{"id":"https://openalex.org/W4200214908","doi":"https://doi.org/10.1109/pst52912.2021.9647741","title":"Epistemic Analysis of a Key-Management Vulnerability in LoRaWAN","display_name":"Epistemic Analysis of a Key-Management Vulnerability in LoRaWAN","publication_year":2021,"publication_date":"2021-12-13","ids":{"openalex":"https://openalex.org/W4200214908","doi":"https://doi.org/10.1109/pst52912.2021.9647741"},"language":"en","primary_location":{"id":"doi:10.1109/pst52912.2021.9647741","is_oa":false,"landing_page_url":"https://doi.org/10.1109/pst52912.2021.9647741","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2021 18th International Conference on Privacy, Security and Trust (PST)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5054644769","display_name":"Martha N. Kamkuemah","orcid":"https://orcid.org/0000-0002-4254-8942"},"institutions":[{"id":"https://openalex.org/I26092322","display_name":"Stellenbosch University","ror":"https://ror.org/05bk57929","country_code":"ZA","type":"education","lineage":["https://openalex.org/I26092322"]},{"id":"https://openalex.org/I148561064","display_name":"African Institute for Mathematical Sciences","ror":"https://ror.org/02f9k5d27","country_code":"ZA","type":"education","lineage":["https://openalex.org/I148561064"]}],"countries":["ZA"],"is_corresponding":true,"raw_author_name":"Martha N. Kamkuemah","raw_affiliation_strings":["Department of Mathematical Sciences, Stellenbosch University, and African Institute for Mathematical Sciences, South Africa"],"affiliations":[{"raw_affiliation_string":"Department of Mathematical Sciences, Stellenbosch University, and African Institute for Mathematical Sciences, South Africa","institution_ids":["https://openalex.org/I148561064","https://openalex.org/I26092322"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5054644769"],"corresponding_institution_ids":["https://openalex.org/I148561064","https://openalex.org/I26092322"],"apc_list":null,"apc_paid":null,"fwci":0.16,"has_fulltext":false,"cited_by_count":3,"citation_normalized_percentile":{"value":0.55518395,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":98},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"7"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.9984999895095825,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.9984999895095825,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11932","display_name":"Wireless Body Area Networks","score":0.9962000250816345,"subfield":{"id":"https://openalex.org/subfields/2204","display_name":"Biomedical Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9918000102043152,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/session-key","display_name":"Session key","score":0.8298109769821167},{"id":"https://openalex.org/keywords/handshake","display_name":"Handshake","score":0.8230446577072144},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7805188894271851},{"id":"https://openalex.org/keywords/session","display_name":"Session (web analytics)","score":0.6576687693595886},{"id":"https://openalex.org/keywords/key-exchange","display_name":"Key exchange","score":0.6099249124526978},{"id":"https://openalex.org/keywords/mutual-authentication","display_name":"Mutual authentication","score":0.6084052324295044},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.602057695388794},{"id":"https://openalex.org/keywords/forward-secrecy","display_name":"Forward secrecy","score":0.5775498151779175},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.553026556968689},{"id":"https://openalex.org/keywords/secrecy","display_name":"Secrecy","score":0.5378355979919434},{"id":"https://openalex.org/keywords/vulnerability","display_name":"Vulnerability (computing)","score":0.5315893292427063},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.5215209126472473},{"id":"https://openalex.org/keywords/shared-secret","display_name":"Shared secret","score":0.4982476234436035},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.4931463599205017},{"id":"https://openalex.org/keywords/authenticated-key-exchange","display_name":"Authenticated Key Exchange","score":0.4925604462623596},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.48814329504966736},{"id":"https://openalex.org/keywords/key-management","display_name":"Key management","score":0.48083266615867615},{"id":"https://openalex.org/keywords/protocol","display_name":"Protocol (science)","score":0.47630059719085693},{"id":"https://openalex.org/keywords/cryptographic-protocol","display_name":"Cryptographic protocol","score":0.4300844669342041},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.420250803232193},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.3543246388435364},{"id":"https://openalex.org/keywords/asynchronous-communication","display_name":"Asynchronous communication","score":0.09573584794998169},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.07696378231048584}],"concepts":[{"id":"https://openalex.org/C191197275","wikidata":"https://www.wikidata.org/wiki/Q1755775","display_name":"Session key","level":3,"score":0.8298109769821167},{"id":"https://openalex.org/C2778000800","wikidata":"https://www.wikidata.org/wiki/Q830043","display_name":"Handshake","level":3,"score":0.8230446577072144},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7805188894271851},{"id":"https://openalex.org/C2779182362","wikidata":"https://www.wikidata.org/wiki/Q17126187","display_name":"Session (web analytics)","level":2,"score":0.6576687693595886},{"id":"https://openalex.org/C99674996","wikidata":"https://www.wikidata.org/wiki/Q1414155","display_name":"Key exchange","level":4,"score":0.6099249124526978},{"id":"https://openalex.org/C2781221063","wikidata":"https://www.wikidata.org/wiki/Q6944186","display_name":"Mutual authentication","level":3,"score":0.6084052324295044},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.602057695388794},{"id":"https://openalex.org/C205009425","wikidata":"https://www.wikidata.org/wiki/Q935662","display_name":"Forward secrecy","level":4,"score":0.5775498151779175},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.553026556968689},{"id":"https://openalex.org/C2776452267","wikidata":"https://www.wikidata.org/wiki/Q1503443","display_name":"Secrecy","level":2,"score":0.5378355979919434},{"id":"https://openalex.org/C95713431","wikidata":"https://www.wikidata.org/wiki/Q631425","display_name":"Vulnerability (computing)","level":2,"score":0.5315893292427063},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.5215209126472473},{"id":"https://openalex.org/C184660509","wikidata":"https://www.wikidata.org/wiki/Q462624","display_name":"Shared secret","level":3,"score":0.4982476234436035},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.4931463599205017},{"id":"https://openalex.org/C2777572472","wikidata":"https://www.wikidata.org/wiki/Q4825878","display_name":"Authenticated Key Exchange","level":5,"score":0.4925604462623596},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.48814329504966736},{"id":"https://openalex.org/C17886624","wikidata":"https://www.wikidata.org/wiki/Q1320561","display_name":"Key management","level":3,"score":0.48083266615867615},{"id":"https://openalex.org/C2780385302","wikidata":"https://www.wikidata.org/wiki/Q367158","display_name":"Protocol (science)","level":3,"score":0.47630059719085693},{"id":"https://openalex.org/C33884865","wikidata":"https://www.wikidata.org/wiki/Q1254335","display_name":"Cryptographic protocol","level":3,"score":0.4300844669342041},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.420250803232193},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.3543246388435364},{"id":"https://openalex.org/C151319957","wikidata":"https://www.wikidata.org/wiki/Q752739","display_name":"Asynchronous communication","level":2,"score":0.09573584794998169},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.07696378231048584},{"id":"https://openalex.org/C142724271","wikidata":"https://www.wikidata.org/wiki/Q7208","display_name":"Pathology","level":1,"score":0.0},{"id":"https://openalex.org/C204787440","wikidata":"https://www.wikidata.org/wiki/Q188504","display_name":"Alternative medicine","level":2,"score":0.0},{"id":"https://openalex.org/C71924100","wikidata":"https://www.wikidata.org/wiki/Q11190","display_name":"Medicine","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/pst52912.2021.9647741","is_oa":false,"landing_page_url":"https://doi.org/10.1109/pst52912.2021.9647741","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2021 18th International Conference on Privacy, Security and Trust (PST)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","score":0.6299999952316284,"id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":37,"referenced_works":["https://openalex.org/W238001728","https://openalex.org/W1491251281","https://openalex.org/W1542059364","https://openalex.org/W1964661113","https://openalex.org/W1989109597","https://openalex.org/W2010939995","https://openalex.org/W2022205872","https://openalex.org/W2029693536","https://openalex.org/W2043394329","https://openalex.org/W2052990370","https://openalex.org/W2124926080","https://openalex.org/W2145415641","https://openalex.org/W2146973388","https://openalex.org/W2153041122","https://openalex.org/W2153281696","https://openalex.org/W2156186849","https://openalex.org/W2169908972","https://openalex.org/W2293605433","https://openalex.org/W2512365016","https://openalex.org/W2512955429","https://openalex.org/W2579364859","https://openalex.org/W2605955588","https://openalex.org/W2748868501","https://openalex.org/W2806705211","https://openalex.org/W2807066473","https://openalex.org/W2810641345","https://openalex.org/W2894972847","https://openalex.org/W2901126201","https://openalex.org/W2905499724","https://openalex.org/W3150645827","https://openalex.org/W3196893454","https://openalex.org/W4289126832","https://openalex.org/W4300349690","https://openalex.org/W6632410262","https://openalex.org/W6725565169","https://openalex.org/W6743493502","https://openalex.org/W6744808962"],"related_works":["https://openalex.org/W2021104671","https://openalex.org/W2947414929","https://openalex.org/W2002426612","https://openalex.org/W2951467593","https://openalex.org/W2126761626","https://openalex.org/W1511771844","https://openalex.org/W4200214908","https://openalex.org/W2515070993","https://openalex.org/W845402638","https://openalex.org/W2128046926"],"abstract_inverted_index":{"Smart":[0],"devices":[1,153],"in":[2],"applications":[3],"like":[4],"remote":[5],"sensing":[6],"systems":[7],"use":[8,26],"the":[9,27,49,55,64,76,96,105,119,136,141,145],"LoRaWAN":[10,77],"protocol":[11,56,137],"to":[12,18,31,58,94],"connect":[13],"with":[14,48,154],"and":[15,24,36,70,86,88,111,121,159],"transmit":[16],"data":[17],"a":[19,33,90],"central":[20],"server.":[21,50],"The":[22],"device":[23],"server":[25],"protocol\u2019s":[28],"handshake":[29,78,120],"procedure":[30],"start":[32],"communication":[34],"session":[35,38,42,52,65,97],"negotiate":[37],"encryption":[39],"keys.":[40],"However,":[41],"keys":[43,53,66],"remain":[44],"unchanged":[45],"throughout":[46],"communications":[47],"Static":[51],"make":[54],"vulnerable":[57],"attack.":[59],"An":[60],"intruder":[61],"that":[62,118,135,144],"compromises":[63],"can":[67],"decrypt":[68],"past":[69],"future":[71],"messages.":[72],"This":[73],"work":[74,142],"studies":[75],"procedure,":[79],"its":[80],"security":[81],"properties,":[82],"namely":[83],"mutual":[84,109],"authentication":[85,110],"secrecy,":[87],"proposes":[89,101],"key":[91,98,123,147],"exchange":[92,124,148],"scheme":[93,125,149],"mitigate":[95],"vulnerability.":[99],"It":[100],"epistemic":[102],"definitions":[103],"for":[104,152],"vital":[106],"properties":[107],"of":[108],"secrecy.":[112],"To":[113],"validate":[114],"them,":[115],"we":[116,133],"prove":[117],"new":[122,146],"satisfy":[126],"these":[127],"definitions.":[128],"Based":[129],"on":[130],"this":[131],"validation,":[132],"show":[134],"is":[138,150],"secure.":[139],"Finally,":[140],"shows":[143],"feasible":[151],"limited":[155],"processing":[156],"power,":[157],"bandwidth,":[158],"memory.":[160]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":1},{"year":2022,"cited_by_count":1}],"updated_date":"2026-04-07T14:57:38.498316","created_date":"2025-10-10T00:00:00"}
