{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,11]],"date-time":"2025-11-11T15:48:07Z","timestamp":1762876087329,"version":"3.40.3"},"publisher-location":"Cham","reference-count":12,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030249069"},{"type":"electronic","value":"9783030249076"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-3-030-24907-6_3","type":"book-chapter","created":{"date-parts":[[2019,7,10]],"date-time":"2019-07-10T15:02:46Z","timestamp":1562770966000},"page":"26-35","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":14,"title":["A Lightweight Secure Communication Protocol for IoT Devices Using Physically Unclonable Function"],"prefix":"10.1007","author":[{"given":"Priyanka","family":"Mall","sequence":"first","affiliation":[]},{"given":"Md Zakirul Alam","family":"Bhuiyan","sequence":"additional","affiliation":[]},{"given":"Ruhul","family":"Amin","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,7,11]]},"reference":[{"issue":"11","key":"3_CR1","doi-asserted-by":"publisher","first-page":"3857","DOI":"10.3390\/su10113857","volume":"10","author":"D Kim","year":"2018","unstructured":"Kim, D.: Performance of UWB wireless telecommunication positioning for disaster relief communication environment securing. Sustainability 10(11), 3857 (2018)","journal-title":"Sustainability"},{"key":"3_CR2","doi-asserted-by":"publisher","first-page":"110","DOI":"10.1016\/j.future.2018.06.027","volume":"89","author":"AK Das","year":"2018","unstructured":"Das, A.K., Zeadally, S., He, D.: Taxonomy and analysis of security protocols for Internet of Things. Future Gener. Comput. Syst. 89, 110\u2013125 (2018)","journal-title":"Future Gener. Comput. Syst."},{"issue":"3","key":"3_CR3","first-page":"67","volume":"16","author":"U Chatterjee","year":"2017","unstructured":"Chatterjee, U., Chakraborty, R.S., Mukhopadhyay, D.: A PUF-based secure communication protocol for IoT. ACM Trans. Embed. Comput. Syst. (TECS) 16(3), 67 (2017)","journal-title":"ACM Trans. Embed. Comput. Syst. (TECS)"},{"key":"3_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"262","DOI":"10.1007\/978-3-642-04474-8_22","volume-title":"Information Security","author":"KB Frikken","year":"2009","unstructured":"Frikken, K.B., Blanton, M., Atallah, M.J.: Robust authentication using physically unclonable functions. In: Samarati, P., Yung, M., Martinelli, F., Ardagna, C.A. (eds.) ISC 2009. LNCS, vol. 5735, pp. 262\u2013277. Springer, Heidelberg (2009). \n                    https:\/\/doi.org\/10.1007\/978-3-642-04474-8_22"},{"key":"3_CR5","doi-asserted-by":"crossref","unstructured":"Feng, J., Yang, L.T., Zhu, Q., Choo, K.-K.R.: Privacy-preserving tensor decomposition over encrypted data in a federated cloud environment. IEEE Trans. Dependable Secure Comput. (2018)","DOI":"10.1109\/TDSC.2018.2881452"},{"issue":"2","key":"3_CR6","doi-asserted-by":"publisher","first-page":"26","DOI":"10.1145\/3230641","volume":"19","author":"J Feng","year":"2019","unstructured":"Feng, J., Yang, L.T., Zhang, R.: Practical privacy-preserving high-order bi-lanczos in integrated edge-fog-cloud architecture for cyber-physical-social systems. ACM Trans. Internet Technol. (TOIT) 19(2), 26 (2019)","journal-title":"ACM Trans. Internet Technol. (TOIT)"},{"key":"3_CR7","doi-asserted-by":"crossref","unstructured":"Mahalle, P.N., Prasad, N.R., Prasad, R.: Threshold cryptography-based group authentication (TCGA) scheme for the Internet of Things (IoT). In: 4th International Conference on Wireless Communications, Vehicular Technology, Information Theory and Aerospace & Electronic Systems (VITAE), pp. 1\u20135. IEEE (2014)","DOI":"10.1109\/VITAE.2014.6934425"},{"key":"3_CR8","doi-asserted-by":"crossref","unstructured":"Porambage, P., Schmitt, C., Kumar, P., Gurtov, A., Ylianttila, M.: Two-phase authentication protocol for wireless sensor networks in distributed IoT applications. In: IEEE Wireless Communications and Networking Conference (WCNC), pp. 2728\u20132733. IEEE (2014)","DOI":"10.1109\/WCNC.2014.6952860"},{"key":"3_CR9","doi-asserted-by":"crossref","unstructured":"Shivraj, V.L., Rajan, M.A., Singh, M., Balamuralidhar, P.: One time password authentication scheme based on elliptic curves for Internet of Things (IoT). In: 5th National Symposium on Information Technology: Towards New Smart World (NSITNSW), pp. 1\u20136. IEEE (2015)","DOI":"10.1109\/NSITNSW.2015.7176384"},{"key":"3_CR10","doi-asserted-by":"crossref","unstructured":"Edward Suh, G., Devadas, S.: Physical unclonable functions for device authentication and secret key generation. In: 44th ACM\/IEEE Design Automation Conference, pp. 9\u201314. IEEE (2007)","DOI":"10.1109\/DAC.2007.375043"},{"issue":"8","key":"3_CR11","doi-asserted-by":"publisher","first-page":"352","DOI":"10.3390\/sym10080352","volume":"10","author":"A Braeken","year":"2018","unstructured":"Braeken, A.: PUF based authentication protocol for IoT. Symmetry 10(8), 352 (2018)","journal-title":"Symmetry"},{"key":"3_CR12","doi-asserted-by":"crossref","unstructured":"Cremers, C.J.F.: Unbounded verification, falsification, and characterization of security protocols by pattern refinement. In: Proceedings of the 15th ACM Conference on Computer and Communications Security, pp. 119\u2013128. ACM (2008)","DOI":"10.1145\/1455770.1455787"}],"container-title":["Lecture Notes in Computer Science","Security, Privacy, and Anonymity in Computation, Communication, and Storage"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-24907-6_3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,7,11]],"date-time":"2019-07-11T09:14:59Z","timestamp":1562836499000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-24907-6_3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9783030249069","9783030249076"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-24907-6_3","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"11 July 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"SpaCCS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Security, Privacy and Anonymity in Computation, Communication and Storage","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Atlanta, GA","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"USA","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"14 July 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17 July 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"12","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"spaccs2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/cse.stfx.ca\/~cybermatics\/2019\/spaccs\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}