{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,6]],"date-time":"2025-08-06T13:00:18Z","timestamp":1754485218854},"reference-count":32,"publisher":"Springer Science and Business Media LLC","issue":"8","license":[{"start":{"date-parts":[[2023,12,20]],"date-time":"2023-12-20T00:00:00Z","timestamp":1703030400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,12,20]],"date-time":"2023-12-20T00:00:00Z","timestamp":1703030400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Supercomput"],"published-print":{"date-parts":[[2024,5]]},"DOI":"10.1007\/s11227-023-05809-9","type":"journal-article","created":{"date-parts":[[2023,12,20]],"date-time":"2023-12-20T10:02:43Z","timestamp":1703066563000},"page":"10223-10254","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["MDROGWL: modified deep reinforcement oppositional wolf learning for group key management in IoT environment"],"prefix":"10.1007","volume":"80","author":[{"given":"G.","family":"Jagadeesh","sequence":"first","affiliation":[]},{"given":"J.","family":"Gitanjali","sequence":"additional","affiliation":[]},{"given":"J.","family":"Vellingiri","sequence":"additional","affiliation":[]},{"given":"M.","family":"Pounambal","sequence":"additional","affiliation":[]},{"given":"E.","family":"Sathiyamoorthy","sequence":"additional","affiliation":[]},{"given":"Celestine","family":"Iwendi","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,12,20]]},"reference":[{"key":"5809_CR1","doi-asserted-by":"publisher","DOI":"10.1016\/j.scs.2020.102416","volume":"63","author":"BD Deebak","year":"2020","unstructured":"Deebak BD (2020) Lightweight authentication and key management in mobile-sink for smart IoT-assisted systems. Sustain Cities Soc 63:102416","journal-title":"Sustain Cities Soc"},{"issue":"14","key":"5809_CR2","doi-asserted-by":"publisher","DOI":"10.1002\/dac.4465","volume":"33","author":"V Kumar","year":"2020","unstructured":"Kumar V, Kumar R, Pandey SK (2020) A secure and robust group key distribution and authentication protocol with efficient rekey mechanism for dynamic access control in secure group communications. Int J Commun Syst 33(14):e4465","journal-title":"Int J Commun Syst"},{"key":"5809_CR3","doi-asserted-by":"publisher","DOI":"10.1016\/j.sysarc.2021.102108","volume":"117","author":"K Sowjanya","year":"2021","unstructured":"Sowjanya K, Dasgupta M, Ray S (2021) A lightweight key management scheme for key-escrow-free ECC-based CP-ABE for IoT healthcare systems. J Syst Architect 117:102108","journal-title":"J Syst Architect"},{"issue":"2","key":"5809_CR4","first-page":"783","volume":"4","author":"R Jain","year":"2023","unstructured":"Jain R, Varshney M (2023) A critical study on group key management protocols and security aspects for non-networks. J Appl Eng Technol Sci (JAETS) 4(2):783\u2013794","journal-title":"J Appl Eng Technol Sci (JAETS)"},{"issue":"7","key":"5809_CR5","doi-asserted-by":"publisher","first-page":"5682","DOI":"10.1109\/JIOT.2020.3032757","volume":"8","author":"H Y\u0131ld\u0131z","year":"2020","unstructured":"Y\u0131ld\u0131z H, Cenk M, Onur E (2020) PLGAKD: A PUF-based lightweight group authentication and key distribution protocol. IEEE Internet Things J 8(7):5682\u20135696","journal-title":"IEEE Internet Things J"},{"key":"5809_CR6","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2021.103177","volume":"192","author":"AYF Alsahlani","year":"2021","unstructured":"Alsahlani AYF, Popa A (2021) LMAAS-IoT: Lightweight multi-factor authentication and authorization scheme for real-time data access in IoT cloud-based environment. J Netw Comput Appl 192:103177","journal-title":"J Netw Comput Appl"},{"issue":"3","key":"5809_CR7","doi-asserted-by":"publisher","first-page":"3440","DOI":"10.1109\/JSYST.2020.2970167","volume":"14","author":"B Hammi","year":"2020","unstructured":"Hammi B, Fayad A, Khatoun R, Zeadally S, Begriche Y (2020) A lightweight ECC-based authentication scheme for Internet of Things (IoT). IEEE Syst J 14(3):3440\u20133450","journal-title":"IEEE Syst J"},{"issue":"2","key":"5809_CR8","first-page":"781","volume":"14","author":"V Kumar","year":"2022","unstructured":"Kumar V, Pal O, Thakur V, Kumar K (2022) Scgkm: a secure and cost-effective group key management scheme for multicast communication in large dynamic groups. Int J Inf Technol 14(2):781\u2013788","journal-title":"Int J Inf Technol"},{"issue":"2","key":"5809_CR9","doi-asserted-by":"publisher","first-page":"119","DOI":"10.1016\/j.eij.2020.05.004","volume":"22","author":"AF Khan","year":"2021","unstructured":"Khan AF, Anandharaj G (2021) Ahkm: an improved class of hash based key management mechanism with combined solution for single hop and multi hop nodes in IoT. Egypt Inform J 22(2):119\u2013124","journal-title":"Egypt Inform J"},{"key":"5809_CR10","doi-asserted-by":"crossref","unstructured":"Janani VS, Devaraju M (2022) An efficient distributed secured broadcast stateless group key management scheme for mobile Ad Hoc networks. In\u00a02022 International Conference on Advances in Computing, Communication and Applied Informatics (ACCAI). IEEE, pp 1\u20135","DOI":"10.1109\/ACCAI53970.2022.9752592"},{"issue":"4","key":"5809_CR11","doi-asserted-by":"publisher","first-page":"3039","DOI":"10.1007\/s11277-020-07834-w","volume":"116","author":"KN Pallavi","year":"2021","unstructured":"Pallavi KN, Ravi Kumar V (2021) Authentication-based access control and data exchanging mechanism of IoT devices in fog computing environment. Wireless Pers Commun 116(4):3039\u20133060","journal-title":"Wireless Pers Commun"},{"issue":"3","key":"5809_CR12","doi-asserted-by":"publisher","first-page":"1041","DOI":"10.3390\/app12031041","volume":"12","author":"P Bondada","year":"2022","unstructured":"Bondada P, Samanta D, Kaur M, Lee HN (2022) Data security-based routing in MANETs using key management mechanism. Appl Sci 12(3):1041","journal-title":"Appl Sci"},{"issue":"6","key":"5809_CR13","doi-asserted-by":"publisher","first-page":"3673","DOI":"10.1109\/TWC.2020.2975781","volume":"19","author":"K Xue","year":"2020","unstructured":"Xue K, Meng W, Zhou H, Wei DS, Guizani M (2020) A lightweight and secure group key based handover authentication protocol for the software-defined space information network. IEEE Trans Wireless Commun 19(6):3673\u20133684","journal-title":"IEEE Trans Wireless Commun"},{"issue":"1","key":"5809_CR14","doi-asserted-by":"publisher","first-page":"51","DOI":"10.1504\/WRSTSD.2022.119327","volume":"18","author":"P Perumal","year":"2022","unstructured":"Perumal P, Subha S (2022) An analysis of a secure communication for healthcare system using wearable devices based on elliptic curve cryptography. World Rev Sci Technol Sustain Dev 18(1):51\u201358","journal-title":"World Rev Sci Technol Sustain Dev"},{"key":"5809_CR15","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2019.102480","volume":"150","author":"MA Kandi","year":"2020","unstructured":"Kandi MA, Lakhlef H, Bouabdallah A, Challal Y (2020) A versatile key management protocol for secure group and device-to-device communication in the internet of things. J Netw Comput Appl 150:102480","journal-title":"J Netw Comput Appl"},{"key":"5809_CR16","doi-asserted-by":"publisher","unstructured":"Mahendran RK, Prabhu V, Parthasarathy V, Usharani T, Mary Judith A, Jagadeesan S (2021)  An energy-efficient centralized dynamic time scheduling for internet of healthcare things. Measurement 186:110230. https:\/\/doi.org\/10.1016\/j.measurement.2021.110230","DOI":"10.1016\/j.measurement.2021.110230"},{"key":"5809_CR17","doi-asserted-by":"publisher","unstructured":"Elhoseny M, Thilakarathne NN, Alghamdi MI, Mahendran RK, Gardezi AA, Weerasinghe H, Welhenge A (2021) Security and privacy issues in medical internet of things: overview, countermeasures, challenges and future directions. Sustainability 13(21):11645. https:\/\/doi.org\/10.3390\/su132111645","DOI":"10.3390\/su132111645"},{"key":"5809_CR18","doi-asserted-by":"publisher","unstructured":"Thilakarathne NN, Muneeswari G, Parthasarathy V, Alassery F, Hamam H, Mahendran RK, Shafiq M (2022) Federated learning for privacy-preserved medical internet of things. Intell Autom Soft Comput 33(1):157\u2013172. https:\/\/doi.org\/10.32604\/iasc.2022.023763","DOI":"10.32604\/iasc.2022.023763"},{"issue":"1","key":"5809_CR19","doi-asserted-by":"publisher","first-page":"9","DOI":"10.12785\/ijcds\/100102","volume":"10","author":"U Iqbal","year":"2021","unstructured":"Iqbal U, Mir AH (2021) Efficient and dynamic access control mechanism for secure data acquisition in IoT environment. Int J Comput Digital Syst 10(1):9\u201328","journal-title":"Int J Comput Digital Syst"},{"key":"5809_CR20","doi-asserted-by":"publisher","first-page":"34045","DOI":"10.1109\/ACCESS.2019.2904042","volume":"7","author":"M Ma","year":"2019","unstructured":"Ma M, Shi G, Li F (2019) Privacy-oriented blockchain-based distributed key management architecture for hierarchical access control in the IoT scenario. IEEE Access 7:34045\u201334059","journal-title":"IEEE Access"},{"issue":"5","key":"5809_CR21","doi-asserted-by":"publisher","first-page":"711","DOI":"10.3390\/electronics11050711","volume":"11","author":"AI Abdi","year":"2022","unstructured":"Abdi AI, Eassa FE, Jambi K, Almarhabi K, Khemakhem M, Basuhail A, Yamin M (2022) Hierarchical blockchain-based multi-chaincode access control for securing IoT systems. Electronics 11(5):711","journal-title":"Electronics"},{"key":"5809_CR22","doi-asserted-by":"publisher","first-page":"181","DOI":"10.1016\/j.comnet.2019.01.032","volume":"151","author":"S Ganapathy","year":"2019","unstructured":"Ganapathy S (2019) A secured storage and privacy-preserving model using CRT for providing security on cloud and IoT-based applications. Comput Netw 151:181\u2013190","journal-title":"Comput Netw"},{"issue":"3","key":"5809_CR23","doi-asserted-by":"publisher","first-page":"1742","DOI":"10.1109\/TNSM.2020.3002957","volume":"17","author":"M Dammak","year":"2020","unstructured":"Dammak M, Senouci SM, Messous MA, Elhdhili MH, Gransart C (2020) Decentralized lightweight group key management for dynamic access control in IoT environments. IEEE Trans Netw Serv Manage 17(3):1742\u20131757","journal-title":"IEEE Trans Netw Serv Manage"},{"issue":"24","key":"5809_CR24","doi-asserted-by":"publisher","first-page":"5539","DOI":"10.3390\/s19245539","volume":"19","author":"M Wazid","year":"2019","unstructured":"Wazid M, Das AK, Shetty S, Rodrigues JPC, J. and Park, Y. (2019) LDAKM-EIoT: lightweight device authentication and key management mechanism for edge-based IoT deployment. Sensors 19(24):5539","journal-title":"Sensors"},{"key":"5809_CR25","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2019.102496","volume":"150","author":"M Wazid","year":"2020","unstructured":"Wazid M, Das AK, Bhat V, Vasilakos AV (2020) LAM-CIoT: Lightweight authentication mechanism in a cloud-based IoT environment. J Netw Comput Appl 150:102496","journal-title":"J Netw Comput Appl"},{"issue":"6","key":"5809_CR26","doi-asserted-by":"publisher","first-page":"9762","DOI":"10.1109\/JIOT.2019.2931372","volume":"6","author":"S Malani","year":"2019","unstructured":"Malani S, Srinivas J, Das AK, Srinathan K, Jo M (2019) Certificate-based anonymous device access control scheme for IoT environment. IEEE Internet Things J 6(6):9762\u20139773","journal-title":"IEEE Internet Things J"},{"key":"5809_CR27","doi-asserted-by":"publisher","DOI":"10.1016\/j.iot.2019.100089","volume":"8","author":"MM Islam","year":"2019","unstructured":"Islam MM, Funabiki N, Sudibyo RW, Munene KI, Kao WC (2019) A dynamic access-point transmission power minimization method using PI feedback control in elastic WLAN system for IoT applications. Internet of Things 8:100089","journal-title":"Internet of Things"},{"key":"5809_CR28","doi-asserted-by":"publisher","DOI":"10.1016\/j.sysarc.2021.102388","volume":"123","author":"H Hong","year":"2022","unstructured":"Hong H, Sun Z (2022) TS-ABOS-CMS: Time-bounded secure attribute-based online\/offline signature with constant message size for IoT systems. J Syst Architect 123:102388","journal-title":"J Syst Architect"},{"issue":"5","key":"5809_CR29","doi-asserted-by":"publisher","first-page":"2991","DOI":"10.1109\/TWC.2020.3046275","volume":"20","author":"L Zhao","year":"2020","unstructured":"Zhao L, Zhao W, Hawbani A, Al-Dubai AY, Min G, Zomaya AY, Gong C (2020) Novel online sequential learning-based adaptive routing for edge software-defined vehicular networks. IEEE Trans Wireless Commun 20(5):2991\u20133004","journal-title":"IEEE Trans Wireless Commun"},{"issue":"7","key":"5809_CR30","doi-asserted-by":"publisher","first-page":"4919","DOI":"10.1109\/TWC.2020.2988363","volume":"19","author":"N Lin","year":"2020","unstructured":"Lin N, Fu L, Zhao L, Min G, Al-Dubai A, Gacanin H (2020) A novel multimodal collaborative drone-assisted VANET networking model. IEEE Trans Wireless Commun 19(7):4919\u20134933","journal-title":"IEEE Trans Wireless Commun"},{"issue":"3","key":"5809_CR31","doi-asserted-by":"publisher","first-page":"170","DOI":"10.3390\/ijgi10030170","volume":"10","author":"S Liu","year":"2021","unstructured":"Liu S, Tang J (2021) Modified deep reinforcement learning with efficient convolution feature for small target detection in VHR remote sensing imagery. ISPRS Int J Geo Inf 10(3):170","journal-title":"ISPRS Int J Geo Inf"},{"key":"5809_CR32","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2021.107139","volume":"226","author":"X Yu","year":"2021","unstructured":"Yu X, Xu W, Li C (2021) Opposition-based learning grey wolf optimizer for global optimization. Knowl-Based Syst 226:107139","journal-title":"Knowl-Based Syst"}],"container-title":["The Journal of Supercomputing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11227-023-05809-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11227-023-05809-9\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11227-023-05809-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,5,6]],"date-time":"2024-05-06T10:47:15Z","timestamp":1714992435000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11227-023-05809-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,12,20]]},"references-count":32,"journal-issue":{"issue":"8","published-print":{"date-parts":[[2024,5]]}},"alternative-id":["5809"],"URL":"https:\/\/doi.org\/10.1007\/s11227-023-05809-9","relation":{},"ISSN":["0920-8542","1573-0484"],"issn-type":[{"value":"0920-8542","type":"print"},{"value":"1573-0484","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,12,20]]},"assertion":[{"value":"11 November 2023","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"20 December 2023","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"Not applicable.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent to participate"}},{"value":"Not applicable.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent for publication"}},{"value":"This article does not contain any studies with human or animal subjects performed by any of the authors.","order":5,"name":"Ethics","group":{"name":"EthicsHeading","label":"Human and animal rights"}},{"value":"Informed consent was obtained from all individual participants included in the study.","order":6,"name":"Ethics","group":{"name":"EthicsHeading","label":"Informed consent"}}]}}