{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,11]],"date-time":"2025-09-11T17:25:54Z","timestamp":1757611554940,"version":"3.44.0"},"reference-count":29,"publisher":"Springer Science and Business Media LLC","issue":"6","license":[{"start":{"date-parts":[[2025,6,16]],"date-time":"2025-06-16T00:00:00Z","timestamp":1750032000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,6,16]],"date-time":"2025-06-16T00:00:00Z","timestamp":1750032000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Cluster Comput"],"published-print":{"date-parts":[[2025,9]]},"DOI":"10.1007\/s10586-025-05293-1","type":"journal-article","created":{"date-parts":[[2025,6,16]],"date-time":"2025-06-16T12:27:14Z","timestamp":1750076834000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["A secure and energy-efficient authentication framework for the internet of electric things"],"prefix":"10.1007","volume":"28","author":[{"given":"Samiulla","family":"Itoo","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Vinod","family":"Kumar","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Musheer","family":"Ahmad","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2025,6,16]]},"reference":[{"issue":"1","key":"5293_CR1","doi-asserted-by":"publisher","first-page":"900","DOI":"10.1109\/JSYST.2019.2912415","volume":"14","author":"J Song","year":"2019","unstructured":"Song, J., Liu, Y., Shao, J., Tang, C.: A dynamic membership data aggregation (dmda) protocol for smart grid. IEEE Syst. J. 14(1), 900\u2013908 (2019)","journal-title":"IEEE Syst. J."},{"key":"5293_CR2","doi-asserted-by":"publisher","first-page":"557","DOI":"10.1016\/j.future.2017.05.002","volume":"81","author":"K Mahmood","year":"2018","unstructured":"Mahmood, K., Chaudhry, S.A., Naqvi, H., Kumari, S., Li, X., Sangaiah, A.K.: An elliptic curve cryptography based lightweight authentication scheme for smart grid communication. Future Gener. Comput. Syst. 81, 557\u2013565 (2018)","journal-title":"Future Gener. Comput. Syst."},{"key":"5293_CR3","doi-asserted-by":"publisher","first-page":"770","DOI":"10.1016\/j.future.2019.05.069","volume":"100","author":"L Zhang","year":"2019","unstructured":"Zhang, L., Zhao, L., Yin, S., Chi, C.-H., Liu, R., Zhang, Y.: A lightweight authentication scheme with privacy protection for smart grid communications. Future Gener. Comput. Syst. 100, 770\u2013778 (2019)","journal-title":"Future Gener. Comput. Syst."},{"issue":"10","key":"5293_CR4","doi-asserted-by":"publisher","first-page":"2662","DOI":"10.3390\/en11102662","volume":"11","author":"A Braeken","year":"2018","unstructured":"Braeken, A., Kumar, P., Martin, A.: Efficient and provably secure key agreement for modern smart metering communications. Energies 11(10), 2662 (2018)","journal-title":"Energies"},{"issue":"2","key":"5293_CR5","first-page":"906","volume":"7","author":"J-L Tsai","year":"2015","unstructured":"Tsai, J.-L., Lo, N.-W.: Secure anonymous key distribution scheme for smart grid. IEEE Trans. Smart Grid. 7(2), 906\u2013914 (2015)","journal-title":"IEEE Trans. Smart Grid."},{"issue":"11","key":"5293_CR6","doi-asserted-by":"publisher","first-page":"21023","DOI":"10.3390\/s141121023","volume":"14","author":"J Nam","year":"2014","unstructured":"Nam, J., Kim, M., Paik, J., Lee, Y., Won, D.: A provably-secure ecc-based authentication scheme for wireless sensor networks. Sensors 14(11), 21023\u201321044 (2014)","journal-title":"Sensors"},{"issue":"1","key":"5293_CR7","doi-asserted-by":"publisher","first-page":"71","DOI":"10.1109\/MCOM.2015.7010518","volume":"53","author":"D He","year":"2015","unstructured":"He, D., Zeadally, S.: Authentication protocol for an ambient assisted living system. IEEE Commun. Mag. 53(1), 71\u201377 (2015)","journal-title":"IEEE Commun. Mag."},{"issue":"8","key":"5293_CR8","doi-asserted-by":"publisher","first-page":"3599","DOI":"10.1109\/TII.2017.2773666","volume":"14","author":"X Li","year":"2017","unstructured":"Li, X., Niu, J., Bhuiyan, M.Z.A., Wu, F., Karuppiah, M., Kumari, S.: A robust ecc-based provable secure authentication protocol with privacy preserving for industrial internet of things. IEEE Trans. Ind. Inform. 14(8), 3599\u20133609 (2017)","journal-title":"IEEE Trans. Ind. Inform."},{"issue":"5","key":"5293_CR9","doi-asserted-by":"publisher","first-page":"4359","DOI":"10.1109\/TVT.2017.2780183","volume":"67","author":"A Dua","year":"2017","unstructured":"Dua, A., Kumar, N., Das, A.K., Susilo, W.: Secure message communication protocol among vehicles in smart city. IEEE Trans. Veh. Technol. 67(5), 4359\u20134373 (2017)","journal-title":"IEEE Trans. Veh. Technol."},{"issue":"5","key":"5293_CR10","doi-asserted-by":"publisher","first-page":"942","DOI":"10.1109\/TDSC.2018.2828306","volume":"17","author":"J Srinivas","year":"2018","unstructured":"Srinivas, J., Das, A.K., Kumar, N., Rodrigues, J.J.: Cloud centric authentication for wearable healthcare monitoring system. IEEE Trans. Dependable Secure Comput. 17(5), 942\u2013956 (2018)","journal-title":"IEEE Trans. Dependable Secure Comput."},{"key":"5293_CR11","doi-asserted-by":"publisher","first-page":"242","DOI":"10.1016\/j.jpdc.2017.11.008","volume":"132","author":"X Li","year":"2019","unstructured":"Li, X., Wu, F., Kumari, S., Xu, L., Sangaiah, A.K., Choo, K.-K.R.: A provably secure and anonymous message authentication scheme for smart grids. J. Parallel Distrib. Comput. 132, 242\u2013249 (2019)","journal-title":"J. Parallel Distrib. Comput."},{"key":"5293_CR12","doi-asserted-by":"publisher","first-page":"22633","DOI":"10.1109\/ACCESS.2019.2898376","volume":"7","author":"Y Chen","year":"2019","unstructured":"Chen, Y., Mart\u00ednez, J.-F., Castillejo, P., L\u00f3pez, L.: A bilinear map pairing based authentication scheme for smart grid communications: Pauth. IEEE Access 7, 22633\u201322643 (2019)","journal-title":"IEEE Access"},{"issue":"1","key":"5293_CR13","first-page":"4836016","volume":"2019","author":"L Wu","year":"2019","unstructured":"Wu, L., Wang, J., Zeadally, S., He, D.: Anonymous and efficient message authentication scheme for smart grid. Secur. Commun. Netw. 2019(1), 4836016 (2019)","journal-title":"Secur. Commun. Netw."},{"issue":"7","key":"5293_CR14","doi-asserted-by":"publisher","first-page":"5744","DOI":"10.1109\/JIOT.2020.3030308","volume":"8","author":"B Bera","year":"2020","unstructured":"Bera, B., Saha, S., Das, A.K., Vasilakos, A.V.: Designing blockchain-based access control protocol in iot-enabled smart-grid system. IEEE Internet Things J. 8(7), 5744\u20135761 (2020)","journal-title":"IEEE Internet Things J."},{"issue":"5","key":"5293_CR15","doi-asserted-by":"publisher","first-page":"4426","DOI":"10.1109\/TSG.2021.3072244","volume":"12","author":"HMS Badar","year":"2021","unstructured":"Badar, H.M.S., Qadri, S., Shamshad, S., Ayub, M.F., Mahmood, K., Kumar, N.: An identity based authentication protocol for smart grid environment using physical uncloneable function. IEEE Trans. Smart Grid 12(5), 4426\u20134434 (2021)","journal-title":"IEEE Trans. Smart Grid"},{"key":"5293_CR16","doi-asserted-by":"publisher","DOI":"10.1016\/j.sysarc.2021.102053","volume":"116","author":"AA Khan","year":"2021","unstructured":"Khan, A.A., Kumar, V., Ahmad, M., Rana, S.: Lakaf: lightweight authentication and key agreement framework for smart grid network. J. Syst. Archit. 116, 102053 (2021)","journal-title":"J. Syst. Archit."},{"key":"5293_CR17","volume":"45","author":"B Zhao","year":"2021","unstructured":"Zhao, B., Zeng, S., Feng, H., Chen, Z., Wang, Z., Yang, J., Zhao, J.: Lightweight mutual authentication strategy for internet of electric things. Sustain. Energy Technol. Assess. 45, 101130 (2021)","journal-title":"Sustain. Energy Technol. Assess."},{"issue":"7","key":"5293_CR18","first-page":"4011","volume":"21","author":"S Itoo","year":"2022","unstructured":"Itoo, S., Kumar, V., Khan, A.A., Ahmad, M., Singh, G.: Cryptanalysis and suggested improvement of light weight mutual authentication strategy for internet of electric things. Adv. Appl. Math. Sci. 21(7), 4011\u20134021 (2022)","journal-title":"Adv. Appl. Math. Sci."},{"issue":"10","key":"5293_CR19","doi-asserted-by":"publisher","first-page":"13407","DOI":"10.1109\/TITS.2024.3410114","volume":"25","author":"D Abbasinezhad-Mood","year":"2024","unstructured":"Abbasinezhad-Mood, D., Ghaemi, H.: Dual-signature blockchain-based key sharing protocol for secure v2v communications in multi-domain iov environments. IEEE Trans. Intel. Trans. Syst. 25(10), 13407\u201313416 (2024). https:\/\/doi.org\/10.1109\/TITS.2024.3410114","journal-title":"IEEE Trans. Intel. Trans. Syst."},{"key":"5293_CR20","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2024.103843","volume":"224","author":"H Ghaemi","year":"2024","unstructured":"Ghaemi, H., Abbasinezhad-Mood, D., Ostad-Sharif, A., Alizadehsani, Z.: Novel blockchain-assisted fault-tolerant roaming authentication protocol for mobility networks without home agent entanglement. J. Netw. Comput. Appl. 224, 103843 (2024)","journal-title":"J. Netw. Comput. Appl."},{"issue":"2","key":"5293_CR21","doi-asserted-by":"publisher","first-page":"198","DOI":"10.1109\/TIT.1983.1056650","volume":"29","author":"D Dolev","year":"1983","unstructured":"Dolev, D., Yao, A.: On the security of public key protocols. IEEE Trans. Inform. Theory 29(2), 198\u2013208 (1983)","journal-title":"IEEE Trans. Inform. Theory"},{"doi-asserted-by":"crossref","unstructured":"Canetti, R., Krawczyk, H.: Universally composable notions of key exchange and secure channels. In: International Conference on the Theory and Applications of Cryptographic Techniques, Springer, pp. 337\u2013351 (2002)","key":"5293_CR22","DOI":"10.1007\/3-540-46035-7_22"},{"doi-asserted-by":"crossref","unstructured":"Abdalla, M., Chevassut, O., Fouque, P.-A., Pointcheval, D.: A simple threshold authenticated key exchange from short secrets, In: International Conference on the Theory and Application of Cryptology and Information Security, Springer, pp. 566\u2013584 (2005)","key":"5293_CR23","DOI":"10.1007\/11593447_31"},{"doi-asserted-by":"crossref","unstructured":"Cremers, C.J.: The scyther tool: Verification, falsification, and analysis of security protocols, in: International conference on computer aided verification, Springer, pp. 414\u2013418 (2008)","key":"5293_CR24","DOI":"10.1007\/978-3-540-70545-1_38"},{"key":"5293_CR25","volume-title":"Scyther: Semantics and Verification of Security Protocols","author":"CJF Cremers","year":"2006","unstructured":"Cremers, C.J.F., et al.: Scyther: Semantics and Verification of Security Protocols. Eindhoven university of Technology Eindhoven, Eindhoven (2006)"},{"key":"5293_CR26","doi-asserted-by":"publisher","first-page":"47","DOI":"10.1016\/j.future.2018.02.034","volume":"84","author":"D Abbasinezhad-Mood","year":"2018","unstructured":"Abbasinezhad-Mood, D., Nikooghadam, M.: Design and hardware implementation of a security-enhanced elliptic curve cryptography based lightweight authentication scheme for smart grid communications. Future Gener. Comput. Syst. 84, 47\u201357 (2018)","journal-title":"Future Gener. Comput. Syst."},{"key":"5293_CR27","first-page":"850","volume":"2011","author":"A De Caro","year":"2011","unstructured":"De Caro, A., Iovino, V.: jpbc: Java pairing based cryptography, in,: IEEE symposium on computers and communications (ISCC). IEEE 2011, 850\u2013855 (2011)","journal-title":"IEEE"},{"issue":"2","key":"5293_CR28","doi-asserted-by":"publisher","first-page":"1005","DOI":"10.1109\/SURV.2013.091513.00050","volume":"16","author":"HH Kilinc","year":"2013","unstructured":"Kilinc, H.H., Yanik, T.: A survey of sip authentication and key agreement schemes. IEEE Commun. Surv. Tutor. 16(2), 1005\u20131023 (2013)","journal-title":"IEEE Commun. Surv. Tutor."},{"issue":"1","key":"5293_CR29","doi-asserted-by":"publisher","first-page":"254","DOI":"10.1109\/JSEN.2015.2475298","volume":"16","author":"P Kumar","year":"2015","unstructured":"Kumar, P., Gurtov, A., Iinatti, J., Ylianttila, M., Sain, M.: Lightweight and secure session-key establishment scheme in smart home environments. IEEE Sens. J. 16(1), 254\u2013264 (2015)","journal-title":"IEEE Sens. J."}],"container-title":["Cluster Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-025-05293-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10586-025-05293-1\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-025-05293-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,3]],"date-time":"2025-09-03T20:22:33Z","timestamp":1756930953000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10586-025-05293-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,6,16]]},"references-count":29,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2025,9]]}},"alternative-id":["5293"],"URL":"https:\/\/doi.org\/10.1007\/s10586-025-05293-1","relation":{},"ISSN":["1386-7857","1573-7543"],"issn-type":[{"type":"print","value":"1386-7857"},{"type":"electronic","value":"1573-7543"}],"subject":[],"published":{"date-parts":[[2025,6,16]]},"assertion":[{"value":"22 September 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"28 February 2025","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"24 April 2025","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"16 June 2025","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no Conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"The manuscript is not currently being considered for publication elsewhere.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical approval and consent to participate"}},{"value":"All authors are agreed for publication.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent for publication"}}],"article-number":"382"}}