{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T07:42:17Z","timestamp":1740123737110,"version":"3.37.3"},"reference-count":50,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2021,1,24]],"date-time":"2021-01-24T00:00:00Z","timestamp":1611446400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,1,24]],"date-time":"2021-01-24T00:00:00Z","timestamp":1611446400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Mobile Netw Appl"],"published-print":{"date-parts":[[2022,2]]},"DOI":"10.1007\/s11036-020-01706-0","type":"journal-article","created":{"date-parts":[[2021,1,24]],"date-time":"2021-01-24T02:03:35Z","timestamp":1611453815000},"page":"96-108","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Identity Authentication with Association Behavior Sequence in Machine-to-Machine Mobile Terminals"],"prefix":"10.1007","volume":"27","author":[{"given":"Congcong","family":"Shi","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7303-8726","authenticated-orcid":false,"given":"Miao","family":"Du","sequence":"additional","affiliation":[]},{"given":"Weidong","family":"Lu","sequence":"additional","affiliation":[]},{"given":"Xiaoming","family":"He","sequence":"additional","affiliation":[]},{"given":"Sanglu","family":"Lu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,1,24]]},"reference":[{"key":"1706_CR1","doi-asserted-by":"crossref","first-page":"1241","DOI":"10.1109\/COMST.2016.2515516","volume":"18","author":"A Barki","year":"2016","unstructured":"Barki A, Bouabdallah A, Gharout S, Traore J (2016) M2M security: Challenges and solutions. IEEE Commun Surv Tutor 18:1241\u20131254","journal-title":"IEEE Commun Surv Tutor"},{"key":"1706_CR2","doi-asserted-by":"crossref","first-page":"886","DOI":"10.1109\/TMC.2016.2575835","volume":"16","author":"C Chang","year":"2017","unstructured":"Chang C, Chen J (2017) UM paging: Unified M2M paging with optimal DRX cycle. IEEE Trans Mob Comput 16:886\u2013900","journal-title":"IEEE Trans Mob Comput"},{"key":"1706_CR3","doi-asserted-by":"crossref","first-page":"525","DOI":"10.1109\/COMST.2014.2361626","volume":"17","author":"F Ghavimi","year":"2015","unstructured":"Ghavimi F, Chen H (2015) M2M communications in 3GPP LTE\/LTE-A Networks: Architectures, service requirements, challenges, and applications. IEEE Commun Surv Tutor 17:525\u2013549","journal-title":"IEEE Commun Surv Tutor"},{"key":"1706_CR4","doi-asserted-by":"crossref","first-page":"8667","DOI":"10.1109\/TVT.2017.2702388","volume":"66","author":"W Liu","year":"2017","unstructured":"Liu W, Qin G, He Y, Jiang F (2017) Distributed cooperative reinforcement learning-based traffic signal control that integrates V2X networks\u2019 dynamic clustering. IEEE Trans Veh Technol 66:8667\u20138681","journal-title":"IEEE Trans Veh Technol"},{"issue":"4","key":"1706_CR5","doi-asserted-by":"crossref","first-page":"870","DOI":"10.1109\/TPDS.2018.2871449","volume":"30","author":"C Xu","year":"2019","unstructured":"Xu C, Wang K, Li P, Guo S, Luo J, Ye B, Guo M (2019) Making big data open in edges: a resource-efficient blockchain-based approach. IEEE Trans Parallel Distrib Syst 30(4):870\u2013882","journal-title":"IEEE Trans Parallel Distrib Syst"},{"key":"1706_CR6","doi-asserted-by":"crossref","first-page":"817","DOI":"10.1109\/TMC.2015.2442529","volume":"15","author":"N Morozs","year":"2016","unstructured":"Morozs N, Clarke T, Grace D (2016) Distributed heuristically accelerated Q-learning for robust cognitive spectrum management in LTE cellular systems. IEEE Trans Mob Comput 15:817\u2013 825","journal-title":"IEEE Trans Mob Comput"},{"key":"1706_CR7","doi-asserted-by":"publisher","unstructured":"Wei Y, Yu FR, Song M, Han Z Joint optimization of caching, computing, and radio resources for fog-enabled IoT using natural actor-critic deep reinforcement learning. IEEE Internet of Things Journal, https:\/\/doi.org\/10.1109\/JIOT.2018","DOI":"10.1109\/JIOT.2018"},{"key":"1706_CR8","doi-asserted-by":"crossref","first-page":"107","DOI":"10.1109\/TETC.2014.2379991","volume":"3","author":"J Seto","year":"2015","unstructured":"Seto J, Wang Y, Lin X (2015) User-habit-oriented authentication model: Toward secure, user-friendly authentication for mobile devices. IEEE Trans Emerg Topics Comput 3:107\u2013118","journal-title":"IEEE Trans Emerg Topics Comput"},{"key":"1706_CR9","doi-asserted-by":"crossref","first-page":"805","DOI":"10.1109\/JSYST.2014.2322973","volume":"9","author":"J Tsai","year":"2015","unstructured":"Tsai J, Lo N (2015) A privacy-aware authentication scheme for distributed mobile cloud computing services. IEEE Syst J 9:805\u2013815","journal-title":"IEEE Syst J"},{"key":"1706_CR10","doi-asserted-by":"publisher","unstructured":"Liu Y, Wang K, Qian K, Du M, Guo S (2019) Tornado: enabling blockchain in heterogeneous Internet of things through a space-structured approach. IEEE Internet of Things Journal, https:\/\/doi.org\/10.1109\/JIOT.2019.2954128","DOI":"10.1109\/JIOT.2019.2954128"},{"key":"1706_CR11","doi-asserted-by":"crossref","first-page":"2884","DOI":"10.1109\/JIOT.2017.2714179","volume":"50","author":"S Roy","year":"2018","unstructured":"Roy S, Chatterjee S, Das A K, Chattopadhyay S, Kumari S, Jo M (2018) Chaotic map-based anonymous user authentication scheme with user biometrics and fuzzy extractor for crowdsourcing Internet of Things. IEEE Internet Things J 50:2884\u20132895","journal-title":"IEEE Internet Things J"},{"key":"1706_CR12","doi-asserted-by":"crossref","first-page":"2039","DOI":"10.1109\/JSYST.2016.2574719","volume":"12","author":"Q Jiang","year":"2018","unstructured":"Jiang Q, Ma J, Wei F (2018) On the security of a privacy-aware authentication scheme for distributed mobile cloud computing services. IEEE Syst J 12:2039\u20132042","journal-title":"IEEE Syst J"},{"issue":"12","key":"1706_CR13","doi-asserted-by":"crossref","first-page":"1755","DOI":"10.1109\/TC.2019.2931716","volume":"68","author":"Q Zhou","year":"2019","unstructured":"Zhou Q, Wang K, Li P, Zeng D, Guo S., Ye B, Guo M (2019) Fast coflow scheduling via traffic compression and stage pipelining in datacenter networks. IEEE Trans Comput 68(12):1755\u20131771","journal-title":"IEEE Trans Comput"},{"key":"1706_CR14","doi-asserted-by":"crossref","first-page":"4042","DOI":"10.1109\/JIOT.2018.2851501","volume":"5","author":"DM Shila","year":"2018","unstructured":"Shila D M, Srivastava K (2018) CASTRA: Seamless and unobtrusive authentication of users to diverse mobile services. IEEE Internet Things J 5:4042\u20134057","journal-title":"IEEE Internet Things J"},{"key":"1706_CR15","doi-asserted-by":"crossref","first-page":"1042","DOI":"10.1109\/TIFS.2017.2777787","volume":"13","author":"H Gunasinghe","year":"2018","unstructured":"Gunasinghe H, Bertino E (2018) PrivBioMTAuth: Privacy preserving biometrics-based and user centric protocol for user authentication from mobile phones. IEEE Trans Inf Forensics Secur 13 :1042\u20131057","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"1706_CR16","doi-asserted-by":"crossref","first-page":"1240","DOI":"10.1109\/TIFS.2018.2876748","volume":"14","author":"P Perera","year":"2019","unstructured":"Perera P, Patel V M (2019) Face-based multiple user active authentication on mobile devices. IEEE Trans Inf Forensics Secur 14:1240\u20131250","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"1706_CR17","doi-asserted-by":"crossref","first-page":"5700","DOI":"10.1109\/TWC.2018.2848937","volume":"17","author":"S Tomasin","year":"2018","unstructured":"Tomasin S (2018) Analysis of channel-based user authentication by key-less and key-based approaches. IEEE Trans Wirel Commun 17:5700\u20135712","journal-title":"IEEE Trans Wirel Commun"},{"key":"1706_CR18","doi-asserted-by":"publisher","unstructured":"Du M, Wang K, Xia Z, Zhang Y (2018) Differential privacy preserving of training model in wireless big data with edge computing. IEEE Transactions on Big Data, https:\/\/doi.org\/10.1109\/TBDATA.2018.2829886","DOI":"10.1109\/TBDATA.2018.2829886"},{"key":"1706_CR19","doi-asserted-by":"crossref","first-page":"1268","DOI":"10.1109\/COMST.2014.2386915","volume":"17","author":"W Meng","year":"2015","unstructured":"Meng W, Wong D S, Furnell S, Zhou J (2015) Surveying the development of biometric user authentication on mobile phones. IEEE Commun Surv Tutor 17:1268\u20131293","journal-title":"IEEE Commun Surv Tutor"},{"key":"1706_CR20","doi-asserted-by":"crossref","first-page":"2225","DOI":"10.1109\/TIFS.2015.2452893","volume":"10","author":"KM Borle","year":"2015","unstructured":"Borle K M, Chen B, Du W K (2015) Physical layer spectrum usage authentication in cognitive radio: Analysis and implementation. IEEE Trans Inf Forensics Secur 10:2225\u20132235","journal-title":"IEEE Trans Inf Forensics Secur"},{"issue":"2","key":"1706_CR21","doi-asserted-by":"crossref","first-page":"145","DOI":"10.1109\/TSUSC.2017.2715038","volume":"4","author":"M Du","year":"2019","unstructured":"Du M, Wang K, Liu X, Guo S, Zhang Y (2019) A differential privacy-based query model for sustainable fog data centers. IEEE Transactions on Sustainable Computing 4(2):145\u2013155","journal-title":"IEEE Transactions on Sustainable Computing"},{"key":"1706_CR22","doi-asserted-by":"crossref","first-page":"319","DOI":"10.1109\/TIFS.2018.2850299","volume":"14","author":"L Wu","year":"2019","unstructured":"Wu L, Wang J, Choo K R, He D (2019) Secure key agreement and key protection for mobile device user authentication. IEEE Trans Inf Forensics Secur 14:319\u2013330","journal-title":"IEEE Trans Inf Forensics Secur"},{"issue":"8","key":"1706_CR23","doi-asserted-by":"crossref","first-page":"62","DOI":"10.1109\/MCOM.2018.1701148","volume":"56","author":"M Du","year":"2018","unstructured":"Du M, Wang K, Chen Y, Wang X, Sun Y (2018) Big data privacy preserving in multiaccess edge computing for heterogeneous internet of things. IEEE Commun Mag 56(8):62\u201367","journal-title":"IEEE Commun Mag"},{"key":"1706_CR24","doi-asserted-by":"publisher","unstructured":"Yang T, Zhang Y, Li W, Zomaya AY (2020) Decentralized networked load frequency control in interconnected power systems based on stochastic jump system theory. IEEE Trans Smart Grid, https:\/\/doi.org\/10.1109\/TSG.2020.2978029","DOI":"10.1109\/TSG.2020.2978029"},{"key":"1706_CR25","doi-asserted-by":"crossref","first-page":"150","DOI":"10.1109\/MCOM.2018.1700339","volume":"56","author":"K Yeh","year":"2018","unstructured":"Yeh K, Su C, Chiu W, Zhou L (2018) I walk, therefore I am: Continuous user authentication with plantar biometrics. IEEE Commun Mag 56:150\u2013157","journal-title":"IEEE Commun Mag"},{"issue":"5","key":"1706_CR26","doi-asserted-by":"crossref","first-page":"2474","DOI":"10.1109\/TSG.2017.2670144","volume":"8","author":"K Wang","year":"2017","unstructured":"Wang K, Du M, Maharjan S, Sun Y (2017) Strategic honeypot game model for distributed denial of service attacks in the smart grid. IEEE Trans Smart Grid 8(5):2474\u20132482","journal-title":"IEEE Trans Smart Grid"},{"key":"1706_CR27","doi-asserted-by":"crossref","first-page":"49","DOI":"10.1109\/TBDATA.2015.2472014","volume":"1","author":"EP Xing","year":"2015","unstructured":"Xing E P, Ho Q, Dai W, Kim J K, Wei J, Lee S, Zheng X, Xie P, Kumar A, Yu Y (2015) Petuum: A new platform for distributed machine learning on big data. IEEE Trans Big Data 1:49\u201367","journal-title":"IEEE Trans Big Data"},{"issue":"6","key":"1706_CR28","doi-asserted-by":"crossref","first-page":"49","DOI":"10.1109\/MNET.2016.1600113NM","volume":"30","author":"K Wang","year":"2016","unstructured":"Wang K, Du M, Sun Y, Vinel A, Zhang Y (2016) Attack detection and distributed forensics in machine-to-machine networks. IEEE Netw 30(6):49\u201355","journal-title":"IEEE Netw"},{"key":"1706_CR29","doi-asserted-by":"crossref","first-page":"7124","DOI":"10.1109\/TIE.2016.2585081","volume":"63","author":"P Gope","year":"2016","unstructured":"Gope P, Hwang T (2016) A realistic lightweight anonymous authentication protocol for securing real-time application data access in wireless sensor networks. IEEE Trans Ind Electron 63:7124\u20137132","journal-title":"IEEE Trans Ind Electron"},{"key":"1706_CR30","doi-asserted-by":"crossref","unstructured":"Wang K, Du M, Yang D, Zhu C, Shen J, Zhang Y (2016) Game theory-based active defense for intrusion detection in cyber-physical embedded systems. ACM Transactions on Embedded Computing Systems 16(1)Article 18","DOI":"10.1145\/2886100"},{"key":"1706_CR31","doi-asserted-by":"crossref","first-page":"3317","DOI":"10.1109\/TPDS.2014.2381640","volume":"26","author":"S Deng","year":"2015","unstructured":"Deng S, Huang L, Taheri J, Zomaya A Y (2015) Computation offloading for service workflow in mobile cloud computing. IEEE Trans Parallel Distrib Syst 26:3317\u20133329","journal-title":"IEEE Trans Parallel Distrib Syst"},{"key":"1706_CR32","doi-asserted-by":"crossref","first-page":"113","DOI":"10.1109\/TDSC.2016.2645208","volume":"16","author":"Y Yang","year":"2019","unstructured":"Yang Y, Sun J, Guo L (2019) PersonaIA: A lightweight implicit authentication system based on customized user behavior selection. IEEE Transactions on Dependable and Secure Computing 16:113\u2013126","journal-title":"IEEE Transactions on Dependable and Secure Computing"},{"key":"1706_CR33","first-page":"53583","volume":"6","author":"X Qiu","year":"2018","unstructured":"Qiu X, Jiang T, Wu S, Hayes M (2018) Physical layer authentication enhancement using a gaussian mixture model. IEEE Trans Evol Comput 6:53583\u201353592","journal-title":"IEEE Trans Evol Comput"},{"key":"1706_CR34","doi-asserted-by":"crossref","unstructured":"Pei C, Zhang N, Shen X S, Mark J W (2014) Channel-based physical layer authentication. In: Proc IEEE GLOBECOM, pp 4114\u20134119","DOI":"10.1109\/GLOCOM.2014.7037452"},{"key":"1706_CR35","doi-asserted-by":"crossref","unstructured":"Rouillard J (2008) Contextual QR codes. In: Proc IEEE ICCGI, pp 50\u201355","DOI":"10.1109\/ICCGI.2008.25"},{"key":"1706_CR36","doi-asserted-by":"crossref","first-page":"2089","DOI":"10.1109\/TIFS.2013.2286269","volume":"8","author":"L Xiao","year":"2013","unstructured":"Xiao L, Yan Q, Lou W, Chen G, Hou Y T (2013) Proximity-based security techniques for mobile users in wireless networks. IEEE Trans Inf Forensics Secur 8:2089\u20132100","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"1706_CR37","doi-asserted-by":"publisher","unstructured":"Du M, Wang K (2019) An SDN-enabled pseudo-honeypot strategy for distributed denial of service attacks in industrial Internet of things. IEEE Transactions on Industrial Informatics, https:\/\/doi.org\/10.1109\/TII.2019.2917912","DOI":"10.1109\/TII.2019.2917912"},{"key":"1706_CR38","doi-asserted-by":"crossref","first-page":"2302","DOI":"10.1109\/TIFS.2014.2362979","volume":"9","author":"J Yu","year":"2014","unstructured":"Yu J, Wang G, Mu Y, Gao W (2014) An efficient and improved generic framework for three-factor authentication with provably secure instantiation. IEEE Trans Inf Forensics Secur 9:2302\u2013 2313","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"1706_CR39","doi-asserted-by":"crossref","first-page":"428","DOI":"10.1109\/TDSC.2014.2355850","volume":"12","author":"D Wang","year":"2015","unstructured":"Wang D, He D, Wang P, Chu C H (2015) Anonymous two-factor authentication in distributed systems: Certain goals are beyond attainment. IEEE Transactions on Dependable and Secure Computing 12:428\u2013442","journal-title":"IEEE Transactions on Dependable and Secure Computing"},{"key":"1706_CR40","doi-asserted-by":"crossref","first-page":"30","DOI":"10.1109\/TCE.2014.6780922","volume":"60","author":"D He","year":"2014","unstructured":"He D, Kumar N, Lee J H, Sherratt R (2014) Enhanced three-factor security protocol for USB consumer storage devices. IEEE Trans Consum Electron 60:30\u201337","journal-title":"IEEE Trans Consum Electron"},{"key":"1706_CR41","doi-asserted-by":"crossref","first-page":"4523","DOI":"10.1109\/TIT.2016.2572725","volume":"62","author":"O Gungor","year":"2016","unstructured":"Gungor O, Koksal C (2016) On the basic limits of RF-fingerprint-based authentication. IEEE Trans Inf Theory 62:4523\u20134543","journal-title":"IEEE Trans Inf Theory"},{"key":"1706_CR42","doi-asserted-by":"crossref","first-page":"404","DOI":"10.1109\/THMS.2016.2623562","volume":"47","author":"G Peng","year":"2017","unstructured":"Peng G, Zhou G, Nguyen T (2017) Continuous authentication with touch behavioral biometrics and voice on wearable glasses. IEEE Transactions on Human-Machine Systems 47:404\u2013 416","journal-title":"IEEE Transactions on Human-Machine Systems"},{"key":"1706_CR43","doi-asserted-by":"crossref","first-page":"3622","DOI":"10.1109\/ACCESS.2017.2666258","volume":"5","author":"A Reddy","year":"2017","unstructured":"Reddy A, Yoon E, Das A (2017) Design of mutually authenticated key agreement protocol resistant to impersonation attacks for multi-server environment. IEEE Access 5:3622\u20133639","journal-title":"IEEE Access"},{"key":"1706_CR44","doi-asserted-by":"crossref","first-page":"313","DOI":"10.1109\/TSG.2016.2550801","volume":"9","author":"S Tan","year":"2017","unstructured":"Tan S, Song W, Stewart M (2017) Online data integrity attacks against real-time electrical market in smart grid. IEEE Trans Smart Grid 9:313\u2013322","journal-title":"IEEE Trans Smart Grid"},{"key":"1706_CR45","doi-asserted-by":"crossref","first-page":"2405","DOI":"10.1109\/TCYB.2014.2307349","volume":"44","author":"G Huang","year":"2014","unstructured":"Huang G, Song S, Gupta J N D, Wu C (2014) Semi-supervised and unsupervised extreme learning machines. IEEE Trans Cybern 44:2405\u20132417","journal-title":"IEEE Trans Cybern"},{"key":"1706_CR46","doi-asserted-by":"crossref","unstructured":"Tao D, Ma P, Obaidat MS (2019) Anonymous identity authentication mechanism for hybrid architecture in mobile crowd sensing networks. International Journal of Communication Systems 32(14)","DOI":"10.1002\/dac.4099"},{"key":"1706_CR47","doi-asserted-by":"publisher","unstructured":"Zhu Y W, Li X X, Wang J, Li J (2019) Cloud-assisted secure biometric identification with sub-linear search efficiency. Soft Computing, https:\/\/doi.org\/10.1007\/s00500-019-04401-9","DOI":"10.1007\/s00500-019-04401-9"},{"key":"1706_CR48","first-page":"1","volume":"10","author":"X Jia","year":"2019","unstructured":"Jia X, He D, Kumar N (2019) A provably secure and efficient identity-based anonymous authentication scheme for mobile edge computing. IEEE Syst J 10:1\u201312","journal-title":"IEEE Syst J"},{"key":"1706_CR49","first-page":"1","volume":"10","author":"Y Zhu","year":"2018","unstructured":"Zhu Y, Zhang Y, Yuan J, Wang X M (2018) FTP: An approximate fast privacy-preserving equality test protocol for authentication in internet of things. Secur Commun Netw 10:1\u201312","journal-title":"Secur Commun Netw"},{"key":"1706_CR50","first-page":"674","volume":"10","author":"N Malik","year":"2018","unstructured":"Malik N, Nanda P, He X, Puthal D (2018) Blockchain based secured identity authentication and expeditious revocation framework for vehicular networks. TrustCom\/BigDataSE 10:674\u2013679","journal-title":"TrustCom\/BigDataSE"}],"container-title":["Mobile Networks and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11036-020-01706-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11036-020-01706-0\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11036-020-01706-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,3,25]],"date-time":"2022-03-25T18:04:48Z","timestamp":1648231488000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11036-020-01706-0"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,1,24]]},"references-count":50,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2022,2]]}},"alternative-id":["1706"],"URL":"https:\/\/doi.org\/10.1007\/s11036-020-01706-0","relation":{},"ISSN":["1383-469X","1572-8153"],"issn-type":[{"type":"print","value":"1383-469X"},{"type":"electronic","value":"1572-8153"}],"subject":[],"published":{"date-parts":[[2021,1,24]]},"assertion":[{"value":"26 November 2020","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"24 January 2021","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}