{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,11]],"date-time":"2025-04-11T20:07:06Z","timestamp":1744402026840,"version":"3.40.3"},"publisher-location":"Cham","reference-count":12,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030996185"},{"type":"electronic","value":"9783030996192"}],"license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"DOI":"10.1007\/978-3-030-99619-2_46","type":"book-chapter","created":{"date-parts":[[2022,3,30]],"date-time":"2022-03-30T05:19:48Z","timestamp":1648617588000},"page":"482-491","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["Ensuring Data Integrity Using Digital Signature in\u00a0an\u00a0IoT Environment"],"prefix":"10.1007","author":[{"given":"Nadia","family":"Kammoun","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Aida","family":"ben Chehida Douss","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Ryma","family":"Abassi","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Sihem","family":"Guemara el Fatmi","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2022,3,31]]},"reference":[{"issue":"5","key":"46_CR1","doi-asserted-by":"publisher","first-page":"1141","DOI":"10.3390\/s19051141","volume":"19","author":"M El-hajj","year":"2019","unstructured":"El-hajj, M., Fadlallah, A., Chamoun, M., Serhrouchni, A.: A survey of Internet of Things (IoT) authentication schemes. Sensors 19(5), 1141 (2019)","journal-title":"Sensors"},{"issue":"2","key":"46_CR2","first-page":"2103","volume":"6","author":"Y Lu","year":"2019","unstructured":"Lu, Y., Xu, L.D.: Internet of Things (IoT) cybersecurity research: a review of current research topics. IEEE IoT J. 6(2), 2103\u20132115 (2019)","journal-title":"IEEE IoT J."},{"issue":"4","key":"46_CR3","first-page":"3102","volume":"5","author":"MN Aman","year":"2018","unstructured":"Aman, M.N., Sikdar, B., Chua, K.C., Ali, A.: Low power data integrity in IoT systems. IEEE IoT J. 5(4), 3102\u20133113 (2018)","journal-title":"IEEE IoT J."},{"key":"46_CR4","doi-asserted-by":"crossref","unstructured":"Liu, B., Yu, X.L., Chen, S., et al.: Blockchain based data integrity service framework for IoT data. In: 2017 IEEE International Conference on Web Services (ICWS), pp. 468\u2013475. IEEE (2017)","DOI":"10.1109\/ICWS.2017.54"},{"key":"46_CR5","doi-asserted-by":"crossref","unstructured":"Dua, A., Chaudhary, R., Aujla, G.S.: LEASE: lattice and ECC-based authentication and integrity verification scheme in E-healthcare. In: IEEE Global Communications Conference (GLOBECOM), vol. 2018, pp. 1\u20136. IEEE (2018)","DOI":"10.1109\/GLOCOM.2018.8648089"},{"issue":"24","key":"46_CR6","first-page":"11","volume":"69","author":"M Dubal","year":"2013","unstructured":"Dubal, M., Deshmukh, A.: Achieving authentication and integrity using elliptic curve cryptography architecture. Int. J. Comput. Appl. 69(24), 11\u201315 (2013)","journal-title":"Int. J. Comput. Appl."},{"key":"46_CR7","doi-asserted-by":"crossref","unstructured":"Kammoun, N., Abassi, R., Guemara, S.: Towards a new clustering algorithm based on trust management and edge computing for IoT. In: 15th International Wireless Communications & Mobile Computing Conference (IWCMC), vol. 2019, pp. 1570\u20131575. IEEE (2019)","DOI":"10.1109\/IWCMC.2019.8766492"},{"key":"46_CR8","doi-asserted-by":"publisher","first-page":"336","DOI":"10.1007\/978-3-030-75078-7_34","volume-title":"Advanced Information Networking and Applications: Proceedings of the 35th International Conference on Advanced Information Networking and Applications, Volume 3","author":"N Kammoun","year":"2021","unstructured":"Kammoun, N., Abassi, R., Guemara El Fatmi, S., Mosbah, M.: A lightweight authentication scheme for SDN-based architecture in IoT. In: Barolli, L., Woungang, I., Enokido, T. (eds.) AINA-2021, pp. 336\u2013345. Springer, Cham (2021). https:\/\/doi.org\/10.1007\/978-3-030-75078-7_34"},{"key":"46_CR9","doi-asserted-by":"crossref","unstructured":"Toradmalle, D., Singh, R., Shastri, H., et al.: Prominence of ECDSA over RSA digital signature algorithm. In: 2018 2nd International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud), pp. 253\u2013257. IEEE (2018)","DOI":"10.1109\/I-SMAC.2018.8653689"},{"key":"46_CR10","doi-asserted-by":"publisher","unstructured":"Gupta, P., Sinha, A., Srivastava, P.K., Perti, A., Singh, A.K.: Security implementations in IoT using digital signature. In: Favorskaya, M.N., Mekhilef, S., Pandey, R.K., Singh, N. (eds.) Innovations in Electrical and Electronic Engineering: Proceedings of ICEEE 2020, pp. 523\u2013535. Springer, Singapore (2021). https:\/\/doi.org\/10.1007\/978-981-15-4692-1_40","DOI":"10.1007\/978-981-15-4692-1_40"},{"key":"46_CR11","doi-asserted-by":"crossref","unstructured":"Su\u00e1rez-albela, M., Fern\u00e1ndez-caram\u00e9s, T.M., Fraga-Lamas, P.: A practical performance comparison of ECC and RSA for resource-constrained IoT devices. In: Global Internet of Things Summit (GIoTS), vol. 2018, pp. 1\u20136. IEEE (2018)","DOI":"10.1109\/GIOTS.2018.8534575"},{"key":"46_CR12","doi-asserted-by":"crossref","unstructured":"Chattaraj, D., Saha, S., Bera, B., et al.: On the design of blockchain-based access control scheme for software defined networks. In: IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS), IEEE INFOCOM 2020, pp. 237\u2013242. IEEE (2020)","DOI":"10.1109\/INFOCOMWKSHPS50562.2020.9162669"}],"container-title":["Lecture Notes in Networks and Systems","Advanced Information Networking and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-99619-2_46","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,3,30]],"date-time":"2022-03-30T06:15:24Z","timestamp":1648620924000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-99619-2_46"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"ISBN":["9783030996185","9783030996192"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-99619-2_46","relation":{},"ISSN":["2367-3370","2367-3389"],"issn-type":[{"type":"print","value":"2367-3370"},{"type":"electronic","value":"2367-3389"}],"subject":[],"published":{"date-parts":[[2022]]},"assertion":[{"value":"31 March 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"AINA","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Advanced Information Networking and Applications","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Sydney, NSW","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Australia","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2022","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"13 April 2022","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"15 April 2022","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"aina2022","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/voyager.ce.fit.ac.jp\/conf\/aina\/2022\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}