{"id":"https://openalex.org/W4313463441","doi":"https://doi.org/10.1145/3571306.3571407","title":"HessianAuth: An ECC-based Distributed and Efficient Authentication Mechanism for 6LoWPAN Networked IoT Devices","display_name":"HessianAuth: An ECC-based Distributed and Efficient Authentication Mechanism for 6LoWPAN Networked IoT Devices","publication_year":2023,"publication_date":"2023-01-03","ids":{"openalex":"https://openalex.org/W4313463441","doi":"https://doi.org/10.1145/3571306.3571407"},"language":"en","primary_location":{"id":"doi:10.1145/3571306.3571407","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3571306.3571407","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 24th International Conference on Distributed Computing and Networking","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5088254507","display_name":"Debasmita Dey","orcid":"https://orcid.org/0000-0002-9327-6545"},"institutions":[{"id":"https://openalex.org/I98365261","display_name":"Indian Institute of Engineering Science and Technology, Shibpur","ror":"https://ror.org/02ytfzr55","country_code":"IN","type":"education","lineage":["https://openalex.org/I98365261"]}],"countries":["IN"],"is_corresponding":true,"raw_author_name":"Debasmita Dey","raw_affiliation_strings":["Computer Science and Technology, Indian Institute of Engineering Science and Technology Shibpur, India"],"raw_orcid":"https://orcid.org/0000-0002-9327-6545","affiliations":[{"raw_affiliation_string":"Computer Science and Technology, Indian Institute of Engineering Science and Technology Shibpur, India","institution_ids":["https://openalex.org/I98365261"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5063147590","display_name":"Saket Chandra","orcid":"https://orcid.org/0000-0003-3181-6937"},"institutions":[{"id":"https://openalex.org/I152815399","display_name":"Singapore University of Technology and Design","ror":"https://ror.org/05j6fvn87","country_code":"SG","type":"education","lineage":["https://openalex.org/I152815399"]}],"countries":["SG"],"is_corresponding":false,"raw_author_name":"Saket Chandra","raw_affiliation_strings":["Singapore University of Technology and Design, Singapore"],"raw_orcid":"https://orcid.org/0000-0003-3181-6937","affiliations":[{"raw_affiliation_string":"Singapore University of Technology and Design, Singapore","institution_ids":["https://openalex.org/I152815399"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5072425803","display_name":"Nirnay Ghosh","orcid":"https://orcid.org/0000-0003-4079-8259"},"institutions":[{"id":"https://openalex.org/I98365261","display_name":"Indian Institute of Engineering Science and Technology, Shibpur","ror":"https://ror.org/02ytfzr55","country_code":"IN","type":"education","lineage":["https://openalex.org/I98365261"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Nirnay Ghosh","raw_affiliation_strings":["Computer Science and Technology, Indian Institute Engineering Science and Technology Shibpur, India"],"raw_orcid":"https://orcid.org/0000-0003-4079-8259","affiliations":[{"raw_affiliation_string":"Computer Science and Technology, Indian Institute Engineering Science and Technology Shibpur, India","institution_ids":["https://openalex.org/I98365261"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5088254507"],"corresponding_institution_ids":["https://openalex.org/I98365261"],"apc_list":null,"apc_paid":null,"fwci":0.9838,"has_fulltext":false,"cited_by_count":5,"citation_normalized_percentile":{"value":0.75460016,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":91,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"227","last_page":"236"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10273","display_name":"IoT and Edge/Fog Computing","score":0.9980999827384949,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10273","display_name":"IoT and Edge/Fog Computing","score":0.9980999827384949,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.9973999857902527,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11932","display_name":"Wireless Body Area Networks","score":0.9957000017166138,"subfield":{"id":"https://openalex.org/subfields/2204","display_name":"Biomedical Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/6lowpan","display_name":"6LoWPAN","score":0.8709122538566589},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8460062742233276},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.672946572303772},{"id":"https://openalex.org/keywords/elliptic-curve-cryptography","display_name":"Elliptic curve cryptography","score":0.6574974060058594},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.5689376592636108},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.43767374753952026},{"id":"https://openalex.org/keywords/latency","display_name":"Latency (audio)","score":0.42955300211906433},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3169978857040405},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.268187940120697},{"id":"https://openalex.org/keywords/ipv6","display_name":"IPv6","score":0.23506209254264832},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.21442320942878723},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.1509714424610138},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.13653898239135742},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.07992500066757202}],"concepts":[{"id":"https://openalex.org/C99400001","wikidata":"https://www.wikidata.org/wiki/Q109775","display_name":"6LoWPAN","level":4,"score":0.8709122538566589},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8460062742233276},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.672946572303772},{"id":"https://openalex.org/C167615521","wikidata":"https://www.wikidata.org/wiki/Q1048911","display_name":"Elliptic curve cryptography","level":4,"score":0.6574974060058594},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.5689376592636108},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.43767374753952026},{"id":"https://openalex.org/C82876162","wikidata":"https://www.wikidata.org/wiki/Q17096504","display_name":"Latency (audio)","level":2,"score":0.42955300211906433},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3169978857040405},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.268187940120697},{"id":"https://openalex.org/C84555802","wikidata":"https://www.wikidata.org/wiki/Q2551624","display_name":"IPv6","level":3,"score":0.23506209254264832},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.21442320942878723},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.1509714424610138},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.13653898239135742},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.07992500066757202}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3571306.3571407","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3571306.3571407","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 24th International Conference on Distributed Computing and Networking","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":21,"referenced_works":["https://openalex.org/W271922137","https://openalex.org/W1508480110","https://openalex.org/W1592431873","https://openalex.org/W1639305476","https://openalex.org/W2014013723","https://openalex.org/W2018485402","https://openalex.org/W2085068649","https://openalex.org/W2116613408","https://openalex.org/W2117064875","https://openalex.org/W2163354454","https://openalex.org/W2234639732","https://openalex.org/W2431793705","https://openalex.org/W2508026591","https://openalex.org/W2549575089","https://openalex.org/W2743870702","https://openalex.org/W2889513721","https://openalex.org/W2978569441","https://openalex.org/W3045855741","https://openalex.org/W3143407182","https://openalex.org/W3173514176","https://openalex.org/W3194453829"],"related_works":["https://openalex.org/W2316537096","https://openalex.org/W2577044099","https://openalex.org/W2086647415","https://openalex.org/W2001861295","https://openalex.org/W3160049933","https://openalex.org/W2397235246","https://openalex.org/W2585577245","https://openalex.org/W2597885677","https://openalex.org/W1991104649","https://openalex.org/W4322486674"],"abstract_inverted_index":{"Internet":[0],"of":[1,7,145],"Things":[2],"(IoT)":[3],"constitutes":[4],"an":[5,48],"ecosystem":[6],"networked":[8,45],"resource-constrained":[9],"devices":[10,23,46],"that":[11,57,155],"mandates":[12],"light-weighted":[13],"security":[14,143],"solutions.":[15],"In":[16,64],"most":[17],"IoT":[18],"applications,":[19],"co-located":[20],"and":[21,29,60,86,103,118,126,136,153,162],"proximal":[22],"are":[24,62],"connected":[25],"in":[26,83],"6LoWPAN":[27,44,95],"networks":[28],"use":[30],"the":[31,105,110,124,156],"IEEE":[32],"802.15":[33],"standard":[34,119],"for":[35],"local":[36],"interactions":[37],"via":[38],"device-to-device":[39],"(D2D)":[40],"communication.":[41],"The":[42],"resource-limited":[43],"need":[47],"efficient":[49],"authentication":[50,76,107],"mechanism":[51,108],"to":[52,80,97,133],"validate":[53],"requesters\u2019":[54],"identities":[55],"such":[56],"less":[58],"resources":[59],"time":[61],"required.":[63],"this":[65],"paper,":[66],"we":[67,139],"propose":[68],"a":[69,94,99,142,148],"novel":[70],"Elliptic":[71],"Curve":[72],"Cryptography":[73],"(ECC)-based":[74],"distributed":[75],"scheme":[77],"called":[78,151],"HessianAuth":[79,146],"achieve":[81],"efficiencies":[82],"resource":[84],"usage":[85],"latency":[87],"as":[88,90,123],"well":[89],"security.":[91],"We":[92,114],"simulated":[93],"network":[96,112],"support":[98],"D2D":[100],"communication":[101],"scenario":[102],"implemented":[104],"proposed":[106],"using":[109,147],"Cooja":[111],"simulator.":[113],"have":[115],"considered":[116],"AES-CBC":[117],"Weierstrass":[120],"curve-based":[121],"ECC":[122],"benchmarks":[125],"carried":[127],"out":[128,141],"performance":[129],"analysis":[130,144],"with":[131],"respect":[132],"CPU":[134],"cycles":[135],"delay.":[137],"Further,":[138],"carry":[140],"state-of-the-art":[149],"tool":[150],"AVISPA":[152],"demonstrate":[154],"former":[157],"is":[158],"secure":[159],"against":[160],"man-in-the-middle":[161],"replay":[163],"attacks.":[164]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":2},{"year":2023,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
