{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,11]],"date-time":"2025-09-11T18:20:11Z","timestamp":1757614811380,"version":"3.44.0"},"reference-count":28,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2025,7,29]],"date-time":"2025-07-29T00:00:00Z","timestamp":1753747200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,7,29]],"date-time":"2025-07-29T00:00:00Z","timestamp":1753747200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"name":"This work is supported by the National Natural Science Foundation of China","award":["No. 62162039","No. 62162039","No. 62162039","No. 62162039"],"award-info":[{"award-number":["No. 62162039","No. 62162039","No. 62162039","No. 62162039"]}]},{"name":"This work is supported by Foundation for the Key Research and Development Program of Gansu Province, China","award":["No. 23YFGA0060","No. 23YFGA0060","No. 23YFGA0060","No. 23YFGA0060"],"award-info":[{"award-number":["No. 23YFGA0060","No. 23YFGA0060","No. 23YFGA0060","No. 23YFGA0060"]}]},{"DOI":"10.13039\/501100004775","name":"Natural Science Foundation of Gansu Province, China","doi-asserted-by":"crossref","award":["No. 23JRRA837","No. 23JRRA837","No. 23JRRA837","No. 23JRRA837"],"award-info":[{"award-number":["No. 23JRRA837","No. 23JRRA837","No. 23JRRA837","No. 23JRRA837"]}],"id":[{"id":"10.13039\/501100004775","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Int. J. Inf. Secur."],"published-print":{"date-parts":[[2025,8]]},"DOI":"10.1007\/s10207-025-01091-3","type":"journal-article","created":{"date-parts":[[2025,7,29]],"date-time":"2025-07-29T12:38:09Z","timestamp":1753792689000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Formal security analysis and improvement based on the ZLL touchlink commissioning protocol"],"prefix":"10.1007","volume":"24","author":[{"given":"Tao","family":"Feng","sequence":"first","affiliation":[]},{"given":"Longxin","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Yi","family":"Wu","sequence":"additional","affiliation":[]},{"given":"Chunyan","family":"Liu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,7,29]]},"reference":[{"key":"1091_CR1","doi-asserted-by":"crossref","unstructured":"Hammi, B., Zeadally, S., Khatoun, R., Nebhen, J.: Survey on smart homes: Vulnerabilities, risks, and countermeasures. vol.\u00a0117, p. 102677. Elsevier (2022)","DOI":"10.1016\/j.cose.2022.102677"},{"issue":"5","key":"1091_CR2","doi-asserted-by":"publisher","first-page":"1928","DOI":"10.1080\/00207543.2023.2290229","volume":"62","author":"X Mu","year":"2024","unstructured":"Mu, X., Antwi-Afari, M.F.: The applications of internet of things (iot) in industrial management: a science mapping review. International Journal of Production Research 62(5), 1928\u20131952 (2024)","journal-title":"International Journal of Production Research"},{"key":"1091_CR3","doi-asserted-by":"crossref","unstructured":"Omar, A., AlMaeeni, S., Attia, H., Takruri, M., Altunaiji, A., Sanduleanu, M., Shubair, R., Ashhab, M.S., Al\u00a0Ali, M., Al\u00a0Hebsi, G.: Smart city: Recent advances in intelligent street lighting systems based on iot. vol.\u00a02022, p. 5249187. Wiley Online Library (2022)","DOI":"10.1155\/2022\/5249187"},{"key":"1091_CR4","doi-asserted-by":"crossref","unstructured":"Morgner, P., Mattejat, S., Benenson, Z., M\u00fcller, C., Armknecht, F.: Insecure to the touch: Attacking zigbee 3.0 via touchlink commissioning. In: Proceedings of the 10th ACM conference on security and privacy in wireless and mobile networks. pp. 230\u2013240 (2017)","DOI":"10.1145\/3098243.3098254"},{"key":"1091_CR5","doi-asserted-by":"crossref","unstructured":"Yang, J., Liu, R., Cui, B.: Enhanced secure zigbee light link protocol based on network key update mechanism pp. 343\u2013353 (2019)","DOI":"10.1007\/978-3-319-93554-6_32"},{"issue":"4","key":"1091_CR6","doi-asserted-by":"publisher","first-page":"579","DOI":"10.3390\/sym12040579","volume":"12","author":"G Kambourakis","year":"2020","unstructured":"Kambourakis, G., Kolias, C., Geneiatakis, D., Karopoulos, G., Makrakis, G.M., Kounelis, I.: A state-of-the-art review on the security of mainstream iot wireless pan protocol stacks. Symmetry 12(4), 579 (2020)","journal-title":"Symmetry"},{"key":"1091_CR7","doi-asserted-by":"crossref","unstructured":"Sadikin, F., van Deursen, T., Kumar, S.: A zigbee intrusion detection system for iot using secure and efficient data collection (vol 12, 100,306, 2020). INTERNET OF THINGS 19 (2022)","DOI":"10.1016\/j.iot.2022.100523"},{"key":"1091_CR8","doi-asserted-by":"crossref","unstructured":"Lourme, O., Grimaud, G., Hauspie, M.: Zbds2023: A multi location zigbee dataset to build innovative iot intrusion detection systems pp. 84\u201391 (2023)","DOI":"10.1109\/WiMob58348.2023.10187745"},{"issue":"19","key":"1091_CR9","doi-asserted-by":"publisher","first-page":"19238","DOI":"10.1109\/JIOT.2022.3165580","volume":"9","author":"D He","year":"2022","unstructured":"He, D., Lu, X., Li, X., Chan, S., Guizani, M.: Design and formal analysis of a lightweight mipv6 authentication scheme. IEEE Internet of Things Journal 9(19), 19238\u201319245 (2022)","journal-title":"IEEE Internet of Things Journal"},{"issue":"8","key":"1091_CR10","doi-asserted-by":"publisher","first-page":"10906","DOI":"10.1109\/TVT.2023.3262173","volume":"72","author":"H Khalid","year":"2023","unstructured":"Khalid, H., Hashim, S.J., Hashim, F., Ahamed, S.M.S., Chaudhary, M.A., Altarturi, H.H., Saadoon, M.: Hoopoe: High performance and efficient anonymous handover authentication protocol for flying out of zone uavs. IEEE Transactions on Vehicular Technology 72(8), 10906\u201310920 (2023)","journal-title":"IEEE Transactions on Vehicular Technology"},{"issue":"12","key":"1091_CR11","doi-asserted-by":"publisher","first-page":"24698","DOI":"10.1109\/TITS.2022.3207593","volume":"23","author":"S Bojjagani","year":"2022","unstructured":"Bojjagani, S., Reddy, Y.P., Anuradha, T., Rao, P.V., Reddy, B.R., Khan, M.K.: Secure authentication and key management protocol for deployment of internet of vehicles (iov) concerning intelligent transport systems. IEEE Transactions on Intelligent Transportation Systems 23(12), 24698\u201324713 (2022)","journal-title":"IEEE Transactions on Intelligent Transportation Systems"},{"key":"1091_CR12","doi-asserted-by":"crossref","unstructured":"Wang, W., Huang, W., Meng, Z., Xiong, Y., Su, C.: Advancing the automation capability of verifying security protocols. IEEE Transactions on Dependable and Secure Computing (2024)","DOI":"10.1109\/TDSC.2024.3368131"},{"issue":"17","key":"1091_CR13","doi-asserted-by":"publisher","first-page":"6713","DOI":"10.3390\/s22176713","volume":"22","author":"Y Wu","year":"2022","unstructured":"Wu, Y., Feng, T.: An anonymous authentication and key update mechanism for iot devices based on enocean protocol. Sensors 22(17), 6713 (2022)","journal-title":"Sensors"},{"issue":"12","key":"1091_CR14","doi-asserted-by":"publisher","first-page":"12978","DOI":"10.1007\/s11227-023-05185-4","volume":"79","author":"D Lages","year":"2023","unstructured":"Lages, D., Borba, E., Tavares, E., Balieiro, A., Souza, E.: A cpn-based model for assessing energy consumption of iot networks. The Journal of Supercomputing 79(12), 12978\u201313000 (2023)","journal-title":"The Journal of Supercomputing"},{"key":"1091_CR15","doi-asserted-by":"crossref","unstructured":"Ali, N., Punnekkat, S., Rauf, A.: Modeling and safety analysis for collaborative safety-critical systems using hierarchical colored petri nets. vol.\u00a0210, p. 111958. Elsevier (2024)","DOI":"10.1016\/j.jss.2024.111958"},{"key":"1091_CR16","unstructured":"Gong, X., Feng, T., Du, J., et\u00a0al.: Formal modeling and security analysis method of security protocol based on cpn (2021)"},{"key":"1091_CR17","unstructured":"Pu, C., Choo, K.K.R., Kora\u0107, D.: A lightweight and anonymous application-aware authentication and key agreement protocol for the internet of drones. IEEE Internet of Things Journal (2024)"},{"key":"1091_CR18","doi-asserted-by":"crossref","unstructured":"Badar, H.M.S., Qadri, S., Shamshad, S., Ayub, M.F., Mahmood, K., Kumar, N.: An identity based authentication protocol for smart grid environment using physical uncloneable function. IEEE Transactions on Smart Grid 12(5), 4426\u20134434 (2021)","DOI":"10.1109\/TSG.2021.3072244"},{"key":"1091_CR19","doi-asserted-by":"crossref","unstructured":"Parameswarath, R.P., Sikdar, B.: A secure puf-based authentication protocol for remote keyless entry systems in cars. IEEE Transactions on Vehicular Technology (2024)","DOI":"10.1109\/TVT.2024.3363000"},{"issue":"5","key":"1091_CR20","doi-asserted-by":"publisher","first-page":"6227","DOI":"10.1007\/s12652-021-03421-4","volume":"14","author":"K Nimmy","year":"2023","unstructured":"Nimmy, K., Sankaran, S., Achuthan, K.: A novel lightweight puf based authentication protocol for iot without explicit crps in verifier database. Journal of Ambient Intelligence and Humanized Computing 14(5), 6227\u20136242 (2023)","journal-title":"Journal of Ambient Intelligence and Humanized Computing"},{"key":"1091_CR21","doi-asserted-by":"publisher","first-page":"2451","DOI":"10.1109\/TIFS.2023.3266624","volume":"18","author":"O Millwood","year":"2023","unstructured":"Millwood, O., Miskelly, J., Yang, B., Gope, P., Kavun, E.B., Lin, C.: Puf-phenotype: a robust and noise-resilient approach to aid group-based authentication with dram-pufs using machine learning. IEEE Transactions on Information Forensics and Security 18, 2451\u20132465 (2023)","journal-title":"IEEE Transactions on Information Forensics and Security"},{"key":"1091_CR22","doi-asserted-by":"crossref","unstructured":"Dolev, D., Yao, A.: On the security of public key protocols. vol.\u00a029, pp. 198\u2013208. IEEE (1983)","DOI":"10.1109\/TIT.1983.1056650"},{"key":"1091_CR23","unstructured":"M\u00fcller, C., Armknecht, F., Benenson, Z., Morgner, P.: On the security of the zigbee light link touchlink commissioning procedure. Gesellschaft f\u00fcr Informatik eV (2016)"},{"issue":"9","key":"1091_CR24","doi-asserted-by":"publisher","first-page":"15450","DOI":"10.1109\/JIOT.2024.3349689","volume":"11","author":"S Yu","year":"2024","unstructured":"Yu, S., Park, K.: Puf-based robust and anonymous authentication and key establishment scheme for v2g networks. IEEE Internet of Things Journal 11(9), 15450\u201315464 (2024)","journal-title":"IEEE Internet of Things Journal"},{"key":"1091_CR25","doi-asserted-by":"publisher","unstructured":"FAN, X., LIU, J., HE, J.: Lightweight PUF-based anonymous authentication protocol in V2G. Journal on Communications 45(10), 129\u2013141 (2024). https:\/\/doi.org\/10.11959\/j.issn.1000-436x.2024175","DOI":"10.11959\/j.issn.1000-436x.2024175"},{"key":"1091_CR26","doi-asserted-by":"publisher","first-page":"793","DOI":"10.1016\/j.aej.2024.08.078","volume":"106","author":"F Algarni","year":"2024","unstructured":"Algarni, F.: A lightweight and secure authentication protocol for visually impaired and handicapped people in the telehealth system. Alexandria Engineering Journal 106, 793\u2013808 (2024)","journal-title":"Alexandria Engineering Journal"},{"key":"1091_CR27","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2021.102787","volume":"58","author":"D Kaur","year":"2021","unstructured":"Kaur, D., Kumar, D.: Cryptanalysis and improvement of a two-factor user authentication scheme for smart home. Journal of Information Security and Applications 58, 102787 (2021)","journal-title":"Journal of Information Security and Applications"},{"issue":"3","key":"1091_CR28","doi-asserted-by":"publisher","first-page":"4938","DOI":"10.1109\/JSYST.2021.3127438","volume":"16","author":"S Zou","year":"2021","unstructured":"Zou, S., Cao, Q., Wang, C., Huang, Z., Xu, G.: A robust two-factor user authentication scheme-based ecc for smart home in iot. IEEE Systems Journal 16(3), 4938\u20134949 (2021)","journal-title":"IEEE Systems Journal"}],"container-title":["International Journal of Information Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-025-01091-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10207-025-01091-3\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-025-01091-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,5]],"date-time":"2025-09-05T11:33:31Z","timestamp":1757072011000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10207-025-01091-3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,7,29]]},"references-count":28,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2025,8]]}},"alternative-id":["1091"],"URL":"https:\/\/doi.org\/10.1007\/s10207-025-01091-3","relation":{},"ISSN":["1615-5262","1615-5270"],"issn-type":[{"type":"print","value":"1615-5262"},{"type":"electronic","value":"1615-5270"}],"subject":[],"published":{"date-parts":[[2025,7,29]]},"assertion":[{"value":"22 June 2025","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"29 July 2025","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"This article does not contain any studies with human participants performed by any of the authors.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical Approval"}},{"value":"The authors declare that they have no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing Interests"}}],"article-number":"188"}}