{"id":"https://openalex.org/W3093713281","doi":"https://doi.org/10.1109/wf-iot48130.2020.9221331","title":"iMAC: Implicit Message Authentication Code for IoT Devices","display_name":"iMAC: Implicit Message Authentication Code for IoT Devices","publication_year":2020,"publication_date":"2020-06-01","ids":{"openalex":"https://openalex.org/W3093713281","doi":"https://doi.org/10.1109/wf-iot48130.2020.9221331","mag":"3093713281"},"language":"en","primary_location":{"id":"doi:10.1109/wf-iot48130.2020.9221331","is_oa":false,"landing_page_url":"https://doi.org/10.1109/wf-iot48130.2020.9221331","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2020 IEEE 6th World Forum on Internet of Things (WF-IoT)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://ris.utwente.nl/ws/files/254067263/accepted_manuscript.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5108027558","display_name":"Ikram Ullah","orcid":"https://orcid.org/0000-0002-8026-8239"},"institutions":[{"id":"https://openalex.org/I94624287","display_name":"University of Twente","ror":"https://ror.org/006hf6230","country_code":"NL","type":"education","lineage":["https://openalex.org/I94624287"]}],"countries":["NL"],"is_corresponding":true,"raw_author_name":"Ikram Ullah","raw_affiliation_strings":["University of Twente, Enschede, The Netherlands"],"affiliations":[{"raw_affiliation_string":"University of Twente, Enschede, The Netherlands","institution_ids":["https://openalex.org/I94624287"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5003885813","display_name":"Nirvana Meratnia","orcid":"https://orcid.org/0000-0002-8379-770X"},"institutions":[{"id":"https://openalex.org/I94624287","display_name":"University of Twente","ror":"https://ror.org/006hf6230","country_code":"NL","type":"education","lineage":["https://openalex.org/I94624287"]}],"countries":["NL"],"is_corresponding":false,"raw_author_name":"Nirvana Meratnia","raw_affiliation_strings":["University of Twente, Enschede, The Netherlands"],"affiliations":[{"raw_affiliation_string":"University of Twente, Enschede, The Netherlands","institution_ids":["https://openalex.org/I94624287"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5067566830","display_name":"Paul Havinga","orcid":"https://orcid.org/0000-0002-3399-1790"},"institutions":[{"id":"https://openalex.org/I94624287","display_name":"University of Twente","ror":"https://ror.org/006hf6230","country_code":"NL","type":"education","lineage":["https://openalex.org/I94624287"]}],"countries":["NL"],"is_corresponding":false,"raw_author_name":"Paul J. M. Havinga","raw_affiliation_strings":["University of Twente, Enschede, The Netherlands"],"affiliations":[{"raw_affiliation_string":"University of Twente, Enschede, The Netherlands","institution_ids":["https://openalex.org/I94624287"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5108027558"],"corresponding_institution_ids":["https://openalex.org/I94624287"],"apc_list":null,"apc_paid":null,"fwci":1.3907,"has_fulltext":true,"cited_by_count":7,"citation_normalized_percentile":{"value":0.86940877,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.996399998664856,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10828","display_name":"Biometric Identification and Security","score":0.9909999966621399,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8090020418167114},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.6358778476715088},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6338302493095398},{"id":"https://openalex.org/keywords/message-authentication-code","display_name":"Message authentication code","score":0.6245084404945374},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.5939460396766663},{"id":"https://openalex.org/keywords/internet-of-things","display_name":"Internet of Things","score":0.536481499671936},{"id":"https://openalex.org/keywords/confidentiality","display_name":"Confidentiality","score":0.5094917416572571},{"id":"https://openalex.org/keywords/transparency","display_name":"Transparency (behavior)","score":0.5086732506752014},{"id":"https://openalex.org/keywords/cryptographic-primitive","display_name":"Cryptographic primitive","score":0.4912683367729187},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.46510371565818787},{"id":"https://openalex.org/keywords/context","display_name":"Context (archaeology)","score":0.4438367486000061},{"id":"https://openalex.org/keywords/single-point-of-failure","display_name":"Single point of failure","score":0.4279761016368866},{"id":"https://openalex.org/keywords/cryptographic-protocol","display_name":"Cryptographic protocol","score":0.3727736473083496}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8090020418167114},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.6358778476715088},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6338302493095398},{"id":"https://openalex.org/C141492731","wikidata":"https://www.wikidata.org/wiki/Q1052621","display_name":"Message authentication code","level":3,"score":0.6245084404945374},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.5939460396766663},{"id":"https://openalex.org/C81860439","wikidata":"https://www.wikidata.org/wiki/Q251212","display_name":"Internet of Things","level":2,"score":0.536481499671936},{"id":"https://openalex.org/C71745522","wikidata":"https://www.wikidata.org/wiki/Q2476929","display_name":"Confidentiality","level":2,"score":0.5094917416572571},{"id":"https://openalex.org/C2780233690","wikidata":"https://www.wikidata.org/wiki/Q535347","display_name":"Transparency (behavior)","level":2,"score":0.5086732506752014},{"id":"https://openalex.org/C15927051","wikidata":"https://www.wikidata.org/wiki/Q246593","display_name":"Cryptographic primitive","level":4,"score":0.4912683367729187},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.46510371565818787},{"id":"https://openalex.org/C2779343474","wikidata":"https://www.wikidata.org/wiki/Q3109175","display_name":"Context (archaeology)","level":2,"score":0.4438367486000061},{"id":"https://openalex.org/C165136773","wikidata":"https://www.wikidata.org/wiki/Q1363179","display_name":"Single point of failure","level":2,"score":0.4279761016368866},{"id":"https://openalex.org/C33884865","wikidata":"https://www.wikidata.org/wiki/Q1254335","display_name":"Cryptographic protocol","level":3,"score":0.3727736473083496},{"id":"https://openalex.org/C151730666","wikidata":"https://www.wikidata.org/wiki/Q7205","display_name":"Paleontology","level":1,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0}],"mesh":[],"locations_count":3,"locations":[{"id":"doi:10.1109/wf-iot48130.2020.9221331","is_oa":false,"landing_page_url":"https://doi.org/10.1109/wf-iot48130.2020.9221331","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2020 IEEE 6th World Forum on Internet of Things (WF-IoT)","raw_type":"proceedings-article"},{"id":"pmh:oai:ris.utwente.nl:publications/853f353c-e236-44ab-af6b-1853128b7539","is_oa":false,"landing_page_url":null,"pdf_url":null,"source":{"id":"https://openalex.org/S4406922991","display_name":"University of Twente Research Information","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"acceptedVersion","is_accepted":true,"is_published":false,"raw_source_name":"","raw_type":""},{"id":"pmh:oai:ris.utwente.nl:openaire/853f353c-e236-44ab-af6b-1853128b7539","is_oa":true,"landing_page_url":"https://research.utwente.nl/en/publications/853f353c-e236-44ab-af6b-1853128b7539","pdf_url":"https://ris.utwente.nl/ws/files/254067263/accepted_manuscript.pdf","source":{"id":"https://openalex.org/S4406922991","display_name":"University of Twente Research Information","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Ullah, I, Meratnia, N & Havinga, P J M 2020, iMAC: Implicit Message Authentication Code for IoT Devices. in 2020 IEEE 6th World Forum on Internet of Things (WF-IoT). IEEE, IEEE 6th World Forum on Internet of Things, WF-IoT 2020, New Orleans, Louisiana, United States, 2/06/20. https://doi.org/10.1109/WF-IoT48130.2020.9221331","raw_type":"info:eu-repo/semantics/publishedVersion"}],"best_oa_location":{"id":"pmh:oai:ris.utwente.nl:openaire/853f353c-e236-44ab-af6b-1853128b7539","is_oa":true,"landing_page_url":"https://research.utwente.nl/en/publications/853f353c-e236-44ab-af6b-1853128b7539","pdf_url":"https://ris.utwente.nl/ws/files/254067263/accepted_manuscript.pdf","source":{"id":"https://openalex.org/S4406922991","display_name":"University of Twente Research Information","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Ullah, I, Meratnia, N & Havinga, P J M 2020, iMAC: Implicit Message Authentication Code for IoT Devices. in 2020 IEEE 6th World Forum on Internet of Things (WF-IoT). IEEE, IEEE 6th World Forum on Internet of Things, WF-IoT 2020, New Orleans, Louisiana, United States, 2/06/20. https://doi.org/10.1109/WF-IoT48130.2020.9221331","raw_type":"info:eu-repo/semantics/publishedVersion"},"sustainable_development_goals":[],"awards":[],"funders":[{"id":"https://openalex.org/F4320335322","display_name":"European Regional Development Fund","ror":"https://ror.org/00k4n6c32"}],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W3093713281.pdf","grobid_xml":"https://content.openalex.org/works/W3093713281.grobid-xml"},"referenced_works_count":19,"referenced_works":["https://openalex.org/W1492832934","https://openalex.org/W1515964640","https://openalex.org/W1525179699","https://openalex.org/W1724737952","https://openalex.org/W2009033060","https://openalex.org/W2058844560","https://openalex.org/W2083358597","https://openalex.org/W2095038611","https://openalex.org/W2158653467","https://openalex.org/W2164947865","https://openalex.org/W2293480925","https://openalex.org/W2331322161","https://openalex.org/W2716791982","https://openalex.org/W2737284251","https://openalex.org/W2768224956","https://openalex.org/W6629279466","https://openalex.org/W6637487613","https://openalex.org/W6683388150","https://openalex.org/W6697167593"],"related_works":["https://openalex.org/W2904818008","https://openalex.org/W2904314268","https://openalex.org/W57958781","https://openalex.org/W1554274402","https://openalex.org/W2361781577","https://openalex.org/W1488313539","https://openalex.org/W1971522943","https://openalex.org/W2141019415","https://openalex.org/W2126560026","https://openalex.org/W2342603380"],"abstract_inverted_index":{"The":[0,133],"role":[1,28],"of":[2,35,55,67,71,90],"cryptography":[3],"is":[4,110,136],"not":[5,47],"only":[6,48,100],"limited":[7],"to":[8,83,114],"enabling":[9],"secure":[10],"communication":[11],"but":[12,50],"also":[13,51,58],"providing":[14],"mechanisms":[15,25],"for":[16],"authentication,":[17],"integrity,":[18],"privacy,":[19],"trust":[20],"and":[21,69,74,77,108,117,138],"non-repudiation.":[22],"All":[23],"these":[24],"play":[26],"vital":[27],"in":[29,98,102],"modern":[30],"digital":[31],"communications.":[32],"Currently,":[33],"number":[34,89],"interconnected":[36],"IoT":[37,56,93,119],"devices":[38,57,101],"has":[39],"exceeded":[40],"over":[41],"billions,":[42],"which":[43,99],"makes":[44],"managing":[45],"them":[46],"challenging":[49],"impractical.":[52],"Central":[53],"management":[54],"introduces":[59],"serious":[60],"security":[61],"threats":[62],"such":[63],"as":[64],"central":[65],"point":[66],"failure":[68],"lack":[70],"transparency,":[72],"confidentiality,":[73],"integrity.":[75],"Lightweight":[76],"decentralized":[78,116],"device-to-device":[79],"schemes":[80],"are":[81],"important":[82],"cope":[84],"with":[85],"the":[86,103],"ever":[87],"increasing":[88],"resource":[91],"constrained":[92],"devices.":[94],"Implicit":[95],"cryptographic":[96],"schemes,":[97],"same":[104],"context":[105],"can":[106],"authenticate":[107],"communicate,":[109],"an":[111],"efficient":[112,137],"way":[113],"achieve":[115],"transparent":[118],"security.":[120],"In":[121],"this":[122],"paper,":[123],"we":[124],"propose":[125],"a":[126],"multi-sensor-based":[127],"lightweight":[128],"implicit":[129],"message":[130],"authentication":[131],"mechanism.":[132],"proposed":[134],"scheme":[135],"secure.":[139]},"counts_by_year":[{"year":2025,"cited_by_count":2},{"year":2023,"cited_by_count":2},{"year":2022,"cited_by_count":2},{"year":2021,"cited_by_count":1}],"updated_date":"2026-03-20T23:20:44.827607","created_date":"2025-10-10T00:00:00"}
