{"id":"https://openalex.org/W2405416499","doi":"https://doi.org/10.5220/0005262701970206","title":"Key Establishment and Trustful Communication for the Internet of Things","display_name":"Key Establishment and Trustful Communication for the Internet of Things","publication_year":2015,"publication_date":"2015-01-01","ids":{"openalex":"https://openalex.org/W2405416499","doi":"https://doi.org/10.5220/0005262701970206","mag":"2405416499"},"language":"en","primary_location":{"id":"doi:10.5220/0005262701970206","is_oa":false,"landing_page_url":"https://doi.org/10.5220/0005262701970206","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 4th International Conference on Sensor Networks","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":null,"display_name":"Davi Resner","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Davi Resner","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"last","author":{"id":null,"display_name":"Ant\u00f4nio Augusto Fr\u00f6hlich","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Ant\u00f4nio Augusto Fr\u00f6hlich","raw_affiliation_strings":[],"affiliations":[]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":2,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":1.4974,"has_fulltext":false,"cited_by_count":9,"citation_normalized_percentile":{"value":0.88776331,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":98},"biblio":{"volume":null,"issue":null,"first_page":"197","last_page":"206"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9948999881744385,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9948999881744385,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":0.9948999881744385,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.993399977684021,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.7813421487808228},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6640337109565735},{"id":"https://openalex.org/keywords/internet-of-things","display_name":"Internet of Things","score":0.612986147403717},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.5572985410690308},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.5050099492073059},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4593638777732849},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.3913239538669586},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.37392741441726685},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.2654871642589569}],"concepts":[{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.7813421487808228},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6640337109565735},{"id":"https://openalex.org/C81860439","wikidata":"https://www.wikidata.org/wiki/Q251212","display_name":"Internet of Things","level":2,"score":0.612986147403717},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.5572985410690308},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.5050099492073059},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4593638777732849},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.3913239538669586},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.37392741441726685},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.2654871642589569}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.5220/0005262701970206","is_oa":false,"landing_page_url":"https://doi.org/10.5220/0005262701970206","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 4th International Conference on Sensor Networks","raw_type":"proceedings-article"},{"id":"pmh:oai:CiteSeerX.psu:10.1.1.727.3763","is_oa":false,"landing_page_url":"http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.727.3763","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"http://www.lisha.ufsc.br/pub/Resner_SENSORNETS_2015.pdf","raw_type":"text"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.5899999737739563,"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":14,"referenced_works":["https://openalex.org/W1560862316","https://openalex.org/W1660562555","https://openalex.org/W1970123348","https://openalex.org/W1972446558","https://openalex.org/W1996697813","https://openalex.org/W2054009311","https://openalex.org/W2105103777","https://openalex.org/W2114495437","https://openalex.org/W2116286374","https://openalex.org/W2128203164","https://openalex.org/W2149690282","https://openalex.org/W2159227062","https://openalex.org/W2168814471","https://openalex.org/W2533279456"],"related_works":["https://openalex.org/W4311097251","https://openalex.org/W2625093826","https://openalex.org/W2921026492","https://openalex.org/W4361251261","https://openalex.org/W3031181660","https://openalex.org/W4285201139","https://openalex.org/W2604876367","https://openalex.org/W2954140889","https://openalex.org/W3015944302","https://openalex.org/W3107196699"],"abstract_inverted_index":{"This":[0],"work":[1],"describes":[2],"a":[3,29,62,75],"practical":[4],"solution":[5],"for":[6],"the":[7,17,20,67,72,86,90,93,97,105],"problem":[8],"of":[9,19,22,74,92,107],"cryptographic":[10],"key":[11],"establishment":[12,34],"and":[13,45,56,89],"secure":[14],"communication":[15],"in":[16,24,66,71,104],"context":[18],"Internet":[21],"Things,":[23],"which":[25],"computational":[26],"efficiency":[27],"is":[28,48,99],"fundamental":[30],"requirement.":[31],"A":[32],"symmetric-key":[33],"protocol":[35,63],"based":[36],"on":[37,85],"AES,":[38],"Poly1305-AES,":[39],"time":[40],"synchronization,":[41],"Elliptic":[42],"Curve":[43],"Diffie-Hellman":[44],"sensor":[46],"IDs":[47],"proposed":[49],"to":[50,101],"achieve":[51],"data":[52],"confidentiality,":[53],"authentication,":[54],"integrity":[55],"prevention":[57],"from":[58],"replay":[59],"attacks.":[60],"Such":[61],"was":[64],"implemented":[65],"EPOS":[68],"operating":[69],"system":[70],"form":[73],"network":[76],"layer":[77],"that":[78,96],"transparently":[79],"provides":[80],"trustfulness.":[81],"Tests":[82],"were":[83],"executed":[84],"EPOSMoteII":[87],"platform":[88],"analysis":[91],"results":[94],"shows":[95],"implementation":[98],"adequate":[100],"be":[102],"used":[103],"scenario":[106],"embedded":[108],"systems":[109],"with":[110],"low":[111],"processing":[112],"power.":[113],"1":[114]},"counts_by_year":[{"year":2023,"cited_by_count":1},{"year":2018,"cited_by_count":2},{"year":2017,"cited_by_count":1},{"year":2016,"cited_by_count":4},{"year":2015,"cited_by_count":1}],"updated_date":"2026-04-05T17:49:38.594831","created_date":"2025-10-10T00:00:00"}
