{"id":"https://openalex.org/W2131136735","doi":"https://doi.org/10.1145/2554850.2555045","title":"A biometric-based authenticated key agreement scheme using ECC for wireless sensor networks","display_name":"A biometric-based authenticated key agreement scheme using ECC for wireless sensor networks","publication_year":2014,"publication_date":"2014-03-24","ids":{"openalex":"https://openalex.org/W2131136735","doi":"https://doi.org/10.1145/2554850.2555045","mag":"2131136735"},"language":"en","primary_location":{"id":"doi:10.1145/2554850.2555045","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2554850.2555045","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 29th Annual ACM Symposium on Applied Computing","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5113494309","display_name":"Eun\u2010Jun Yoon","orcid":null},"institutions":[{"id":"https://openalex.org/I4210113474","display_name":"Kyungil University","ror":"https://ror.org/024kwvm84","country_code":"KR","type":"education","lineage":["https://openalex.org/I4210113474"]}],"countries":["KR"],"is_corresponding":true,"raw_author_name":"Eun-Jun Yoon","raw_affiliation_strings":["Kyungil University, Kyungsangpuk-Do, South Korea"],"affiliations":[{"raw_affiliation_string":"Kyungil University, Kyungsangpuk-Do, South Korea","institution_ids":["https://openalex.org/I4210113474"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5113534082","display_name":"Kee-Young Yoo","orcid":null},"institutions":[{"id":"https://openalex.org/I31419693","display_name":"Kyungpook National University","ror":"https://ror.org/040c17130","country_code":"KR","type":"education","lineage":["https://openalex.org/I31419693"]}],"countries":["KR"],"is_corresponding":false,"raw_author_name":"Kee-Young Yoo","raw_affiliation_strings":["Kyungpook National University, Daegu, South Korea"],"affiliations":[{"raw_affiliation_string":"Kyungpook National University, Daegu, South Korea","institution_ids":["https://openalex.org/I31419693"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5113494309"],"corresponding_institution_ids":["https://openalex.org/I4210113474"],"apc_list":null,"apc_paid":null,"fwci":1.0344,"has_fulltext":false,"cited_by_count":6,"citation_normalized_percentile":{"value":0.81142886,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"699","last_page":"705"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.9979000091552734,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.9979000091552734,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9957000017166138,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":0.9943000078201294,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/elliptic-curve-cryptography","display_name":"Elliptic curve cryptography","score":0.8170121312141418},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7657350301742554},{"id":"https://openalex.org/keywords/forward-secrecy","display_name":"Forward secrecy","score":0.6864666938781738},{"id":"https://openalex.org/keywords/wireless-sensor-network","display_name":"Wireless sensor network","score":0.6227134466171265},{"id":"https://openalex.org/keywords/password","display_name":"Password","score":0.5773464441299438},{"id":"https://openalex.org/keywords/hash-function","display_name":"Hash function","score":0.5496113300323486},{"id":"https://openalex.org/keywords/cryptosystem","display_name":"Cryptosystem","score":0.5277156233787537},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.49769309163093567},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.4970994293689728},{"id":"https://openalex.org/keywords/node","display_name":"Node (physics)","score":0.4884561598300934},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.48815399408340454},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.4613639712333679},{"id":"https://openalex.org/keywords/session-key","display_name":"Session key","score":0.4565108120441437},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.4361191391944885},{"id":"https://openalex.org/keywords/elliptic-curve-digital-signature-algorithm","display_name":"Elliptic Curve Digital Signature Algorithm","score":0.41187506914138794},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.2917513847351074},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.27646976709365845},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.08913549780845642}],"concepts":[{"id":"https://openalex.org/C167615521","wikidata":"https://www.wikidata.org/wiki/Q1048911","display_name":"Elliptic curve cryptography","level":4,"score":0.8170121312141418},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7657350301742554},{"id":"https://openalex.org/C205009425","wikidata":"https://www.wikidata.org/wiki/Q935662","display_name":"Forward secrecy","level":4,"score":0.6864666938781738},{"id":"https://openalex.org/C24590314","wikidata":"https://www.wikidata.org/wiki/Q336038","display_name":"Wireless sensor network","level":2,"score":0.6227134466171265},{"id":"https://openalex.org/C109297577","wikidata":"https://www.wikidata.org/wiki/Q161157","display_name":"Password","level":2,"score":0.5773464441299438},{"id":"https://openalex.org/C99138194","wikidata":"https://www.wikidata.org/wiki/Q183427","display_name":"Hash function","level":2,"score":0.5496113300323486},{"id":"https://openalex.org/C6295992","wikidata":"https://www.wikidata.org/wiki/Q976521","display_name":"Cryptosystem","level":3,"score":0.5277156233787537},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.49769309163093567},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.4970994293689728},{"id":"https://openalex.org/C62611344","wikidata":"https://www.wikidata.org/wiki/Q1062658","display_name":"Node (physics)","level":2,"score":0.4884561598300934},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.48815399408340454},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.4613639712333679},{"id":"https://openalex.org/C191197275","wikidata":"https://www.wikidata.org/wiki/Q1755775","display_name":"Session key","level":3,"score":0.4565108120441437},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.4361191391944885},{"id":"https://openalex.org/C197966572","wikidata":"https://www.wikidata.org/wiki/Q915079","display_name":"Elliptic Curve Digital Signature Algorithm","level":5,"score":0.41187506914138794},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.2917513847351074},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.27646976709365845},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.08913549780845642},{"id":"https://openalex.org/C66938386","wikidata":"https://www.wikidata.org/wiki/Q633538","display_name":"Structural engineering","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/2554850.2555045","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2554850.2555045","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 29th Annual ACM Symposium on Applied Computing","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[{"id":"https://openalex.org/F4320337392","display_name":"Division of Electrical, Communications and Cyber Systems","ror":"https://ror.org/01krpsy48"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":26,"referenced_works":["https://openalex.org/W82420611","https://openalex.org/W1660562555","https://openalex.org/W1764565075","https://openalex.org/W1880212920","https://openalex.org/W1986912309","https://openalex.org/W2004513455","https://openalex.org/W2015177198","https://openalex.org/W2036378739","https://openalex.org/W2044007297","https://openalex.org/W2047413095","https://openalex.org/W2053134894","https://openalex.org/W2057708964","https://openalex.org/W2060379433","https://openalex.org/W2067438990","https://openalex.org/W2101281924","https://openalex.org/W2112176683","https://openalex.org/W2122126819","https://openalex.org/W2122782274","https://openalex.org/W2149259182","https://openalex.org/W2156186849","https://openalex.org/W2162931930","https://openalex.org/W2243712200","https://openalex.org/W2399147701","https://openalex.org/W2526822862","https://openalex.org/W2561675875","https://openalex.org/W6639053789"],"related_works":["https://openalex.org/W3201596224","https://openalex.org/W1565266559","https://openalex.org/W2782833818","https://openalex.org/W1990743860","https://openalex.org/W4226182343","https://openalex.org/W3191743943","https://openalex.org/W3213981908","https://openalex.org/W4303856864","https://openalex.org/W2260005205","https://openalex.org/W2332531239"],"abstract_inverted_index":{"Recently,":[0],"various":[1],"user":[2,129],"authentication":[3],"schemes":[4],"have":[5],"successfully":[6],"drawn":[7],"researchers'":[8],"attention":[9],"and":[10,53,56,97,122,131,155],"been":[11],"studied":[12],"widely":[13],"in":[14,148],"order":[15],"to":[16,42,101],"guarantee":[17],"secure":[18,79,111],"communication":[19],"for":[20,40,146],"wireless":[21],"sensor":[22,51,59],"networks":[23],"(WSNs).":[24],"This":[25],"paper":[26],"proposes":[27],"a":[28],"new":[29],"biometric-based":[30],"authenticated":[31],"key":[32,81],"agreement":[33,82],"scheme":[34,69,142],"using":[35],"Elliptic":[36],"Curve":[37],"Cryptosystem":[38],"(ECC)":[39],"WSN":[41],"minimize":[43],"the":[44,50,54,66,71,93,102,128,140],"complexity":[45],"of":[46],"computational":[47],"costs":[48],"between":[49],"node":[52],"GW-node":[55],"fit":[57],"low-power":[58],"network":[60],"environments.":[61],"Compared":[62],"with":[63],"previous":[64],"schemes,":[65],"newly":[67],"proposed":[68,141],"has":[70],"following":[72],"more":[73],"practical":[74],"characteristics:":[75],"(1)":[76],"it":[77,90,107,124,151],"provides":[78,118,152],"session":[80],"function":[83],"by":[84],"adopting":[85],"elliptic":[86,103],"curve":[87,104],"cryptosystem,":[88],"(2)":[89],"can":[91],"reduce":[92],"total":[94],"execution":[95],"time":[96],"memory":[98],"requirement":[99],"due":[100],"cryptography,":[105],"(3)":[106],"is":[108,143],"not":[109,126],"only":[110,133],"against":[112],"well-known":[113],"cryptographical":[114],"attacks":[115],"but":[116],"also":[117],"perfect":[119],"forward":[120],"secrecy,":[121],"(4)":[123],"does":[125],"require":[127],"password":[130],"uses":[132],"hash":[134],"function.":[135],"Analysis":[136],"results":[137],"show":[138],"that":[139],"extremely":[144],"suitable":[145],"use":[147],"WSNs":[149],"since":[150],"security,":[153],"reliability,":[154],"efficiency.":[156]},"counts_by_year":[{"year":2022,"cited_by_count":1},{"year":2021,"cited_by_count":1},{"year":2019,"cited_by_count":1},{"year":2016,"cited_by_count":2},{"year":2015,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
