{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,26]],"date-time":"2026-02-26T15:09:00Z","timestamp":1772118540458,"version":"3.50.1"},"reference-count":18,"publisher":"Wiley","issue":"5","license":[{"start":{"date-parts":[[2024,11,19]],"date-time":"2024-11-19T00:00:00Z","timestamp":1731974400000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/onlinelibrary.wiley.com\/termsAndConditions#vor"}],"content-domain":{"domain":["onlinelibrary.wiley.com"],"crossmark-restriction":true},"short-container-title":["Internet Technology Letters"],"published-print":{"date-parts":[[2025,9]]},"abstract":"<jats:title>ABSTRACT<\/jats:title>\n                  <jats:p>Smart villages, utilizing digital technology, present a viable solution to address rural communities' needs, especially in developing countries. However, high infrastructure costs, informal economies, and governance issues pose significant challenges, impeding the realization of government aspirations for the smart village concept. This study focuses on preserving privacy and enhancing security within IoT\u2010enabled smart villages. We propose a lightweight, privacy\u2010preserving remote user authentication protocol utilizing geometric secret sharing to mitigate security vulnerabilities in resource\u2010constrained IoT devices. The protocol eliminates the need for traditional passwords and smart cards, reducing user burden and enhancing usability. Performance analysis and comparative evaluations, including power consumption, security features, and computational costs, demonstrate the efficacy and robustness of our protocol.<\/jats:p>","DOI":"10.1002\/itl2.612","type":"journal-article","created":{"date-parts":[[2024,11,19]],"date-time":"2024-11-19T03:17:00Z","timestamp":1731986220000},"update-policy":"https:\/\/doi.org\/10.1002\/crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Lightweight and Privacy\u2010Preserving Authentication Protocol for Smart Village"],"prefix":"10.1002","volume":"8","author":[{"given":"Ranjeet Kumar","family":"Panigrahi","sequence":"first","affiliation":[{"name":"Department of Computer Science and Engineering Gandhi Institute of Engineering and Technology University  Gunupur India"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1311-7585","authenticated-orcid":false,"given":"Raghvendra","family":"Kumar","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Engineering Gandhi Institute of Engineering and Technology University  Gunupur India"}]}],"member":"311","published-online":{"date-parts":[[2024,11,19]]},"reference":[{"key":"e_1_2_7_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/JSEN.2015.2475298"},{"key":"e_1_2_7_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2010.5473869"},{"key":"e_1_2_7_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/3301551.3301575"},{"key":"e_1_2_7_5_1","doi-asserted-by":"publisher","DOI":"10.3390\/s19092012"},{"key":"e_1_2_7_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2021.3074974"},{"key":"e_1_2_7_7_1","volume-title":"Smart Thermostat Security: Turning up the Heat","author":"Burrough M.","year":"2015"},{"key":"e_1_2_7_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/2133601.2133628"},{"key":"e_1_2_7_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/2398356.2398377"},{"key":"e_1_2_7_10_1","article-title":"A Hackers\u2010Eye View of the Internet of Things","volume":"7","author":"Hesseldahl A.","year":"2015","journal-title":"Recode Net"},{"key":"e_1_2_7_11_1","first-page":"209","volume-title":"Workshop on Home Usable Privacy and Security (HUPS)","author":"Ur B.","year":"2013"},{"key":"e_1_2_7_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2017.2764083"},{"key":"e_1_2_7_13_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2019.06.003"},{"key":"e_1_2_7_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCE.2017.014777"},{"key":"e_1_2_7_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCE.2016.7448561"},{"key":"e_1_2_7_16_1","doi-asserted-by":"publisher","DOI":"10.48550\/arXiv.1708.05044"},{"key":"e_1_2_7_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1983.1056650"},{"key":"e_1_2_7_18_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2019.06.002"},{"key":"e_1_2_7_19_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2021.102787"}],"container-title":["Internet Technology Letters"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1002\/itl2.612","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,21]],"date-time":"2025-10-21T18:25:17Z","timestamp":1761071117000},"score":1,"resource":{"primary":{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/10.1002\/itl2.612"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,11,19]]},"references-count":18,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2025,9]]}},"alternative-id":["10.1002\/itl2.612"],"URL":"https:\/\/doi.org\/10.1002\/itl2.612","archive":["Portico"],"relation":{"has-review":[{"id-type":"doi","id":"10.1002\/ITL2.612\/v1\/review2","asserted-by":"object"},{"id-type":"doi","id":"10.1002\/ITL2.612\/v1\/review1","asserted-by":"object"},{"id-type":"doi","id":"10.1002\/ITL2.612\/v2\/decision1","asserted-by":"object"},{"id-type":"doi","id":"10.1002\/ITL2.612\/v2\/review2","asserted-by":"object"},{"id-type":"doi","id":"10.1002\/ITL2.612\/v2\/review1","asserted-by":"object"},{"id-type":"doi","id":"10.1002\/ITL2.612\/v2\/response1","asserted-by":"object"},{"id-type":"doi","id":"10.1002\/ITL2.612\/v1\/decision1","asserted-by":"object"}]},"ISSN":["2476-1508","2476-1508"],"issn-type":[{"value":"2476-1508","type":"print"},{"value":"2476-1508","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,11,19]]},"assertion":[{"value":"2024-06-15","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2024-11-01","order":2,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2024-11-19","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}],"article-number":"e612"}}