{"id":"https://openalex.org/W2053134894","doi":"https://doi.org/10.1145/1029102.1029113","title":"TinyPK","display_name":"TinyPK","publication_year":2004,"publication_date":"2004-10-25","ids":{"openalex":"https://openalex.org/W2053134894","doi":"https://doi.org/10.1145/1029102.1029113","mag":"2053134894"},"language":"en","primary_location":{"id":"doi:10.1145/1029102.1029113","is_oa":false,"landing_page_url":"https://doi.org/10.1145/1029102.1029113","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2nd ACM workshop on Security of ad hoc and sensor networks","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5019019699","display_name":"Ronald Watro","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Ronald Watro","raw_affiliation_strings":["BBN Technologies, Cambridge, MA"],"affiliations":[{"raw_affiliation_string":"BBN Technologies, Cambridge, MA","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5004335041","display_name":"Derrick Kong","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Derrick Kong","raw_affiliation_strings":["BBN Technologies, Cambridge, MA"],"affiliations":[{"raw_affiliation_string":"BBN Technologies, Cambridge, MA","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5023988741","display_name":"Sue-fen Cuti","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Sue-fen Cuti","raw_affiliation_strings":["BBN Technologies, Cambridge, MA"],"affiliations":[{"raw_affiliation_string":"BBN Technologies, Cambridge, MA","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5089562871","display_name":"Charles Fox Gardiner","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Charles Gardiner","raw_affiliation_strings":["BBN Technologies, Cambridge, MA"],"affiliations":[{"raw_affiliation_string":"BBN Technologies, Cambridge, MA","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5033225548","display_name":"Charles Lynn","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Charles Lynn","raw_affiliation_strings":["BBN Technologies, Cambridge, MA"],"affiliations":[{"raw_affiliation_string":"BBN Technologies, Cambridge, MA","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5042050319","display_name":"Peter Kruus","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Peter Kruus","raw_affiliation_strings":["BBN Technologies, Cambridge, MA"],"affiliations":[{"raw_affiliation_string":"BBN Technologies, Cambridge, MA","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5019019699"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":23.8708,"has_fulltext":false,"cited_by_count":637,"citation_normalized_percentile":{"value":0.99578873,"is_in_top_1_percent":true,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":96,"max":100},"biblio":{"volume":null,"issue":null,"first_page":"59","last_page":"64"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10080","display_name":"Energy Efficient Wireless Sensor Networks","score":0.9965000152587891,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10246","display_name":"Mobile Ad Hoc Networks","score":0.9962999820709229,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.5261549353599548}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5261549353599548}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/1029102.1029113","is_oa":false,"landing_page_url":"https://doi.org/10.1145/1029102.1029113","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2nd ACM workshop on Security of ad hoc and sensor networks","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/9","display_name":"Industry, innovation and infrastructure","score":0.41999998688697815}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":26,"referenced_works":["https://openalex.org/W1493856790","https://openalex.org/W1518306097","https://openalex.org/W1545289068","https://openalex.org/W1558077212","https://openalex.org/W1567573409","https://openalex.org/W1593318668","https://openalex.org/W1805023694","https://openalex.org/W1947125001","https://openalex.org/W1953433535","https://openalex.org/W1996360405","https://openalex.org/W2033751220","https://openalex.org/W2104532741","https://openalex.org/W2114495437","https://openalex.org/W2136032111","https://openalex.org/W2156186849","https://openalex.org/W2537170501","https://openalex.org/W2561675875","https://openalex.org/W4232836212","https://openalex.org/W4243443630","https://openalex.org/W4285719527","https://openalex.org/W4293168393","https://openalex.org/W6629469155","https://openalex.org/W6631682812","https://openalex.org/W6633485244","https://openalex.org/W6635385780","https://openalex.org/W6682764390"],"related_works":["https://openalex.org/W2748952813","https://openalex.org/W2390279801","https://openalex.org/W2358668433","https://openalex.org/W2376932109","https://openalex.org/W2001405890","https://openalex.org/W2382290278","https://openalex.org/W2478288626","https://openalex.org/W2350741829","https://openalex.org/W2530322880","https://openalex.org/W1596801655"],"abstract_inverted_index":{"Wireless":[0],"networks":[1,24],"of":[2,33,46,92,99],"miniaturized,":[3],"low-power":[4,88],"sensor/actuator":[5],"devices":[6],"are":[7,25],"poised":[8],"to":[9,81,119],"become":[10],"widely":[11],"used":[12],"in":[13,74,102],"commercial":[14],"and":[15,31,44,52,59,106],"military":[16],"environments.":[17],"The":[18],"communication":[19],"security":[20],"problems":[21],"for":[22,85],"these":[23],"exacerbated":[26],"by":[27],"the":[28,34,42,97,103,111,116,120,136],"limited":[29],"power":[30],"energy":[32],"sensor":[35,57,68,121],"devices.":[36,89],"In":[37],"this":[38],"paper,":[39],"we":[40,95],"describe":[41],"design":[43,107],"implementation":[45],"public-key-(PK)-based":[47],"protocols":[48,108,126],"that":[49,75,109],"allow":[50],"authentication":[51],"key":[53],"agreement":[54],"between":[55,66],"a":[56,60],"network":[58],"third":[61],"party":[62],"as":[63,65],"well":[64],"two":[67],"networks.":[69],"Our":[70,125],"work":[71],"is":[72],"novel":[73],"PK":[76],"technology":[77],"was":[78],"commonly":[79],"believed":[80],"be":[82],"too":[83],"inefficient":[84],"use":[86],"on":[87,115,130],"As":[90],"part":[91],"our":[93],"solution,":[94],"exploit":[96],"efficiency":[98],"public":[100],"operations":[101,114],"RSA":[104],"cryptosystem":[105],"place":[110],"computationally":[112],"expensive":[113],"parties":[117],"external":[118],"network,":[122],"when":[123],"possible.":[124],"have":[127],"been":[128],"implemented":[129],"UC":[131],"Berkeley":[132],"MICA2":[133],"motes":[134],"using":[135],"TinyOS":[137],"development":[138],"environment.":[139]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":3},{"year":2024,"cited_by_count":5},{"year":2023,"cited_by_count":10},{"year":2022,"cited_by_count":7},{"year":2021,"cited_by_count":20},{"year":2020,"cited_by_count":21},{"year":2019,"cited_by_count":17},{"year":2018,"cited_by_count":30},{"year":2017,"cited_by_count":37},{"year":2016,"cited_by_count":35},{"year":2015,"cited_by_count":31},{"year":2014,"cited_by_count":43},{"year":2013,"cited_by_count":53},{"year":2012,"cited_by_count":43}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2016-06-24T00:00:00"}
