{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,2]],"date-time":"2025-10-02T06:12:45Z","timestamp":1759385565156,"version":"3.40.3"},"publisher-location":"Cham","reference-count":11,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030750770"},{"type":"electronic","value":"9783030750787"}],"license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-3-030-75078-7_34","type":"book-chapter","created":{"date-parts":[[2021,4,30]],"date-time":"2021-04-30T09:06:00Z","timestamp":1619773560000},"page":"336-345","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["A Lightweight Authentication Scheme for SDN-Based Architecture in IoT"],"prefix":"10.1007","author":[{"given":"Nadia","family":"Kammoun","sequence":"first","affiliation":[]},{"given":"Ryma","family":"Abassi","sequence":"additional","affiliation":[]},{"given":"Sihem","family":"Guemara El Fatmi","sequence":"additional","affiliation":[]},{"given":"Mohamed","family":"Mosbah","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,5,1]]},"reference":[{"key":"34_CR1","doi-asserted-by":"crossref","unstructured":"Salman, O., Abdallah, Sarah, Elhajj, I.H.: Identity-based authentication scheme for the internet of things. In: IEEE Symposium on Computers and Communication (ISCC), pp. 1109\u20131111. IEEE (2016)","DOI":"10.1109\/ISCC.2016.7543884"},{"key":"34_CR2","doi-asserted-by":"crossref","unstructured":"Adeel, A., Ali, M., Khan, A.N., et al.: A multiattack resilient lightweight IoT authentication scheme. Trans. Emerg. Telecommun. Technol.e3676 (2019)","DOI":"10.1002\/ett.3676"},{"key":"34_CR3","unstructured":"Mohana, S., Priya, T.K.S.L.: Identity-based Encryption for device-to-device Security in IOT Environments. World Sci. News 41, 120 (2016)"},{"issue":"9","key":"34_CR4","doi-asserted-by":"publisher","first-page":"186","DOI":"10.1109\/MCOM.2017.1700714","volume":"56","author":"K Kalkan","year":"2017","unstructured":"Kalkan, K., Zeadally, S.: Securing internet of things with software defined networking. IEEE Commun. Mag. 56(9), 186\u2013192 (2017)","journal-title":"IEEE Commun. Mag."},{"key":"34_CR5","doi-asserted-by":"crossref","unstructured":"Abbou, A.N., Baddi, Y., Hasbi, A.: Software defined networks in internet of things integration security: challenges and solutions. In: 2018 6th International Conference on Wireless Networks and Mobile Communications (WINCOM), pp. 1\u20136. IEEE (2018)","DOI":"10.1109\/WINCOM.2018.8629722"},{"key":"34_CR6","doi-asserted-by":"crossref","unstructured":"Lee, J.-Y., Lin, W.-C., Huang, Y.-H.: A lightweight authentication protocol for internet of things. In: 2014 International Symposium on Next-Generation Electronics (ISNE), pp. 1\u20132. IEEE (2014)","DOI":"10.1109\/ISNE.2014.6839375"},{"key":"34_CR7","doi-asserted-by":"crossref","unstructured":"Abdullaziz, O.I., Chen, Y.-J., Wang, L.-C.: Lightweight authentication mechanism for software defined network using information hiding. In: 2016 IEEE Global Communications Conference (GLOBECOM), pp. 1\u20136. IEEE (2016)","DOI":"10.1109\/GLOCOM.2016.7841954"},{"issue":"2","key":"34_CR8","doi-asserted-by":"publisher","first-page":"501","DOI":"10.3390\/s20020501","volume":"20","author":"E Lara","year":"2020","unstructured":"Lara, E., Aguilar, L., Sanchez, M.A., et al.: Lightweight authentication protocol for M2M communications of resource-constrained devices in industrial internet of things. Sensors 20(2), 501 (2020)","journal-title":"Sensors"},{"key":"34_CR9","doi-asserted-by":"crossref","unstructured":"Kammoun, N., Abassi, R., Guemara, S.: Towards a new clustering algorithm based on trust management and edge computing for IoT. In: 15th International Wireless Communications & Mobile Computing Conference (IWCMC). IEEE 2019, pp. 1570\u20131575 (2019)","DOI":"10.1109\/IWCMC.2019.8766492"},{"key":"34_CR10","doi-asserted-by":"crossref","unstructured":"Ye, N., Zhu, Y., Wang, R. C., Malekian, R., Lin, Q.M.: An efficient authentication and access control scheme for perception layer of internet of things (2014)","DOI":"10.12785\/amis\/080416"},{"key":"34_CR11","doi-asserted-by":"crossref","unstructured":"Ouaddah, A., Mousannif, H., Abou Elkalam, A., et al.: Access control in the internet of things: big challenges and new opportunities. Comput. Netw. 112, 237\u2013262 (2017)","DOI":"10.1016\/j.comnet.2016.11.007"}],"container-title":["Lecture Notes in Networks and Systems","Advanced Information Networking and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-75078-7_34","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,6,10]],"date-time":"2021-06-10T11:23:05Z","timestamp":1623324185000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-75078-7_34"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"ISBN":["9783030750770","9783030750787"],"references-count":11,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-75078-7_34","relation":{},"ISSN":["2367-3370","2367-3389"],"issn-type":[{"type":"print","value":"2367-3370"},{"type":"electronic","value":"2367-3389"}],"subject":[],"published":{"date-parts":[[2021]]},"assertion":[{"value":"1 May 2021","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"AINA","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Advanced Information Networking and Applications","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Toronto, ON","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Canada","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2021","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"12 May 2021","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"14 May 2021","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"35","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"aina2021","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/voyager.ce.fit.ac.jp\/conf\/aina\/2021\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}