{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,13]],"date-time":"2026-05-13T16:35:09Z","timestamp":1778690109105,"version":"3.51.4"},"reference-count":41,"publisher":"Springer Science and Business Media LLC","issue":"6","license":[{"start":{"date-parts":[[2023,5,10]],"date-time":"2023-05-10T00:00:00Z","timestamp":1683676800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,5,10]],"date-time":"2023-05-10T00:00:00Z","timestamp":1683676800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"name":"IoT Innovation Team Foundation of Qinghai Office of Science and Technology","award":["2020-ZJ-903"],"award-info":[{"award-number":["2020-ZJ-903"]}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61962052"],"award-info":[{"award-number":["61962052"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Wireless Netw"],"published-print":{"date-parts":[[2023,8]]},"DOI":"10.1007\/s11276-023-03342-4","type":"journal-article","created":{"date-parts":[[2023,5,11]],"date-time":"2023-05-11T09:32:36Z","timestamp":1683797556000},"page":"2873-2890","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":18,"title":["A novel and quantum-resistant handover authentication protocol in IoT environment"],"prefix":"10.1007","volume":"29","author":[{"given":"Shuailiang","family":"Zhang","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9221-8917","authenticated-orcid":false,"given":"Xiujuan","family":"Du","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Xin","family":"Liu","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2023,5,10]]},"reference":[{"key":"3342_CR1","doi-asserted-by":"publisher","first-page":"100158","DOI":"10.1016\/j.iot.2020.100158","volume":"9","author":"F Moneer","year":"2020","unstructured":"Moneer, F., Mohammed, A., Fayez, G., et al. (2020). Secure remote anonymous user authentication scheme for smart home environment. Internet of Things, 9, 100158.","journal-title":"Internet of Things"},{"issue":"5","key":"3342_CR2","doi-asserted-by":"publisher","first-page":"3801","DOI":"10.1109\/JIOT.2020.3024703","volume":"8","author":"R Vinoth","year":"2021","unstructured":"Vinoth, R., Deborah, L. J., Vijayakumar, P., et al. (2021). Secure multi-factor authenticated key agreement scheme for industrial iot. IEEE Internet of Things Journal, 8(5), 3801\u20133811.","journal-title":"IEEE Internet of Things Journal"},{"key":"3342_CR3","doi-asserted-by":"publisher","first-page":"103247","DOI":"10.1016\/j.jisa.2022.103247","volume":"68","author":"Z Chen","year":"2022","unstructured":"Chen, Z., Ao, J., Luo, W., et al. (2022). A dual-factor access authentication scheme for IoT terminal in 5G environments with network slice selection[J]. Journal of Information Security and Applications., 68, 103247.","journal-title":"Journal of Information Security and Applications."},{"key":"3342_CR4","unstructured":"Hemangi, G., Hiten, C. (2022) Remote Registration and Group Authentication of IoT Devices in 5G Cellular Network[J]. Computers & Security."},{"issue":"9","key":"3342_CR5","doi-asserted-by":"publisher","first-page":"4081","DOI":"10.1109\/TII.2018.2834351","volume":"14","author":"D Wang","year":"2018","unstructured":"Wang, D., Li, W., & Wang, P. (2018). Measuring two-factor authentication schemes for real-time data access in industrial wireless sensor networks[J]. IEEE Transactions on Industrial Informatics, 14(9), 4081\u20134092.","journal-title":"IEEE Transactions on Industrial Informatics"},{"issue":"2","key":"3342_CR6","doi-asserted-by":"publisher","first-page":"1454","DOI":"10.1109\/JSYST.2018.2883349","volume":"13","author":"Y Lu","year":"2019","unstructured":"Lu, Y., Xu, G., Li, L., et al. (2019). Robust privacy-preserving mutual authenticated key agreement scheme in roaming service for global mobility networks[J]. IEEE Systems Journal, 13(2), 1454\u20131465.","journal-title":"IEEE Systems Journal"},{"issue":"3","key":"3342_CR7","doi-asserted-by":"publisher","first-page":"2775","DOI":"10.1109\/JSYST.2018.2851295","volume":"13","author":"F Qi","year":"2019","unstructured":"Qi, F., He, D., Sherali, Z., et al. (2019). Ideal lattice-based anonymous authentication protocol for mobile devices. IEEE Systems Journal, 13(3), 2775\u20132785.","journal-title":"IEEE Systems Journal"},{"key":"3342_CR8","doi-asserted-by":"publisher","first-page":"1435","DOI":"10.1007\/s13369-021-05940-w","volume":"47","author":"R Shashidhara","year":"2022","unstructured":"Shashidhara, R., Lajuvanthi, M., & Akhila, S. (2022). A secure and privacy-preserving mutual authentication system for global roaming in mobile networks[J]. Arabian Journal for Science and Engineering, 47, 1435\u20131446.","journal-title":"Arabian Journal for Science and Engineering"},{"key":"3342_CR9","doi-asserted-by":"publisher","first-page":"102358","DOI":"10.1016\/j.cose.2021.102358","volume":"108","author":"Y Guo","year":"2021","unstructured":"Guo, Y., & Guo, Y. (2021). FogHA: An efficient handover authentication for mobile devices in fog computing[J]. Computers & Security, 108, 102358.","journal-title":"Computers & Security"},{"key":"3342_CR10","doi-asserted-by":"publisher","first-page":"162","DOI":"10.1016\/j.ins.2015.03.070","volume":"321","author":"W Ding","year":"2015","unstructured":"Ding, W., Nan, W., Ping, W., et al. (2015). Preserving privacy for free: Efficient and provably secure two-factor authentication scheme with user anonymity[J]. Information Sciences, 321, 162\u2013178.","journal-title":"Information Sciences"},{"issue":"2","key":"3342_CR11","first-page":"1338","volume":"19","author":"S Qiu","year":"2022","unstructured":"Qiu, S., Wang, D., Xu, G., et al. (2022). Practical and provably secure three-factor authentication protocol based on extended chaotic-maps for mobile lightweight devices[J]. IEEE Transactions on Dependable and Secure Computing, 19(2), 1338\u20131351.","journal-title":"IEEE Transactions on Dependable and Secure Computing"},{"key":"3342_CR12","doi-asserted-by":"crossref","unstructured":"Mo, J., Chen, H. (2019) A lightweight secure user authentication and key agreement protocol for wireless sensor networks [J]. Security and Communication Networks.","DOI":"10.1155\/2019\/2136506"},{"issue":"2","key":"3342_CR13","doi-asserted-by":"publisher","first-page":"303","DOI":"10.1137\/S0036144598347011","volume":"41","author":"PW Shor","year":"1999","unstructured":"Shor, P. W. (1999). Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer [J]. SIAM Review, 41(2), 303\u2013332.","journal-title":"SIAM Review"},{"issue":"3","key":"3342_CR14","doi-asserted-by":"publisher","first-page":"586","DOI":"10.1109\/LCOMM.2017.2786228","volume":"22","author":"R Chen","year":"2018","unstructured":"Chen, R., & Peng, D. (2018). A novel NTRU-based handover authentication scheme for wireless networks[J]. IEEE Communications Letters, 22(3), 586\u2013589.","journal-title":"IEEE Communications Letters"},{"issue":"1","key":"3342_CR15","doi-asserted-by":"publisher","first-page":"1120","DOI":"10.1109\/JSYST.2020.2981049","volume":"15","author":"F Wu","year":"2021","unstructured":"Wu, F., Li, X., Xu, L., et al. (2021). A novel three-factor authentication protocol for wireless sensor networks with IoT notion[J]. IEEE Systems Journal, 15(1), 1120\u20131129.","journal-title":"IEEE Systems Journal"},{"key":"3342_CR16","doi-asserted-by":"publisher","first-page":"2055","DOI":"10.1007\/s11277-015-2524-x","volume":"84","author":"K Marimuthu","year":"2015","unstructured":"Marimuthu, K., & Saravanan, R. (2015). A secure authentication scheme with user anonymity for roaming service in global mobility networks[J]. Wireless Personal Communications, 84, 2055\u20132078.","journal-title":"Wireless Personal Communications"},{"issue":"5","key":"3342_CR17","doi-asserted-by":"publisher","first-page":"791","DOI":"10.1007\/s00779-017-1054-9","volume":"21","author":"L Xiong","year":"2017","unstructured":"Xiong, L., Sangaiah, A. K., et al. (2017). An efficient authentication and key agreement scheme with user anonymity for roaming service in smart city[J]. Personal and Ubiquitous Computing, 21(5), 791\u2013805.","journal-title":"Personal and Ubiquitous Computing"},{"key":"3342_CR18","doi-asserted-by":"publisher","first-page":"131","DOI":"10.1016\/j.neucom.2019.03.020","volume":"347","author":"Q Xie","year":"2019","unstructured":"Xie, Q., & Hwang, L. (2019). Security enhancement of an anonymous roaming authentication scheme with two-factor security in smart city[J]. Neurocomputing, 347, 131\u2013138.","journal-title":"Neurocomputing"},{"key":"3342_CR19","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.jnca.2015.12.003","volume":"62","author":"P Gope","year":"2016","unstructured":"Gope, P., & Hwang, T. (2016). An efficient mutual authentication and key agreement scheme preserving strong anonymity of the mobile user in global mobility networks[J]. Journal of Network & Computer Applications, 62, 1\u20138.","journal-title":"Journal of Network & Computer Applications"},{"key":"3342_CR20","doi-asserted-by":"crossref","unstructured":"Xiong, L., Jianwei, N., et al. (2018) A robust biometrics based three-factor authentication scheme for Global Mobility Networks in smart city[J]. Future Generations Computer Systems: FGCS, 83:607\u2013618.","DOI":"10.1016\/j.future.2017.04.012"},{"key":"3342_CR21","doi-asserted-by":"crossref","unstructured":"Meysam, G., Reza, J., Mohammad, S.A. (2020) Secure biometric-based authentication protocol for global mobility networks in smart cities[J]. The Journal of Supercomputing, 76:8729\u20138755.","DOI":"10.1007\/s11227-020-03160-x"},{"key":"3342_CR22","doi-asserted-by":"publisher","first-page":"102588","DOI":"10.1016\/j.jisa.2020.102588","volume":"54","author":"N Mahdi","year":"2020","unstructured":"Mahdi, N., Haleh, A., & Saru, K. (2020). A provably secure ECC-based roaming authentication scheme for global mobility networks[J]. Journal of Information Security and Applications, 54, 102588.","journal-title":"Journal of Information Security and Applications"},{"key":"3342_CR23","doi-asserted-by":"publisher","first-page":"83","DOI":"10.1016\/j.jnca.2018.02.003","volume":"107","author":"G Xu","year":"2018","unstructured":"Xu, G., Liu, J., Lu, Y., et al. (2018). A novel efficient MAKA protocol with desynchronization for anonymous roaming service in global mobility networks[J]. Journal of Network and Computer Applications, 107, 83\u201392.","journal-title":"Journal of Network and Computer Applications"},{"issue":"4","key":"3342_CR24","doi-asserted-by":"publisher","first-page":"1370","DOI":"10.1109\/JSYST.2015.2416396","volume":"10","author":"P Gope","year":"2016","unstructured":"Gope, P., & Hwang, T. (2016). Lightweight and energy-efficient mutual authentication and key agreement scheme with user anonymity for secure communication in global mobility networks[J]. IEEE Systems Journal, 10(4), 1370\u20131379.","journal-title":"IEEE Systems Journal"},{"key":"3342_CR25","doi-asserted-by":"publisher","first-page":"1943","DOI":"10.1007\/s12083-020-00929-y","volume":"13","author":"R Shashidhara","year":"2020","unstructured":"Shashidhara, R., Bojjagani, S., Maurya, A. K., et al. (2020). A robust user authentication protocol with privacy-preserving for roaming service in mobility environments[J]. Peer-to-Peer Networking and Applications, 13, 1943\u20131966.","journal-title":"Peer-to-Peer Networking and Applications"},{"issue":"2","key":"3342_CR26","doi-asserted-by":"publisher","first-page":"486","DOI":"10.1109\/TIFS.2018.2854740","volume":"14","author":"Q Yang","year":"2019","unstructured":"Yang, Q., Xue, K., Xu, J., et al. (2019). AnFRA: Anonymous and fast roaming authentication for space information network[J]. IEEE Transactions on Information Forensics & Security, 14(2), 486\u2013497.","journal-title":"IEEE Transactions on Information Forensics & Security"},{"issue":"3","key":"3342_CR27","doi-asserted-by":"publisher","first-page":"234","DOI":"10.1002\/sat.1279","volume":"37","author":"M Qi","year":"2019","unstructured":"Qi, M., Chen, J., & Chen, Y. (2019). A secure authentication with key agreement scheme using ECC for satellite communication systems[J]. International Journal of Satellite Communications and Networking, 37(3), 234\u2013244.","journal-title":"International Journal of Satellite Communications and Networking"},{"key":"3342_CR28","doi-asserted-by":"crossref","unstructured":"Yuchen, L., Aixin, Z. et al. (2017) A lightweight authentication scheme based on self-updating strategy for space information network[J]. International Journal of Satellite Communications & Networking, 35(3):231\u2013248.","DOI":"10.1002\/sat.1179"},{"key":"3342_CR29","doi-asserted-by":"publisher","first-page":"898","DOI":"10.1007\/s12083-020-01050-w","volume":"14","author":"J Guo","year":"2021","unstructured":"Guo, J., & Du, Y. (2021). A secure three-factor anonymous roaming authentication protocol using ECC for space information networks[J]. Peer-to-Peer Networking and Applications, 14, 898\u2013916.","journal-title":"Peer-to-Peer Networking and Applications"},{"issue":"4","key":"3342_CR30","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1002\/dac.3019","volume":"30","author":"MS Farash","year":"2017","unstructured":"Farash, M. S., Chaudhry, S. A., Heydari, M., et al. (2017). A lightweight anonymous authentication scheme for consumer roaming in ubiquitous networks with provable security[J]. International Journal of Communication Systems, 30(4), 1\u201320.","journal-title":"International Journal of Communication Systems"},{"key":"3342_CR31","doi-asserted-by":"publisher","first-page":"1223","DOI":"10.1007\/s10586-017-0783-x","volume":"20","author":"SA Chaudhry","year":"2017","unstructured":"Chaudhry, S. A., Albeshri, A., Xiong, N., et al. (2017). A privacy preserving authentication scheme for roaming in ubiquitous networks[J]. Cluster Computing, 20, 1223\u20131236.","journal-title":"Cluster Computing"},{"key":"3342_CR32","doi-asserted-by":"publisher","first-page":"295","DOI":"10.1016\/j.jisa.2019.05.018","volume":"47","author":"Y Zhou","year":"2019","unstructured":"Zhou, Y., Long, X., Chen, L., et al. (2019). Conditional privacy-preserving authentication and key agreement scheme for roaming services in VANETs[J]. Journal of Information Security and Applications, 47, 295\u2013301.","journal-title":"Journal of Information Security and Applications"},{"key":"3342_CR33","doi-asserted-by":"crossref","unstructured":"Cheng, X., Xiaohong, H., et al. (2018) An anonymous handover authentication scheme based on LTE-A for vehicular networks[J]. Wireless Communications & Mobile Computing.","DOI":"10.1155\/2018\/6251219"},{"key":"3342_CR34","doi-asserted-by":"crossref","unstructured":"Ren, Z., Li, X., Jiang, Q., et al. (2021) Fast and Universal Inter-Slice Handover Authentication with Privacy Protection in 5G Network[J]. Security and Communication Networks.","DOI":"10.1155\/2021\/6694058"},{"key":"3342_CR35","doi-asserted-by":"crossref","unstructured":"Cao, J., Ma, M. et al. (2018) EGHR: Efficient group-based handover authentication protocols for mMTC in 5G wireless networks[J]. Journal of Network & Computer Applications, 102:1\u201316.","DOI":"10.1016\/j.jnca.2017.11.009"},{"issue":"3","key":"3342_CR36","doi-asserted-by":"publisher","first-page":"3255","DOI":"10.1109\/TVT.2022.3144785","volume":"71","author":"DS Gupta","year":"2022","unstructured":"Gupta, D. S., Karati, A., Saad, W., et al. (2022). Quantum-defended blockchain-assisted data authentication protocol for Internet of Vehicles. IEEE Transactions on Vehicular Technology, 71(3), 3255\u20133266.","journal-title":"IEEE Transactions on Vehicular Technology"},{"key":"3342_CR37","doi-asserted-by":"crossref","unstructured":"Gupta, D.S., Ray, S., Singh, T., et al. (2022) Post-quantum lightweight identity-based two-party authenticated key exchange protocol for Internet of Vehicles with probable security[J]. Computer Communications, 181:69\u201379","DOI":"10.1016\/j.comcom.2021.09.031"},{"issue":"3","key":"3342_CR38","doi-asserted-by":"publisher","first-page":"3620","DOI":"10.1109\/JSYST.2020.3016065","volume":"15","author":"DS Gupta","year":"2021","unstructured":"Gupta, D. S., Islam, S. H., Obaidat, M. S., et al. (2021). LAAC: Lightweight lattice-based authentication and access control protocol for E-health systems in IoT environments[J]. IEEE Systems Journal, 15(3), 3620\u20133627.","journal-title":"IEEE Systems Journal"},{"key":"3342_CR39","doi-asserted-by":"crossref","unstructured":"Hoffstein, J., Pipher, J., Silverman, J.H. (1998) NTRU: A ring-based public key cryptosystem[J]. International Algorithmic Number Theory Symposium, 1423:267\u2013288.","DOI":"10.1007\/BFb0054868"},{"issue":"1","key":"3342_CR40","first-page":"1","volume":"10","author":"D Kumar","year":"2018","unstructured":"Kumar, D., Chand, S., & Kumar, B. (2018). Cryptanalysis and improvement of an authentication protocol for wireless sensor networks applications like safety monitoring in coal mines[J]. Journal of Ambient Intelligence and Humanized Computing, 10(1), 1\u201320.","journal-title":"Journal of Ambient Intelligence and Humanized Computing"},{"key":"3342_CR41","doi-asserted-by":"crossref","unstructured":"Zhou, Y., Wang, L. (2020) A Lattice-Based Authentication Scheme for Roaming Service in Ubiquitous Networks with Anonymity[J]. Security and Communication Networks.","DOI":"10.1155\/2020\/2637916"}],"container-title":["Wireless Networks"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11276-023-03342-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11276-023-03342-4\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11276-023-03342-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,7,25]],"date-time":"2023-07-25T12:14:12Z","timestamp":1690287252000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11276-023-03342-4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,5,10]]},"references-count":41,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2023,8]]}},"alternative-id":["3342"],"URL":"https:\/\/doi.org\/10.1007\/s11276-023-03342-4","relation":{},"ISSN":["1022-0038","1572-8196"],"issn-type":[{"value":"1022-0038","type":"print"},{"value":"1572-8196","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,5,10]]},"assertion":[{"value":"27 March 2023","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"10 May 2023","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}