{"id":"https://openalex.org/W2616938314","doi":"https://doi.org/10.1109/jiot.2017.2709757","title":"Security Bootstrapping for Secure Join and Binding on the IEEE 802.15.4-Based LoWPAN","display_name":"Security Bootstrapping for Secure Join and Binding on the IEEE 802.15.4-Based LoWPAN","publication_year":2017,"publication_date":"2017-05-29","ids":{"openalex":"https://openalex.org/W2616938314","doi":"https://doi.org/10.1109/jiot.2017.2709757","mag":"2616938314"},"language":"en","primary_location":{"id":"doi:10.1109/jiot.2017.2709757","is_oa":false,"landing_page_url":"https://doi.org/10.1109/jiot.2017.2709757","pdf_url":null,"source":{"id":"https://openalex.org/S2480266640","display_name":"IEEE Internet of Things Journal","issn_l":"2327-4662","issn":["2327-4662","2372-2541"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Internet of Things Journal","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5074964393","display_name":"Chang-Seop Park","orcid":"https://orcid.org/0000-0003-1273-5162"},"institutions":[{"id":"https://openalex.org/I89015989","display_name":"Dankook University","ror":"https://ror.org/058pdbn81","country_code":"KR","type":"education","lineage":["https://openalex.org/I89015989"]}],"countries":["KR"],"is_corresponding":true,"raw_author_name":"Chang-Seop Park","raw_affiliation_strings":["Software Department, Dankook University, Yongin, South Korea"],"affiliations":[{"raw_affiliation_string":"Software Department, Dankook University, Yongin, South Korea","institution_ids":["https://openalex.org/I89015989"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5055775351","display_name":"Jong\u2010Hoon Lee","orcid":"https://orcid.org/0000-0003-1775-5656"},"institutions":[{"id":"https://openalex.org/I89015989","display_name":"Dankook University","ror":"https://ror.org/058pdbn81","country_code":"KR","type":"education","lineage":["https://openalex.org/I89015989"]}],"countries":["KR"],"is_corresponding":false,"raw_author_name":"Jong-Hoon Lee","raw_affiliation_strings":["Software Department, Dankook University, Yongin, South Korea"],"affiliations":[{"raw_affiliation_string":"Software Department, Dankook University, Yongin, South Korea","institution_ids":["https://openalex.org/I89015989"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5074964393"],"corresponding_institution_ids":["https://openalex.org/I89015989"],"apc_list":null,"apc_paid":null,"fwci":1.036,"has_fulltext":false,"cited_by_count":6,"citation_normalized_percentile":{"value":0.79389444,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":98},"biblio":{"volume":"4","issue":"4","first_page":"996","last_page":"1005"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11932","display_name":"Wireless Body Area Networks","score":0.9965000152587891,"subfield":{"id":"https://openalex.org/subfields/2204","display_name":"Biomedical Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10246","display_name":"Mobile Ad Hoc Networks","score":0.9943000078201294,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.835207462310791},{"id":"https://openalex.org/keywords/bootstrapping","display_name":"Bootstrapping (finance)","score":0.7537586688995361},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.6333938837051392},{"id":"https://openalex.org/keywords/protocol","display_name":"Protocol (science)","score":0.4798130989074707},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4770200252532959},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.4247405230998993},{"id":"https://openalex.org/keywords/cryptographic-protocol","display_name":"Cryptographic protocol","score":0.4228357970714569},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.31095340847969055},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.07930490374565125}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.835207462310791},{"id":"https://openalex.org/C207609745","wikidata":"https://www.wikidata.org/wiki/Q4944086","display_name":"Bootstrapping (finance)","level":2,"score":0.7537586688995361},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.6333938837051392},{"id":"https://openalex.org/C2780385302","wikidata":"https://www.wikidata.org/wiki/Q367158","display_name":"Protocol (science)","level":3,"score":0.4798130989074707},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4770200252532959},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.4247405230998993},{"id":"https://openalex.org/C33884865","wikidata":"https://www.wikidata.org/wiki/Q1254335","display_name":"Cryptographic protocol","level":3,"score":0.4228357970714569},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.31095340847969055},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.07930490374565125},{"id":"https://openalex.org/C204787440","wikidata":"https://www.wikidata.org/wiki/Q188504","display_name":"Alternative medicine","level":2,"score":0.0},{"id":"https://openalex.org/C71924100","wikidata":"https://www.wikidata.org/wiki/Q11190","display_name":"Medicine","level":0,"score":0.0},{"id":"https://openalex.org/C162324750","wikidata":"https://www.wikidata.org/wiki/Q8134","display_name":"Economics","level":0,"score":0.0},{"id":"https://openalex.org/C106159729","wikidata":"https://www.wikidata.org/wiki/Q2294553","display_name":"Financial economics","level":1,"score":0.0},{"id":"https://openalex.org/C142724271","wikidata":"https://www.wikidata.org/wiki/Q7208","display_name":"Pathology","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/jiot.2017.2709757","is_oa":false,"landing_page_url":"https://doi.org/10.1109/jiot.2017.2709757","pdf_url":null,"source":{"id":"https://openalex.org/S2480266640","display_name":"IEEE Internet of Things Journal","issn_l":"2327-4662","issn":["2327-4662","2372-2541"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Internet of Things Journal","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/17","score":0.5299999713897705,"display_name":"Partnerships for the goals"}],"awards":[],"funders":[{"id":"https://openalex.org/F4320321209","display_name":"Dankook University","ror":"https://ror.org/058pdbn81"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":23,"referenced_works":["https://openalex.org/W1746383718","https://openalex.org/W1755042603","https://openalex.org/W1927099252","https://openalex.org/W2002054891","https://openalex.org/W2008102763","https://openalex.org/W2010895668","https://openalex.org/W2021827492","https://openalex.org/W2027791414","https://openalex.org/W2031289640","https://openalex.org/W2039456366","https://openalex.org/W2041950790","https://openalex.org/W2044813636","https://openalex.org/W2090249029","https://openalex.org/W2113154117","https://openalex.org/W2116613408","https://openalex.org/W2117984332","https://openalex.org/W2149542790","https://openalex.org/W2153343530","https://openalex.org/W2160813024","https://openalex.org/W3211513184","https://openalex.org/W4244434362","https://openalex.org/W6638086538","https://openalex.org/W6677374569"],"related_works":["https://openalex.org/W2159180878","https://openalex.org/W2289378658","https://openalex.org/W1531360494","https://openalex.org/W2093529019","https://openalex.org/W1982325601","https://openalex.org/W2282990539","https://openalex.org/W4240432851","https://openalex.org/W154233216","https://openalex.org/W2626486901","https://openalex.org/W1988007309"],"abstract_inverted_index":{"The":[0,109,156],"IEEE":[1,106],"802.15.4-based":[2,107],"low-data":[3],"rate":[4],"wireless":[5],"personal":[6],"area":[7],"network":[8],"(LoWPAN)":[9],"is":[10,102,112,126,159],"a":[11,82,97,129,149],"basic":[12],"building":[13],"block":[14],"of":[15,18,30,42,64,68,81,120,169],"the":[16,21,27,31,36,40,53,65,69,74,79,87,105,115],"Internet":[17],"Things.":[19],"When":[20],"sensor":[22],"devices":[23,32,46,88],"are":[24,89,139,154],"deployed":[25],"on":[26,128],"LoWPAN,":[28,37],"each":[29,48],"should":[33,56],"first":[34],"join":[35,75],"allowing":[38],"for":[39,50,73,104,134],"binding":[41,77],"two":[43],"or":[44,91],"more":[45],"with":[47,164],"other":[49],"cooperation;":[51],"therefore,":[52],"join-and-binding":[54,100],"protocol":[55,101,111,158],"be":[57],"secured":[58],"against":[59],"malicious":[60],"effects":[61],"as":[62,124],"part":[63],"normal":[66],"operation":[67],"LoWPAN.":[70,108],"Security":[71],"bootstrapping":[72,132],"and":[76,122,148,162,171],"involves":[78],"establishment":[80],"trust":[83],"relationship":[84],"so":[85],"that":[86,138],"joined":[90],"bound":[92],"securely.":[93],"In":[94],"this":[95],"paper,":[96],"new,":[98],"secure":[99],"proposed":[103,110,157],"different":[113],"from":[114,141],"previous":[116,165],"works":[117],"in":[118,167],"terms":[119,168],"security":[121,131,170],"efficiency,":[123],"it":[125],"based":[127],"new":[130],"scheme":[133],"which":[135],"device":[136],"identifiers":[137],"constructed":[140],"an":[142],"elliptic":[143],"curve":[144],"Diffie-Hellman":[145],"public":[146],"key":[147],"media":[150],"access":[151],"control":[152],"address":[153],"used.":[155],"extensively":[160],"analyzed":[161],"compared":[163],"schemes":[166],"performance.":[172]},"counts_by_year":[{"year":2021,"cited_by_count":1},{"year":2019,"cited_by_count":4},{"year":2018,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
