{"id":"https://openalex.org/W3092001004","doi":"https://doi.org/10.1145/3384940.3388960","title":"Verification of Group Key Management of IEEE 802.21 using ProVerif","display_name":"Verification of Group Key Management of IEEE 802.21 using ProVerif","publication_year":2020,"publication_date":"2020-10-05","ids":{"openalex":"https://openalex.org/W3092001004","doi":"https://doi.org/10.1145/3384940.3388960","mag":"3092001004"},"language":"en","primary_location":{"id":"doi:10.1145/3384940.3388960","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3384940.3388960","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 7th ACM Workshop on ASIA Public-Key Cryptography","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5038779766","display_name":"Ryoga Noguchi","orcid":null},"institutions":[{"id":"https://openalex.org/I6178835","display_name":"Ibaraki University","ror":"https://ror.org/00sjd5653","country_code":"JP","type":"education","lineage":["https://openalex.org/I6178835"]},{"id":"https://openalex.org/I65143321","display_name":"Hitachi (Japan)","ror":"https://ror.org/02exqgm79","country_code":"JP","type":"company","lineage":["https://openalex.org/I65143321"]}],"countries":["JP"],"is_corresponding":true,"raw_author_name":"Ryoga Noguchi","raw_affiliation_strings":["Ibaraki University, Hitachi, Japan"],"affiliations":[{"raw_affiliation_string":"Ibaraki University, Hitachi, Japan","institution_ids":["https://openalex.org/I6178835","https://openalex.org/I65143321"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5042864101","display_name":"Yoshikazu Hanatani","orcid":null},"institutions":[{"id":"https://openalex.org/I1292669757","display_name":"Toshiba (Japan)","ror":"https://ror.org/0326v3z14","country_code":"JP","type":"company","lineage":["https://openalex.org/I1292669757"]}],"countries":["JP"],"is_corresponding":false,"raw_author_name":"Yoshikazu Hanatani","raw_affiliation_strings":["Toshiba Corporation, Kawasaki, Japan"],"affiliations":[{"raw_affiliation_string":"Toshiba Corporation, Kawasaki, Japan","institution_ids":["https://openalex.org/I1292669757"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5101878847","display_name":"Kazuki Yoneyama","orcid":"https://orcid.org/0000-0002-2673-3830"},"institutions":[{"id":"https://openalex.org/I6178835","display_name":"Ibaraki University","ror":"https://ror.org/00sjd5653","country_code":"JP","type":"education","lineage":["https://openalex.org/I6178835"]},{"id":"https://openalex.org/I65143321","display_name":"Hitachi (Japan)","ror":"https://ror.org/02exqgm79","country_code":"JP","type":"company","lineage":["https://openalex.org/I65143321"]}],"countries":["JP"],"is_corresponding":false,"raw_author_name":"Kazuki Yoneyama","raw_affiliation_strings":["Ibaraki University, Hitachi, Japan"],"affiliations":[{"raw_affiliation_string":"Ibaraki University, Hitachi, Japan","institution_ids":["https://openalex.org/I6178835","https://openalex.org/I65143321"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5038779766"],"corresponding_institution_ids":["https://openalex.org/I6178835","https://openalex.org/I65143321"],"apc_list":null,"apc_paid":null,"fwci":0.3084,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.61541173,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":93,"max":95},"biblio":{"volume":null,"issue":null,"first_page":"19","last_page":"27"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.9991000294685364,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.9991000294685364,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":0.9799000024795532,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T13999","display_name":"Digital Rights Management and Security","score":0.9368000030517578,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7109687924385071},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6992554664611816},{"id":"https://openalex.org/keywords/key-management","display_name":"Key management","score":0.6887561082839966},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.5483697652816772},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.5293139815330505},{"id":"https://openalex.org/keywords/secrecy","display_name":"Secrecy","score":0.5059553980827332},{"id":"https://openalex.org/keywords/group-key","display_name":"Group key","score":0.4713308811187744},{"id":"https://openalex.org/keywords/forward-secrecy","display_name":"Forward secrecy","score":0.46638989448547363},{"id":"https://openalex.org/keywords/spoofing-attack","display_name":"Spoofing attack","score":0.44425514340400696},{"id":"https://openalex.org/keywords/insider","display_name":"Insider","score":0.4435919523239136},{"id":"https://openalex.org/keywords/session-key","display_name":"Session key","score":0.4274140000343323},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.4182148873806},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.3583754301071167},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.17190584540367126},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.08383160829544067}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7109687924385071},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6992554664611816},{"id":"https://openalex.org/C17886624","wikidata":"https://www.wikidata.org/wiki/Q1320561","display_name":"Key management","level":3,"score":0.6887561082839966},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.5483697652816772},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.5293139815330505},{"id":"https://openalex.org/C2776452267","wikidata":"https://www.wikidata.org/wiki/Q1503443","display_name":"Secrecy","level":2,"score":0.5059553980827332},{"id":"https://openalex.org/C2777513581","wikidata":"https://www.wikidata.org/wiki/Q5611239","display_name":"Group key","level":3,"score":0.4713308811187744},{"id":"https://openalex.org/C205009425","wikidata":"https://www.wikidata.org/wiki/Q935662","display_name":"Forward secrecy","level":4,"score":0.46638989448547363},{"id":"https://openalex.org/C167900197","wikidata":"https://www.wikidata.org/wiki/Q11081100","display_name":"Spoofing attack","level":2,"score":0.44425514340400696},{"id":"https://openalex.org/C2778971194","wikidata":"https://www.wikidata.org/wiki/Q1664551","display_name":"Insider","level":2,"score":0.4435919523239136},{"id":"https://openalex.org/C191197275","wikidata":"https://www.wikidata.org/wiki/Q1755775","display_name":"Session key","level":3,"score":0.4274140000343323},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.4182148873806},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.3583754301071167},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.17190584540367126},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.08383160829544067},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3384940.3388960","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3384940.3388960","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 7th ACM Workshop on ASIA Public-Key Cryptography","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Affordable and clean energy","id":"https://metadata.un.org/sdg/7","score":0.7099999785423279}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":11,"referenced_works":["https://openalex.org/W146244851","https://openalex.org/W157178500","https://openalex.org/W199762066","https://openalex.org/W1983921819","https://openalex.org/W2122190611","https://openalex.org/W2510986846","https://openalex.org/W2537266186","https://openalex.org/W2742647072","https://openalex.org/W2905100179","https://openalex.org/W3005515334","https://openalex.org/W6725126354"],"related_works":["https://openalex.org/W2086075630","https://openalex.org/W2978912884","https://openalex.org/W2947337737","https://openalex.org/W2105539324","https://openalex.org/W2064608844","https://openalex.org/W1514252288","https://openalex.org/W1491855523","https://openalex.org/W1988061963","https://openalex.org/W2268042431","https://openalex.org/W2308745204"],"abstract_inverted_index":{"Home":[0],"Energy":[1],"Management":[2],"Systems":[3],"(HEMS)":[4],"contain":[5],"devices":[6,17],"of":[7,14,16,46,71,75,81],"multiple":[8],"manufacturers.":[9],"Also,":[10],"a":[11,33,101,106,113],"large":[12],"number":[13],"groups":[15],"must":[18],"be":[19,129],"managed":[20],"according":[21],"to":[22,31],"several":[23],"clustering":[24],"situations.":[25],"Hence,":[26],"since":[27],"it":[28],"is":[29,49,59,92],"necessary":[30],"establish":[32],"common":[34],"secret":[35],"group":[36,39,42,77],"key":[37,43,78],"among":[38],"members,":[40],"the":[41,66,76,122,133,136],"management":[44,79],"scheme":[45,80,134],"IEEE":[47,82],"802.21":[48,83],"used.":[50],"However,":[51],"no":[52],"security":[53],"verification":[54,69,95],"result":[55,70],"by":[56,109,116,131],"formal":[57,68],"methods":[58],"known.":[60],"In":[61],"this":[62],"paper,":[63],"we":[64,103],"give":[65],"first":[67],"secrecy":[72],"and":[73,86,112],"authenticity":[74],"against":[84],"insider":[85,111],"outsider":[87,118],"attacks":[88,127],"using":[89,132],"ProVerif,":[90],"which":[91],"an":[93,110,117],"automatic":[94],"tool":[96],"for":[97,121],"cryptographic":[98],"protocols.":[99],"As":[100],"result,":[102],"clarify":[104],"that":[105],"spoofing":[107],"attack":[108,115],"reply":[114],"are":[119],"found":[120],"basic":[123],"scheme,":[124],"but":[125],"these":[126],"can":[128],"prevented":[130],"with":[135],"digital":[137],"signature":[138],"option.":[139]},"counts_by_year":[{"year":2021,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
