{"id":"https://openalex.org/W2743334235","doi":"https://doi.org/10.1109/medhocnet.2017.8001657","title":"\u03bcDTNSec: a security layer for disruption-tolerant networks on microcontrollers","display_name":"\u03bcDTNSec: a security layer for disruption-tolerant networks on microcontrollers","publication_year":2017,"publication_date":"2017-06-01","ids":{"openalex":"https://openalex.org/W2743334235","doi":"https://doi.org/10.1109/medhocnet.2017.8001657","mag":"2743334235"},"language":"en","primary_location":{"id":"doi:10.1109/medhocnet.2017.8001657","is_oa":false,"landing_page_url":"https://doi.org/10.1109/medhocnet.2017.8001657","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2017 16th Annual Mediterranean Ad Hoc Networking Workshop (Med-Hoc-Net)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5079214602","display_name":"Dominik Sch\u00fcrmann","orcid":"https://orcid.org/0000-0002-6840-5683"},"institutions":[{"id":"https://openalex.org/I94509681","display_name":"Technische Universit\u00e4t Braunschweig","ror":"https://ror.org/010nsgg66","country_code":"DE","type":"education","lineage":["https://openalex.org/I94509681"]}],"countries":["DE"],"is_corresponding":true,"raw_author_name":"Dominik Sch\u00fcrmann","raw_affiliation_strings":["Institute of Operating Systems and Computer Networks, TU Braunschweig"],"affiliations":[{"raw_affiliation_string":"Institute of Operating Systems and Computer Networks, TU Braunschweig","institution_ids":["https://openalex.org/I94509681"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5014365588","display_name":"Georg von Zengen","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Georg von Zengen","raw_affiliation_strings":["Institute of Operating Systems and Computer Networks, Technische Universitat Braunschweig, Braunschweig, Niedersachsen, DE"],"affiliations":[{"raw_affiliation_string":"Institute of Operating Systems and Computer Networks, Technische Universitat Braunschweig, Braunschweig, Niedersachsen, DE","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5034690298","display_name":"Marvin Priedigkeit","orcid":null},"institutions":[{"id":"https://openalex.org/I94509681","display_name":"Technische Universit\u00e4t Braunschweig","ror":"https://ror.org/010nsgg66","country_code":"DE","type":"education","lineage":["https://openalex.org/I94509681"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Marvin Priedigkeit","raw_affiliation_strings":["Institute of Operating Systems and Computer Networks, TU Braunschweig"],"affiliations":[{"raw_affiliation_string":"Institute of Operating Systems and Computer Networks, TU Braunschweig","institution_ids":["https://openalex.org/I94509681"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5070428847","display_name":"Lars Wolf","orcid":"https://orcid.org/0000-0001-9782-7765"},"institutions":[{"id":"https://openalex.org/I94509681","display_name":"Technische Universit\u00e4t Braunschweig","ror":"https://ror.org/010nsgg66","country_code":"DE","type":"education","lineage":["https://openalex.org/I94509681"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Lars Wolf","raw_affiliation_strings":["Institute of Operating Systems and Computer Networks, TU Braunschweig"],"affiliations":[{"raw_affiliation_string":"Institute of Operating Systems and Computer Networks, TU Braunschweig","institution_ids":["https://openalex.org/I94509681"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5079214602"],"corresponding_institution_ids":["https://openalex.org/I94509681"],"apc_list":null,"apc_paid":null,"fwci":0.4144,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.65724547,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":94},"biblio":{"volume":"37","issue":null,"first_page":"1","last_page":"7"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11896","display_name":"Opportunistic and Delay-Tolerant Networks","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11896","display_name":"Opportunistic and Delay-Tolerant Networks","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":0.998199999332428,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10246","display_name":"Mobile Ad Hoc Networks","score":0.9973999857902527,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/eavesdropping","display_name":"Eavesdropping","score":0.8735649585723877},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7287030220031738},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.6577554941177368},{"id":"https://openalex.org/keywords/payload","display_name":"Payload (computing)","score":0.6180334687232971},{"id":"https://openalex.org/keywords/microcontroller","display_name":"Microcontroller","score":0.5170948505401611},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.5108527541160583},{"id":"https://openalex.org/keywords/layer","display_name":"Layer (electronics)","score":0.49596866965293884},{"id":"https://openalex.org/keywords/elliptic-curve-cryptography","display_name":"Elliptic curve cryptography","score":0.4713040292263031},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.427381306886673},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.37938401103019714},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.2820442020893097},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.22188928723335266}],"concepts":[{"id":"https://openalex.org/C2776788033","wikidata":"https://www.wikidata.org/wiki/Q320769","display_name":"Eavesdropping","level":2,"score":0.8735649585723877},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7287030220031738},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.6577554941177368},{"id":"https://openalex.org/C134066672","wikidata":"https://www.wikidata.org/wiki/Q1424639","display_name":"Payload (computing)","level":3,"score":0.6180334687232971},{"id":"https://openalex.org/C173018170","wikidata":"https://www.wikidata.org/wiki/Q165678","display_name":"Microcontroller","level":2,"score":0.5170948505401611},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.5108527541160583},{"id":"https://openalex.org/C2779227376","wikidata":"https://www.wikidata.org/wiki/Q6505497","display_name":"Layer (electronics)","level":2,"score":0.49596866965293884},{"id":"https://openalex.org/C167615521","wikidata":"https://www.wikidata.org/wiki/Q1048911","display_name":"Elliptic curve cryptography","level":4,"score":0.4713040292263031},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.427381306886673},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.37938401103019714},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.2820442020893097},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.22188928723335266},{"id":"https://openalex.org/C178790620","wikidata":"https://www.wikidata.org/wiki/Q11351","display_name":"Organic chemistry","level":1,"score":0.0},{"id":"https://openalex.org/C185592680","wikidata":"https://www.wikidata.org/wiki/Q2329","display_name":"Chemistry","level":0,"score":0.0},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/medhocnet.2017.8001657","is_oa":false,"landing_page_url":"https://doi.org/10.1109/medhocnet.2017.8001657","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2017 16th Annual Mediterranean Ad Hoc Networking Workshop (Med-Hoc-Net)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Affordable and clean energy","score":0.8299999833106995,"id":"https://metadata.un.org/sdg/7"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":26,"referenced_works":["https://openalex.org/W1511530643","https://openalex.org/W1567573409","https://openalex.org/W1895149995","https://openalex.org/W1993236111","https://openalex.org/W2013613544","https://openalex.org/W2024279322","https://openalex.org/W2052628396","https://openalex.org/W2052666587","https://openalex.org/W2080765376","https://openalex.org/W2089339937","https://openalex.org/W2101820660","https://openalex.org/W2114495437","https://openalex.org/W2126311411","https://openalex.org/W2134585683","https://openalex.org/W2138366490","https://openalex.org/W2170914992","https://openalex.org/W2181772319","https://openalex.org/W2253517037","https://openalex.org/W2263363604","https://openalex.org/W2548728160","https://openalex.org/W2572848332","https://openalex.org/W2608582056","https://openalex.org/W3149356600","https://openalex.org/W4206072291","https://openalex.org/W6633996066","https://openalex.org/W6685308309"],"related_works":["https://openalex.org/W2368710903","https://openalex.org/W4386360526","https://openalex.org/W2772112465","https://openalex.org/W4387918499","https://openalex.org/W2158905603","https://openalex.org/W2766105476","https://openalex.org/W2735171729","https://openalex.org/W2786267942","https://openalex.org/W2769254131","https://openalex.org/W4322486674"],"abstract_inverted_index":{"We":[0,110],"introduce":[1],"\u03bcDTNSec,":[2],"the":[3,30,42,65,86,95,98,104,107,120],"first":[4],"fully-implemented":[5],"security":[6,124],"layer":[7,125],"for":[8,115],"Delay/Disruption-Tolerant":[9],"Networks":[10],"(DTN)":[11],"on":[12,41,79,85,126],"microcontrollers.":[13],"It":[14],"provides":[15],"protection":[16],"against":[17],"eavesdropping":[18],"and":[19,46,54,60,82],"Man-in-the-Middle":[20],"attacks":[21],"that":[22,94],"are":[23],"especially":[24],"easy":[25],"in":[26],"these":[27],"networks.":[28],"Following":[29],"Store-Carry-Forward":[31],"principle":[32],"of":[33,51,97,106,122],"DTNs,":[34],"an":[35,75],"attacker":[36],"can":[37],"simply":[38],"place":[39],"itself":[40],"route":[43],"between":[44],"source":[45],"destination.":[47],"Our":[48,90],"design":[49],"consists":[50],"asymmetric":[52],"encryption":[53,63],"signatures":[55],"with":[56,64],"Elliptic":[57],"Curve":[58],"Cryptography":[59],"hardwarebacked":[61],"symmetric":[62],"Advanced":[66],"Encryption":[67],"Standard.":[68],"\u03bcDTNSec":[69],"has":[70],"been":[71],"fully":[72],"implemented":[73],"as":[74],"extension":[76],"to":[77,118],"\u03bcDTN":[78],"Contiki":[80],"OS":[81],"is":[83],"based":[84],"Bundle":[87],"Protocol":[88],"specification.":[89],"performance":[91],"evaluation":[92],"shows":[93],"choice":[96],"curve":[99],"(secp128r1,":[100],"secp192r1,":[101],"secp256r1)":[102],"dominates":[103],"influence":[105],"payload":[108],"size.":[109],"also":[111],"provide":[112],"energy":[113],"measurements":[114],"all":[116],"operations":[117],"show":[119],"feasibility":[121],"our":[123],"energy-constrained":[127],"devices.":[128]},"counts_by_year":[{"year":2019,"cited_by_count":1},{"year":2018,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
