{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,5]],"date-time":"2025-11-05T11:26:35Z","timestamp":1762341995750,"version":"3.40.3"},"publisher-location":"Cham","reference-count":24,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031243660"},{"type":"electronic","value":"9783031243677"}],"license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"DOI":"10.1007\/978-3-031-24367-7_29","type":"book-chapter","created":{"date-parts":[[2023,1,17]],"date-time":"2023-01-17T16:04:38Z","timestamp":1673971478000},"page":"293-307","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["SAFE: Secure and Fast Key Establishment for Resource Constrained Devices in Device to Device Communications"],"prefix":"10.1007","author":[{"given":"Mahanya","family":"Kochhar","sequence":"first","affiliation":[]},{"given":"Narendra S.","family":"Chaudhari","sequence":"additional","affiliation":[]},{"given":"Shubham","family":"Gupta","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,1,18]]},"reference":[{"issue":"2","key":"29_CR1","doi-asserted-by":"publisher","first-page":"1054","DOI":"10.1109\/COMST.2017.2649687","volume":"19","author":"M Haus","year":"2017","unstructured":"Haus, M., Waqas, M., Ding, A.Y., Li, Y., Tarkoma, S., Ott, J.: Security and privacy in device-to-device (D2D) communication: a review. IEEE Commun. Surv. Tutor. 19(2), 1054\u20131079 (2017). https:\/\/doi.org\/10.1109\/COMST.2017.2649687","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"29_CR2","doi-asserted-by":"publisher","unstructured":"Wang, M., Yan, Z.: Security in D2D communications: a review. In: Proceedings of the 2015 IEEE Trustcom\/BigDataSE\/ISPA - Volume 01 (TRUSTCOM 2015), pp. 1199\u20131204. IEEE Computer Society, New York (2015). https:\/\/doi.org\/10.1109\/Trustcom.2015.505","DOI":"10.1109\/Trustcom.2015.505"},{"key":"29_CR3","unstructured":"Viehbock, S.: Brute forcing Wi-Fi protected setup, Wi-Fi Prot. Setup 9 (2011)"},{"key":"29_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"395","DOI":"10.1007\/11745853_26","volume-title":"Public Key Cryptography - PKC 2006","author":"S Pasini","year":"2006","unstructured":"Pasini, S., Vaudenay, S.: SAS-based authenticated key agreement. In: Yung, M., Dodis, Y., Kiayias, A., Malkin, T. (eds.) PKC 2006. LNCS, vol. 3958, pp. 395\u2013409. Springer, Heidelberg (2006). https:\/\/doi.org\/10.1007\/11745853_26"},{"key":"29_CR5","unstructured":"Baker, K.A.: Diffie-Hellman Key Exchange. https:\/\/www.math.ucla.edu\/~baker\/40\/handouts\/rev_DH\/node1.html"},{"key":"29_CR6","unstructured":"Gretes, M.: MITM Attack. https:\/\/open.oregonstate.education\/defenddissent\/chapter\/the-man-in-the-middle\/"},{"key":"29_CR7","doi-asserted-by":"publisher","first-page":"107","DOI":"10.1007\/BF00124891","volume":"2","author":"W Diffie","year":"1992","unstructured":"Diffie, W., Van Oorschot, P.C., Wiener, M.J.: Authentication and authenticated key exchanges. Des Codes Crypt 2, 107\u2013125 (1992)","journal-title":"Des Codes Crypt"},{"key":"29_CR8","doi-asserted-by":"publisher","first-page":"217","DOI":"10.3390\/app10010217","volume":"10","author":"B Seok","year":"2020","unstructured":"Seok, B., Sicato, J.C.S., Erzhena, T., Xuan, C., Pan, Y., Park, J.H.: Secure D2D communication for 5G IoT network based on lightweight cryptography. Appl. Sci. 10, 217 (2020)","journal-title":"Appl. Sci."},{"key":"29_CR9","doi-asserted-by":"publisher","first-page":"107375","DOI":"10.1016\/j.compeleceng.2021.107375","volume":"95","author":"MC Chow","year":"2021","unstructured":"Chow, M.C., Ma, M.: A lightweight traceable D2D authentication and key agreement scheme in 5G cellular networks. Comput. Electr. Eng. 95, 107375 (2021)","journal-title":"Comput. Electr. Eng."},{"key":"29_CR10","doi-asserted-by":"crossref","unstructured":"Li, S., Li, M., Bao, B., Yu, B., Tang, J.: An efficient authenticated key agreement protocol for D2D communication. In: 2021 7th International Conference on Computer and Communications (ICCC), pp. 199\u2013203 (2021)","DOI":"10.1109\/ICCC54389.2021.9674457"},{"key":"29_CR11","doi-asserted-by":"publisher","first-page":"251","DOI":"10.3390\/fi11120251","volume":"11","author":"Z Belghazi","year":"2019","unstructured":"Belghazi, Z., Benamar, N., Addaim, A., Kerrache, C.A.: Secure WiFi-direct using key exchange for IoT device-to-device communications in a smart environment. Future Internet 11, 251 (2019)","journal-title":"Future Internet"},{"key":"29_CR12","doi-asserted-by":"publisher","first-page":"114","DOI":"10.1016\/j.comcom.2021.01.010","volume":"169","author":"GS Gaba","year":"2021","unstructured":"Gaba, G.S., Kumar, G., Kim, T.-H., Monga, H., Kumar, P.: Secure Device-to-Device communications for 5G enabled Internet of Things applications. Comput. Commun. 169, 114\u2013128 (2021)","journal-title":"Comput. Commun."},{"key":"29_CR13","volume-title":"Position, Location Techniques and Applications","author":"D Munoz","year":"2009","unstructured":"Munoz, D., Bouchereau, F., Enriquez, R.: Position, Location Techniques and Applications. Elsevier, Amsterdam (2009)"},{"key":"29_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"47","DOI":"10.1007\/3-540-39568-7_5","volume-title":"Advances in Cryptology","author":"A Shamir","year":"1985","unstructured":"Shamir, A.: Identity-based cryptosystems and signature schemes. In: Blakley, G.R., Chaum, D. (eds.) CRYPTO 1984. LNCS, vol. 196, pp. 47\u201353. Springer, Heidelberg (1985). https:\/\/doi.org\/10.1007\/3-540-39568-7_5"},{"key":"29_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"213","DOI":"10.1007\/3-540-44647-8_13","volume-title":"Advances in Cryptology \u2014 CRYPTO 2001","author":"D Boneh","year":"2001","unstructured":"Boneh, D., Franklin, M.: Identity-based encryption from the weil pairing. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, pp. 213\u2013229. Springer, Heidelberg (2001). https:\/\/doi.org\/10.1007\/3-540-44647-8_13"},{"key":"29_CR16","unstructured":"Arazi, B.: Certification of DL\/EC keys. In: Proceedings of the IEEE P1363 Study Group for Future Public-Key Cryptography Standards (1999)"},{"key":"29_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"42","DOI":"10.1007\/978-3-642-17499-5_3","volume-title":"Transactions on Computational Science X","author":"D Fiore","year":"2010","unstructured":"Fiore, D., Gennaro, R.: Identity-based key exchange protocols without pairings. In: Gavrilova, M.L., Tan, C.J.K., Moreno, E.D. (eds.) Transactions on Computational Science X. LNCS, vol. 6340, pp. 42\u201377. Springer, Heidelberg (2010). https:\/\/doi.org\/10.1007\/978-3-642-17499-5_3"},{"key":"29_CR18","doi-asserted-by":"crossref","unstructured":"Hang, I., Ullmann, M., Wieschebrink, C.: Short paper: a new identity-based DH key-agreement protocol for wireless sensor networks based on the Arazi-Qi scheme. In: Proceedings of the Fourth ACM Conference on Wireless Network security (WiSec 2011), pp. 139\u2013144. Association for Computing Machinery, New York (2011)","DOI":"10.1145\/1998412.1998436"},{"key":"29_CR19","doi-asserted-by":"publisher","first-page":"168","DOI":"10.1016\/j.future.2021.06.038","volume":"125","author":"S Gupta","year":"2021","unstructured":"Gupta, S., Parne, B.L., Chaudhari, N.S.: ISAG: IoT-enabled and Secrecy Aware Group-based handover scheme for e-health services in M2M communication network. Future Gener. Comput. Syst. 125, 168\u2013187 (2021)","journal-title":"Future Gener. Comput. Syst."},{"key":"29_CR20","unstructured":"OPENSSL-Cryptography and SSl\/TLS Toolkit. Technical report. https:\/\/www.openssl.org\/"},{"issue":"4","key":"29_CR21","doi-asserted-by":"publisher","first-page":"604","DOI":"10.3923\/jas.2005.604.633","volume":"5","author":"K Rabah","year":"2005","unstructured":"Rabah, K.: Theory and implementation of elliptic curve cryptography. J. Appl. Sci. 5(4), 604\u2013633 (2005)","journal-title":"J. Appl. Sci."},{"key":"29_CR22","doi-asserted-by":"publisher","first-page":"1517","DOI":"10.3390\/s17071517","volume":"17","author":"R Alvarez","year":"2017","unstructured":"Alvarez, R., Caballero-Gil, C., Santonja, J., Zamora, A.: Algorithms for lightweight key exchange. Sensors 17, 1517 (2017)","journal-title":"Sensors"},{"key":"29_CR23","unstructured":"Bernstein, D.J., Lange, T.: SafeCurves: choosing safe curves for elliptic-curve cryptography. https:\/\/safecurves.cr.yp.to. Accessed 5 Aug 2022"},{"key":"29_CR24","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"207","DOI":"10.1007\/11745853_14","volume-title":"Public Key Cryptography - PKC 2006","author":"DJ Bernstein","year":"2006","unstructured":"Bernstein, D.J.: Curve25519: new Diffie-Hellman speed records. In: Yung, M., Dodis, Y., Kiayias, A., Malkin, T. (eds.) PKC 2006. LNCS, vol. 3958, pp. 207\u2013228. Springer, Heidelberg (2006). https:\/\/doi.org\/10.1007\/11745853_14"}],"container-title":["Communications in Computer and Information Science","Machine Learning, Image Processing, Network Security and Data Sciences"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-24367-7_29","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,17]],"date-time":"2023-01-17T16:13:36Z","timestamp":1673972016000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-24367-7_29"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"ISBN":["9783031243660","9783031243677"],"references-count":24,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-24367-7_29","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2022]]},"assertion":[{"value":"18 January 2023","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"MIND","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Machine Learning, Image Processing, Network Security and Data Sciences","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2022","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"21 December 2022","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"22 December 2022","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"4","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"mind2022","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/conf.manit.ac.in\/mind2022\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"399","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"64","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"16% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"4","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"5","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}