{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:17:30Z","timestamp":1750220250361,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":28,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,4,14]],"date-time":"2022-04-14T00:00:00Z","timestamp":1649894400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,4,14]]},"DOI":"10.1145\/3508398.3511520","type":"proceedings-article","created":{"date-parts":[[2022,4,16]],"date-time":"2022-04-16T04:13:31Z","timestamp":1650082411000},"page":"214-225","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Toward a Resilient Key Exchange Protocol for IoT"],"prefix":"10.1145","author":[{"given":"Zhangxiang","family":"Hu","sequence":"first","affiliation":[{"name":"University of Oregon, Eugene, OR, USA"}]},{"given":"Jun","family":"Li","sequence":"additional","affiliation":[{"name":"University of Oregon, Eugene, OR, USA"}]},{"given":"Samuel","family":"Mergendahl","sequence":"additional","affiliation":[{"name":"University of Oregon, Eugene, OR, USA"}]},{"given":"Christopher","family":"Wilson","sequence":"additional","affiliation":[{"name":"University of Oregon, Eugene, OR, USA"}]}],"member":"320","published-online":{"date-parts":[[2022,4,15]]},"reference":[{"key":"e_1_3_2_2_1_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-46800-5_27"},{"key":"e_1_3_2_2_2_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2016.02.011"},{"key":"e_1_3_2_2_3_1","unstructured":"Giuseppe Ateniese Giuseppe Bianchi Angelo Capossele and Chiara Petrioli. 2013. Low-cost Standard Signatures in Wireless Sensor Networks: A Case for Reviving Pre-computation Techniques?. In NDSS .  Giuseppe Ateniese Giuseppe Bianchi Angelo Capossele and Chiara Petrioli. 2013. Low-cost Standard Signatures in Wireless Sensor Networks: A Case for Reviving Pre-computation Techniques?. In NDSS ."},{"volume-title":"Recommendation for key management: Part 1: General","author":"Barker Elaine","key":"e_1_3_2_2_4_1","unstructured":"Elaine Barker , William Burr , William Polk , and Miles Smid . 2006. Recommendation for key management: Part 1: General . National Institute of Standards and Technology , Technology Administration . Elaine Barker, William Burr, William Polk, and Miles Smid. 2006. Recommendation for key management: Part 1: General .National Institute of Standards and Technology, Technology Administration."},{"key":"e_1_3_2_2_5_1","doi-asserted-by":"crossref","unstructured":"Mihir Bellare Ran Canetti and Hugo Krawczyk. 1998. A Modular Approach to the Design and Analysis of Authentication and Key Exchange Protocols. Cryptology ePrint Archive. https:\/\/eprint.iacr.org\/1998\/009 .  Mihir Bellare Ran Canetti and Hugo Krawczyk. 1998. A Modular Approach to the Design and Analysis of Authentication and Key Exchange Protocols. Cryptology ePrint Archive. https:\/\/eprint.iacr.org\/1998\/009 .","DOI":"10.1145\/276698.276854"},{"volume-title":"Public Key Cryptography .","author":"Bernstein Daniel J.","key":"e_1_3_2_2_6_1","unstructured":"Daniel J. Bernstein . 2006. Curve25519: New Diffie-Hellman Speed Records . In Public Key Cryptography . Berlin, Heidelberg , 207--228. Daniel J. Bernstein. 2006. Curve25519: New Diffie-Hellman Speed Records. In Public Key Cryptography . Berlin, Heidelberg, 207--228."},{"volume-title":"Advances in Cryptology.","author":"Costello Craig","key":"e_1_3_2_2_9_1","unstructured":"Craig Costello and Patrick Longa . 2015. FourQ: Four-Dimensional Decompositions on a Q-curve over the Mersenne Prime . In Advances in Cryptology. Berlin, Heidelberg , 214--235. Craig Costello and Patrick Longa. 2015. FourQ: Four-Dimensional Decompositions on a Q-curve over the Mersenne Prime. In Advances in Cryptology. Berlin, Heidelberg, 214--235."},{"volume-title":"Advances in Cryptology .","author":"Raimondo Mario Di","key":"e_1_3_2_2_10_1","unstructured":"Mario Di Raimondo and Rosario Gennaro . 2003. Provably Secure Threshold Password-Authenticated Key Exchange . In Advances in Cryptology . Berlin, Heidelberg , 507--523. Mario Di Raimondo and Rosario Gennaro. 2003. Provably Secure Threshold Password-Authenticated Key Exchange. In Advances in Cryptology . Berlin, Heidelberg, 507--523."},{"key":"e_1_3_2_2_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/2413176.2413206"},{"volume-title":"Symposium on Security and Privacy . 197--213","author":"Chan Haowen","key":"e_1_3_2_2_12_1","unstructured":"Haowen Chan , A. Perrig , and D. Song . 2003. Random key predistribution schemes for sensor Networks . In Symposium on Security and Privacy . 197--213 . Haowen Chan, A. Perrig, and D. Song. 2003. Random key predistribution schemes for sensor Networks. In Symposium on Security and Privacy . 197--213."},{"volume-title":"Eleventh Annual IEEE International Conference on Sensing, Communication, and Networking (SECON). 284--292","author":"Hummen R.","key":"e_1_3_2_2_13_1","unstructured":"R. Hummen , H. Shafagh , S. Raza , T. Voig , and K. Wehrle . 2014. Delegation-based authentication and authorization for the IP-based Internet of Things . In Eleventh Annual IEEE International Conference on Sensing, Communication, and Networking (SECON). 284--292 . R. Hummen, H. Shafagh, S. Raza, T. Voig, and K. Wehrle. 2014. Delegation-based authentication and authorization for the IP-based Internet of Things. In Eleventh Annual IEEE International Conference on Sensing, Communication, and Networking (SECON). 284--292."},{"volume-title":"International Conference on High Performance Computing Simulation (HPCS). 523--530","author":"Iqbal M. A.","key":"e_1_3_2_2_14_1","unstructured":"M. A. Iqbal and M. Bayoumi . 2016. Secure End-to-End key establishment protocol for resource-constrained healthcare sensors in the context of IoT . In International Conference on High Performance Computing Simulation (HPCS). 523--530 . M. A. Iqbal and M. Bayoumi. 2016. Secure End-to-End key establishment protocol for resource-constrained healthcare sensors in the context of IoT. In International Conference on High Performance Computing Simulation (HPCS). 523--530."},{"key":"e_1_3_2_2_15_1","volume-title":"Scalable Session Key Construction Protocol for Wireless Sensor Networks. In IEEE Workshop on Large Scale RealTime and Embedded Systems (LARTES) .","author":"Lai Bocheng","year":"2002","unstructured":"Bocheng Lai , Sungha Kim , and Ingrid Verbauwhede . 2002 . Scalable Session Key Construction Protocol for Wireless Sensor Networks. In IEEE Workshop on Large Scale RealTime and Embedded Systems (LARTES) . Bocheng Lai, Sungha Kim, and Ingrid Verbauwhede. 2002. Scalable Session Key Construction Protocol for Wireless Sensor Networks. In IEEE Workshop on Large Scale RealTime and Embedded Systems (LARTES) ."},{"key":"e_1_3_2_2_16_1","doi-asserted-by":"publisher","DOI":"10.9728\/dcs.2016.17.6.499"},{"key":"e_1_3_2_2_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2018.2840979"},{"key":"e_1_3_2_2_18_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-72540-4_4"},{"key":"e_1_3_2_2_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/948109.948119"},{"key":"e_1_3_2_2_20_1","doi-asserted-by":"crossref","unstructured":"P. MacKenzie Thomas Shrimpton and M. Jakobsson. 2002. Threshold password-authenticated key exchange: (Extended abstract). In CRYPTO .  P. MacKenzie Thomas Shrimpton and M. Jakobsson. 2002. Threshold password-authenticated key exchange: (Extended abstract). In CRYPTO .","DOI":"10.1007\/3-540-45708-9_25"},{"volume-title":"Proceedings of the Workshop on Internet of Things Security and Privacy . 65--70","author":"Ozmen Muslum Ozgur","key":"e_1_3_2_2_21_1","unstructured":"Muslum Ozgur Ozmen and Attila A. Yavuz . 2017. Low-Cost Standard Public Key Cryptography Services for Wireless IoT Systems . In Proceedings of the Workshop on Internet of Things Security and Privacy . 65--70 . Muslum Ozgur Ozmen and Attila A. Yavuz. 2017. Low-Cost Standard Public Key Cryptography Services for Wireless IoT Systems. In Proceedings of the Workshop on Internet of Things Security and Privacy . 65--70."},{"key":"e_1_3_2_2_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/3307334.3326100"},{"key":"e_1_3_2_2_23_1","doi-asserted-by":"crossref","unstructured":"P. Porambage A. Braeken A. Gurtov M. Ylianttila and S. Spinsante. 2015a. Secure end-to-end communication for constrained devices in IoT-March-enabled Ambient Assisted Living systems. In 2nd World Forum on Internet of Things (WF-IoT) . 711--714.  P. Porambage A. Braeken A. Gurtov M. Ylianttila and S. Spinsante. 2015a. Secure end-to-end communication for constrained devices in IoT-March-enabled Ambient Assisted Living systems. In 2nd World Forum on Internet of Things (WF-IoT) . 711--714.","DOI":"10.1109\/WF-IoT.2015.7389141"},{"volume-title":"International Conference on Communication Workshop (ICCW). 2677--2682","author":"Porambage P.","key":"e_1_3_2_2_24_1","unstructured":"P. Porambage , A. Braeken , P. Kumar , A. Gurtov , and M. Ylianttila . 2015b. Proxy-based end-to-end key establishment protocol for the Internet of Things . In International Conference on Communication Workshop (ICCW). 2677--2682 . P. Porambage, A. Braeken, P. Kumar, A. Gurtov , and M. Ylianttila. 2015b. Proxy-based end-to-end key establishment protocol for the Internet of Things. In International Conference on Communication Workshop (ICCW). 2677--2682."},{"volume-title":"International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM) . 1--7.","author":"Saied Y. B.","key":"e_1_3_2_2_25_1","unstructured":"Y. B. Saied and A. Olivereau . 2012. D-HIP: A distributed key exchange scheme for HIP-based Internet of Things . In International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM) . 1--7. Y. B. Saied and A. Olivereau. 2012. D-HIP: A distributed key exchange scheme for HIP-based Internet of Things. In International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM) . 1--7."},{"key":"e_1_3_2_2_26_1","volume-title":"20th International Conference on Advanced Communication Technology (ICACT). 172--177","author":"Seralathan Yogeesh","year":"2018","unstructured":"Yogeesh Seralathan , Tae Tom Oh , Suyash Jadhav , Jonathan Myers , Jaehoon Paul Jeong , Young Ho Kim , and Jeong Neyo Kim . 2018 . IoT security vulnerability: A case study of a Web camera . In 20th International Conference on Advanced Communication Technology (ICACT). 172--177 . Yogeesh Seralathan, Tae Tom Oh, Suyash Jadhav, Jonathan Myers, Jaehoon Paul Jeong, Young Ho Kim, and Jeong Neyo Kim. 2018. IoT security vulnerability: A case study of a Web camera. In 20th International Conference on Advanced Communication Technology (ICACT). 172--177."},{"key":"e_1_3_2_2_27_1","volume-title":"Key establishment and authentication suite to counter DoS attacks in distributed sensor networks. Unpublished manuscript). COSIC","author":"Seys Stefaan","year":"2002","unstructured":"Stefaan Seys and Bart Preneel . 2002. Key establishment and authentication suite to counter DoS attacks in distributed sensor networks. Unpublished manuscript). COSIC ( 2002 ). Stefaan Seys and Bart Preneel. 2002. Key establishment and authentication suite to counter DoS attacks in distributed sensor networks. Unpublished manuscript). COSIC (2002)."},{"key":"e_1_3_2_2_28_1","first-page":"11","article-title":"How to Share a Secret","volume":"22","author":"Shamir Adi","year":"1979","unstructured":"Adi Shamir . 1979 . How to Share a Secret . Communication , Vol. 22 , 11 (November 1979), 612--613. Adi Shamir. 1979. How to Share a Secret. Communication , Vol. 22, 11 (November 1979), 612--613.","journal-title":"Communication"},{"volume-title":"Conference on Computer Communications . 1--9.","author":"Zhang J.","key":"e_1_3_2_2_29_1","unstructured":"J. Zhang , Z. Wang , Z. Yang , and Q. Zhang . 2017. Proximity based IoT device authentication . In Conference on Computer Communications . 1--9. J. Zhang, Z. Wang , Z. Yang, and Q. Zhang. 2017. Proximity based IoT device authentication. In Conference on Computer Communications . 1--9."},{"key":"e_1_3_2_2_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/SOCA.2014.58"}],"event":{"name":"CODASPY '22: Twelveth ACM Conference on Data and Application Security and Privacy","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Baltimore MD USA","acronym":"CODASPY '22"},"container-title":["Proceedings of the Twelfth ACM Conference on Data and Application Security and Privacy"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3508398.3511520","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3508398.3511520","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T19:30:39Z","timestamp":1750188639000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3508398.3511520"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,4,14]]},"references-count":28,"alternative-id":["10.1145\/3508398.3511520","10.1145\/3508398"],"URL":"https:\/\/doi.org\/10.1145\/3508398.3511520","relation":{},"subject":[],"published":{"date-parts":[[2022,4,14]]},"assertion":[{"value":"2022-04-15","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}