{"id":"https://openalex.org/W3035111190","doi":"https://doi.org/10.1109/isplc48789.2020.9115402","title":"Security Concepts Based on IEEE 802.1X for G.hn Broadband PLC Access Networks","display_name":"Security Concepts Based on IEEE 802.1X for G.hn Broadband PLC Access Networks","publication_year":2020,"publication_date":"2020-05-01","ids":{"openalex":"https://openalex.org/W3035111190","doi":"https://doi.org/10.1109/isplc48789.2020.9115402","mag":"3035111190"},"language":"en","primary_location":{"id":"doi:10.1109/isplc48789.2020.9115402","is_oa":false,"landing_page_url":"https://doi.org/10.1109/isplc48789.2020.9115402","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2020 IEEE International Symposium on Power Line Communications and its Applications (ISPLC)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5028159729","display_name":"George Hallak","orcid":"https://orcid.org/0000-0002-2846-2800"},"institutions":[{"id":"https://openalex.org/I4210111492","display_name":"Devolo (Germany)","ror":"https://ror.org/01ymrn657","country_code":"DE","type":"company","lineage":["https://openalex.org/I4210111492"]}],"countries":["DE"],"is_corresponding":true,"raw_author_name":"George Hallak","raw_affiliation_strings":["devolo AG, Aachen, Germany"],"affiliations":[{"raw_affiliation_string":"devolo AG, Aachen, Germany","institution_ids":["https://openalex.org/I4210111492"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5028889995","display_name":"Tobias Frauenrath","orcid":"https://orcid.org/0009-0004-7749-2178"},"institutions":[{"id":"https://openalex.org/I4210111492","display_name":"Devolo (Germany)","ror":"https://ror.org/01ymrn657","country_code":"DE","type":"company","lineage":["https://openalex.org/I4210111492"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Tobias Frauenrath","raw_affiliation_strings":["devolo AG, Aachen, Germany"],"affiliations":[{"raw_affiliation_string":"devolo AG, Aachen, Germany","institution_ids":["https://openalex.org/I4210111492"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5049152409","display_name":"Anil Mengi","orcid":null},"institutions":[{"id":"https://openalex.org/I4210111492","display_name":"Devolo (Germany)","ror":"https://ror.org/01ymrn657","country_code":"DE","type":"company","lineage":["https://openalex.org/I4210111492"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Anil Mengi","raw_affiliation_strings":["devolo AG, Aachen, Germany"],"affiliations":[{"raw_affiliation_string":"devolo AG, Aachen, Germany","institution_ids":["https://openalex.org/I4210111492"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5028159729"],"corresponding_institution_ids":["https://openalex.org/I4210111492"],"apc_list":null,"apc_paid":null,"fwci":0.3082,"has_fulltext":false,"cited_by_count":3,"citation_normalized_percentile":{"value":0.55916475,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":96},"biblio":{"volume":"67 10","issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12146","display_name":"Power Line Communications and Noise","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12146","display_name":"Power Line Communications and Noise","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.9952999949455261,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12565","display_name":"Physics and Engineering Research Articles","score":0.9890999794006348,"subfield":{"id":"https://openalex.org/subfields/2206","display_name":"Computational Mechanics"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7639726400375366},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.5994762182235718},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.5832362771034241},{"id":"https://openalex.org/keywords/ieee-802.1x","display_name":"IEEE 802.1X","score":0.5339782238006592},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.5123897194862366},{"id":"https://openalex.org/keywords/broadband","display_name":"Broadband","score":0.4871963858604431},{"id":"https://openalex.org/keywords/broadband-networks","display_name":"Broadband networks","score":0.4794967770576477},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.46840542554855347},{"id":"https://openalex.org/keywords/handshake","display_name":"Handshake","score":0.4678885042667389},{"id":"https://openalex.org/keywords/software-deployment","display_name":"Software deployment","score":0.43575239181518555},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.41570961475372314},{"id":"https://openalex.org/keywords/kerberos","display_name":"Kerberos","score":0.41479700803756714},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.26088547706604004},{"id":"https://openalex.org/keywords/ieee-802.11","display_name":"IEEE 802.11","score":0.22250673174858093},{"id":"https://openalex.org/keywords/throughput","display_name":"Throughput","score":0.14767852425575256},{"id":"https://openalex.org/keywords/wireless","display_name":"Wireless","score":0.12858614325523376},{"id":"https://openalex.org/keywords/asynchronous-communication","display_name":"Asynchronous communication","score":0.11054566502571106},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.1006665825843811}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7639726400375366},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.5994762182235718},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.5832362771034241},{"id":"https://openalex.org/C28722885","wikidata":"https://www.wikidata.org/wiki/Q1428844","display_name":"IEEE 802.1X","level":5,"score":0.5339782238006592},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.5123897194862366},{"id":"https://openalex.org/C509933004","wikidata":"https://www.wikidata.org/wiki/Q194163","display_name":"Broadband","level":2,"score":0.4871963858604431},{"id":"https://openalex.org/C125599584","wikidata":"https://www.wikidata.org/wiki/Q15057100","display_name":"Broadband networks","level":3,"score":0.4794967770576477},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.46840542554855347},{"id":"https://openalex.org/C2778000800","wikidata":"https://www.wikidata.org/wiki/Q830043","display_name":"Handshake","level":3,"score":0.4678885042667389},{"id":"https://openalex.org/C105339364","wikidata":"https://www.wikidata.org/wiki/Q2297740","display_name":"Software deployment","level":2,"score":0.43575239181518555},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.41570961475372314},{"id":"https://openalex.org/C32455479","wikidata":"https://www.wikidata.org/wiki/Q506053","display_name":"Kerberos","level":3,"score":0.41479700803756714},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.26088547706604004},{"id":"https://openalex.org/C185298936","wikidata":"https://www.wikidata.org/wiki/Q193228","display_name":"IEEE 802.11","level":4,"score":0.22250673174858093},{"id":"https://openalex.org/C157764524","wikidata":"https://www.wikidata.org/wiki/Q1383412","display_name":"Throughput","level":3,"score":0.14767852425575256},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.12858614325523376},{"id":"https://openalex.org/C151319957","wikidata":"https://www.wikidata.org/wiki/Q752739","display_name":"Asynchronous communication","level":2,"score":0.11054566502571106},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.1006665825843811}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/isplc48789.2020.9115402","is_oa":false,"landing_page_url":"https://doi.org/10.1109/isplc48789.2020.9115402","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2020 IEEE International Symposium on Power Line Communications and its Applications (ISPLC)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Partnerships for the goals","id":"https://metadata.un.org/sdg/17","score":0.44999998807907104}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":10,"referenced_works":["https://openalex.org/W628907222","https://openalex.org/W1894693606","https://openalex.org/W2079960731","https://openalex.org/W2234013711","https://openalex.org/W2492457451","https://openalex.org/W2735526485","https://openalex.org/W2737625898","https://openalex.org/W2795209467","https://openalex.org/W2895014248","https://openalex.org/W2945586672"],"related_works":["https://openalex.org/W4224251339","https://openalex.org/W2360607528","https://openalex.org/W2383871034","https://openalex.org/W2388067495","https://openalex.org/W2887725106","https://openalex.org/W2533399023","https://openalex.org/W1612824710","https://openalex.org/W2393525829","https://openalex.org/W2383992966","https://openalex.org/W2370296220"],"abstract_inverted_index":{"Broadband":[0],"Power":[1],"Line":[2],"Communications":[3],"(BPL)":[4],"has":[5,69],"the":[6,14,31,56,78,83,89,103,119,122,125,129,135,148,155,158],"potential":[7],"to":[8,19,87,101,153],"play":[9],"a":[10,43],"significant":[11,28],"role":[12],"in":[13,47,98],"German":[15],"smart":[16],"grid,":[17],"due":[18],"its":[20],"high":[21],"data":[22],"rate.":[23],"Although":[24],"BPL":[25,36,48,62],"may":[26,37,41],"offer":[27],"competitive":[29],"benefits,":[30],"possible":[32],"negative":[33],"impact":[34],"that":[35,72],"have":[38],"on":[39,77,118,147],"security":[40,53,96],"be":[42],"more":[44],"important":[45],"factor":[46],"deployment.":[49],"In":[50],"this":[51],"paper,":[52],"issues":[54],"regarding":[55],"current":[57],"implementations":[58],"of":[59,106,121,124,150,157],"ITU-T":[60],"G.hn":[61,110],"for":[63],"access":[64],"networks":[65],"are":[66,92,111],"discussed.":[67],"It":[68],"been":[70],"shown":[71],"an":[73],"authentication":[74,126,152],"using":[75],"AES-128":[76],"physical":[79],"layer":[80],"cannot":[81],"grant":[82],"authenticity.":[84],"Security":[85],"requirements":[86],"improve":[88],"actual":[90],"situation":[91],"introduced.":[93],"Furthermore,":[94],"three":[95],"concepts":[97],"different":[99],"complexities":[100],"adapt":[102],"key":[104],"features":[105],"IEEE":[107],"802.1X":[108],"into":[109],"presented.":[112],"The":[113,131,142],"first":[114],"concept":[115,133,144],"is":[116,145],"based":[117,146],"encryption":[120],"content":[123],"messages":[127],"during":[128],"handshake.":[130],"second":[132],"extends":[134],"previous":[136],"one":[137],"with":[138],"additional":[139],"response":[140],"messages.":[141],"last":[143],"insertion":[149],"EAP-TLS":[151],"validate":[154],"possession":[156],"private":[159],"keys.":[160]},"counts_by_year":[{"year":2022,"cited_by_count":2},{"year":2021,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
