{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,30]],"date-time":"2026-01-30T12:59:25Z","timestamp":1769777965407,"version":"3.49.0"},"publisher-location":"Singapore","reference-count":23,"publisher":"Springer Nature Singapore","isbn-type":[{"value":"9789819557189","type":"print"},{"value":"9789819557196","type":"electronic"}],"license":[{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2026]]},"DOI":"10.1007\/978-981-95-5719-6_40","type":"book-chapter","created":{"date-parts":[[2026,1,29]],"date-time":"2026-01-29T20:34:38Z","timestamp":1769718878000},"page":"633-648","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["FLAR: Fibonacci-Assisted Lightweight Anonymous Revocable Authentication Scheme in\u00a0Industrial Internet of\u00a0Things"],"prefix":"10.1007","author":[{"given":"Junfeng","family":"Tian","sequence":"first","affiliation":[]},{"given":"Jian","family":"Geng","sequence":"additional","affiliation":[]},{"given":"Siyi","family":"Zhang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2026,1,30]]},"reference":[{"key":"40_CR1","unstructured":"Piccialli, F., Bessis, N., Jung, J.J.: Data science challenges in industry 4.0. IEEE Trans. Ind. Inform. (2020)"},{"issue":"18","key":"40_CR2","doi-asserted-by":"publisher","first-page":"16780","DOI":"10.1109\/JIOT.2022.3160737","volume":"9","author":"Y Liu","year":"2022","unstructured":"Liu, Y., Chi, C., Zhang, Y., Tang, T.: Identification and resolution for industrial internet: architecture and key technology. IEEE Internet Things J. 9(18), 16780\u201316794 (2022)","journal-title":"IEEE Internet Things J."},{"issue":"11","key":"40_CR3","doi-asserted-by":"publisher","first-page":"1466","DOI":"10.1631\/FITEE.2400497","volume":"25","author":"W Shang","year":"2024","unstructured":"Shang, W., Wen, X., Chen, Z., Xiong, W., Chang, Z., Cao, Z.: Lightweight authentication scheme for edge control systems in Industrial Internet of Things. Front. Inf. Technol. Electron. Eng. 25(11), 1466\u20131478 (2024)","journal-title":"Front. Inf. Technol. Electron. Eng."},{"key":"40_CR4","doi-asserted-by":"crossref","unstructured":"Huang, Y., Xu, G., Song, X., Xu, Y.: An efficient RLWE-based privacy-preserving authentication scheme based on edge computing in Industrial Internet of Things. IEEE Trans. Serv. Comput. (2024)","DOI":"10.1109\/TSC.2024.3433534"},{"issue":"6","key":"40_CR5","doi-asserted-by":"publisher","first-page":"474","DOI":"10.1007\/s10489-025-06400-w","volume":"55","author":"H Niu","year":"2025","unstructured":"Niu, H., Zhang, X., Chu, Z., Shi, W.: DSFL: a blockchain-based data sharing and federated learning framework. Appl. Intell. 55(6), 474 (2025)","journal-title":"Appl. Intell."},{"key":"40_CR6","doi-asserted-by":"crossref","unstructured":"Lingga, P., Jeong, J., Yang, J., Kim, J.: SPT: Security policy translator for network security functions in cloud-based security services. IEEE Trans. Dependable Secure Comput. (2024)","DOI":"10.1109\/TDSC.2024.3371788"},{"key":"40_CR7","doi-asserted-by":"crossref","unstructured":"Brown, L., et al.: An architecture for edge networking services. In: Proc. ACM SIGCOMM 2024 Conf., pp. 645\u2013660 (2024)","DOI":"10.1145\/3651890.3672261"},{"key":"40_CR8","doi-asserted-by":"crossref","unstructured":"Liu, Y., He, D., Luo, M., Wang, H., Liu, Q.: ATRC: an anonymous traceable and revocable credential system using blockchain for VANETs. IEEE Trans. Veh. Technol. 73(2) (2024)","DOI":"10.1109\/TVT.2023.3312547"},{"issue":"1","key":"40_CR9","doi-asserted-by":"publisher","first-page":"734","DOI":"10.1109\/JIOT.2022.3203991","volume":"10","author":"D Xie","year":"2023","unstructured":"Xie, D., Yang, J., Bian, W., Chen, F., Wang, T.: An improved identity-based anonymous authentication scheme resistant to semi-trusted server attacks. IEEE Internet Things J. 10(1), 734\u2013746 (2023). https:\/\/doi.org\/10.1109\/JIOT.2022.3203991","journal-title":"IEEE Internet Things J."},{"issue":"8","key":"40_CR10","doi-asserted-by":"publisher","first-page":"10885","DOI":"10.1109\/JIOT.2024.3514821","volume":"12","author":"Y Hu","year":"2025","unstructured":"Hu, Y., Bian, W., Xie, D., Xu, Z., He, P.: Secure user authentication scheme using revocable biometrics based on secret sharing for smart home. IEEE Internet Things J. 12(8), 10885\u201310898 (2025). https:\/\/doi.org\/10.1109\/JIOT.2024.3514821","journal-title":"IEEE Internet Things J."},{"issue":"1","key":"40_CR11","doi-asserted-by":"publisher","first-page":"867","DOI":"10.1109\/JIOT.2022.3204410","volume":"10","author":"D He","year":"2023","unstructured":"He, D., Zhao, Z., Chan, S., Guizani, M.: A novel authentication protocol for IoT-enabled devices. IEEE Internet Things J. 10(1), 867\u2013876 (2023). https:\/\/doi.org\/10.1109\/JIOT.2022.3204410","journal-title":"IEEE Internet Things J."},{"issue":"4","key":"40_CR12","doi-asserted-by":"publisher","first-page":"3535","DOI":"10.1109\/TDSC.2022.3203874","volume":"20","author":"L Bai","year":"2023","unstructured":"Bai, L., Hsu, C., Harn, L., Cui, J., Zhao, Z.: A practical lightweight anonymous authentication and key establishment scheme for resource-asymmetric smart environments. IEEE Trans. Dependable Secure Comput. 20(4), 3535\u20133545 (2023)","journal-title":"IEEE Trans. Dependable Secure Comput."},{"issue":"1","key":"40_CR13","doi-asserted-by":"publisher","first-page":"935","DOI":"10.1109\/JSYST.2020.2979006","volume":"15","author":"Y Li","year":"2021","unstructured":"Li, Y., Cheng, Q., Liu, X., Li, X.: A secure anonymous identity-based scheme in new authentication architecture for mobile edge computing. IEEE Syst. J. 15(1), 935\u2013946 (2021)","journal-title":"IEEE Syst. J."},{"issue":"7","key":"40_CR14","doi-asserted-by":"publisher","first-page":"12266","DOI":"10.1109\/JIOT.2023.3332943","volume":"11","author":"S Ren","year":"2024","unstructured":"Ren, S., Liu, Y., Yu, B., Liu, J., Li, D.: Provable secure anonymous device authentication protocol in IoT environment. IEEE Internet Things J. 11(7), 12266\u201312277 (2024). https:\/\/doi.org\/10.1109\/JIOT.2023.3332943","journal-title":"IEEE Internet Things J."},{"issue":"12","key":"40_CR15","doi-asserted-by":"publisher","first-page":"10357","DOI":"10.1109\/JIOT.2023.3237609","volume":"10","author":"Z Cao","year":"2023","unstructured":"Cao, Z., Chen, Z., Shang, W., Zhu, Y.: Efficient revocable anonymous authentication mechanism for edge intelligent controllers. IEEE Internet Things J. 10(12), 10357\u201310367 (2023)","journal-title":"IEEE Internet Things J."},{"issue":"6","key":"40_CR16","doi-asserted-by":"publisher","first-page":"5280","DOI":"10.1109\/JIOT.2022.3221943","volume":"10","author":"X Li","year":"2023","unstructured":"Li, X., Jiang, C., Du, D., Fei, M., Wu, L.: A novel revocable lightweight authentication scheme for resource-constrained devices in cyber-physical power systems. IEEE Internet Things J. 10(6), 5280\u20135292 (2023). https:\/\/doi.org\/10.1109\/JIOT.2022.3221943","journal-title":"IEEE Internet Things J."},{"issue":"2","key":"40_CR17","doi-asserted-by":"publisher","first-page":"1343","DOI":"10.1109\/TII.2022.3194956","volume":"19","author":"AK Yadav","year":"2023","unstructured":"Yadav, A.K., Misra, M., Pandey, P.K., Liyanage, M.: An EAP-based mutual authentication protocol for WLAN-connected IoT devices. IEEE Trans. Ind. Inform. 19(2), 1343\u20131355 (2023). https:\/\/doi.org\/10.1109\/TII.2022.3194956","journal-title":"IEEE Trans. Ind. Inform."},{"issue":"3","key":"40_CR18","first-page":"1818","volume":"20","author":"C Lin","year":"2023","unstructured":"Lin, C., Huang, X., He, D.: EBCPA: efficient blockchain-based conditional privacy-preserving authentication for VANETs. IEEE Trans. Dependable Secure Comput. 20(3), 1818\u20131832 (2023)","journal-title":"IEEE Trans. Dependable Secure Comput."},{"issue":"1","key":"40_CR19","doi-asserted-by":"publisher","first-page":"518","DOI":"10.1109\/TNSE.2024.3503996","volume":"12","author":"F Wang","year":"2025","unstructured":"Wang, F., Cui, J., Zhang, Q., He, D., Zhong, H.: Blockchain-assisted flexible revocable anonymous authentication in Industrial Internet of Things. IEEE Trans. Netw. Sci. Eng. 12(1), 518\u2013532 (2025). https:\/\/doi.org\/10.1109\/TNSE.2024.3503996","journal-title":"IEEE Trans. Netw. Sci. Eng."},{"key":"40_CR20","doi-asserted-by":"crossref","unstructured":"Yang, H., Peng, C.: TSA-IPFE: a secure solution for authorization revocation and dynamic identity assignment in IoT. IEEE Internet Things J. (2025)","DOI":"10.1109\/JIOT.2025.3544641"},{"key":"40_CR21","doi-asserted-by":"crossref","unstructured":"Nazish, M., Banday, M.T.: A novel Fibonacci-sequence-based chaotification model for enhancing chaos in one-dimensional maps. IEEE Internet Things J. (2024)","DOI":"10.1109\/JIOT.2024.3450547"},{"key":"40_CR22","doi-asserted-by":"publisher","unstructured":"Ammann, M., Hirschi, L., Kremer, S.: DY fuzzing: formal Dolev-Yao models meet cryptographic protocol fuzz testing. In: 2024 IEEE Symposium on Security and Privacy (SP), pp. 1481\u20131499 (2024). https:\/\/doi.org\/10.1109\/SP54263.2024.00096","DOI":"10.1109\/SP54263.2024.00096"},{"key":"40_CR23","doi-asserted-by":"publisher","first-page":"251","DOI":"10.1109\/TIFS.2023.3321961","volume":"19","author":"N Yang","year":"2024","unstructured":"Yang, N., Tang, C., He, D.: A lightweight certificateless multi-user matchmaking encryption for mobile devices: enhancing security and performance. IEEE Trans. Inf. Forensics Secur. 19, 251\u2013264 (2024)","journal-title":"IEEE Trans. Inf. Forensics Secur."}],"container-title":["Lecture Notes in Computer Science","Web and Big Data"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-95-5719-6_40","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,1,29]],"date-time":"2026-01-29T20:34:42Z","timestamp":1769718882000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-95-5719-6_40"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026]]},"ISBN":["9789819557189","9789819557196"],"references-count":23,"URL":"https:\/\/doi.org\/10.1007\/978-981-95-5719-6_40","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026]]},"assertion":[{"value":"30 January 2026","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"APWeb-WAIM","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Asia-Pacific Web (APWeb) and Web-Age Information Management (WAIM) Joint International Conference on Web and Big Data","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Shenyang","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"28 August 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"30 August 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"9","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"apwebwaim2025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/apweb2025.sau.edu.cn\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}