{"id":"https://openalex.org/W2115345805","doi":"https://doi.org/10.1109/icnsc.2012.6204902","title":"An authenticated key agreement with rekeying for secured body sensor networks based on hybrid cryptosystem","display_name":"An authenticated key agreement with rekeying for secured body sensor networks based on hybrid cryptosystem","publication_year":2012,"publication_date":"2012-04-01","ids":{"openalex":"https://openalex.org/W2115345805","doi":"https://doi.org/10.1109/icnsc.2012.6204902","mag":"2115345805"},"language":"en","primary_location":{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/icnsc.2012.6204902","pdf_url":null,"source":null,"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false},"type":"article","type_crossref":"proceedings-article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5074344560","display_name":"Noor Ul Amin","orcid":"https://orcid.org/0000-0001-5822-5550"},"institutions":[{"id":"https://openalex.org/I263208278","display_name":"Hazara University","ror":"https://ror.org/018y22094","country_code":"PK","type":"education","lineage":["https://openalex.org/I263208278"]}],"countries":["PK"],"is_corresponding":false,"raw_author_name":"Noor Ul Amin","raw_affiliation_strings":["(Hazara University, Mansehra, Pakistan)"],"affiliations":[{"raw_affiliation_string":"(Hazara University, Mansehra, Pakistan)","institution_ids":["https://openalex.org/I263208278"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5103209260","display_name":"Muhammad Asad","orcid":"https://orcid.org/0000-0002-3672-2414"},"institutions":[{"id":"https://openalex.org/I121243025","display_name":"International Islamic University, Islamabad","ror":"https://ror.org/047w75g40","country_code":"PK","type":"education","lineage":["https://openalex.org/I121243025"]}],"countries":["PK"],"is_corresponding":false,"raw_author_name":"Muhammad Asad","raw_affiliation_strings":["International Islamic University Islamabad, PAKISTAN"],"affiliations":[{"raw_affiliation_string":"International Islamic University Islamabad, PAKISTAN","institution_ids":["https://openalex.org/I121243025"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5040679634","display_name":"Nizamuddin","orcid":null},"institutions":[{"id":"https://openalex.org/I121243025","display_name":"International Islamic University, Islamabad","ror":"https://ror.org/047w75g40","country_code":"PK","type":"education","lineage":["https://openalex.org/I121243025"]}],"countries":["PK"],"is_corresponding":false,"raw_author_name":"None Nizamuddin","raw_affiliation_strings":["International Islamic University Islamabad, PAKISTAN"],"affiliations":[{"raw_affiliation_string":"International Islamic University Islamabad, PAKISTAN","institution_ids":["https://openalex.org/I121243025"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5047048551","display_name":"Shehzad Ashraf Chaudhry","orcid":"https://orcid.org/0000-0002-9321-6956"},"institutions":[{"id":"https://openalex.org/I121243025","display_name":"International Islamic University, Islamabad","ror":"https://ror.org/047w75g40","country_code":"PK","type":"education","lineage":["https://openalex.org/I121243025"]}],"countries":["PK"],"is_corresponding":false,"raw_author_name":"Shehzad Ashraf Chaudhry","raw_affiliation_strings":["International Islamic University Islamabad, PAKISTAN"],"affiliations":[{"raw_affiliation_string":"International Islamic University Islamabad, PAKISTAN","institution_ids":["https://openalex.org/I121243025"]}]}],"institution_assertions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":3.037,"has_fulltext":true,"fulltext_origin":"ngrams","cited_by_count":25,"citation_normalized_percentile":{"value":0.905427,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":91,"max":92},"biblio":{"volume":null,"issue":null,"first_page":"118","last_page":"121"},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":0.9991,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":0.9991,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11932","display_name":"Wireless Body Area Networks in Healthcare","score":0.999,"subfield":{"id":"https://openalex.org/subfields/2204","display_name":"Biomedical Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11504","display_name":"Security Protocols for Authentication and Key Exchange","score":0.9918,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/rekeying","display_name":"Rekeying","score":0.9340811},{"id":"https://openalex.org/keywords/key-management","display_name":"Key Management","score":0.552766},{"id":"https://openalex.org/keywords/elliptic-curve-cryptography","display_name":"Elliptic Curve Cryptography","score":0.551267},{"id":"https://openalex.org/keywords/key-exchange","display_name":"Key Exchange","score":0.549579},{"id":"https://openalex.org/keywords/forward-secrecy","display_name":"Forward secrecy","score":0.5483915},{"id":"https://openalex.org/keywords/wireless-body-area-networks","display_name":"Wireless Body Area Networks","score":0.526872},{"id":"https://openalex.org/keywords/secure-routing","display_name":"Secure Routing","score":0.523623}],"concepts":[{"id":"https://openalex.org/C127150765","wikidata":"https://www.wikidata.org/wiki/Q7310605","display_name":"Rekeying","level":4,"score":0.9340811},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7354828},{"id":"https://openalex.org/C17886624","wikidata":"https://www.wikidata.org/wiki/Q1320561","display_name":"Key management","level":3,"score":0.65599746},{"id":"https://openalex.org/C2779960059","wikidata":"https://www.wikidata.org/wiki/Q7113681","display_name":"Overhead (engineering)","level":2,"score":0.60385287},{"id":"https://openalex.org/C73468433","wikidata":"https://www.wikidata.org/wiki/Q1639918","display_name":"Hybrid cryptosystem","level":4,"score":0.59223026},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.57918936},{"id":"https://openalex.org/C6295992","wikidata":"https://www.wikidata.org/wiki/Q976521","display_name":"Cryptosystem","level":3,"score":0.5706643},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.5530907},{"id":"https://openalex.org/C205009425","wikidata":"https://www.wikidata.org/wiki/Q935662","display_name":"Forward secrecy","level":4,"score":0.5483915},{"id":"https://openalex.org/C167615521","wikidata":"https://www.wikidata.org/wiki/Q1048911","display_name":"Elliptic curve cryptography","level":4,"score":0.5305952},{"id":"https://openalex.org/C24590314","wikidata":"https://www.wikidata.org/wiki/Q336038","display_name":"Wireless sensor network","level":2,"score":0.50706863},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.49823546},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.4305677},{"id":"https://openalex.org/C45374587","wikidata":"https://www.wikidata.org/wiki/Q12525525","display_name":"Computation","level":2,"score":0.41724437},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.39799577},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.3816552},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.34107846},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.20567721},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.15201622},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.102134526},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.09058076},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/icnsc.2012.6204902","pdf_url":null,"source":null,"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/17","display_name":"Partnerships for the goals","score":0.43}],"grants":[],"datasets":[],"versions":[],"referenced_works_count":13,"referenced_works":["https://openalex.org/W1567573409","https://openalex.org/W1964970915","https://openalex.org/W1990273327","https://openalex.org/W2013363438","https://openalex.org/W2064447331","https://openalex.org/W2066110502","https://openalex.org/W2098727156","https://openalex.org/W2102155759","https://openalex.org/W2114242878","https://openalex.org/W2122053504","https://openalex.org/W2122235704","https://openalex.org/W2128382483","https://openalex.org/W2150019198"],"related_works":["https://openalex.org/W2518763300","https://openalex.org/W2392339170","https://openalex.org/W2361436777","https://openalex.org/W2338204483","https://openalex.org/W2187717998","https://openalex.org/W211146613","https://openalex.org/W2055607619","https://openalex.org/W2051465998","https://openalex.org/W1998759144","https://openalex.org/W1988061963"],"abstract_inverted_index":{"In":[0,41],"recent":[1],"years":[2],"personal":[3],"health":[4,21],"monitoring":[5],"Body":[6,55],"Sensor":[7,56],"Network":[8],"(BSN)":[9],"have":[10,45],"got":[11],"significant":[12],"importance.":[13],"Due":[14],"to":[15],"its":[16],"sensitive":[17],"and":[18,33,64,85],"constrained":[19],"nature,":[20],"data":[22],"should":[23],"be":[24],"transported":[25],"/":[26],"kept":[27],"confidentially,":[28],"therefore,":[29],"lightweight":[30],"cryptographic":[31],"technique":[32],"key":[34,50],"management":[35],"schemes":[36],"are":[37],"required":[38],"in":[39],"BSN.":[40],"this":[42],"paper":[43],"we":[44],"proposed":[46,69],"a":[47],"hybrid":[48],"authenticated":[49],"agreement":[51],"with":[52],"rekeying":[53],"for":[54,77],"Network.":[57],"Our":[58],"scheme":[59,70],"is":[60],"based":[61],"on":[62],"Symmetric":[63],"Elliptic":[65],"Curve":[66],"Cryptography.":[67],"The":[68],"reduces":[71],"seventy":[72],"four":[73],"percent":[74,82,88],"memory":[75],"requirements":[76],"keys":[78],"storage,":[79],"eighty":[80],"seven":[81],"Computation":[83],"Cost":[84],"sixty":[86],"one":[87],"Communication":[89],"Overhead.":[90]},"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W2115345805","counts_by_year":[{"year":2024,"cited_by_count":1},{"year":2021,"cited_by_count":1},{"year":2019,"cited_by_count":5},{"year":2018,"cited_by_count":1},{"year":2017,"cited_by_count":2},{"year":2016,"cited_by_count":3},{"year":2015,"cited_by_count":10},{"year":2014,"cited_by_count":1},{"year":2012,"cited_by_count":1}],"updated_date":"2024-11-21T18:33:02.423061","created_date":"2016-06-24"}