{"id":"https://openalex.org/W2794306189","doi":"https://doi.org/10.1109/infocom.2018.8486417","title":"SFIRE: Secret-Free-in-band Trust Establishment for COTS Wireless Devices","display_name":"SFIRE: Secret-Free-in-band Trust Establishment for COTS Wireless Devices","publication_year":2018,"publication_date":"2018-04-01","ids":{"openalex":"https://openalex.org/W2794306189","doi":"https://doi.org/10.1109/infocom.2018.8486417","mag":"2794306189"},"language":"en","primary_location":{"id":"doi:10.1109/infocom.2018.8486417","is_oa":false,"landing_page_url":"https://doi.org/10.1109/infocom.2018.8486417","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE INFOCOM 2018 - IEEE Conference on Computer Communications","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5037544707","display_name":"Nirnimesh Ghose","orcid":"https://orcid.org/0000-0003-2138-5977"},"institutions":[{"id":"https://openalex.org/I138006243","display_name":"University of Arizona","ror":"https://ror.org/03m2x1q45","country_code":"US","type":"education","lineage":["https://openalex.org/I138006243"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Nirnimesh Ghose","raw_affiliation_strings":["Department of Electrical and Computer Engineering, University of Arizona, USA"],"affiliations":[{"raw_affiliation_string":"Department of Electrical and Computer Engineering, University of Arizona, USA","institution_ids":["https://openalex.org/I138006243"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5063642902","display_name":"Loukas Lazos","orcid":"https://orcid.org/0000-0002-6187-7063"},"institutions":[{"id":"https://openalex.org/I138006243","display_name":"University of Arizona","ror":"https://ror.org/03m2x1q45","country_code":"US","type":"education","lineage":["https://openalex.org/I138006243"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Loukas Lazos","raw_affiliation_strings":["Department of Electrical and Computer Engineering, University of Arizona, USA"],"affiliations":[{"raw_affiliation_string":"Department of Electrical and Computer Engineering, University of Arizona, USA","institution_ids":["https://openalex.org/I138006243"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100351421","display_name":"Ming Li","orcid":"https://orcid.org/0000-0002-4073-0273"},"institutions":[{"id":"https://openalex.org/I138006243","display_name":"University of Arizona","ror":"https://ror.org/03m2x1q45","country_code":"US","type":"education","lineage":["https://openalex.org/I138006243"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Ming Li","raw_affiliation_strings":["Department of Electrical and Computer Engineering, University of Arizona, USA"],"affiliations":[{"raw_affiliation_string":"Department of Electrical and Computer Engineering, University of Arizona, USA","institution_ids":["https://openalex.org/I138006243"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5037544707"],"corresponding_institution_ids":["https://openalex.org/I138006243"],"apc_list":null,"apc_paid":null,"fwci":2.8717,"has_fulltext":false,"cited_by_count":16,"citation_normalized_percentile":{"value":0.92587963,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":93,"max":97},"biblio":{"volume":null,"issue":null,"first_page":"1529","last_page":"1537"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9983000159263611,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/firmware","display_name":"Firmware","score":0.833171010017395},{"id":"https://openalex.org/keywords/universal-software-radio-peripheral","display_name":"Universal Software Radio Peripheral","score":0.8170905113220215},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7625901699066162},{"id":"https://openalex.org/keywords/wireless","display_name":"Wireless","score":0.6323451399803162},{"id":"https://openalex.org/keywords/mutual-authentication","display_name":"Mutual authentication","score":0.5576792359352112},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.5540452003479004},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.5450416803359985},{"id":"https://openalex.org/keywords/rss","display_name":"RSS","score":0.5326041579246521},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.5226061940193176},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.5147383213043213},{"id":"https://openalex.org/keywords/cryptographic-protocol","display_name":"Cryptographic protocol","score":0.5012564659118652},{"id":"https://openalex.org/keywords/protocol","display_name":"Protocol (science)","score":0.47663649916648865},{"id":"https://openalex.org/keywords/wireless-security","display_name":"Wireless security","score":0.4747213125228882},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.4136393070220947},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.39822131395339966},{"id":"https://openalex.org/keywords/computer-hardware","display_name":"Computer hardware","score":0.327308714389801},{"id":"https://openalex.org/keywords/wireless-network","display_name":"Wireless network","score":0.31186285614967346},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.1415574848651886}],"concepts":[{"id":"https://openalex.org/C67212190","wikidata":"https://www.wikidata.org/wiki/Q104851","display_name":"Firmware","level":2,"score":0.833171010017395},{"id":"https://openalex.org/C192220659","wikidata":"https://www.wikidata.org/wiki/Q1245659","display_name":"Universal Software Radio Peripheral","level":3,"score":0.8170905113220215},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7625901699066162},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.6323451399803162},{"id":"https://openalex.org/C2781221063","wikidata":"https://www.wikidata.org/wiki/Q6944186","display_name":"Mutual authentication","level":3,"score":0.5576792359352112},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.5540452003479004},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.5450416803359985},{"id":"https://openalex.org/C2385561","wikidata":"https://www.wikidata.org/wiki/Q45432","display_name":"RSS","level":2,"score":0.5326041579246521},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.5226061940193176},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.5147383213043213},{"id":"https://openalex.org/C33884865","wikidata":"https://www.wikidata.org/wiki/Q1254335","display_name":"Cryptographic protocol","level":3,"score":0.5012564659118652},{"id":"https://openalex.org/C2780385302","wikidata":"https://www.wikidata.org/wiki/Q367158","display_name":"Protocol (science)","level":3,"score":0.47663649916648865},{"id":"https://openalex.org/C2776946656","wikidata":"https://www.wikidata.org/wiki/Q1655812","display_name":"Wireless security","level":4,"score":0.4747213125228882},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.4136393070220947},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.39822131395339966},{"id":"https://openalex.org/C9390403","wikidata":"https://www.wikidata.org/wiki/Q3966","display_name":"Computer hardware","level":1,"score":0.327308714389801},{"id":"https://openalex.org/C108037233","wikidata":"https://www.wikidata.org/wiki/Q11375","display_name":"Wireless network","level":3,"score":0.31186285614967346},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.1415574848651886},{"id":"https://openalex.org/C142724271","wikidata":"https://www.wikidata.org/wiki/Q7208","display_name":"Pathology","level":1,"score":0.0},{"id":"https://openalex.org/C71924100","wikidata":"https://www.wikidata.org/wiki/Q11190","display_name":"Medicine","level":0,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C204787440","wikidata":"https://www.wikidata.org/wiki/Q188504","display_name":"Alternative medicine","level":2,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/infocom.2018.8486417","is_oa":false,"landing_page_url":"https://doi.org/10.1109/infocom.2018.8486417","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE INFOCOM 2018 - IEEE Conference on Computer Communications","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/17","score":0.47999998927116394,"display_name":"Partnerships for the goals"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":40,"referenced_works":["https://openalex.org/W22520173","https://openalex.org/W96549597","https://openalex.org/W203500824","https://openalex.org/W1533298133","https://openalex.org/W1542316315","https://openalex.org/W1543653153","https://openalex.org/W1656028867","https://openalex.org/W1874069312","https://openalex.org/W1968616969","https://openalex.org/W2019258915","https://openalex.org/W2021409677","https://openalex.org/W2031481606","https://openalex.org/W2042239046","https://openalex.org/W2050333996","https://openalex.org/W2059980308","https://openalex.org/W2087355434","https://openalex.org/W2116070678","https://openalex.org/W2116897550","https://openalex.org/W2121500124","https://openalex.org/W2136447324","https://openalex.org/W2155886813","https://openalex.org/W2156186849","https://openalex.org/W2169929745","https://openalex.org/W2183625517","https://openalex.org/W2298844901","https://openalex.org/W2397798400","https://openalex.org/W2504658464","https://openalex.org/W2601292847","https://openalex.org/W2752160765","https://openalex.org/W6603906713","https://openalex.org/W6608241863","https://openalex.org/W6631925621","https://openalex.org/W6632593034","https://openalex.org/W6637173333","https://openalex.org/W6661278215","https://openalex.org/W6685256444","https://openalex.org/W6686411734","https://openalex.org/W6697529807","https://openalex.org/W6712219031","https://openalex.org/W6744032261"],"related_works":["https://openalex.org/W2091431498","https://openalex.org/W3017301090","https://openalex.org/W2795712606","https://openalex.org/W2004539568","https://openalex.org/W2054860186","https://openalex.org/W1973126419","https://openalex.org/W2181469750","https://openalex.org/W1660755136","https://openalex.org/W3102971638","https://openalex.org/W2397554340"],"abstract_inverted_index":{"We":[0,38,135],"address":[1],"the":[2,19,48,62,89,112,125,147,150],"problem":[3],"of":[4,51,114,149],"trust":[5,43],"establishment":[6,44],"between":[7],"wireless":[8,55],"devices":[9,56,141],"that":[10,28,46,95],"do":[11],"not":[12,66],"share":[13],"any":[14,68,81],"prior":[15],"secrets.":[16],"This":[17],"includes":[18],"mutual":[20],"authentication":[21],"and":[22,122,142,145],"agreement":[23],"to":[24,32,61,80,88,129],"a":[25,41,58,115,120,131],"common":[26],"key":[27],"can":[29,77],"be":[30,78],"used":[31],"further":[33],"bootstrap":[34],"essential":[35],"cryptographic":[36],"mechanisms.":[37],"propose":[39],"SFIRE,":[40],"secret-free":[42],"protocol":[45],"allows":[47],"secure":[49],"pairing":[50],"commercial":[52],"off-the-shelf":[53],"(COTS)":[54],"with":[57,111],"hub.":[59],"Compared":[60],"state-of-the-art,":[63],"SFIRE":[64,85],"does":[65],"require":[67],"out-of-band":[69],"channels,":[70],"special":[71],"hardware,":[72],"or":[73],"firmware":[74],"modification,":[75],"but":[76],"applied":[79],"COTS":[82,140],"device.":[83],"Moreover,":[84],"is":[86],"resistant":[87],"most":[90],"advanced":[91],"active":[92],"signal":[93,99],"manipulations":[94],"include":[96],"recently":[97],"demonstrated":[98],"nullification":[100],"at":[101],"an":[102],"intended":[103],"receiver.":[104],"These":[105],"security":[106],"properties":[107],"are":[108],"achieved":[109],"in-band":[110],"assistance":[113],"helper":[116],"device":[117],"such":[118],"as":[119],"smartphone":[121],"by":[123],"using":[124,139],"RSS":[126],"fluctuation":[127],"patterns":[128],"build":[130],"robust":[132],"\u201cRSS":[133],"authenticator\u201d.":[134],"perform":[136],"extensive":[137],"experiments":[138],"USRP":[143],"radios":[144],"verify":[146],"validity":[148],"proposed":[151],"protocol.":[152]},"counts_by_year":[{"year":2025,"cited_by_count":2},{"year":2023,"cited_by_count":4},{"year":2022,"cited_by_count":3},{"year":2021,"cited_by_count":2},{"year":2020,"cited_by_count":3},{"year":2019,"cited_by_count":2}],"updated_date":"2026-03-17T09:09:15.849793","created_date":"2025-10-10T00:00:00"}
