Computer Engineering, Khalifa University of Science and Technology, Abu Dhabi, UAE"],"affiliations":[{"raw_affiliation_string":"Department of Electrical and Computer Engineering, Khalifa University of Science and Technology, Abu Dhabi, UAE","institution_ids":["https://openalex.org/I176601375"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5044552714","display_name":"Chan Yeob Yeun","orcid":"https://orcid.org/0000-0002-1398-952X"},"institutions":[{"id":"https://openalex.org/I176601375","display_name":"Khalifa University of Science and Technology","ror":"https://ror.org/05hffr360","country_code":"AE","type":"education","lineage":["https://openalex.org/I176601375"]}],"countries":["AE"],"is_corresponding":false,"raw_author_name":"Chan Yeob Yeun","raw_affiliation_strings":["Department of Electrical and Computer Engineering, Khalifa University of Science and Technology, Abu Dhabi, UAE"],"affiliations":[{"raw_affiliation_string":"Department of Electrical and Computer Engineering, Khalifa University of Science and Technology, Abu Dhabi, UAE","institution_ids":["https://openalex.org/I176601375"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5013814572","display_name":"Baker Mohammad","orcid":"https://orcid.org/0000-0002-6063-473X"},"institutions":[{"id":"https://openalex.org/I176601375","display_name":"Khalifa University of Science and Technology","ror":"https://ror.org/05hffr360","country_code":"AE","type":"education","lineage":["https://openalex.org/I176601375"]}],"countries":["AE"],"is_corresponding":false,"raw_author_name":"Baker Mohammad","raw_affiliation_strings":["Department of Electrical and Computer Engineering, Khalifa University of Science and Technology, Abu Dhabi, UAE"],"affiliations":[{"raw_affiliation_string":"Department of Electrical and Computer Engineering, Khalifa University of Science and Technology, Abu Dhabi, UAE","institution_ids":["https://openalex.org/I176601375"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5045307151","display_name":"T. Stouraitis","orcid":"https://orcid.org/0000-0002-3696-4958"},"institutions":[{"id":"https://openalex.org/I176601375","display_name":"Khalifa University of Science and Technology","ror":"https://ror.org/05hffr360","country_code":"AE","type":"education","lineage":["https://openalex.org/I176601375"]}],"countries":["AE"],"is_corresponding":false,"raw_author_name":"Thanos Stouraitis","raw_affiliation_strings":["Department of Electrical and Computer Engineering, Khalifa University of Science and Technology, Abu Dhabi, UAE"],"affiliations":[{"raw_affiliation_string":"Department of Electrical and Computer Engineering, Khalifa University of Science and Technology, Abu Dhabi, UAE","institution_ids":["https://openalex.org/I176601375"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5006143958"],"corresponding_institution_ids":["https://openalex.org/I176601375"],"apc_list":null,"apc_paid":null,"fwci":0.2867,"has_fulltext":false,"cited_by_count":3,"citation_normalized_percentile":{"value":0.61994794,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":"17","issue":null,"first_page":"58","last_page":"61"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10502","display_name":"Advanced Memory and Neural Computing","score":1.0,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10502","display_name":"Advanced Memory and Neural Computing","score":1.0,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12808","display_name":"Ferroelectric and Negative Capacitance Devices","score":0.9990000128746033,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7422478795051575},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.6449524164199829},{"id":"https://openalex.org/keywords/eavesdropping","display_name":"Eavesdropping","score":0.5934979319572449},{"id":"https://openalex.org/keywords/memristor","display_name":"Memristor","score":0.5803666710853577},{"id":"https://openalex.org/keywords/mutual-authentication","display_name":"Mutual authentication","score":0.5275123715400696},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.5200152397155762},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.514197826385498},{"id":"https://openalex.org/keywords/elliptic-curve-cryptography","display_name":"Elliptic curve cryptography","score":0.502286434173584},{"id":"https://openalex.org/keywords/internet-of-things","display_name":"Internet of Things","score":0.47473153471946716},{"id":"https://openalex.org/keywords/reset","display_name":"Reset (finance)","score":0.4490920305252075},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.4141283631324768},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.3441101908683777},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.26970523595809937},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.25921884179115295},{"id":"https://openalex.org/keywords/electrical-engineering","display_name":"Electrical engineering","score":0.1822521984577179},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.17742469906806946},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.10692140460014343}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7422478795051575},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.6449524164199829},{"id":"https://openalex.org/C2776788033","wikidata":"https://www.wikidata.org/wiki/Q320769","display_name":"Eavesdropping","level":2,"score":0.5934979319572449},{"id":"https://openalex.org/C150072547","wikidata":"https://www.wikidata.org/wiki/Q212923","display_name":"Memristor","level":2,"score":0.5803666710853577},{"id":"https://openalex.org/C2781221063","wikidata":"https://www.wikidata.org/wiki/Q6944186","display_name":"Mutual authentication","level":3,"score":0.5275123715400696},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.5200152397155762},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.514197826385498},{"id":"https://openalex.org/C167615521","wikidata":"https://www.wikidata.org/wiki/Q1048911","display_name":"Elliptic curve cryptography","level":4,"score":0.502286434173584},{"id":"https://openalex.org/C81860439","wikidata":"https://www.wikidata.org/wiki/Q251212","display_name":"Internet of Things","level":2,"score":0.47473153471946716},{"id":"https://openalex.org/C2779795794","wikidata":"https://www.wikidata.org/wiki/Q7315343","display_name":"Reset (finance)","level":2,"score":0.4490920305252075},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.4141283631324768},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.3441101908683777},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.26970523595809937},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.25921884179115295},{"id":"https://openalex.org/C119599485","wikidata":"https://www.wikidata.org/wiki/Q43035","display_name":"Electrical engineering","level":1,"score":0.1822521984577179},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.17742469906806946},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.10692140460014343},{"id":"https://openalex.org/C162324750","wikidata":"https://www.wikidata.org/wiki/Q8134","display_name":"Economics","level":0,"score":0.0},{"id":"https://openalex.org/C106159729","wikidata":"https://www.wikidata.org/wiki/Q2294553","display_name":"Financial economics","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/icecs.2017.8292056","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icecs.2017.8292056","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2017 24th IEEE International Conference on Electronics, Circuits and Systems (ICECS)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":15,"referenced_works":["https://openalex.org/W25261110","https://openalex.org/W1603878273","https://openalex.org/W1974177380","https://openalex.org/W2112181056","https://openalex.org/W2162651880","https://openalex.org/W2170029535","https://openalex.org/W2204128698","https://openalex.org/W2270016227","https://openalex.org/W2288559147","https://openalex.org/W2308721663","https://openalex.org/W2420036144","https://openalex.org/W2519186663","https://openalex.org/W2520518864","https://openalex.org/W2592228567","https://openalex.org/W6726447991"],"related_works":["https://openalex.org/W2772112465","https://openalex.org/W4386360526","https://openalex.org/W4387918499","https://openalex.org/W141692544","https://openalex.org/W4247741102","https://openalex.org/W2888216334","https://openalex.org/W2954295797","https://openalex.org/W4391216707","https://openalex.org/W2339018681","https://openalex.org/W2972845117"],"abstract_inverted_index":{"Low":[0],"cost,":[1],"power":[2],"efficiency,":[3],"and":[4,65,92,127,140],"small":[5],"size":[6],"are":[7,129],"the":[8,34,41,59,71,87,90,112,133],"star":[9],"features":[10,110],"desired":[11],"for":[12,81,104],"Internet":[13],"of":[14,45,67,111],"Things":[15],"(IoT)":[16],"platform.":[17],"This":[18],"paper":[19],"presents":[20],"a":[21],"novel":[22,54],"hardware-based":[23],"secure":[24],"conference":[25],"communication":[26],"system":[27,38,134],"rather":[28],"than":[29],"application-level":[30],"algorithms":[31],"existing":[32],"in":[33,70,96],"literature.":[35],"The":[36,52,73,108],"proposed":[37],"depends":[39],"on":[40],"fingerprint":[42],"I-V":[43,78,98],"characteristics":[44],"HfO":[46],"<sub":[47],"xmlns:mml=\"http://www.w3.org/1998/Math/MathML\"":[48],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">2</sub>":[49],"memristor":[50],"devices.":[51,72,83],"suggested":[53],"nano-thick":[55],"layer":[56],"stack":[57],"provides":[58],"memristors":[60],"with":[61],"highly":[62],"probabilistic":[63],"number":[64],"strength":[66],"filaments":[68],"created":[69],"experimental":[74],"results":[75],"reveal":[76],"different":[77],"curves":[79],"obtained":[80],"identical":[82],"In":[84,131],"addition,":[85,132],"within":[86],"same":[88],"device,":[89],"set":[91],"reset":[93],"operations":[94],"result":[95],"new":[97],"characteristics,":[99],"which":[100],"can":[101],"be":[102],"used":[103],"session":[105],"key":[106],"generation.":[107],"distinctive":[109],"fabricated":[113],"devices":[114],"allow":[115],"symmetric-key":[116],"cryptography-based":[117],"communication.":[118],"Security":[119],"analysis":[120],"proves":[121],"that":[122],"mutual":[123],"authentication,":[124],"confidentiality,":[125],"integrity,":[126],"authorization":[128],"obtained.":[130],"is":[135],"resilient":[136],"to":[137],"eavesdropping,":[138],"replay,":[139],"Man-in-the-Middle":[141],"attacks.":[142]},"counts_by_year":[{"year":2022,"cited_by_count":1},{"year":2020,"cited_by_count":1},{"year":2018,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
