{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,23]],"date-time":"2026-01-23T07:59:39Z","timestamp":1769155179511,"version":"3.49.0"},"publisher-location":"Singapore","reference-count":31,"publisher":"Springer Nature Singapore","isbn-type":[{"value":"9789819615445","type":"print"},{"value":"9789819615452","type":"electronic"}],"license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-981-96-1545-2_9","type":"book-chapter","created":{"date-parts":[[2025,2,12]],"date-time":"2025-02-12T16:55:26Z","timestamp":1739379326000},"page":"134-153","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Multidimensional Intrinsic Identity Construction and\u00a0Dynamic Seamless Authentication Schemes in\u00a0IoT Environments"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0009-0003-0935-8076","authenticated-orcid":false,"given":"Zhijian","family":"Xu","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6455-6866","authenticated-orcid":false,"given":"Zhiwei","family":"Zhang","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0009-0000-2026-1302","authenticated-orcid":false,"given":"Guiyuan","family":"Tang","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0009-0004-1395-0520","authenticated-orcid":false,"given":"Ziwei","family":"Shi","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8448-705X","authenticated-orcid":false,"given":"Yulong","family":"Shen","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0690-5321","authenticated-orcid":false,"given":"Ning","family":"Xi","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,2,13]]},"reference":[{"key":"9_CR1","first-page":"2573","volume":"46","author":"L Lulu","year":"2023","unstructured":"Lulu, L., Ruijie, Z., Luyao, S., Yafei, L., Mingliang, X., Huitao, F.: A survey of reinforcement learning methods for intelligent swarm systems. Chinese J. Comput. 46, 2573\u20132596 (2023)","journal-title":"Chinese J. Comput."},{"key":"9_CR2","unstructured":"of\u00a0Standardization\u00a0of Electronic\u00a0Technology, C.I.: White paper on the development of intelligent unmanned swarm systems. http:\/\/www.cesi.cn\/202111\/8036.html (2021-11-23). Accessed 23 Apr 2021"},{"issue":"1","key":"9_CR3","doi-asserted-by":"publisher","first-page":"19","DOI":"10.33969\/J-NaNA.2021.010103","volume":"1","author":"X Zhu","year":"2021","unstructured":"Zhu, X., Zheng, J., Ren, B., Dong, X., Shen, Y.: Microthingschain: blockchain-based controlled data sharing platform in multi-domain IoT. J. Networking Network Appl. 1(1), 19\u201327 (2021)","journal-title":"J. Networking Network Appl."},{"key":"9_CR4","first-page":"646","volume":"55","author":"Z Mengqi","year":"2022","unstructured":"Mengqi, Z., Xiaoxia, F., Jin-yao, C.: Research on network security of UAV swarm. ICT 55, 646\u2013651 (2022)","journal-title":"ICT"},{"issue":"1","key":"9_CR5","doi-asserted-by":"publisher","first-page":"1","DOI":"10.33969\/J-NaNA.2023.030101","volume":"3","author":"M Umar","year":"2023","unstructured":"Umar, M., Wang, J., Liu, L., Guo, Z., Wang, S.: Physical layer authentication in the internet of vehicles based on signal propagation attribute prediction. J. Networking Network Appl. 3(1), 1\u201310 (2023)","journal-title":"J. Networking Network Appl."},{"key":"9_CR6","doi-asserted-by":"publisher","first-page":"128288","DOI":"10.1109\/ACCESS.2023.3333242","volume":"11","author":"SF Chevtchenko","year":"2023","unstructured":"Chevtchenko, S.F., Rocha, E.D.S., Dos Santos, M.C.M., Mota, R.L., Vieira, D.M., De Andrade, E.C., De Ara\u00fajo, D.R.B.: Anomaly detection in industrial machinery using IoT devices and machine learning: a systematic mapping. IEEE Access 11, 128288\u2013128305 (2023)","journal-title":"IEEE Access"},{"key":"9_CR7","doi-asserted-by":"crossref","unstructured":"Al-Meer, A., Al-Kuwari, S.: Physical unclonable functions (PUF) for IoT devices. ACM Comput. Surv. 55(14s), 314:1\u2013314:31 (2023)","DOI":"10.1145\/3591464"},{"issue":"2","key":"9_CR8","doi-asserted-by":"publisher","first-page":"2770","DOI":"10.1109\/JIOT.2018.2874626","volume":"6","author":"C Labrado","year":"2019","unstructured":"Labrado, C., Thapliyal, H.: Design of a piezoelectric-based physically unclonable function for IoT security. IEEE Internet Things J. 6(2), 2770\u20132777 (2019)","journal-title":"IEEE Internet Things J."},{"issue":"1","key":"9_CR9","doi-asserted-by":"publisher","first-page":"325","DOI":"10.1109\/JIOT.2018.2838580","volume":"6","author":"N Kumar","year":"2019","unstructured":"Kumar, N., Chen, J., Kar, M., Sitaraman, S.K., Mukhopadhyay, S., Kumar, S.: Multigated carbon nanotube field effect transistors-based physically unclonable functions as security keys. IEEE Internet Things J. 6(1), 325\u2013334 (2019)","journal-title":"IEEE Internet Things J."},{"key":"9_CR10","doi-asserted-by":"crossref","unstructured":"Xiang, C., et\u00a0al.: Towards continuous access control validation and forensics. In: Cavallaro, L., Kinder, J., Wang, X., Katz, J. (eds.) Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, CCS 2019, London, UK, November 11-15, 2019, pp. 113\u2013129. ACM (2019)","DOI":"10.1145\/3319535.3363191"},{"key":"9_CR11","doi-asserted-by":"publisher","first-page":"436","DOI":"10.1016\/j.procs.2015.03.175","volume":"45","author":"A Ambre","year":"2015","unstructured":"Ambre, A., Shekokar, N.: Insider threat detection using log analysis and event correlation. Procedia Comput. Sci. 45, 436\u2013445 (2015)","journal-title":"Procedia Comput. Sci."},{"issue":"1","key":"9_CR12","first-page":"1","volume":"2","author":"A Ometov","year":"2018","unstructured":"Ometov, A., Bezzateev, S., M\u00e4kitalo, N., Andreev, S., Mikkonen, T., Koucheryavy, Y.: Multi-factor authentication: a survey. Cryptogr. 2(1), 1 (2018)","journal-title":"Multi-factor authentication: a survey. Cryptogr."},{"key":"9_CR13","first-page":"2713","volume":"44","author":"L Licai","year":"2016","unstructured":"Licai, L., Ruiguang, L., Lihua, Y., Yunchuan, G., Fei, X.: Research on multi-feature fusion implicit authentication mechanism for mobile smart devices. Chin. J. Electron. 44, 2713\u20132719 (2016)","journal-title":"Chin. J. Electron."},{"key":"9_CR14","first-page":"207","volume":"800","author":"V Stafford","year":"2020","unstructured":"Stafford, V.: Zero trust architecture. NIST special publication 800, 207 (2020)","journal-title":"Zero trust architecture. NIST special publication"},{"key":"9_CR15","first-page":"66","volume":"10","author":"L Shi","year":"2019","unstructured":"Shi, L., Ning, C., Jun, Z.: Research on access trust technology of big data platform based on identity dynamic continuous authentication. Cyberspace Secur. 10, 66\u201372 (2019)","journal-title":"Cyberspace Secur."},{"issue":"2","key":"9_CR16","doi-asserted-by":"publisher","first-page":"1495","DOI":"10.1109\/JIOT.2018.2836144","volume":"6","author":"Z Yang","year":"2019","unstructured":"Yang, Z., Yang, K., Lei, L., Zheng, K., Leung, V.C.M.: Blockchain-based decentralized trust management in vehicular networks. IEEE Internet Things J. 6(2), 1495\u20131505 (2019)","journal-title":"IEEE Internet Things J."},{"key":"9_CR17","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2020.107593","volume":"183","author":"A Shamsoshoara","year":"2020","unstructured":"Shamsoshoara, A., Korenda, A., Afghah, F., Zeadally, S.: A survey on physical unclonable function (PUF)-based security solutions for internet of things. Comput. Networks 183, 107593 (2020)","journal-title":"Comput. Networks"},{"issue":"11","key":"9_CR18","doi-asserted-by":"publisher","first-page":"8205","DOI":"10.1109\/JIOT.2022.3142084","volume":"9","author":"P Mall","year":"2022","unstructured":"Mall, P., Amin, R., Das, A.K., Leung, M.T., Choo, K.R.: PUF-based authentication and key agreement protocols for IoT, WSNS, and smart grids: a comprehensive survey. IEEE Internet Things J. 9(11), 8205\u20138228 (2022)","journal-title":"IEEE Internet Things J."},{"key":"9_CR19","doi-asserted-by":"crossref","unstructured":"Liang, W., Xie, S., Zhang, D., Li, X., Li, K.: A mutual security authentication method for RFID-PUF circuit based on deep learning. ACM Trans. Internet Techn. 22(2), 34:1\u201334:20 (2022)","DOI":"10.1145\/3426968"},{"key":"9_CR20","doi-asserted-by":"crossref","unstructured":"Xi, Z., Zhang, G., Zhang, B., Zhang, T.: Device identity recognition based on an adaptive environment for intrinsic security fingerprints. Electronics 13(3) (2024)","DOI":"10.3390\/electronics13030656"},{"key":"9_CR21","doi-asserted-by":"crossref","unstructured":"Sabrina, F., Li, N., Sohail, S.: A blockchain based secure IoT system using device identity management. Sensors 22(19) (2022)","DOI":"10.3390\/s22197535"},{"key":"9_CR22","doi-asserted-by":"crossref","unstructured":"Zhang, H., et\u00a0al.: Multi-modality adaptive feature fusion graph convolutional network for skeleton-based action recognition. Sensors 23(12) (2023)","DOI":"10.3390\/s23125414"},{"key":"9_CR23","doi-asserted-by":"crossref","unstructured":"Zhang, B., Zhang, T., Xi, Z., Chen, P., Wei, J., Liu, Y.: Secure device-to-device communication in IoT: fuzzy identity from wireless channel state information for identity-based encryption. Electronics 13(5) (2024)","DOI":"10.3390\/electronics13050984"},{"key":"9_CR24","doi-asserted-by":"crossref","unstructured":"Xiao, K., Rahman, M.T., Forte, D., Huang, Y., Su, M., Tehranipoor, M.: Bit selection algorithm suitable for high-volume production of SRAM-PUF. In: 2014 IEEE International Symposium on Hardware-Oriented Security and Trust, HOST 2014, Arlington, VA, USA, 6-7 May, 2014, pp. 101\u2013106. IEEE Computer Society (2014)","DOI":"10.1109\/HST.2014.6855578"},{"key":"9_CR25","doi-asserted-by":"crossref","unstructured":"Shifman, Y., Miller, A., Keren, O., Weizman, Y., Shor, J.: An sram-based PUF with a capacitive digital preselection for a 1e-9 key error probability. IEEE Trans. Circuits Syst. 67-I(12), 4855\u20134868 (2020)","DOI":"10.1109\/TCSI.2020.2996772"},{"key":"9_CR26","doi-asserted-by":"crossref","unstructured":"Maiti, A., Casarona, J., McHale, L., Schaumont, P.: A large scale characterization of RO-PUF. In: Plusquellic, J., Mai, K. (eds.) HOST 2010, Proceedings of the 2010 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST), 13\u201314 June 2010, Anaheim Convention Center, California, USA, pp. 94\u201399. IEEE Computer Society (2010)","DOI":"10.1109\/HST.2010.5513108"},{"key":"9_CR27","doi-asserted-by":"publisher","first-page":"181751","DOI":"10.1109\/ACCESS.2020.3028514","volume":"8","author":"Z He","year":"2020","unstructured":"He, Z., Chen, W., Zhang, L., Chi, G., Gao, Q., Harn, L.: A highly reliable arbiter PUF with improved uniqueness in FPGA implementation using bit-self-test. IEEE Access 8, 181751\u2013181762 (2020)","journal-title":"IEEE Access"},{"key":"9_CR28","doi-asserted-by":"crossref","unstructured":"Cronin, P., Gao, X., Wang, H., Cotton, C.: Time-print: authenticating USB flash drives with novel timing fingerprints. In: 43rd IEEE Symposium on Security and Privacy, SP 2022, San Francisco, CA, USA, 22\u201326 May 2022, pp. 1002\u20131017. IEEE (2022)","DOI":"10.1109\/SP46214.2022.9833595"},{"issue":"23","key":"9_CR29","doi-asserted-by":"publisher","first-page":"23741","DOI":"10.1109\/JIOT.2022.3191951","volume":"9","author":"K Kostas","year":"2022","unstructured":"Kostas, K., Just, M., Lones, M.A.: Iotdevid: a behavior-based device identification method for the IoT. IEEE Internet Things J. 9(23), 23741\u201323749 (2022)","journal-title":"IEEE Internet Things J."},{"key":"9_CR30","doi-asserted-by":"crossref","unstructured":"Kennedy, J.: Swarm intelligence. In: Handbook of nature-inspired and innovative computing: integrating classical models with emerging technologies, pp. 187\u2013219. Springer (2006)","DOI":"10.1007\/0-387-27705-6_6"},{"key":"9_CR31","unstructured":"Gilbert: sg3_utils. https:\/\/github.com\/hreinecke\/sg3_utils (2023-04-26). Accessed April 23, 2023"}],"container-title":["Lecture Notes in Computer Science","Algorithms and Architectures for Parallel Processing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-96-1545-2_9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,12]],"date-time":"2025-02-12T16:55:42Z","timestamp":1739379342000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-96-1545-2_9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"ISBN":["9789819615445","9789819615452"],"references-count":31,"URL":"https:\/\/doi.org\/10.1007\/978-981-96-1545-2_9","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025]]},"assertion":[{"value":"13 February 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICA3PP","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Algorithms and Architectures for Parallel Processing","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Macau","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"30 October 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"1 November 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"24","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"ica3pp2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/ica3pp2024.scimeeting.cn\/en\/web\/index\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}