{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,3]],"date-time":"2026-02-03T21:29:25Z","timestamp":1770154165267,"version":"3.49.0"},"publisher-location":"Singapore","reference-count":28,"publisher":"Springer Nature Singapore","isbn-type":[{"value":"9789819564187","type":"print"},{"value":"9789819564194","type":"electronic"}],"license":[{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2026]]},"DOI":"10.1007\/978-981-95-6419-4_10","type":"book-chapter","created":{"date-parts":[[2026,2,3]],"date-time":"2026-02-03T08:57:59Z","timestamp":1770109079000},"page":"161-175","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["An Improved PUF-Based Three-Factor Authentication Scheme for Industrial IoT"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0009-0003-4067-2952","authenticated-orcid":false,"given":"Qingyun","family":"Liu","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0099-1436","authenticated-orcid":false,"given":"Fengtong","family":"Wen","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2026,2,4]]},"reference":[{"issue":"1","key":"10_CR1","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/s40537-019-0268-2","volume":"6","author":"S Kumar","year":"2019","unstructured":"Kumar, S., Tiwari, P., Zymbler, M.: Internet of Things is a revolutionary approach for future technology enhancement: a review. J. Big Data 6(1), 1\u201321 (2019). https:\/\/doi.org\/10.1186\/s40537-019-0268-2","journal-title":"J. Big Data"},{"key":"10_CR2","doi-asserted-by":"crossref","unstructured":"Lampropoulos, G., Siakas, K., Anastasiadis, T.: Internet of things in the context of industry 4.0: an overview.\u00a0Int. J. Entrep. Knowl.\u00a07(1) (2019)","DOI":"10.37335\/ijek.v7i1.84"},{"key":"10_CR3","doi-asserted-by":"publisher","unstructured":"Thapa, C., Camtepe, S.: Precision health data: requirements, challenges and existing techniques for data security and privacy.\u00a0Comput. Biol. Med. 129 (2021). https:\/\/doi.org\/10.1016\/j.compbiomed.2020.104130","DOI":"10.1016\/j.compbiomed.2020.104130"},{"issue":"4","key":"10_CR4","doi-asserted-by":"publisher","first-page":"879","DOI":"10.1080\/09720529.2019.1627072","volume":"23","author":"D Kumar","year":"2020","unstructured":"Kumar, D., Singh, H.K., Ahlawat, C.: A secure three-factor authentication scheme for wireless sensor networks using ECC. J. Discrete Math. Sci. Cryptogr. 23(4), 879\u2013900 (2020). https:\/\/doi.org\/10.1080\/09720529.2019.1627072","journal-title":"J. Discrete Math. Sci. Cryptogr."},{"issue":"1","key":"10_CR5","doi-asserted-by":"publisher","first-page":"87","DOI":"10.1007\/s41870-024-02268-0","volume":"17","author":"S Sharma","year":"2025","unstructured":"Sharma, S., Kumar, B.: ECC based secure privacy-preserving authentication scheme for wireless sensor networks in IoT environment. Int. J. Inf. Technol. 17(1), 87\u201396 (2025). https:\/\/doi.org\/10.1007\/s41870-024-02268-0","journal-title":"Int. J. Inf. Technol."},{"key":"10_CR6","doi-asserted-by":"publisher","unstructured":"Wang, F., Xu, G., Xu, G.: A provably secure anonymous biometrics-based authentication scheme for wireless sensor networks using chaotic map.\u00a0IEEE Access 7 (2019). https:\/\/doi.org\/10.1109\/ACCESS.2019.2930542","DOI":"10.1109\/ACCESS.2019.2930542"},{"issue":"6","key":"10_CR7","doi-asserted-by":"publisher","first-page":"1133","DOI":"10.1109\/TDSC.2018.2857811","volume":"17","author":"J Srinivas","year":"2018","unstructured":"Srinivas, J., Das, A.K., Wazid, M., Kumar, N.: Anonymous lightweight chaotic map-based authenticated key agreement protocol for industrial Internet of Things. IEEE Trans. Dependable Secure Comput. 17(6), 1133\u20131146 (2018). https:\/\/doi.org\/10.1109\/TDSC.2018.2857811","journal-title":"IEEE Trans. Dependable Secure Comput."},{"key":"10_CR8","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2025.104200","author":"B Zahednejad","year":"2025","unstructured":"Zahednejad, B., Gao, C.Z.: Addressing security requirements in industrial IoT: a robust three-factor authentication scheme with enhanced features. J. Netw. Comput. Appl. (2025). https:\/\/doi.org\/10.1016\/j.jnca.2025.104200","journal-title":"J. Netw. Comput. Appl."},{"issue":"5","key":"10_CR9","doi-asserted-by":"publisher","first-page":"8739","DOI":"10.1109\/JIOT.2019.2923373","volume":"6","author":"S Banerjee","year":"2019","unstructured":"Banerjee, S., et al.: A provably secure and lightweight anonymous user authenticated session key exchange scheme for Internet of Things deployment. IEEE Internet Things J. 6(5), 8739\u20138752 (2019). https:\/\/doi.org\/10.1109\/JIOT.2019.2923373","journal-title":"IEEE Internet Things J."},{"key":"10_CR10","doi-asserted-by":"publisher","unstructured":"Alzahrani, B.A., Chaudhry, S.A., Barnawi, A., Xiao, W., Chen, M., Al-Barakati, A.: ILAS-IoT: an improved and lightweight authentication scheme for IoT deployment.\u00a0J. Amb. Intell. Hum. Comput., 1\u201313 (2022). https:\/\/doi.org\/10.1007\/s12652-020-02349-5","DOI":"10.1007\/s12652-020-02349-5"},{"issue":"6","key":"10_CR11","doi-asserted-by":"publisher","first-page":"4900","DOI":"10.1109\/JIOT.2018.2877690","volume":"5","author":"AK Das","year":"2018","unstructured":"Das, A.K., Wazid, M., Kumar, N., Vasilakos, A.V., Rodrigues, J.J.: Biometrics-based privacy-preserving user authentication scheme for cloud-based industrial Internet of Things deployment. IEEE Internet Things J. 5(6), 4900\u20134913 (2018). https:\/\/doi.org\/10.1109\/JIOT.2018.2877690","journal-title":"IEEE Internet Things J."},{"issue":"6","key":"10_CR12","doi-asserted-by":"publisher","first-page":"10936","DOI":"10.1109\/JIOT.2018.2877690","volume":"6","author":"S Hussain","year":"2019","unstructured":"Hussain, S., Chaudhry, S.A.: Comments on \u201cbiometrics-based privacy-preserving user authentication scheme for cloud-based industrial internet of things deployment.\u201d IEEE Internet Things J. 6(6), 10936\u201310940 (2019). https:\/\/doi.org\/10.1109\/JIOT.2018.2877690","journal-title":"IEEE Internet Things J."},{"key":"10_CR13","doi-asserted-by":"publisher","first-page":"882","DOI":"10.1016\/j.future.2019.04.019","volume":"100","author":"A Ostad-Sharif","year":"2019","unstructured":"Ostad-Sharif, A., Arshad, H., Nikooghadam, M., Abbasinezhad-Mood, D.: Three party secure data transmission in IoT networks through design of a lightweight authenticated key agreement scheme. Futur. Gener. Comput. Syst. 100, 882\u2013892 (2019). https:\/\/doi.org\/10.1016\/j.future.2019.04.019","journal-title":"Futur. Gener. Comput. Syst."},{"key":"10_CR14","doi-asserted-by":"publisher","unstructured":"Chen, Y., Ge, Y., Wang, Y., Zeng, Z.: An improved three-factor user authentication and key agreement scheme for wireless medical sensor networks.\u00a0IEEE Access\u00a07 (2019). https:\/\/doi.org\/10.1109\/ACCESS.2019.2923777","DOI":"10.1109\/ACCESS.2019.2923777"},{"issue":"1","key":"10_CR15","doi-asserted-by":"publisher","first-page":"195","DOI":"10.1016\/j.jcss.2013.07.004","volume":"80","author":"K Xue","year":"2014","unstructured":"Xue, K., Hong, P., Ma, C.: A lightweight dynamic pseudonym identity based authentication and key agreement protocol without verification tables for multi-server architecture. J. Comput. Syst. Sci. 80(1), 195\u2013206 (2014). https:\/\/doi.org\/10.1016\/j.jcss.2013.07.004","journal-title":"J. Comput. Syst. Sci."},{"key":"10_CR16","doi-asserted-by":"publisher","first-page":"1005","DOI":"10.1016\/j.future.2016.12.028","volume":"78","author":"R Amin","year":"2018","unstructured":"Amin, R., Kumar, N., Biswas, G.P., Iqbal, R., Chang, V.: A light weight authentication protocol for IoT-enabled devices in distributed Cloud Computing environment. Futur. Gener. Comput. Syst. 78, 1005\u20131019 (2018). https:\/\/doi.org\/10.1016\/j.future.2016.12.028","journal-title":"Futur. Gener. Comput. Syst."},{"issue":"1","key":"10_CR17","doi-asserted-by":"publisher","first-page":"1120","DOI":"10.1109\/JSYST.2020.2981049","volume":"15","author":"F Wu","year":"2020","unstructured":"Wu, F., Li, X., Xu, L., Vijayakumar, P., Kumar, N.: A novel three-factor authentication protocol for wireless sensor networks with IoT notion. IEEE Syst. J. 15(1), 1120\u20131129 (2020). https:\/\/doi.org\/10.1109\/JSYST.2020.2981049","journal-title":"IEEE Syst. J."},{"key":"10_CR18","doi-asserted-by":"publisher","unstructured":"Zou, S., et al.: A robust and effective 3-factor authentication protocol for smart factory in IIoT.\u00a0Comput. Commun.\u00a0220, 81\u201393 (2024). https:\/\/doi.org\/10.1016\/j.comcom.2024.04.011","DOI":"10.1016\/j.comcom.2024.04.011"},{"key":"10_CR19","doi-asserted-by":"publisher","unstructured":"He, K., Ren, Z.: A new three-factor authentication scheme using Chebyshev chaotic map for peer-to-peer Industrial Internet of Things.\u00a0Comput. Netw.\u00a0247 (2024). https:\/\/doi.org\/10.1016\/j.comnet.2024.110450","DOI":"10.1016\/j.comnet.2024.110450"},{"key":"10_CR20","doi-asserted-by":"publisher","unstructured":"Meshram, A., Alouane-Turki, M.H., Wazalwar, N.M., Meshram, C.: An efficient three-party authenticated key exchange procedure using Chebyshev chaotic maps with client anonymity.\u00a0Comput. Mater. Continua 75(3) (2023). https:\/\/doi.org\/10.32604\/cmc.2023.037324","DOI":"10.32604\/cmc.2023.037324"},{"issue":"8","key":"10_CR21","doi-asserted-by":"publisher","first-page":"3599","DOI":"10.1109\/TII.2017.2773666","volume":"14","author":"X Li","year":"2017","unstructured":"Li, X., Niu, J., Bhuiyan, M.Z.A., Wu, F., Karuppiah, M., Kumari, S.: A robust ECC-based provable secure authentication protocol with privacy preserving for industrial Internet of Things. IEEE Trans. Industr. Inf. 14(8), 3599\u20133609 (2017). https:\/\/doi.org\/10.1109\/TII.2017.2773666","journal-title":"IEEE Trans. Industr. Inf."},{"issue":"1","key":"10_CR22","doi-asserted-by":"publisher","first-page":"9974","DOI":"10.1038\/s41598-025-94550-9","volume":"15","author":"T Sudhakar","year":"2025","unstructured":"Sudhakar, T., Praveen, R., Natarajan, V.: An efficient ECC and fuzzy verifier based user authentication protocol for IoT enabled WSNs. Sci. Rep. 15(1), 9974 (2025). https:\/\/doi.org\/10.1038\/s41598-025-94550-9","journal-title":"Sci. Rep."},{"key":"10_CR23","doi-asserted-by":"publisher","first-page":"82","DOI":"10.1016\/j.comcom.2021.04.021","volume":"175","author":"M Masud","year":"2021","unstructured":"Masud, M., Alazab, M., Choudhary, K., Gaba, G.S.: 3P-SAKE: privacy-preserving and physically secured authenticated key establishment protocol for wireless industrial networks. Comput. Commun. 175, 82\u201390 (2021). https:\/\/doi.org\/10.1016\/j.comcom.2021.04.021","journal-title":"Comput. Commun."},{"issue":"4","key":"10_CR24","doi-asserted-by":"publisher","first-page":"3299","DOI":"10.1109\/TDSC.2022.3193570","volume":"20","author":"Y Zheng","year":"2022","unstructured":"Zheng, Y., Liu, W., Gu, C., Chang, C.H.: PUF-based mutual authentication and key exchange protocol for peer-to-peer IoT applications. IEEE Trans. Dependable Secure Comput. 20(4), 3299\u20133316 (2022). https:\/\/doi.org\/10.1109\/TDSC.2022.3193570","journal-title":"IEEE Trans. Dependable Secure Comput."},{"issue":"2","key":"10_CR25","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3487060","volume":"4","author":"K Lounis","year":"2023","unstructured":"Lounis, K., Zulkernine, M.: Lessons learned: analysis of PUF-based authentication protocols for IoT. Digit. Threats: Res. Pract. 4(2), 1\u201333 (2023). https:\/\/doi.org\/10.1145\/3487060","journal-title":"Digit. Threats: Res. Pract."},{"issue":"2","key":"10_CR26","doi-asserted-by":"publisher","first-page":"198","DOI":"10.1109\/sfcs.1981.32","volume":"29","author":"D Dolev","year":"1983","unstructured":"Dolev, D., Yao, A.: On the security of public key protocols. IEEE Trans. Inf. Theory 29(2), 198\u2013208 (1983). https:\/\/doi.org\/10.1109\/sfcs.1981.32","journal-title":"IEEE Trans. Inf. Theory"},{"issue":"1","key":"10_CR27","doi-asserted-by":"publisher","first-page":"6846","DOI":"10.1038\/s41598-025-89502-2","volume":"15","author":"X Wang","year":"2025","unstructured":"Wang, X., Wang, W., Liu, A., Liu, W., Zhang, Z., Li, W.: PIA-A secure and efficient identity authentication scheme in telemedicine via the PUF method. Sci. Rep. 15(1), 6846 (2025)","journal-title":"Sci. Rep."},{"issue":"19","key":"10_CR28","doi-asserted-by":"publisher","first-page":"7413","DOI":"10.3390\/s22197413","volume":"22","author":"F Yi","year":"2022","unstructured":"Yi, F., Zhang, L., Xu, L., Yang, S., Lu, Y., Zhao, D.: WSNEAP: an efficient authentication protocol for IIoT-oriented wireless sensor networks. Sensors 22(19), 7413 (2022). https:\/\/doi.org\/10.3390\/s22197413","journal-title":"Sensors"}],"container-title":["Lecture Notes in Computer Science","Network and System Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-95-6419-4_10","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,2,3]],"date-time":"2026-02-03T08:58:00Z","timestamp":1770109080000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-95-6419-4_10"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026]]},"ISBN":["9789819564187","9789819564194"],"references-count":28,"URL":"https:\/\/doi.org\/10.1007\/978-981-95-6419-4_10","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026]]},"assertion":[{"value":"4 February 2026","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"The authors have no competing interests to declare that are relevant to the content of this article.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Disclosure of Interests"}},{"value":"NSS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Network and System Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Wuhan","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"5 December 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"7 December 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"nss2025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/nsclab.org\/nss-socialsec2025\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}