{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,3]],"date-time":"2025-06-03T09:28:18Z","timestamp":1748942898777},"publisher-location":"Cham","reference-count":33,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030356521"},{"type":"electronic","value":"9783030356538"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-3-030-35653-8_30","type":"book-chapter","created":{"date-parts":[[2019,11,22]],"date-time":"2019-11-22T13:02:59Z","timestamp":1574427779000},"page":"446-466","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":8,"title":["Resource-Constrained IoT Authentication Protocol: An ECC-Based Hybrid Scheme for Device-to-Server and Device-to-Device Communications"],"prefix":"10.1007","author":[{"given":"Chau D. M.","family":"Pham","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Thao L. P.","family":"Nguyen","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Tran Khanh","family":"Dang","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2019,11,20]]},"reference":[{"issue":"5","key":"30_CR1","first-page":"97","volume":"2","author":"K Ashton","year":"2009","unstructured":"Ashton, K.: That \u201cInternet of Things\u201d thing. RFID J. 2(5), 97\u2013114 (2009)","journal-title":"RFID J."},{"key":"30_CR2","unstructured":"IHS. n.d. Number of Internet of Things (IoT) devices connected worldwide in 2017 and 2018, by selected type (in millions), Statista. \nhttps:\/\/www.statista.com\/statistics\/789615\/worldwide-connected-iot-devices-by-type\/\n\n. Accessed 22 Nov 2018"},{"key":"30_CR3","unstructured":"IHS. n.d. Internet of Things (IoT) Connected Devices Installed Base Worldwide from 2015 to 2025 (in billions), Statista. \nhttps:\/\/www.statista.com\/statistics\/471264\/iot-number-of-connected-devices-worldwide\/\n\n. Accessed 22 Nov 2018"},{"key":"30_CR4","unstructured":"LeHong, H., Velosa, A.: Hype cycle for the internet of things. Gartner Group, 21 (2014)"},{"key":"30_CR5","doi-asserted-by":"crossref","unstructured":"Zhou, Q, Zhang, J.: Research prospect of Internet of Things geography. In: 19th International Conference on Geoinformatics 2011, pp. 1\u20135. IEEE (2011)","DOI":"10.1109\/GeoInformatics.2011.5981045"},{"key":"30_CR6","unstructured":"Yu, Y., Wang, J., Zhou, G.: The exploration in the education of professionals in applied Internet of Things engineering. In: 4th International Conference on Distance Learning and Education, pp. 74\u201377. IEEE (2010)"},{"key":"30_CR7","doi-asserted-by":"crossref","unstructured":"Desai, P., Sheth, A., Anantharam, P.: Semantic gateway as a service architecture for IoT interoperability. In: International Conference on Mobile Services, pp. 313\u2013319. IEEE (2015)","DOI":"10.1109\/MobServ.2015.51"},{"key":"30_CR8","unstructured":"Oren, Y., Keromytis, A.D.: From the aether to the ethernet-attacking the internet using broadcast digital television. In: 23rd USENIX Security Symposium (USENIX Security 14), pp. 353\u2013368 (2014)"},{"key":"30_CR9","unstructured":"Cesare, S.: Breaking the security of physical devices. Talk at Blackhat, 14 (2014)"},{"key":"30_CR10","doi-asserted-by":"crossref","unstructured":"Liang, L., Zheng, K., Sheng, Q., Huang, X.: A denial of service attack method for an IoT system. In: 8th International Conference on Information Technology in Medicine and Education, pp. 360\u2013364. IEEE (2016)","DOI":"10.1109\/ITME.2016.0087"},{"key":"30_CR11","doi-asserted-by":"crossref","unstructured":"Vasilomanolakis, E., Daubert, J., Luthra, M., Gazis, V., Wiesmaier, A., Kikiras, P.: On the security and privacy of internet of things architectures and systems. In: 2015 International Workshop on Secure Internet of Things, pp. 49\u201357. IEEE (2015)","DOI":"10.1109\/SIOT.2015.9"},{"key":"30_CR12","doi-asserted-by":"crossref","unstructured":"Alkurd, R., Shubair, R.M., Abualhaol, I.: Survey on device-to-device communications: challenges and design issues. In: 12th International New Circuits and Systems Conference (NEWCAS), pp. 361\u2013364. IEEE (2014)","DOI":"10.1109\/NEWCAS.2014.6934057"},{"key":"30_CR13","doi-asserted-by":"publisher","first-page":"17","DOI":"10.1016\/j.adhoc.2015.01.006","volume":"32","author":"KT Nguyen","year":"2015","unstructured":"Nguyen, K.T., Laurent, M., Oualha, N.: Survey on secure communication protocols for the Internet of Things. Ad Hoc Netw. 32, 17\u201331 (2015)","journal-title":"Ad Hoc Netw."},{"issue":"3","key":"30_CR14","doi-asserted-by":"publisher","first-page":"257","DOI":"10.1007\/s10660-013-9120-5","volume":"13","author":"TAT Nguyen","year":"2013","unstructured":"Nguyen, T.A.T., Dang, T.K.: Enhanced security in internet voting protocol using blind signature and dynamic ballots. Electron. Commer. Res. 13(3), 257\u2013272 (2013)","journal-title":"Electron. Commer. Res."},{"key":"30_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"83","DOI":"10.1007\/978-3-030-03192-3_8","volume-title":"Future Data and Security Engineering","author":"KK Tran","year":"2018","unstructured":"Tran, K.K., Pham, M.K., Dang, T.K.: A light-weight tightening authentication scheme for the objects\u2019 encounters in the meetings. In: Dang, T.K., K\u00fcng, J., Wagner, R., Thoai, N., Takizawa, M. (eds.) FDSE 2018. LNCS, vol. 11251, pp. 83\u2013102. Springer, Cham (2018). \nhttps:\/\/doi.org\/10.1007\/978-3-030-03192-3_8"},{"key":"30_CR16","doi-asserted-by":"crossref","unstructured":"Nechvatal, J.: Public key cryptography. In: Simmons, G. (ed.) Contemporary Cryptology: The Science of Information Integrity. IEEE (1992)","DOI":"10.6028\/NIST.SP.800-2"},{"key":"30_CR17","doi-asserted-by":"crossref","unstructured":"Dierks, T., Allen, C.: The TLS protocol version 1.0 (1999)","DOI":"10.17487\/rfc2246"},{"key":"30_CR18","doi-asserted-by":"crossref","unstructured":"Rescorla, E., Modadugu, N.: Datagram transport layer security (2006)","DOI":"10.17487\/rfc4347"},{"key":"30_CR19","doi-asserted-by":"crossref","unstructured":"Kothmayr, T., Schmitt, C., Hu, W., Br\u00fcnig, M., Carle, G.: A DTLS based end-to-end security architecture for the Internet of Things with two-way authentication. In: 37th Annual IEEE Conference on Local Computer Networks-Workshops, pp. 956\u2013963. IEEE (2012)","DOI":"10.1109\/LCNW.2012.6424088"},{"key":"30_CR20","unstructured":"Rabin, M.O.: Digitalized signatures and public-key functions as intractable as factorization (No. MIT\/LCS\/TR-212), Massachusetts Institiute of Technology Cambridge Laboratory for Computer Science (1979)"},{"issue":"1","key":"30_CR21","first-page":"72","volume":"2","author":"D He","year":"2014","unstructured":"He, D., Zeadally, S.: An analysis of RFID authentication schemes for Internet of Things in healthcare environment using elliptic curve cryptography. IEEE IoT J. 2(1), 72\u201383 (2014)","journal-title":"IEEE IoT J."},{"issue":"1","key":"30_CR22","doi-asserted-by":"publisher","first-page":"113","DOI":"10.1007\/s10660-015-9192-5","volume":"16","author":"SA Chaudhry","year":"2016","unstructured":"Chaudhry, S.A., Farash, M.S., Naqvi, H., Sher, M.: A secure and efficient authenticated encryption for electronic payment systems using elliptic curve cryptography. Electron. Commer. Res. 16(1), 113\u2013139 (2016)","journal-title":"Electron. Commer. Res."},{"key":"30_CR23","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"119","DOI":"10.1007\/978-3-540-28632-5_9","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2004","author":"N Gura","year":"2004","unstructured":"Gura, N., Patel, A., Wander, A., Eberle, H., Shantz, S.C.: Comparing elliptic curve cryptography and RSA on 8-bit CPUs. In: Joye, M., Quisquater, J.-J. (eds.) CHES 2004. LNCS, vol. 3156, pp. 119\u2013132. Springer, Heidelberg (2004). \nhttps:\/\/doi.org\/10.1007\/978-3-540-28632-5_9"},{"key":"30_CR24","doi-asserted-by":"crossref","unstructured":"Chang, S.M., Shieh, S., Lin, W.W., Hsieh, C.M.: An efficient broadcast authentication scheme in wireless sensor networks. In: Proceedings of the ACM Symposium on Information, Computer and Communications Security, pp. 311\u2013320. ACM (2006)","DOI":"10.1145\/1128817.1128864"},{"key":"30_CR25","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"49","DOI":"10.1007\/978-3-319-67807-8_4","volume-title":"Mobile, Secure, and Programmable Networking","author":"H Khemissa","year":"2017","unstructured":"Khemissa, H., Tandjaoui, D., Bouzefrane, S.: An ultra-lightweight authentication scheme for heterogeneous wireless sensor networks in the context of Internet of Things. In: Bouzefrane, S., Banerjee, S., Sailhan, F., Boumerdassi, S., Renault, E. (eds.) MSPN 2017. LNCS, vol. 10566, pp. 49\u201362. Springer, Cham (2017). \nhttps:\/\/doi.org\/10.1007\/978-3-319-67807-8_4"},{"key":"30_CR26","doi-asserted-by":"publisher","first-page":"15","DOI":"10.1016\/j.pmcj.2017.09.004","volume":"42","author":"KH Wang","year":"2017","unstructured":"Wang, K.H., Chen, C.M., Fang, W., Wu, T.Y.: A secure authentication scheme for Internet of Things. Pervasive Mobile Comput. 42, 15\u201326 (2017)","journal-title":"Pervasive Mobile Comput."},{"key":"30_CR27","doi-asserted-by":"publisher","first-page":"210","DOI":"10.1016\/j.pmcj.2015.08.001","volume":"24","author":"S Kalra","year":"2015","unstructured":"Kalra, S., Sood, S.K.: Secure authentication scheme for IoT and cloud servers. Pervasive Mobile Comput. 24, 210\u2013223 (2015)","journal-title":"Pervasive Mobile Comput."},{"key":"30_CR28","doi-asserted-by":"publisher","first-page":"275","DOI":"10.1016\/j.pmcj.2015.12.003","volume":"38","author":"CC Chang","year":"2017","unstructured":"Chang, C.C., Wu, H.L., Sun, C.Y.: Notes on \u201cSecure authentication scheme for IoT and cloud servers\u201d. Pervasive Mobile Comput. 38, 275\u2013278 (2017)","journal-title":"Pervasive Mobile Comput."},{"key":"30_CR29","doi-asserted-by":"crossref","unstructured":"De Meulenaer, G., Gosset, F., Standaert, F.X., Pereira, O.: On the energy cost of communication and cryptography in wireless sensor networks. In: IEEE International Conference on Wireless and Mobile Computing, Networking and Communications, pp. 580\u2013585. IEEE (2008)","DOI":"10.1109\/WiMob.2008.16"},{"key":"30_CR30","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"737","DOI":"10.1007\/978-3-540-77024-4_67","volume-title":"Mobile Ad-Hoc and Sensor Networks","author":"F Kausar","year":"2007","unstructured":"Kausar, F., Hussain, S., Park, J.H., Masood, A.: Secure group communication with self-healing and rekeying in wireless sensor networks. In: Zhang, H., Olariu, S., Cao, J., Johnson, D.B. (eds.) MSN 2007. LNCS, vol. 4864, pp. 737\u2013748. Springer, Heidelberg (2007). \nhttps:\/\/doi.org\/10.1007\/978-3-540-77024-4_67"},{"key":"30_CR31","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"305","DOI":"10.1007\/978-3-319-48057-2_21","volume-title":"Future Data and Security Engineering","author":"QNT Thi","year":"2016","unstructured":"Thi, Q.N.T., Si, T.T., Dang, T.K.: Fine grained attribute based access control model for privacy protection. In: Dang, T.K., Wagner, R., K\u00fcng, J., Thoai, N., Takizawa, M., Neuhold, E. (eds.) FDSE 2016. LNCS, vol. 10018, pp. 305\u2013316. Springer, Cham (2016). \nhttps:\/\/doi.org\/10.1007\/978-3-319-48057-2_21"},{"issue":"1","key":"30_CR32","doi-asserted-by":"publisher","first-page":"79","DOI":"10.1049\/iet-bmt.2018.5101","volume":"8","author":"TAT Nguyen","year":"2018","unstructured":"Nguyen, T.A.T., Dang, T.K.: Privacy preserving biometric-based remote authentication with secure processing unit on untrusted server. IET Biometrics 8(1), 79\u201391 (2018)","journal-title":"IET Biometrics"},{"key":"30_CR33","doi-asserted-by":"publisher","first-page":"18","DOI":"10.1155\/2019\/8123259","volume":"2019","author":"TK Dang","year":"2019","unstructured":"Dang, T.K., Tran, K.T.: The meeting of acquaintances: a cost-efficient authentication scheme for light-weight objects with transient trust level and plurality approach. Secur. Commun. Netw. 2019, 18 (2019)","journal-title":"Secur. Commun. Netw."}],"container-title":["Lecture Notes in Computer Science","Future Data and Security Engineering"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-35653-8_30","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,11,22]],"date-time":"2019-11-22T13:10:57Z","timestamp":1574428257000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-35653-8_30"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9783030356521","9783030356538"],"references-count":33,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-35653-8_30","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"20 November 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"FDSE","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Future Data and Security Engineering","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Nha Trang City","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Vietnam","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"27 November 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"29 November 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"6","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"fdse2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/fdse.hcmut.edu.vn\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}