{"id":"https://openalex.org/W2116070678","doi":"https://doi.org/10.1145/2462096.2462124","title":"Chorus","display_name":"Chorus","publication_year":2013,"publication_date":"2013-04-16","ids":{"openalex":"https://openalex.org/W2116070678","doi":"https://doi.org/10.1145/2462096.2462124","mag":"2116070678"},"language":"en","primary_location":{"id":"doi:10.1145/2462096.2462124","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2462096.2462124","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the sixth ACM conference on Security and privacy in wireless and mobile networks","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5101807622","display_name":"Yantian Hou","orcid":"https://orcid.org/0000-0001-8295-6871"},"institutions":[{"id":"https://openalex.org/I121980950","display_name":"Utah State University","ror":"https://ror.org/00h6set76","country_code":"US","type":"education","lineage":["https://openalex.org/I121980950"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Yantian Hou","raw_affiliation_strings":["Utah State University, Logan, UT, USA"],"affiliations":[{"raw_affiliation_string":"Utah State University, Logan, UT, USA","institution_ids":["https://openalex.org/I121980950"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100351421","display_name":"Ming Li","orcid":"https://orcid.org/0000-0002-4073-0273"},"institutions":[{"id":"https://openalex.org/I121980950","display_name":"Utah State University","ror":"https://ror.org/00h6set76","country_code":"US","type":"education","lineage":["https://openalex.org/I121980950"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Ming Li","raw_affiliation_strings":["Utah State University, Logan, UT, USA"],"affiliations":[{"raw_affiliation_string":"Utah State University, Logan, UT, USA","institution_ids":["https://openalex.org/I121980950"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5069090711","display_name":"Joshua D. Guttman","orcid":"https://orcid.org/0000-0002-7189-1758"},"institutions":[{"id":"https://openalex.org/I107077323","display_name":"Worcester Polytechnic Institute","ror":"https://ror.org/05ejpqr48","country_code":"US","type":"education","lineage":["https://openalex.org/I107077323"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Joshua D. Guttman","raw_affiliation_strings":["Worcester Polytechnic Institute, Worcester, MA, USA","[Worcester Polytechnic Institute Worcester, MA, USA]"],"affiliations":[{"raw_affiliation_string":"Worcester Polytechnic Institute, Worcester, MA, USA","institution_ids":["https://openalex.org/I107077323"]},{"raw_affiliation_string":"[Worcester Polytechnic Institute Worcester, MA, USA]","institution_ids":["https://openalex.org/I107077323"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5101807622"],"corresponding_institution_ids":["https://openalex.org/I121980950"],"apc_list":null,"apc_paid":null,"fwci":2.1747,"has_fulltext":false,"cited_by_count":18,"citation_normalized_percentile":{"value":0.89282669,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":97},"biblio":{"volume":null,"issue":null,"first_page":"167","last_page":"178"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":0.9983999729156494,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7889468669891357},{"id":"https://openalex.org/keywords/chorus","display_name":"Chorus","score":0.671848475933075},{"id":"https://openalex.org/keywords/wireless","display_name":"Wireless","score":0.588360071182251},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.5814314484596252},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.5807426571846008},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.5715676546096802},{"id":"https://openalex.org/keywords/initialization","display_name":"Initialization","score":0.4760341942310333},{"id":"https://openalex.org/keywords/wireless-network","display_name":"Wireless network","score":0.4318925738334656},{"id":"https://openalex.org/keywords/channel","display_name":"Channel (broadcasting)","score":0.42975255846977234},{"id":"https://openalex.org/keywords/physical-layer","display_name":"Physical layer","score":0.41490602493286133},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.39575910568237305},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.17892000079154968}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7889468669891357},{"id":"https://openalex.org/C2780832652","wikidata":"https://www.wikidata.org/wiki/Q5105266","display_name":"Chorus","level":2,"score":0.671848475933075},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.588360071182251},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.5814314484596252},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.5807426571846008},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.5715676546096802},{"id":"https://openalex.org/C114466953","wikidata":"https://www.wikidata.org/wiki/Q6034165","display_name":"Initialization","level":2,"score":0.4760341942310333},{"id":"https://openalex.org/C108037233","wikidata":"https://www.wikidata.org/wiki/Q11375","display_name":"Wireless network","level":3,"score":0.4318925738334656},{"id":"https://openalex.org/C127162648","wikidata":"https://www.wikidata.org/wiki/Q16858953","display_name":"Channel (broadcasting)","level":2,"score":0.42975255846977234},{"id":"https://openalex.org/C19247436","wikidata":"https://www.wikidata.org/wiki/Q192727","display_name":"Physical layer","level":3,"score":0.41490602493286133},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.39575910568237305},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.17892000079154968},{"id":"https://openalex.org/C142362112","wikidata":"https://www.wikidata.org/wiki/Q735","display_name":"Art","level":0,"score":0.0},{"id":"https://openalex.org/C124952713","wikidata":"https://www.wikidata.org/wiki/Q8242","display_name":"Literature","level":1,"score":0.0},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/2462096.2462124","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2462096.2462124","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the sixth ACM conference on Security and privacy in wireless and mobile networks","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[{"id":"https://openalex.org/F4320306076","display_name":"National Science Foundation","ror":"https://ror.org/021nxhr62"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":41,"referenced_works":["https://openalex.org/W1533298133","https://openalex.org/W1542059364","https://openalex.org/W1542316315","https://openalex.org/W1563880518","https://openalex.org/W1572503422","https://openalex.org/W1686853624","https://openalex.org/W1865410070","https://openalex.org/W1874069312","https://openalex.org/W1891543496","https://openalex.org/W1968616969","https://openalex.org/W1973225261","https://openalex.org/W1974664062","https://openalex.org/W2011582944","https://openalex.org/W2019258915","https://openalex.org/W2029693536","https://openalex.org/W2042239046","https://openalex.org/W2054496355","https://openalex.org/W2086174184","https://openalex.org/W2096281186","https://openalex.org/W2096768518","https://openalex.org/W2098395501","https://openalex.org/W2099042427","https://openalex.org/W2101188359","https://openalex.org/W2102523268","https://openalex.org/W2113738064","https://openalex.org/W2115027138","https://openalex.org/W2116269350","https://openalex.org/W2116897550","https://openalex.org/W2117984332","https://openalex.org/W2121500124","https://openalex.org/W2124952412","https://openalex.org/W2140626418","https://openalex.org/W2141136786","https://openalex.org/W2147035977","https://openalex.org/W2155455673","https://openalex.org/W2160015516","https://openalex.org/W2164891257","https://openalex.org/W2169929745","https://openalex.org/W2397798400","https://openalex.org/W2589889346","https://openalex.org/W6631925621"],"related_works":["https://openalex.org/W2809745188","https://openalex.org/W2494818933","https://openalex.org/W2475648064","https://openalex.org/W2349772854","https://openalex.org/W3152157429","https://openalex.org/W2364547139","https://openalex.org/W2139934687","https://openalex.org/W2357558268","https://openalex.org/W3211508905","https://openalex.org/W2394476589"],"abstract_inverted_index":{"Secure":[0],"initial":[1],"trust":[2],"establishment":[3],"for":[4,23,67,102],"multiple":[5,124],"resource":[6],"constrained":[7,256],"devices":[8,59,126],"is":[9,95,157],"a":[10,55,73,80,98,133,176,230,236,252,274],"fundamental":[11],"issue":[12],"underlying":[13],"wireless":[14,83,90,109,125,257],"networks.":[15],"A":[16],"number":[17,57],"of":[18,39,58,79,82,118,163,217,255,271,283],"protocols":[19,204,220],"have":[20],"been":[21],"proposed":[22,93,219],"secure":[24,43,77],"key":[25,134,188],"deployment":[26],"among":[27],"nodes":[28],"without":[29],"prior":[30,196],"shared":[31,197],"secrets":[32],"(ad":[33],"hoc),":[34],"however":[35],"so":[36],"far":[37],"most":[38,214],"them":[40],"rely":[41],"on":[42,97,206,238,241],"out-of-band":[44],"(OOB)":[45],"channels":[46],"(e.g.,":[47],"audio,":[48],"visual)":[49],"which":[50,85,113,137,156],"either":[51],"only":[52],"work":[53],"with":[54],"small":[56],"or":[60],"require":[61,194],"auxiliary":[62],"hardware.":[63],"In":[64],"this":[65],"paper,":[66],"the":[68,89,107,116,161,267,280],"first":[69],"time,":[70,246],"we":[71,200,265],"design":[72,201],"solution":[74,94],"that":[75,147,191],"enables":[76],"initialization":[78],"group":[81,181,186,254],"devices,":[84],"works":[86],"merely":[87],"within":[88,127],"band.":[91],"Our":[92],"based":[96,205],"novel":[99],"physical-layer":[100],"primitive":[101],"authenticated":[103,187],"string":[104],"comparison":[105],"over":[106],"insecure":[108],"channel,":[110],"called":[111],"Chorus,":[112],"simultaneously":[114],"compares":[115],"equality":[117],"fixed-length":[119],"authentication":[120,135,183],"strings":[121,149],"held":[122],"by":[123,159],"constant":[128,244],"time.":[129],"The":[130,213],"Chorus":[131,171,207,272],"achieves":[132],"property,":[136],"prevents":[138],"an":[139],"adversary":[140],"from":[141],"tricking":[142],"each":[143,239],"device":[144,240],"to":[145,178,251],"believe":[146],"all":[148],"are":[150,154,249],"equal":[151],"when":[152],"they":[153,248],"not,":[155],"enabled":[158],"exploiting":[160],"infeasibility":[162],"signal":[164],"cancellation":[165],"and":[166,185,208,229,262,269,278],"unidirectional":[167],"error":[168],"detection":[169],"codes.":[170],"can":[172],"be":[173],"employed":[174],"as":[175],"foundation":[177],"provide":[179],"in-band":[180],"message":[182],"(GMA)":[184],"agreement":[189],"(GAKA),":[190],"does":[192],"not":[193],"any":[195],"secret.":[198],"Specifically,":[199],"two":[202],"GAKA":[203,285],"formally":[209],"prove":[210],"their":[211],"security.":[212],"appealing":[215],"features":[216],"our":[218,284],"include:":[221],"minimal":[222,232],"hardware":[223],"requirement":[224],"(a":[225],"common":[226],"radio":[227],"interface":[228],"button),":[231],"user":[233],"effort":[234],"(pressing":[235],"button":[237],"average),":[242],"nearly":[243],"running":[245],"thus":[247],"scalable":[250],"large":[253],"devices.":[258],"Through":[259],"extensive":[260],"analysis":[261],"experimental":[263],"evaluation,":[264],"show":[266],"security":[268],"robustness":[270],"under":[273],"realistic":[275],"attack":[276],"model,":[277],"demonstrate":[279],"high":[281],"scalability":[282],"protocols.":[286]},"counts_by_year":[{"year":2024,"cited_by_count":1},{"year":2021,"cited_by_count":1},{"year":2020,"cited_by_count":1},{"year":2019,"cited_by_count":3},{"year":2018,"cited_by_count":3},{"year":2017,"cited_by_count":3},{"year":2016,"cited_by_count":1},{"year":2015,"cited_by_count":3},{"year":2013,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2016-06-24T00:00:00"}
