{"id":"https://openalex.org/W4416233764","doi":"https://doi.org/10.1109/wisee57913.2025.11229856","title":"BPSec-MLS: Asynchronous Key Agreement for Space Communications","display_name":"BPSec-MLS: Asynchronous Key Agreement for Space Communications","publication_year":2025,"publication_date":"2025-10-14","ids":{"openalex":"https://openalex.org/W4416233764","doi":"https://doi.org/10.1109/wisee57913.2025.11229856"},"language":null,"primary_location":{"id":"doi:10.1109/wisee57913.2025.11229856","is_oa":false,"landing_page_url":"https://doi.org/10.1109/wisee57913.2025.11229856","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 IEEE International Conference on Wireless for Space and Extreme Environments (WiSEE)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5044825117","display_name":"Xiaomei Tian","orcid":"https://orcid.org/0000-0001-6171-2309"},"institutions":[{"id":"https://openalex.org/I35364215","display_name":"Naval Postgraduate School","ror":"https://ror.org/033yfkj90","country_code":"US","type":"education","lineage":["https://openalex.org/I1330347796","https://openalex.org/I3130687028","https://openalex.org/I35364215"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Xisen Tian","raw_affiliation_strings":["Naval Postgraduate School"],"affiliations":[{"raw_affiliation_string":"Naval Postgraduate School","institution_ids":["https://openalex.org/I35364215"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5120353245","display_name":"Paul Westland","orcid":null},"institutions":[{"id":"https://openalex.org/I35364215","display_name":"Naval Postgraduate School","ror":"https://ror.org/033yfkj90","country_code":"US","type":"education","lineage":["https://openalex.org/I1330347796","https://openalex.org/I3130687028","https://openalex.org/I35364215"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Paul Westland","raw_affiliation_strings":["Naval Postgraduate School"],"affiliations":[{"raw_affiliation_string":"Naval Postgraduate School","institution_ids":["https://openalex.org/I35364215"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5044825117"],"corresponding_institution_ids":["https://openalex.org/I35364215"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.41905117,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"7"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":0.8026999831199646,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":0.8026999831199646,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11896","display_name":"Opportunistic and Delay-Tolerant Networks","score":0.045899998396635056,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12042","display_name":"Satellite Communication Systems","score":0.013500000350177288,"subfield":{"id":"https://openalex.org/subfields/2202","display_name":"Aerospace Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/security-association","display_name":"Security association","score":0.5260000228881836},{"id":"https://openalex.org/keywords/asynchronous-communication","display_name":"Asynchronous communication","score":0.5231999754905701},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.5030999779701233},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.49059998989105225},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.4729999899864197},{"id":"https://openalex.org/keywords/internet-layer","display_name":"Internet layer","score":0.4366999864578247},{"id":"https://openalex.org/keywords/software-deployment","display_name":"Software deployment","score":0.4327999949455261},{"id":"https://openalex.org/keywords/protocol","display_name":"Protocol (science)","score":0.4250999987125397},{"id":"https://openalex.org/keywords/cryptographic-protocol","display_name":"Cryptographic protocol","score":0.4146000146865845}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7450000047683716},{"id":"https://openalex.org/C130881749","wikidata":"https://www.wikidata.org/wiki/Q586894","display_name":"Security association","level":5,"score":0.5260000228881836},{"id":"https://openalex.org/C151319957","wikidata":"https://www.wikidata.org/wiki/Q752739","display_name":"Asynchronous communication","level":2,"score":0.5231999754905701},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5097000002861023},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.5030999779701233},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.49059998989105225},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.4729999899864197},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.4528000056743622},{"id":"https://openalex.org/C146739243","wikidata":"https://www.wikidata.org/wiki/Q2910948","display_name":"Internet layer","level":4,"score":0.4366999864578247},{"id":"https://openalex.org/C105339364","wikidata":"https://www.wikidata.org/wiki/Q2297740","display_name":"Software deployment","level":2,"score":0.4327999949455261},{"id":"https://openalex.org/C2780385302","wikidata":"https://www.wikidata.org/wiki/Q367158","display_name":"Protocol (science)","level":3,"score":0.4250999987125397},{"id":"https://openalex.org/C33884865","wikidata":"https://www.wikidata.org/wiki/Q1254335","display_name":"Cryptographic protocol","level":3,"score":0.4146000146865845},{"id":"https://openalex.org/C135530808","wikidata":"https://www.wikidata.org/wiki/Q3306713","display_name":"Key-agreement protocol","level":5,"score":0.41179999709129333},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.3677000105381012},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.3587000072002411},{"id":"https://openalex.org/C12269588","wikidata":"https://www.wikidata.org/wiki/Q132364","display_name":"Communications protocol","level":2,"score":0.35839998722076416},{"id":"https://openalex.org/C2778572836","wikidata":"https://www.wikidata.org/wiki/Q380933","display_name":"Space (punctuation)","level":2,"score":0.3434000015258789},{"id":"https://openalex.org/C160333310","wikidata":"https://www.wikidata.org/wiki/Q6398153","display_name":"Key distribution","level":4,"score":0.32679998874664307},{"id":"https://openalex.org/C44871818","wikidata":"https://www.wikidata.org/wiki/Q5154139","display_name":"Communication in small groups","level":2,"score":0.320499986410141},{"id":"https://openalex.org/C35341882","wikidata":"https://www.wikidata.org/wiki/Q8795","display_name":"Internet Protocol","level":3,"score":0.31470000743865967},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.31439998745918274},{"id":"https://openalex.org/C144240696","wikidata":"https://www.wikidata.org/wiki/Q367204","display_name":"Address space","level":2,"score":0.31310001015663147},{"id":"https://openalex.org/C17886624","wikidata":"https://www.wikidata.org/wiki/Q1320561","display_name":"Key management","level":3,"score":0.3086000084877014},{"id":"https://openalex.org/C65302260","wikidata":"https://www.wikidata.org/wiki/Q327675","display_name":"Symmetric-key algorithm","level":4,"score":0.30090001225471497},{"id":"https://openalex.org/C510870077","wikidata":"https://www.wikidata.org/wiki/Q7444868","display_name":"Secure communication","level":3,"score":0.2962000072002411},{"id":"https://openalex.org/C95713431","wikidata":"https://www.wikidata.org/wiki/Q631425","display_name":"Vulnerability (computing)","level":2,"score":0.28619998693466187},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.28380000591278076},{"id":"https://openalex.org/C22111027","wikidata":"https://www.wikidata.org/wiki/Q1070427","display_name":"Internet security","level":4,"score":0.2563999891281128},{"id":"https://openalex.org/C190793597","wikidata":"https://www.wikidata.org/wiki/Q189768","display_name":"Application layer","level":3,"score":0.2563999891281128}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/wisee57913.2025.11229856","is_oa":false,"landing_page_url":"https://doi.org/10.1109/wisee57913.2025.11229856","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 IEEE International Conference on Wireless for Space and Extreme Environments (WiSEE)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":24,"referenced_works":["https://openalex.org/W5848912","https://openalex.org/W2001627913","https://openalex.org/W2018501701","https://openalex.org/W2515148583","https://openalex.org/W2790810446","https://openalex.org/W2902106932","https://openalex.org/W2903043053","https://openalex.org/W2982482325","https://openalex.org/W3081132021","https://openalex.org/W3213664522","https://openalex.org/W4210350718","https://openalex.org/W4210432808","https://openalex.org/W4210728322","https://openalex.org/W4288057722","https://openalex.org/W4312452252","https://openalex.org/W4312875584","https://openalex.org/W4382644915","https://openalex.org/W4388203874","https://openalex.org/W4404901182","https://openalex.org/W4406309667","https://openalex.org/W4406502453","https://openalex.org/W4410416851","https://openalex.org/W4411337606","https://openalex.org/W4413679957"],"related_works":[],"abstract_inverted_index":{"Key":[0],"agreement":[1,109],"is":[2],"the":[3,12,53,80,127,138,143],"cornerstone":[4],"of":[5,56,124,145],"any":[6],"secure":[7],"communications":[8,153],"channel":[9],"whether":[10],"over":[11],"traditional":[13],"internet":[14,90],"or":[15,68],"in":[16,21,35,149,161],"delay":[17],"tolerant":[18],"networks":[19],"used":[20],"space":[22,25,152,163],"communications.":[23],"However,":[24],"systems":[26],"that":[27],"rely":[28],"on":[29,142],"pre-shared":[30,57],"keys":[31,58],"face":[32],"insurmountable":[33],"limitations":[34],"both":[36],"security":[37],"and":[38,48,52,106,155],"scalability.":[39],"A":[40],"single":[41],"key":[42,74,95,108],"compromise":[43],"can":[44],"expose":[45],"all":[46],"past":[47],"future":[49,162],"encrypted":[50],"communications,":[51],"static":[54],"nature":[55],"prevents":[59],"dynamic":[60,107],"group":[61,94],"membership,":[62],"making":[63],"it":[64],"difficult":[65],"to":[66,103],"add":[67],"remove":[69],"devices":[70],"without":[71],"invalidating":[72],"entire":[73],"sets.":[75],"To":[76],"address":[77],"these":[78],"challenges,":[79],"Messaging":[81],"Layer":[82],"Security":[83,130],"(MLS)":[84],"protocol":[85],"\u2013":[86,97],"a":[87,150],"recently":[88],"introduced":[89],"standard":[91],"for":[92,110],"asynchronous":[93],"establishment":[96],"offers":[98],"promising":[99],"capabilities.":[100],"Its":[101],"potential":[102],"provide":[104,156],"efficient":[105],"federated":[111],"interplanetary":[112],"architectures":[113],"(e.g.":[114],"government-commercial":[115],"collaborations)":[116],"has":[117],"been":[118],"previously":[119],"recognized,":[120],"particularly":[121],"with":[122,126,147],"integration":[123,144],"MLS":[125,146],"Bundle":[128],"Protocol":[129],"(BPSec)":[131],"framework.":[132],"In":[133],"this":[134],"work,":[135],"we":[136],"present":[137],"first":[139],"empirical":[140],"findings":[141],"BPSec":[148],"realistic":[151],"scenario":[154],"insights":[157],"into":[158],"its":[159],"deployment":[160],"architectures.":[164]},"counts_by_year":[],"updated_date":"2026-03-07T16:01:11.037858","created_date":"2025-11-13T00:00:00"}
