{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,17]],"date-time":"2026-04-17T22:45:11Z","timestamp":1776465911185,"version":"3.51.2"},"reference-count":79,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2024,1,12]],"date-time":"2024-01-12T00:00:00Z","timestamp":1705017600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,1,12]],"date-time":"2024-01-12T00:00:00Z","timestamp":1705017600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Int. J. Inf. Secur."],"published-print":{"date-parts":[[2024,6]]},"DOI":"10.1007\/s10207-023-00806-8","type":"journal-article","created":{"date-parts":[[2024,1,12]],"date-time":"2024-01-12T08:02:45Z","timestamp":1705046565000},"page":"1583-1602","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":9,"title":["Authentication in Internet of Things, protocols, attacks, and open issues: a systematic literature review"],"prefix":"10.1007","volume":"23","author":[{"given":"Elham","family":"Ebrahimpour","sequence":"first","affiliation":[]},{"given":"Shahram","family":"Babaie","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,1,12]]},"reference":[{"issue":"10","key":"806_CR1","doi-asserted-by":"publisher","first-page":"7818","DOI":"10.1109\/JIOT.2020.3040358","volume":"8","author":"RE Navas","year":"2021","unstructured":"Navas, R.E., Cuppens, F., Boulahia Cuppens, N., Toutain, L., Papadopoulos, G.Z.: MTD, Where Art Thou? A systematic review of moving target defense techniques for IoT. IEEE Internet Things J. 8(10), 7818\u20137832 (2021). https:\/\/doi.org\/10.1109\/JIOT.2020.3040358","journal-title":"IEEE Internet Things J."},{"issue":"3","key":"806_CR2","doi-asserted-by":"publisher","first-page":"37","DOI":"10.3390\/cryptography6030037","volume":"6","author":"V Kumar","year":"2022","unstructured":"Kumar, V., Malik, N., Singla, J., Jhanjhi, N.Z., Amsaad, F.: Light weight authentication scheme for smart home IoT devices. Dep. Comput. Sci. Eng. 6(3), 37 (2022). https:\/\/doi.org\/10.3390\/cryptography6030037","journal-title":"Dep. Comput. Sci. Eng."},{"issue":"4","key":"806_CR3","doi-asserted-by":"publisher","first-page":"2489","DOI":"10.1109\/COMST.2020.3011208","volume":"22","author":"K Tange","year":"2020","unstructured":"Tange, K., De Donno, M., Fafoutis, X., Dragoni, N.: A systematic survey of industrial internet of things security: requirements and fog computing opportunities. IEEE Commun. Surv. Tutorials 22(4), 2489\u20132520 (2020). https:\/\/doi.org\/10.1109\/COMST.2020.3011208","journal-title":"IEEE Commun. Surv. Tutorials"},{"key":"806_CR4","doi-asserted-by":"publisher","DOI":"10.1016\/J.JNCA.2021.103177","volume":"192","author":"AYF Alsahlani","year":"2021","unstructured":"Alsahlani, A.Y.F., Popa, A.: LMAAS-IoT: lightweight multi-factor authentication and authorization scheme for real-time data access in iot cloud-based environment. J. Netw. Comput. Appl. 192, 103177 (2021). https:\/\/doi.org\/10.1016\/J.JNCA.2021.103177","journal-title":"J. Netw. Comput. Appl."},{"key":"806_CR5","doi-asserted-by":"publisher","DOI":"10.1016\/J.JISA.2022.103130","volume":"66","author":"Z Chang","year":"2022","unstructured":"Chang, Z., Meng, Y., Liu, W., Zhu, H., Wang, L.: WiCapose: multi-modal fusion based transparent authentication in mobile environments. J. Inf. Secur. Appl. 66, 103130 (2022). https:\/\/doi.org\/10.1016\/J.JISA.2022.103130","journal-title":"J. Inf. Secur. Appl."},{"key":"806_CR6","doi-asserted-by":"publisher","first-page":"151054","DOI":"10.1109\/ACCESS.2019.2947723","volume":"7","author":"T Nandy","year":"2019","unstructured":"Nandy, T., et al.: Review on security of internet of things authentication mechanism. IEEE Access 7, 151054\u2013151089 (2019). https:\/\/doi.org\/10.1109\/ACCESS.2019.2947723","journal-title":"IEEE Access"},{"issue":"5","key":"806_CR7","doi-asserted-by":"publisher","first-page":"1019","DOI":"10.1007\/s10207-022-00595-6","volume":"21","author":"I Ahmim","year":"2022","unstructured":"Ahmim, I., Ghoualmi-Zine, N., Ahmim, A., Ahmim, M.: Security analysis on \u2018Three-factor authentication protocol using physical unclonable function for IoV.\u2019 Int. J. Inf. Secur. 21(5), 1019\u20131026 (2022). https:\/\/doi.org\/10.1007\/s10207-022-00595-6","journal-title":"Int. J. Inf. Secur."},{"key":"806_CR8","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2022.108288","volume":"102","author":"F Ghasemi","year":"2022","unstructured":"Ghasemi, F., Babaie, S.: A lightweight secure authentication approach based on stream ciphering for RFID-based Internet of Things. Comput. Electr. Eng. 102, 108288 (2022). https:\/\/doi.org\/10.1016\/j.compeleceng.2022.108288","journal-title":"Comput. Electr. Eng."},{"issue":"17","key":"806_CR9","doi-asserted-by":"publisher","first-page":"15087","DOI":"10.1109\/JIOT.2023.3264565","volume":"10","author":"SS Sahoo","year":"2023","unstructured":"Sahoo, S.S., et al.: A three-factor-based authentication scheme of 5G wireless sensor networks for IoT system. IEEE Internet Things J. 10(17), 15087\u201315099 (2023). https:\/\/doi.org\/10.1109\/JIOT.2023.3264565","journal-title":"IEEE Internet Things J."},{"issue":"1","key":"806_CR10","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3603705","volume":"56","author":"CW Lien","year":"2023","unstructured":"Lien, C.W., Vhaduri, S.: Challenges and opportunities of biometric user authentication in the age of IoT: a survey. CM Comput. Surv. 56(1), 1\u201337 (2023). https:\/\/doi.org\/10.1145\/3603705","journal-title":"CM Comput. Surv."},{"issue":"4","key":"806_CR11","doi-asserted-by":"publisher","first-page":"2329","DOI":"10.1109\/COMST.2022.3211462","volume":"24","author":"FS Abkenar","year":"2022","unstructured":"Abkenar, F.S., Ramezani, P., Iranmanesh, S., Murali, S., Chulerttiyawong, D., Wan, X., Jamalipour, A., Raad, R.: A survey on mobility of edge computing networks in IoT: state- of -the-art, architectures, and challenges. IEEE Commun. Surv. Tutorials 24(4), 2329\u20132365 (2022)","journal-title":"IEEE Commun. Surv. Tutorials"},{"key":"806_CR12","doi-asserted-by":"crossref","unstructured":"Al-Awami, S.H., Al-Aty, M.M., Al-Najar, M.F.: Comparison of IoT architectures based on the seven essential characteristics, (2023)","DOI":"10.1109\/MI-STA57575.2023.10169289"},{"issue":"2","key":"806_CR13","doi-asserted-by":"publisher","first-page":"1","DOI":"10.3390\/info12020087","volume":"12","author":"M Lombardi","year":"2021","unstructured":"Lombardi, M., Pascale, F., Santaniello, D.: Internet of things: a general overview between architectures, protocols and applications. Inf. 12(2), 1\u201321 (2021). https:\/\/doi.org\/10.3390\/info12020087","journal-title":"Inf."},{"issue":"4","key":"806_CR14","doi-asserted-by":"publisher","first-page":"4883","DOI":"10.1109\/JSYST.2020.2976827","volume":"14","author":"MM Gharamaleki","year":"2020","unstructured":"Gharamaleki, M.M., Babaie, S.: A new distributed fault detection method for wireless sensor networks. IEEE Syst. J. 14(4), 4883\u20134890 (2020). https:\/\/doi.org\/10.1109\/JSYST.2020.2976827","journal-title":"IEEE Syst. J."},{"key":"806_CR15","doi-asserted-by":"publisher","DOI":"10.1016\/J.JISA.2023.103485","volume":"75","author":"Z Najafi","year":"2023","unstructured":"Najafi, Z., Babaie, S.: A lightweight hierarchical key management approach for internet of things. J. Inf. Secur. Appl. 75, 103485 (2023). https:\/\/doi.org\/10.1016\/J.JISA.2023.103485","journal-title":"J. Inf. Secur. Appl."},{"key":"806_CR16","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2020.3041754","author":"M Afrashteh","year":"2020","unstructured":"Afrashteh, M., Babaie, S.: A route segmented broadcast protocol based on RFID for emergency message dissemination in vehicular Ad-hoc Networks. IEEE Trans. Veh. Technol. (2020). https:\/\/doi.org\/10.1109\/TVT.2020.3041754","journal-title":"IEEE Trans. Veh. Technol."},{"issue":"1","key":"806_CR17","first-page":"107","volume":"19","author":"M Almulhim","year":"2019","unstructured":"Almulhim, M., Islam, N., Zaman, N.: A lightweight and secure authentication scheme for IoT based e-health applications. Int. J. Comput. Sci. Netw. Secur. 19(1), 107\u2013120 (2019)","journal-title":"Int. J. Comput. Sci. Netw. Secur."},{"issue":"15","key":"806_CR18","doi-asserted-by":"publisher","first-page":"13945","DOI":"10.1109\/JIOT.2023.3263497","volume":"10","author":"Y Su","year":"2023","unstructured":"Su, Y., Zhang, X., Qin, J., Ma, J.: Efficient and flexible multiauthority attribute-based authentication for IoT devices. IEEE Internet things J. 10(15), 13945\u201313958 (2023)","journal-title":"IEEE Internet things J."},{"issue":"June","key":"806_CR19","doi-asserted-by":"publisher","first-page":"109","DOI":"10.1016\/j.comcom.2020.09.006","volume":"163","author":"FH Al-Naji","year":"2020","unstructured":"Al-Naji, F.H., Zagrouba, R.: A survey on continuous authentication methods in Internet of Things environment. Comput. Commun. 163(June), 109\u2013133 (2020). https:\/\/doi.org\/10.1016\/j.comcom.2020.09.006","journal-title":"Comput. Commun."},{"issue":"14","key":"806_CR20","doi-asserted-by":"publisher","first-page":"16056","DOI":"10.1007\/s11227-022-04520-5","volume":"78","author":"I Alshawish","year":"2022","unstructured":"Alshawish, I., Al-Haj, A.: An efficient mutual authentication scheme for IoT systems. J. Supercomput. 78(14), 16056\u201316087 (2022). https:\/\/doi.org\/10.1007\/s11227-022-04520-5","journal-title":"J. Supercomput."},{"key":"806_CR21","doi-asserted-by":"publisher","first-page":"45","DOI":"10.1016\/J.COMCOM.2022.09.021","volume":"196","author":"M Masud","year":"2022","unstructured":"Masud, M., Gaba, G.S., Kumar, P., Gurtov, A.: A user-centric privacy-preserving authentication protocol for IoT-Am I environments. Comput. Commun. 196, 45\u201354 (2022). https:\/\/doi.org\/10.1016\/J.COMCOM.2022.09.021","journal-title":"Comput. Commun."},{"issue":"5","key":"806_CR22","first-page":"4880","volume":"2","author":"A Shiri","year":"2012","unstructured":"Shiri, A., Babaie, S., Hasan-Zadeh, J.: New active caching method to guarantee desired communication reliability in wireless sensor networks. J. Basic Appl. Sci. Res. 2(5), 4880\u20134885 (2012)","journal-title":"J. Basic Appl. Sci. Res."},{"key":"806_CR23","doi-asserted-by":"publisher","first-page":"135632","DOI":"10.1109\/ACCESS.2019.2941575","volume":"7","author":"BD Deebak","year":"2019","unstructured":"Deebak, B.D., Al-Turjman, F., Aloqaily, M., Alfandi, O.: An authentic-based privacy preservation protocol for smart e-healthcare systems in IoT. IEEE Access 7, 135632\u2013135649 (2019). https:\/\/doi.org\/10.1109\/ACCESS.2019.2941575","journal-title":"IEEE Access"},{"issue":"1","key":"806_CR24","doi-asserted-by":"publisher","first-page":"269","DOI":"10.1109\/JIOT.2017.2780232","volume":"5","author":"M Wazid","year":"2018","unstructured":"Wazid, M., Das, A.K., Odelu, V., Kumar, N., Conti, M., Jo, M.: Design of secure user authenticated key management protocol for generic IoT networks. IEEE Internet Things J. 5(1), 269\u2013282 (2018). https:\/\/doi.org\/10.1109\/JIOT.2017.2780232","journal-title":"IEEE Internet Things J."},{"key":"806_CR25","doi-asserted-by":"publisher","DOI":"10.1016\/J.SUSCOM.2022.100717","volume":"35","author":"M Ramzan","year":"2022","unstructured":"Ramzan, M., Habib, M., Khan, S.A.: Secure and efficient privacy protection system for medical records. Sustain. Comput. Inform. Syst. 35, 100717 (2022). https:\/\/doi.org\/10.1016\/J.SUSCOM.2022.100717","journal-title":"Sustain. Comput. Inform. Syst."},{"issue":"15","key":"806_CR26","doi-asserted-by":"publisher","first-page":"16678","DOI":"10.1007\/s11227-022-04464-w","volume":"78","author":"R Hajian","year":"2022","unstructured":"Hajian, R., Erfani, S.H., Kumari, S.: A lightweight authentication and key agreement protocol for heterogeneous IoT with special attention to sensing devices and gateway. J. Supercomput. 78(15), 16678\u201316720 (2022). https:\/\/doi.org\/10.1007\/s11227-022-04464-w","journal-title":"J. Supercomput."},{"key":"806_CR27","doi-asserted-by":"publisher","DOI":"10.1109\/TNSE.2021.3110315","author":"H Seddiqi","year":"2021","unstructured":"Seddiqi, H., Babaie, S.: A new protection-based approach for link failure management of software-defined networks. IEEE Trans. Netw. Sci. Eng. (2021). https:\/\/doi.org\/10.1109\/TNSE.2021.3110315","journal-title":"IEEE Trans. Netw. Sci. Eng."},{"issue":"10","key":"806_CR28","first-page":"1","volume":"2","author":"S Babaie","year":"2020","unstructured":"Babaie, S.: Biometric authentication: an efficient option for Internet of Things applications during the COVID-19 pandemic. Acta Sci. Comput. Sci. 2(10), 1\u20132 (2020)","journal-title":"Acta Sci. Comput. Sci."},{"key":"806_CR29","doi-asserted-by":"publisher","DOI":"10.1007\/s12083-023-01498-6","author":"E Ebrahimpour","year":"2023","unstructured":"Ebrahimpour, E., Babaie, S.: A Lightweight authentication approach based on linear feedback shift register and majority function for internet of things. Peer-to-Peer Netw Appl (2023). https:\/\/doi.org\/10.1007\/s12083-023-01498-6","journal-title":"Peer-to-Peer Netw Appl"},{"key":"806_CR30","doi-asserted-by":"publisher","DOI":"10.1016\/J.JNCA.2022.103435","volume":"205","author":"PK Roy","year":"2022","unstructured":"Roy, P.K., Sahu, P., Bhattacharya, A.: FastHand: a fast handover authentication protocol for densely deployed small-cell networks. J. Netw. Comput. Appl. 205, 103435 (2022). https:\/\/doi.org\/10.1016\/J.JNCA.2022.103435","journal-title":"J. Netw. Comput. Appl."},{"issue":"6","key":"806_CR31","doi-asserted-by":"publisher","first-page":"1373","DOI":"10.1007\/s10207-022-00619-1","volume":"21","author":"M Abdussami","year":"2022","unstructured":"Abdussami, M., Amin, R., Vollala, S.: LASSI: a lightweight authenticated key agreement protocol for fog-enabled IoT deployment. Int. J. Inf. Secur. 21(6), 1373\u20131387 (2022). https:\/\/doi.org\/10.1007\/s10207-022-00619-1","journal-title":"Int. J. Inf. Secur."},{"issue":"1","key":"806_CR32","doi-asserted-by":"publisher","first-page":"877","DOI":"10.1109\/JIOT.2022.3204246","volume":"10","author":"X Yin","year":"2023","unstructured":"Yin, X., Wang, S., Zhu, Y., Hu, J., Member, S.: A novel length-flexible lightweight cancelable fingerprint template for privacy-preserving authentication systems in resource-constrained IoT applications. IEEE Internet Things J. 10(1), 877\u2013892 (2023). https:\/\/doi.org\/10.1109\/JIOT.2022.3204246","journal-title":"IEEE Internet Things J."},{"issue":"2","key":"806_CR33","doi-asserted-by":"publisher","first-page":"1114","DOI":"10.1007\/s11227-020-03318-7","volume":"77","author":"D Sadhukhan","year":"2021","unstructured":"Sadhukhan, D., Ray, S., Biswas, G.P., Khan, M.K., Dasgupta, M.: A lightweight remote user authentication scheme for IoT communication using elliptic curve cryptography. J. Supercomput. 77(2), 1114\u20131151 (2021). https:\/\/doi.org\/10.1007\/s11227-020-03318-7","journal-title":"J. Supercomput."},{"key":"806_CR34","doi-asserted-by":"publisher","first-page":"34541","DOI":"10.1109\/ACCESS.2021.3061589","volume":"9","author":"R Ryu","year":"2021","unstructured":"Ryu, R., Yeom, S., Kim, S.H., Herbert, D.: Continuous multimodal biometric authentication schemes: a systematic review. IEEE Access 9, 34541\u201334557 (2021). https:\/\/doi.org\/10.1109\/ACCESS.2021.3061589","journal-title":"IEEE Access"},{"issue":"12","key":"806_CR35","doi-asserted-by":"publisher","first-page":"14461","DOI":"10.1007\/s11227-021-03841-1","volume":"77","author":"K Hameed","year":"2021","unstructured":"Hameed, K., Garg, S., Amin, M.B., Kang, B.: A formally verified blockchain-based decentralised authentication scheme for the internet of things. J. Supercomput. 77(12), 14461\u201314501 (2021). https:\/\/doi.org\/10.1007\/s11227-021-03841-1","journal-title":"J. Supercomput."},{"key":"806_CR36","unstructured":"Kitchenham, B.: Procedures for performing systematic reviews, (2004). 10.1.1.122.3308"},{"issue":"1","key":"806_CR37","doi-asserted-by":"publisher","first-page":"580","DOI":"10.1109\/JIOT.2018.2846299","volume":"6","author":"P Gope","year":"2019","unstructured":"Gope, P., Sikdar, B.: Lightweight and privacy-preserving two-factor authentication scheme for IoT devices. IEEE Internet Things J. 6(1), 580\u2013589 (2019). https:\/\/doi.org\/10.1109\/JIOT.2018.2846299","journal-title":"IEEE Internet Things J."},{"issue":"6","key":"806_CR38","doi-asserted-by":"publisher","first-page":"4900","DOI":"10.1109\/JIOT.2018.2877690","volume":"5","author":"AK Das","year":"2018","unstructured":"Das, A.K., Wazid, M., Kumar, N., Vasilakos, A.V., Rodrigues, J.J.P.C.: Biometrics-based privacy-preserving user authentication scheme for cloud-based industrial internet of things deployment. IEEE Internet Things J. 5(6), 4900\u20134913 (2018). https:\/\/doi.org\/10.1109\/JIOT.2018.2877690","journal-title":"IEEE Internet Things J."},{"key":"806_CR39","doi-asserted-by":"publisher","first-page":"195914","DOI":"10.1109\/ACCESS.2020.3034219","volume":"8","author":"Z Liu","year":"2020","unstructured":"Liu, Z., Guo, C., Wang, B.: A physically secure, lightweight three-factor and anonymous user authentication protocol for iot. IEEE Access 8, 195914\u2013195928 (2020). https:\/\/doi.org\/10.1109\/ACCESS.2020.3034219","journal-title":"IEEE Access"},{"key":"806_CR40","doi-asserted-by":"publisher","first-page":"8754","DOI":"10.1109\/ACCESS.2019.2962912","volume":"8","author":"W Liu","year":"2020","unstructured":"Liu, W., Wang, X., Peng, W.: Secure remote multi-factor authentication scheme based on chaotic map zero-knowledge proof for crowdsourcing internet of things. IEEE Access 8, 8754\u20138767 (2020). https:\/\/doi.org\/10.1109\/ACCESS.2019.2962912","journal-title":"IEEE Access"},{"issue":"1","key":"806_CR41","doi-asserted-by":"publisher","first-page":"1120","DOI":"10.1109\/JSYST.2020.2981049","volume":"15","author":"F Wu","year":"2021","unstructured":"Wu, F., Li, X., Xu, L., Vijayakumar, P., Kumar, N.: A novel three-factor authentication protocol for wireless sensor networks with IoT notion. IEEE Syst. J. 15(1), 1120\u20131129 (2021). https:\/\/doi.org\/10.1109\/JSYST.2020.2981049","journal-title":"IEEE Syst. J."},{"issue":"4","key":"806_CR42","doi-asserted-by":"publisher","first-page":"5487","DOI":"10.1109\/JSEN.2020.3028872","volume":"21","author":"S Li","year":"2021","unstructured":"Li, S., Zhang, T., Yu, B., He, K.: A provably secure and practical PUF-based end-to-end mutual authentication and key exchange protocol for IoT. IEEE Sens. J. 21(4), 5487\u20135501 (2021). https:\/\/doi.org\/10.1109\/JSEN.2020.3028872","journal-title":"IEEE Sens. J."},{"issue":"2","key":"806_CR43","doi-asserted-by":"publisher","first-page":"3335","DOI":"10.1109\/JIOT.2018.2882610","volume":"6","author":"MN Aman","year":"2019","unstructured":"Aman, M.N., Basheer, M.H., Sikdar, B.: Two-factor authentication for IoT with location information. IEEE Internet Things J. 6(2), 3335\u20133351 (2019). https:\/\/doi.org\/10.1109\/JIOT.2018.2882610","journal-title":"IEEE Internet Things J."},{"issue":"9","key":"806_CR44","doi-asserted-by":"publisher","first-page":"9128","DOI":"10.1109\/JIOT.2020.3004077","volume":"7","author":"Y Liang","year":"2020","unstructured":"Liang, Y., Samtani, S., Guo, B., Yu, Z.: Behavioral biometrics for continuous authentication in the Internet-of-Things era: an artificial intelligence perspective. IEEE Internet Things J. 7(9), 9128\u20139143 (2020). https:\/\/doi.org\/10.1109\/JIOT.2020.3004077","journal-title":"IEEE Internet Things J."},{"issue":"4","key":"806_CR45","doi-asserted-by":"publisher","first-page":"3184","DOI":"10.1109\/JIOT.2020.2966242","volume":"7","author":"S Mandal","year":"2020","unstructured":"Mandal, S., Bera, B., Sutrala, A.K., Das, A.K., Choo, K.K.R., Park, Y.H.: Certificateless-signcryption-based three-factor user access control scheme for IoT environment. IEEE Internet Things J. 7(4), 3184\u20133197 (2020). https:\/\/doi.org\/10.1109\/JIOT.2020.2966242","journal-title":"IEEE Internet Things J."},{"key":"806_CR46","doi-asserted-by":"publisher","first-page":"694","DOI":"10.1016\/j.future.2019.06.020","volume":"101","author":"W Li","year":"2019","unstructured":"Li, W., Wang, P.: Two-factor authentication in industrial Internet-of-Things: attacks, evaluation and new construction. Futur. Gener. Comput. Syst. 101, 694\u2013708 (2019). https:\/\/doi.org\/10.1016\/j.future.2019.06.020","journal-title":"Futur. Gener. Comput. Syst."},{"issue":"4","key":"806_CR47","doi-asserted-by":"publisher","first-page":"2603","DOI":"10.1109\/TII.2019.2925071","volume":"16","author":"P Vijayakumar","year":"2020","unstructured":"Vijayakumar, P., Obaidat, M.S., Azees, M., Islam, S.H., Kumar, N.: Efficient and secure anonymous authentication with location privacy for IoT-based WBANs. IEEE Trans. Ind. Inform. 16(4), 2603\u20132611 (2020). https:\/\/doi.org\/10.1109\/TII.2019.2925071","journal-title":"IEEE Trans. Ind. Inform."},{"issue":"3","key":"806_CR48","doi-asserted-by":"publisher","first-page":"1606","DOI":"10.1109\/JIOT.2017.2787800","volume":"5","author":"X Li","year":"2018","unstructured":"Li, X., Peng, J., Niu, J., Wu, F., Liao, J., Choo, K.K.R.: A robust and energy efficient authentication protocol for industrial internet of things. IEEE Internet Things J. 5(3), 1606\u20131615 (2018). https:\/\/doi.org\/10.1109\/JIOT.2017.2787800","journal-title":"IEEE Internet Things J."},{"key":"806_CR49","doi-asserted-by":"publisher","DOI":"10.1002\/dac.4139","author":"A Ghani","year":"2019","unstructured":"Ghani, A., Mansoor, K., Mehmood, S., Chaudhry, S.A., Rahman, A.U., Najmus Saqib, M.: Security and key management in IoT-based wireless sensor networks: An authentication protocol using symmetric key. Int. J. Commun. Syst. (2019). https:\/\/doi.org\/10.1002\/dac.4139","journal-title":"Int. J. Commun. Syst."},{"key":"806_CR50","doi-asserted-by":"publisher","first-page":"410","DOI":"10.1016\/j.future.2019.02.020","volume":"96","author":"SF Aghili","year":"2019","unstructured":"Aghili, S.F., Mala, H., Shojafar, M., Peris-Lopez, P.: LACO: lightweight three-factor authentication, access control and ownership transfer scheme for E-health systems in IoT. Futur. Gener. Comput. Syst. 96, 410\u2013424 (2019). https:\/\/doi.org\/10.1016\/j.future.2019.02.020","journal-title":"Futur. Gener. Comput. Syst."},{"key":"806_CR51","doi-asserted-by":"publisher","first-page":"97","DOI":"10.1016\/j.adhoc.2019.03.003","volume":"89","author":"V Rao","year":"2019","unstructured":"Rao, V., Prema, K.V.: Light-weight hashing method for user authentication in Internet-of-Things. Ad Hoc Netw. 89, 97\u2013106 (2019). https:\/\/doi.org\/10.1016\/j.adhoc.2019.03.003","journal-title":"Ad Hoc Netw."},{"key":"806_CR52","doi-asserted-by":"publisher","DOI":"10.3390\/s20020501","author":"E Lara","year":"2020","unstructured":"Lara, E., Aguilar, L., Sanchez, M.A., Garc\u00eda, J.A.: Lightweight authentication protocol for M2M communications of resource-constrained devices in industrial internet of things. Sensors (Switzerland) (2020). https:\/\/doi.org\/10.3390\/s20020501","journal-title":"Sensors (Switzerland)"},{"key":"806_CR53","doi-asserted-by":"publisher","first-page":"125","DOI":"10.1016\/j.future.2020.11.006","volume":"117","author":"J Li","year":"2021","unstructured":"Li, J., et al.: A fast and scalable authentication scheme in IOT for smart living. Futur. Gener. Comput. Syst. 117, 125\u2013137 (2021). https:\/\/doi.org\/10.1016\/j.future.2020.11.006","journal-title":"Futur. Gener. Comput. Syst."},{"issue":"1","key":"806_CR54","doi-asserted-by":"publisher","first-page":"56","DOI":"10.1109\/TII.2021.3075440","volume":"18","author":"A Jabbari","year":"2022","unstructured":"Jabbari, A., Mohasefi, J.B.: A secure and LoRaWAN compatible user authentication protocol for critical applications in the IoT environment. IEEE Trans. Ind. Inform 18(1), 56\u201365 (2022). https:\/\/doi.org\/10.1109\/TII.2021.3075440","journal-title":"IEEE Trans. Ind. Inform"},{"key":"806_CR55","doi-asserted-by":"publisher","first-page":"96","DOI":"10.1016\/j.adhoc.2014.03.009","volume":"20","author":"M Turkanovi\u0107","year":"2014","unstructured":"Turkanovi\u0107, M., Brumen, B., H\u00f6lbl, M.: A novel user authentication and key agreement scheme for heterogeneous ad hoc wireless sensor networks, based on the Internet of Things notion. Ad Hoc Netw. 20, 96\u2013112 (2014). https:\/\/doi.org\/10.1016\/j.adhoc.2014.03.009","journal-title":"Ad Hoc Netw."},{"issue":"March","key":"806_CR56","doi-asserted-by":"publisher","first-page":"35517","DOI":"10.1109\/ACCESS.2023.3261666","volume":"11","author":"M Malik","year":"2023","unstructured":"Malik, M., Dutta, M.: L-ECQV\u202f: lightweight ECQV implicit certificates for authentication in the Internet of Things. IEEE Access 11(March), 35517\u201335540 (2023). https:\/\/doi.org\/10.1109\/ACCESS.2023.3261666","journal-title":"IEEE Access"},{"issue":"6","key":"806_CR57","doi-asserted-by":"publisher","first-page":"4004","DOI":"10.1109\/JIOT.2020.3015432","volume":"8","author":"A Alwarafy","year":"2021","unstructured":"Alwarafy, A., Al-Thelaya, K.A., Abdallah, M., Schneider, J., Hamdi, M.: A survey on security and privacy issues in edge-computing-assisted Internet of Things. IEEE Internet Things J. 8(6), 4004\u20134022 (2021). https:\/\/doi.org\/10.1109\/JIOT.2020.3015432","journal-title":"IEEE Internet Things J."},{"key":"806_CR58","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2020.107751","author":"RE Navas","year":"2021","unstructured":"Navas, R.E., Cuppens, F., Boulahia Cuppens, N., Toutain, L., Papadopoulos, G.Z.: Physical resilience to insider attacks in IoT networks: Independent cryptographically secure sequences for DSSS anti-jamming. Comput. Netw. (2021). https:\/\/doi.org\/10.1016\/j.comnet.2020.107751","journal-title":"Comput. Netw."},{"key":"806_CR59","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-017-5548-2","author":"W Il Bae","year":"2017","unstructured":"Il Bae, W., Kwak, J.: Smart card-based secure authentication protocol in multi-server IoT environment. Multimed Tools Appl. (2017). https:\/\/doi.org\/10.1007\/s11042-017-5548-2","journal-title":"Multimed Tools Appl."},{"key":"806_CR60","doi-asserted-by":"publisher","unstructured":"Quamara M., Gupta, B.B., Yamaguchi, S.: An end-to-end security framework for smart healthcare information sharing against botnet-based cyber-attacks, In: Dig. Tech. Pap.: IEEE Int. Conf. Consum. Electron., vol. 2021-Janua, pp. 1\u20134, (2021). https:\/\/doi.org\/10.1109\/ICCE50685.2021.9427753.","DOI":"10.1109\/ICCE50685.2021.9427753"},{"key":"806_CR61","doi-asserted-by":"publisher","first-page":"53922","DOI":"10.1109\/ACCESS.2019.2912870","volume":"7","author":"Z Xu","year":"2019","unstructured":"Xu, Z., Xu, C., Liang, W., Xu, J., Chen, H.: A lightweight mutual authentication and key agreement scheme for medical internet of things. IEEE Access 7, 53922\u201353931 (2019). https:\/\/doi.org\/10.1109\/ACCESS.2019.2912870","journal-title":"IEEE Access"},{"key":"806_CR62","doi-asserted-by":"publisher","first-page":"621","DOI":"10.1016\/j.future.2019.07.004","volume":"101","author":"SF Aghili","year":"2019","unstructured":"Aghili, S.F., Mala, H., Kaliyar, P., Conti, M.: SecLAP: secure and lightweight RFID authentication protocol for Medical IoT. Futur. Gener. Comput. Syst. 101, 621\u2013634 (2019). https:\/\/doi.org\/10.1016\/j.future.2019.07.004","journal-title":"Futur. Gener. Comput. Syst."},{"key":"806_CR63","doi-asserted-by":"publisher","first-page":"1005","DOI":"10.1016\/j.future.2016.12.028","volume":"78","author":"R Amin","year":"2018","unstructured":"Amin, R., Kumar, N., Biswas, G.P., Iqbal, R., Chang, V.: A light weight authentication protocol for IoT-enabled devices in distributed cloud computing environment. Futur. Gener. Comput. Syst. 78, 1005\u20131019 (2018). https:\/\/doi.org\/10.1016\/j.future.2016.12.028","journal-title":"Futur. Gener. Comput. Syst."},{"key":"806_CR64","doi-asserted-by":"publisher","first-page":"9728","DOI":"10.1109\/ACCESS.2020.2964815","volume":"8","author":"SK Yang","year":"2020","unstructured":"Yang, S.K., Shiue, Y.M., Su, Z.Y., Liu, I.H., Liu, C.G.: An authentication information exchange scheme in WSN for IoT applications. IEEE Access 8, 9728\u20139738 (2020). https:\/\/doi.org\/10.1109\/ACCESS.2020.2964815","journal-title":"IEEE Access"},{"issue":"2","key":"806_CR65","doi-asserted-by":"publisher","first-page":"479","DOI":"10.1007\/s10207-022-00639-x","volume":"22","author":"M Burakgazi Bilgen","year":"2023","unstructured":"Burakgazi Bilgen, M., Abul, O., Bicakci, K.: Authentication-enabled attribute-based access control for smart homes. Int. J. Inf. Secur. 22(2), 479\u2013495 (2023). https:\/\/doi.org\/10.1007\/s10207-022-00639-x","journal-title":"Int. J. Inf. Secur."},{"key":"806_CR66","doi-asserted-by":"crossref","unstructured":"Thakare, A., Kim, Y.G.: Secure and efficient authentication scheme in IoT environments, In: Dep. Comput. Inf. Secur. Converg. Eng. Intell. Drone, Sejong Univ. Seoul 05006, Korea, 11(3), (2021)","DOI":"10.3390\/app11031260"},{"key":"806_CR67","doi-asserted-by":"crossref","unstructured":"Bellare, M., Rogaway, P.: Random oracles are practical: a paradigm for designing efficient protocols, In: 1st ACM Conf. Comput. Commun. Secur., pp. 62\u201373, (1993)","DOI":"10.1145\/168588.168596"},{"issue":"5","key":"806_CR68","doi-asserted-by":"publisher","first-page":"4598","DOI":"10.1109\/JIOT.2019.2942271","volume":"7","author":"S Garg","year":"2020","unstructured":"Garg, S., Kaur, K., Kaddoum, G., Choo, K.K.R.: Toward secure and provable authentication for internet of things: realizing industry 4.0. IEEE Internet Things J. 7(5), 4598\u20134606 (2020). https:\/\/doi.org\/10.1109\/JIOT.2019.2942271","journal-title":"IEEE Internet Things J."},{"key":"806_CR69","doi-asserted-by":"publisher","DOI":"10.1016\/J.SYSARC.2022.102638","volume":"130","author":"D Li","year":"2022","unstructured":"Li, D., et al.: Blockchain-based authentication for IIoT devices with PUF. J. Syst. Archit. 130, 102638 (2022). https:\/\/doi.org\/10.1016\/J.SYSARC.2022.102638","journal-title":"J. Syst. Archit."},{"key":"806_CR70","doi-asserted-by":"publisher","unstructured":"Qureshi, M.A., Munir, A.: PUF-IPA: a PUF-based identity preserving protocol for Internet of Things authentication, In: 2020 IEEE 17th Annu. Consum. Commun. Netw. Conf. CCNC 2020, (2020). https:\/\/doi.org\/10.1109\/CCNC46108.2020.9045264","DOI":"10.1109\/CCNC46108.2020.9045264"},{"issue":"4","key":"806_CR71","doi-asserted-by":"publisher","first-page":"707","DOI":"10.1007\/s10207-022-00578-7","volume":"21","author":"A Huszti","year":"2022","unstructured":"Huszti, A., Kov\u00e1cs, S., Ol\u00e1h, N.: Scalable, password-based and threshold authentication for smart homes. Int. J. Inf. Secur. 21(4), 707\u2013723 (2022). https:\/\/doi.org\/10.1007\/s10207-022-00578-7","journal-title":"Int. J. Inf. Secur."},{"key":"806_CR72","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.jisa.2019.02.005","volume":"46","author":"A Lohachab","year":"2019","unstructured":"Lohachab, A., Karambir: ECC based inter-device authentication and authorization scheme using MQTT for IoT networks. J. Inf. Secur. Appl. 46, 1\u201312 (2019). https:\/\/doi.org\/10.1016\/j.jisa.2019.02.005","journal-title":"J. Inf. Secur. Appl."},{"issue":"11","key":"806_CR73","doi-asserted-by":"publisher","first-page":"7081","DOI":"10.1109\/TII.2019.2942389","volume":"16","author":"S Jangirala","year":"2020","unstructured":"Jangirala, S., Das, A.K., Vasilakos, A.V.: Designing secure lightweight blockchain-Enabled RFID-based authentication protocol for supply chains in 5G mobile edge computing environment. IEEE Trans. Ind. Inform. 16(11), 7081\u20137093 (2020). https:\/\/doi.org\/10.1109\/TII.2019.2942389","journal-title":"IEEE Trans. Ind. Inform."},{"key":"806_CR74","doi-asserted-by":"publisher","first-page":"113498","DOI":"10.1109\/ACCESS.2020.3002815","volume":"8","author":"S Atiewi","year":"2020","unstructured":"Atiewi, S., et al.: Scalable and secure big data IoT system based on multifactor authentication and lightweight cryptography. IEEE Access 8, 113498\u2013113511 (2020). https:\/\/doi.org\/10.1109\/ACCESS.2020.3002815","journal-title":"IEEE Access"},{"key":"806_CR75","doi-asserted-by":"publisher","DOI":"10.3390\/s20092468","author":"K Haseeb","year":"2020","unstructured":"Haseeb, K., Almogren, A., Din, I.U., Islam, N., Altameem, A.: SASC: secure and authentication-based sensor cloud architecture for intelligent internet of things. Sensors (Switzerland) (2020). https:\/\/doi.org\/10.3390\/s20092468","journal-title":"Sensors (Switzerland)"},{"issue":"1","key":"806_CR76","doi-asserted-by":"publisher","first-page":"1","DOI":"10.26599\/BDMA.2020.9020010","volume":"4","author":"M Azrour","year":"2021","unstructured":"Azrour, M., Mabrouki, J., Guezzaz, A., Farhaoui, Y.: New enhanced authentication protocol for Internet of Things. Big Data Min. Anal. 4(1), 1\u20139 (2021). https:\/\/doi.org\/10.26599\/BDMA.2020.9020010","journal-title":"Big Data Min. Anal."},{"key":"806_CR77","doi-asserted-by":"publisher","unstructured":"Dammak, M., Boudia, O.R.M., Messous, M.A., Senouci, S.M., Gransart, C.: Token-based lightweight authentication to secure IoT networks. In: 2019 16th IEEE Annu. Consum. Commun. Netw. Conf. CCNC 2019, (2019). https:\/\/doi.org\/10.1109\/CCNC.2019.8651825.","DOI":"10.1109\/CCNC.2019.8651825"},{"issue":"21","key":"806_CR78","doi-asserted-by":"publisher","first-page":"15663","DOI":"10.1109\/JIOT.2021.3078702","volume":"8","author":"J Sun","year":"2021","unstructured":"Sun, J., Khan, F., Li, J., Alshehri, M.D., Alturki, R., Wedyan, M.: Mutual authentication scheme for the device-to-server communication in the internet of medical things. IEEE Internet Things J. 8(21), 15663\u201315671 (2021). https:\/\/doi.org\/10.1109\/JIOT.2021.3078702","journal-title":"IEEE Internet Things J."},{"issue":"3","key":"806_CR79","doi-asserted-by":"publisher","first-page":"1328","DOI":"10.1109\/TNET.2021.3136943","volume":"30","author":"H Zhou","year":"2022","unstructured":"Zhou, H., Lv, K., Huang, L., Ma, X.: Quantum network: security assessment and key management. IEEE\/ACM Trans. Netw. 30(3), 1328\u20131339 (2022). https:\/\/doi.org\/10.1109\/TNET.2021.3136943","journal-title":"IEEE\/ACM Trans. Netw."}],"container-title":["International Journal of Information Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-023-00806-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10207-023-00806-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-023-00806-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,5,27]],"date-time":"2024-05-27T02:02:56Z","timestamp":1716775376000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10207-023-00806-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,1,12]]},"references-count":79,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2024,6]]}},"alternative-id":["806"],"URL":"https:\/\/doi.org\/10.1007\/s10207-023-00806-8","relation":{},"ISSN":["1615-5262","1615-5270"],"issn-type":[{"value":"1615-5262","type":"print"},{"value":"1615-5270","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,1,12]]},"assertion":[{"value":"17 December 2023","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"12 January 2024","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"All authors have participated in (a) conception and design, or analysis and interpretation of the data; (b) drafting the article or revising it critically for important intellectual content; and (c) approval of the final version. This manuscript has not been submitted to, nor is under review at, another journal or other publishing venue.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"Not applicable.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical approval"}}]}}