{"id":"https://openalex.org/W2114495437","doi":"https://doi.org/10.1145/1031495.1031515","title":"TinySec","display_name":"TinySec","publication_year":2004,"publication_date":"2004-11-03","ids":{"openalex":"https://openalex.org/W2114495437","doi":"https://doi.org/10.1145/1031495.1031515","mag":"2114495437"},"language":"en","primary_location":{"id":"doi:10.1145/1031495.1031515","is_oa":false,"landing_page_url":"https://doi.org/10.1145/1031495.1031515","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2nd international conference on Embedded networked sensor systems","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5016983082","display_name":"Chris Karlof","orcid":null},"institutions":[{"id":"https://openalex.org/I95457486","display_name":"University of California, Berkeley","ror":"https://ror.org/01an7q238","country_code":"US","type":"education","lineage":["https://openalex.org/I95457486"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Chris Karlof","raw_affiliation_strings":["University of California at Berkeley"],"affiliations":[{"raw_affiliation_string":"University of California at Berkeley","institution_ids":["https://openalex.org/I95457486"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5108263849","display_name":"Naveen Sastry","orcid":null},"institutions":[{"id":"https://openalex.org/I95457486","display_name":"University of California, Berkeley","ror":"https://ror.org/01an7q238","country_code":"US","type":"education","lineage":["https://openalex.org/I95457486"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Naveen Sastry","raw_affiliation_strings":["University of California at Berkeley"],"affiliations":[{"raw_affiliation_string":"University of California at Berkeley","institution_ids":["https://openalex.org/I95457486"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5101823734","display_name":"David Wagner","orcid":"https://orcid.org/0000-0002-9933-518X"},"institutions":[{"id":"https://openalex.org/I95457486","display_name":"University of California, Berkeley","ror":"https://ror.org/01an7q238","country_code":"US","type":"education","lineage":["https://openalex.org/I95457486"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"David Wagner","raw_affiliation_strings":["University of California at Berkeley"],"affiliations":[{"raw_affiliation_string":"University of California at Berkeley","institution_ids":["https://openalex.org/I95457486"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5016983082"],"corresponding_institution_ids":["https://openalex.org/I95457486"],"apc_list":null,"apc_paid":null,"fwci":74.7205,"has_fulltext":false,"cited_by_count":1617,"citation_normalized_percentile":{"value":0.99955108,"is_in_top_1_percent":true,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":99,"max":100},"biblio":{"volume":null,"issue":null,"first_page":"162","last_page":"175"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10080","display_name":"Energy Efficient Wireless Sensor Networks","score":0.9991999864578247,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9987000226974487,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8253377676010132},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.681070864200592},{"id":"https://openalex.org/keywords/wireless-sensor-network","display_name":"Wireless sensor network","score":0.5870648622512817},{"id":"https://openalex.org/keywords/network-packet","display_name":"Network packet","score":0.5543521642684937},{"id":"https://openalex.org/keywords/overhead","display_name":"Overhead (engineering)","score":0.4630001187324524},{"id":"https://openalex.org/keywords/cryptographic-protocol","display_name":"Cryptographic protocol","score":0.4519999027252197},{"id":"https://openalex.org/keywords/wireless-transport-layer-security","display_name":"Wireless Transport Layer Security","score":0.4481637477874756},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.39317476749420166},{"id":"https://openalex.org/keywords/wireless-network","display_name":"Wireless network","score":0.36479151248931885},{"id":"https://openalex.org/keywords/key-distribution-in-wireless-sensor-networks","display_name":"Key distribution in wireless sensor networks","score":0.3489590287208557},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.3423037528991699},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.32811659574508667},{"id":"https://openalex.org/keywords/wireless","display_name":"Wireless","score":0.2817692756652832},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.1846754550933838},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.14780810475349426}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8253377676010132},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.681070864200592},{"id":"https://openalex.org/C24590314","wikidata":"https://www.wikidata.org/wiki/Q336038","display_name":"Wireless sensor network","level":2,"score":0.5870648622512817},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.5543521642684937},{"id":"https://openalex.org/C2779960059","wikidata":"https://www.wikidata.org/wiki/Q7113681","display_name":"Overhead (engineering)","level":2,"score":0.4630001187324524},{"id":"https://openalex.org/C33884865","wikidata":"https://www.wikidata.org/wiki/Q1254335","display_name":"Cryptographic protocol","level":3,"score":0.4519999027252197},{"id":"https://openalex.org/C173104861","wikidata":"https://www.wikidata.org/wiki/Q1476032","display_name":"Wireless Transport Layer Security","level":5,"score":0.4481637477874756},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.39317476749420166},{"id":"https://openalex.org/C108037233","wikidata":"https://www.wikidata.org/wiki/Q11375","display_name":"Wireless network","level":3,"score":0.36479151248931885},{"id":"https://openalex.org/C41971633","wikidata":"https://www.wikidata.org/wiki/Q6398155","display_name":"Key distribution in wireless sensor networks","level":4,"score":0.3489590287208557},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.3423037528991699},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.32811659574508667},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.2817692756652832},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.1846754550933838},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.14780810475349426}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/1031495.1031515","is_oa":false,"landing_page_url":"https://doi.org/10.1145/1031495.1031515","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2nd international conference on Embedded networked sensor systems","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":44,"referenced_works":["https://openalex.org/W59437739","https://openalex.org/W110195509","https://openalex.org/W1496617108","https://openalex.org/W1509885357","https://openalex.org/W1515716392","https://openalex.org/W1526649648","https://openalex.org/W1536045256","https://openalex.org/W1551910192","https://openalex.org/W1556597491","https://openalex.org/W1571721593","https://openalex.org/W1965489181","https://openalex.org/W1971903460","https://openalex.org/W1993248613","https://openalex.org/W2002054891","https://openalex.org/W2033751220","https://openalex.org/W2072234079","https://openalex.org/W2083781982","https://openalex.org/W2098506387","https://openalex.org/W2104532741","https://openalex.org/W2114566185","https://openalex.org/W2116269350","https://openalex.org/W2117676331","https://openalex.org/W2117781301","https://openalex.org/W2117984332","https://openalex.org/W2122179278","https://openalex.org/W2122488053","https://openalex.org/W2125591151","https://openalex.org/W2127949150","https://openalex.org/W2139172211","https://openalex.org/W2139215234","https://openalex.org/W2140471436","https://openalex.org/W2144576616","https://openalex.org/W2164478452","https://openalex.org/W2167396179","https://openalex.org/W2561675875","https://openalex.org/W2602645338","https://openalex.org/W3021898884","https://openalex.org/W4210597212","https://openalex.org/W4238462577","https://openalex.org/W4243443630","https://openalex.org/W4353004773","https://openalex.org/W6631402485","https://openalex.org/W6671501446","https://openalex.org/W6680560629"],"related_works":["https://openalex.org/W2289378658","https://openalex.org/W2093529019","https://openalex.org/W87530933","https://openalex.org/W1531360494","https://openalex.org/W154233216","https://openalex.org/W2026856585","https://openalex.org/W2102905434","https://openalex.org/W1988007309","https://openalex.org/W2626486901","https://openalex.org/W2136768843"],"abstract_inverted_index":{"We":[0],"introduce":[1],"TinySec,":[2],"the":[3,82,90],"first":[4],"fully-implemented":[5],"link":[6,140],"layer":[7,141],"security":[8,26,38,46],"architecture":[9],"for":[10,28,106],"wireless":[11,30],"sensor":[12,65,92,132],"networks.":[13],"In":[14],"our":[15,96],"design,":[16],"we":[17,80],"leverage":[18],"recent":[19],"lessons":[20],"learned":[21],"from":[22],"design":[23],"vulnerabilities":[24],"in":[25,44],"protocols":[27,39,142],"other":[29],"networks":[31,66],"such":[32],"as":[33],"802.11b":[34],"and":[35,61,88,110,121,145,153],"GSM.":[36],"Conventional":[37],"tend":[40],"to":[41,95,101,116],"be":[42],"conservative":[43],"their":[45],"guarantees,":[47],"typically":[48],"adding":[49,147],"16--32":[50],"bytes":[51],"of":[52,119],"overhead.":[53,155],"With":[54],"small":[55],"memories,":[56],"weak":[57],"processors,":[58],"limited":[59],"energy,":[60,151],"30":[62],"byte":[63],"packets,":[64],"cannot":[67],"afford":[68],"this":[69],"luxury.":[70],"TinySec":[71,113],"addresses":[72],"these":[73],"extreme":[74],"resource":[75,111],"constraints":[76],"with":[77],"careful":[78],"design;":[79],"explore":[81],"tradeoffs":[83],"among":[84],"different":[85],"cryptographic":[86],"primitives":[87],"use":[89],"inherent":[91],"network":[93,133],"limitations":[94],"advantage":[97],"when":[98],"choosing":[99],"parameters":[100],"find":[102],"a":[103,117,128],"sweet":[104],"spot":[105],"security,":[107],"packet":[108],"overhead,":[109],"requirements.":[112],"is":[114],"portable":[115],"variety":[118],"hardware":[120],"radio":[122],"platforms.":[123],"Our":[124],"experimental":[125],"results":[126],"on":[127],"36":[129],"node":[130],"distributed":[131],"application":[134],"clearly":[135],"demonstrate":[136],"that":[137],"software":[138],"based":[139],"are":[143],"feasible":[144],"efficient,":[146],"less":[148],"than":[149],"10%":[150],"latency,":[152],"bandwidth":[154]},"counts_by_year":[{"year":2025,"cited_by_count":10},{"year":2024,"cited_by_count":9},{"year":2023,"cited_by_count":11},{"year":2022,"cited_by_count":12},{"year":2021,"cited_by_count":15},{"year":2020,"cited_by_count":32},{"year":2019,"cited_by_count":42},{"year":2018,"cited_by_count":46},{"year":2017,"cited_by_count":51},{"year":2016,"cited_by_count":59},{"year":2015,"cited_by_count":97},{"year":2014,"cited_by_count":102},{"year":2013,"cited_by_count":132},{"year":2012,"cited_by_count":116}],"updated_date":"2026-04-04T16:13:02.066488","created_date":"2016-06-24T00:00:00"}
