{"id":"https://openalex.org/W2126869482","doi":"https://doi.org/10.1109/icumt.2009.5345581","title":"An approach to designing lightweight security protocol on binary CDMA sensor networks","display_name":"An approach to designing lightweight security protocol on binary CDMA sensor networks","publication_year":2009,"publication_date":"2009-10-01","ids":{"openalex":"https://openalex.org/W2126869482","doi":"https://doi.org/10.1109/icumt.2009.5345581","mag":"2126869482"},"language":"en","primary_location":{"id":"doi:10.1109/icumt.2009.5345581","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icumt.2009.5345581","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2009 International Conference on Ultra Modern Telecommunications &amp; Workshops","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5113798896","display_name":"Jae Hoon Roh","orcid":null},"institutions":[{"id":"https://openalex.org/I101155339","display_name":"Korea Telecom (South Korea)","ror":"https://ror.org/043n4tt17","country_code":"KR","type":"company","lineage":["https://openalex.org/I101155339"]}],"countries":["KR"],"is_corresponding":true,"raw_author_name":"Jae Hoon Roh","raw_affiliation_strings":["Exploration Department Central Research and Development Laboratory, KT Corporation, Seoul, South Korea","Exploration Department, Central R&D Laboratory, KT Corporation, Seoul, Korea"],"affiliations":[{"raw_affiliation_string":"Exploration Department Central Research and Development Laboratory, KT Corporation, Seoul, South Korea","institution_ids":["https://openalex.org/I101155339"]},{"raw_affiliation_string":"Exploration Department, Central R&D Laboratory, KT Corporation, Seoul, Korea","institution_ids":["https://openalex.org/I101155339"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101840594","display_name":"Mi\u2010Yeon Kim","orcid":"https://orcid.org/0000-0003-4491-2928"},"institutions":[{"id":"https://openalex.org/I101155339","display_name":"Korea Telecom (South Korea)","ror":"https://ror.org/043n4tt17","country_code":"KR","type":"company","lineage":["https://openalex.org/I101155339"]}],"countries":["KR"],"is_corresponding":false,"raw_author_name":"Mi-Yeon Kim","raw_affiliation_strings":["Exploration Department Central Research and Development Laboratory, KT Corporation, Seoul, South Korea","Exploration Department, Central R&D Laboratory, KT Corporation, Seoul, Korea"],"affiliations":[{"raw_affiliation_string":"Exploration Department Central Research and Development Laboratory, KT Corporation, Seoul, South Korea","institution_ids":["https://openalex.org/I101155339"]},{"raw_affiliation_string":"Exploration Department, Central R&D Laboratory, KT Corporation, Seoul, Korea","institution_ids":["https://openalex.org/I101155339"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5058661175","display_name":"Ho Kun Moon","orcid":null},"institutions":[{"id":"https://openalex.org/I101155339","display_name":"Korea Telecom (South Korea)","ror":"https://ror.org/043n4tt17","country_code":"KR","type":"company","lineage":["https://openalex.org/I101155339"]}],"countries":["KR"],"is_corresponding":false,"raw_author_name":"Ho Kun Moon","raw_affiliation_strings":["Exploration Department Central Research and Development Laboratory, KT Corporation, Seoul, South Korea","Exploration Department, Central R&D Laboratory, KT Corporation, Seoul, Korea"],"affiliations":[{"raw_affiliation_string":"Exploration Department Central Research and Development Laboratory, KT Corporation, Seoul, South Korea","institution_ids":["https://openalex.org/I101155339"]},{"raw_affiliation_string":"Exploration Department, Central R&D Laboratory, KT Corporation, Seoul, Korea","institution_ids":["https://openalex.org/I101155339"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5113798896"],"corresponding_institution_ids":["https://openalex.org/I101155339"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.17879318,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":"3","issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10080","display_name":"Energy Efficient Wireless Sensor Networks","score":0.9939000010490417,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10246","display_name":"Mobile Ad Hoc Networks","score":0.9922000169754028,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7990467548370361},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.7126104235649109},{"id":"https://openalex.org/keywords/wireless-sensor-network","display_name":"Wireless sensor network","score":0.6892639398574829},{"id":"https://openalex.org/keywords/key-distribution-in-wireless-sensor-networks","display_name":"Key distribution in wireless sensor networks","score":0.5799694657325745},{"id":"https://openalex.org/keywords/cryptographic-protocol","display_name":"Cryptographic protocol","score":0.5309770703315735},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.4632156491279602},{"id":"https://openalex.org/keywords/wireless-network","display_name":"Wireless network","score":0.4448956549167633},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.4321556091308594},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.41856369376182556},{"id":"https://openalex.org/keywords/mobile-wireless-sensor-network","display_name":"Mobile wireless sensor network","score":0.41283899545669556},{"id":"https://openalex.org/keywords/wireless","display_name":"Wireless","score":0.31073278188705444},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.21376430988311768},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.0740954577922821}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7990467548370361},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.7126104235649109},{"id":"https://openalex.org/C24590314","wikidata":"https://www.wikidata.org/wiki/Q336038","display_name":"Wireless sensor network","level":2,"score":0.6892639398574829},{"id":"https://openalex.org/C41971633","wikidata":"https://www.wikidata.org/wiki/Q6398155","display_name":"Key distribution in wireless sensor networks","level":4,"score":0.5799694657325745},{"id":"https://openalex.org/C33884865","wikidata":"https://www.wikidata.org/wiki/Q1254335","display_name":"Cryptographic protocol","level":3,"score":0.5309770703315735},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.4632156491279602},{"id":"https://openalex.org/C108037233","wikidata":"https://www.wikidata.org/wiki/Q11375","display_name":"Wireless network","level":3,"score":0.4448956549167633},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.4321556091308594},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.41856369376182556},{"id":"https://openalex.org/C7091991","wikidata":"https://www.wikidata.org/wiki/Q17149548","display_name":"Mobile wireless sensor network","level":5,"score":0.41283899545669556},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.31073278188705444},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.21376430988311768},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.0740954577922821}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/icumt.2009.5345581","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icumt.2009.5345581","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2009 International Conference on Ultra Modern Telecommunications &amp; Workshops","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":8,"referenced_works":["https://openalex.org/W293279915","https://openalex.org/W2033751220","https://openalex.org/W2055746889","https://openalex.org/W2061285874","https://openalex.org/W2140372921","https://openalex.org/W2476448192","https://openalex.org/W4285719527","https://openalex.org/W6610586359"],"related_works":["https://openalex.org/W917005982","https://openalex.org/W590203105","https://openalex.org/W2001566400","https://openalex.org/W4309995761","https://openalex.org/W2295628284","https://openalex.org/W2148549110","https://openalex.org/W2511746937","https://openalex.org/W2010136232","https://openalex.org/W1596940136","https://openalex.org/W1975451135"],"abstract_inverted_index":{"Wireless":[0],"sensor":[1,48,79,88,125,160],"network":[2,25,74],"characteristics":[3],"contain":[4],"limited":[5],"power":[6,47],"to":[7,10,16,51,62,86,106,137,149],"store,":[8],"ability":[9,15],"withstand":[11],"harsh":[12],"environmental":[13],"conditions,":[14],"cope":[17],"with":[18],"node":[19],"failures,":[20],"mobility":[21],"of":[22,28,35,98,114],"nodes,":[23,29],"dynamic":[24],"topology,":[26],"heterogeneity":[27],"communication":[30],"failures":[31],"and":[32,54,111],"large":[33],"scale":[34],"deployment.":[36],"The":[37],"traditional":[38],"cryptographic":[39,83,134,143],"protocol":[40,84,135,144],"models":[41],"are":[42],"not":[43],"suitable":[44],"in":[45,76,159],"low":[46],"nodes":[49],"due":[50],"inherent":[52],"resource":[53],"computing":[55],"constraints.":[56],"Data":[57],"traffic":[58],"encryption":[59],"heavily":[60],"impacts":[61],"system":[63],"performance":[64,75],"on":[65],"real-time":[66],"processing.":[67],"To":[68],"provide":[69],"security":[70,96,120,129,157],"functionalities":[71,97],"without":[72],"decreasing":[73],"the":[77,95,119,128],"wireless":[78,87,107],"networks,":[80],"a":[81],"lightweight":[82],"applicable":[85],"networks":[89],"is":[90],"needed.":[91],"This":[92],"paper":[93],"presents":[94],"Binary":[99],"CDMA":[100,124,156],"technology":[101],"which":[102],"can":[103],"be":[104,150],"used":[105],"personal":[108],"area":[109],"network,":[110],"classifies":[112],"many":[113],"attack":[115],"types,":[116],"then":[117],"defines":[118],"requirements":[121],"for":[122],"binary":[123,155],"networks.":[126,161],"With":[127],"requirements,":[130],"we":[131],"design":[132],"efficient":[133],"corresponding":[136],"defensive":[138],"countermeasures":[139],"from":[140],"adversaries.":[141],"Our":[142],"model":[145],"has":[146],"been":[147],"designed":[148],"practical":[151],"use":[152],"by":[153],"utilizing":[154],"code":[158]},"counts_by_year":[{"year":2020,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
