{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,19]],"date-time":"2026-02-19T02:29:48Z","timestamp":1771468188893,"version":"3.50.1"},"reference-count":31,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2025,3,6]],"date-time":"2025-03-06T00:00:00Z","timestamp":1741219200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,3,6]],"date-time":"2025-03-06T00:00:00Z","timestamp":1741219200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Wireless Netw"],"published-print":{"date-parts":[[2025,4]]},"DOI":"10.1007\/s11276-025-03930-6","type":"journal-article","created":{"date-parts":[[2025,3,6]],"date-time":"2025-03-06T10:50:54Z","timestamp":1741258254000},"page":"3167-3186","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["A secure authentication and optimization based device-to-device communication for 5G enabled IoT applications of smart cities"],"prefix":"10.1007","volume":"31","author":[{"given":"Therkkumthala Prakash","family":"Rani","sequence":"first","affiliation":[]},{"given":"Ayyadurai","family":"Maruthu","sequence":"additional","affiliation":[]},{"given":"Pavithra Guru","family":"Ramakrishnan","sequence":"additional","affiliation":[]},{"given":"Cypto","family":"Jayakumar","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,3,6]]},"reference":[{"key":"3930_CR1","doi-asserted-by":"publisher","first-page":"161","DOI":"10.1007\/s11277-018-5618-4","volume":"100","author":"SK Rao","year":"2018","unstructured":"Rao, S. K., & Prasad, R. (2018). Impact of 5G technologies on smart city implementation. Wireless Personal Communications, 100, 161\u2013176.","journal-title":"Wireless Personal Communications"},{"issue":"6","key":"3930_CR2","doi-asserted-by":"publisher","first-page":"32","DOI":"10.1109\/MC.2011.187","volume":"44","author":"M Naphade","year":"2011","unstructured":"Naphade, M., Banavar, G., Harrison, C., Paraszczak, J., & Morris, R. (2011). Smarter cities and their innovation challenges. Computer, 44(6), 32\u201339.","journal-title":"Computer"},{"key":"3930_CR3","doi-asserted-by":"publisher","first-page":"14309","DOI":"10.1109\/ACCESS.2017.2723659","volume":"5","author":"P Sotres","year":"2017","unstructured":"Sotres, P., Santana, J. R., S\u00e1nchez, L., Lanza, J., & Mu\u00f1oz, L. (2017). Practical lessons from the deployment and management of a smart city internet-of-things infrastructure: The smartsantander testbed case. IEEE Access, 5, 14309\u201314322.","journal-title":"IEEE Access"},{"key":"3930_CR4","doi-asserted-by":"publisher","first-page":"114","DOI":"10.1016\/j.comcom.2021.01.010","volume":"169","author":"GS Gaba","year":"2021","unstructured":"Gaba, G. S., Kumar, G., Kim, T. H., Monga, H., & Kumar, P. (2021). Secure device-to-device communications for 5g enabled Internet of things applications. Computer Communications, 169, 114\u2013128.","journal-title":"Computer Communications"},{"issue":"2","key":"3930_CR5","doi-asserted-by":"publisher","first-page":"187","DOI":"10.1016\/j.gltp.2021.08.069","volume":"2","author":"RP Janani","year":"2021","unstructured":"Janani, R. P., Renuka, K., & Aruna, A. (2021). IoT in smart cities: A contemporary survey. Global Transitions Proceedings, 2(2), 187\u2013193.","journal-title":"Global Transitions Proceedings"},{"issue":"3","key":"3930_CR6","doi-asserted-by":"publisher","first-page":"1607","DOI":"10.3390\/app12031607","volume":"12","author":"P Bellini","year":"2022","unstructured":"Bellini, P., Nesi, P., & Pantaleo, G. (2022). IoT-enabled smart cities: A review of concepts, frameworks and key technologies. Applied Sciences, 12(3), 1607.","journal-title":"Applied Sciences"},{"key":"3930_CR7","first-page":"1","volume":"16","author":"R Pothumarti","year":"2021","unstructured":"Pothumarti, R., Jain, K., & Krishnan, P. (2021). A lightweight authentication scheme for 5G mobile communications: a dynamic key approach. Journal of Ambient Intelligence and Humanized Computing, 16, 1\u201319.","journal-title":"Journal of Ambient Intelligence and Humanized Computing"},{"key":"3930_CR8","doi-asserted-by":"crossref","unstructured":"Andrea, I., Chrysostomou, C., & Hadjichristofi, G. (2015). Internet of Things: Security vulnerabilities and challenges. In: Proceedings of 2015 IEEE Symposium on Computers and Communication (ISCC), pp. 180\u2013187, IEEE.","DOI":"10.1109\/ISCC.2015.7405513"},{"key":"3930_CR9","first-page":"31","volume":"10","author":"MA Uusitalo","year":"2015","unstructured":"Uusitalo, M. A., & Moessner, K. (2015). The 5g huddle [from the guest editors]. IEEE Vehicular Technology Magazine, 10, 31.","journal-title":"IEEE Vehicular Technology Magazine"},{"key":"3930_CR10","doi-asserted-by":"publisher","first-page":"13125","DOI":"10.1109\/ACCESS.2024.3352508","volume":"12","author":"SF Ahmed","year":"2024","unstructured":"Ahmed, S. F., Alam, M. S. B., Afrin, S., Rafa, S. J., Taher, S. B., Kabir, M., Muyeen, S. M., & Gandomi, A. H. (2024). Toward a secure 5G-enabled internet of things: A survey on requirements, privacy, security, challenges, and opportunities. IEEE Access, 12, 13125\u201313145.","journal-title":"IEEE Access"},{"key":"3930_CR11","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1155\/2019\/5710834","volume":"2019","author":"D Minoli","year":"2019","unstructured":"Minoli, D., & Occhiogrosso, B. (2019). Practical aspects for the integration of 5G networks and IoT applications in smart cities environments. Wireless Communications and Mobile Computing, 2019, 1\u201330.","journal-title":"Wireless Communications and Mobile Computing"},{"key":"3930_CR12","first-page":"1","volume":"2022","author":"D Gupta","year":"2022","unstructured":"Gupta, D., Rani, S., Singh, A., & Mazon, J. L. V. (2022). Towards security mechanism in D2D wireless communication: A 5G network approach. Wireless Communications and Mobile Computing, 2022, 1\u20138.","journal-title":"Wireless Communications and Mobile Computing"},{"key":"3930_CR13","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2022.108987","volume":"211","author":"I Ioannou","year":"2022","unstructured":"Ioannou, I., Christophorou, C., Vassiliou, V., & Pitsillides, A. (2022). A novel Distributed AI framework with ML for D2D communication in 5G\/6G networks. Computer Networks, 211, 108987.","journal-title":"Computer Networks"},{"key":"3930_CR14","doi-asserted-by":"publisher","first-page":"1","DOI":"10.4108\/eai.26-10-2015.150598","volume":"1","author":"GA Militano","year":"2015","unstructured":"Militano, G. A., Condoluci, M., Farris, I., & Iera, A. (2015). Device-to-Device communications for 5G Internet of Things. EAI Endorsed Trans IoT, 1, 1\u201315.","journal-title":"EAI Endorsed Trans IoT"},{"key":"3930_CR15","first-page":"168","volume":"12","author":"NVR Reddy","year":"2024","unstructured":"Reddy, N. V. R., Kalaivani, K., Prasanthi, K. N., Azmal, S. M., & Teja, P. R. (2024). Enhancing 5G networks with D2D communication: Architectures, protocols, and energy-efficient strategies for future smart. Cities, 12, 168\u2013174.","journal-title":"Cities"},{"issue":"5","key":"3930_CR16","doi-asserted-by":"publisher","first-page":"86","DOI":"10.1109\/MCOM.2014.6815897","volume":"52","author":"MN Tehrani","year":"2014","unstructured":"Tehrani, M. N., Uysal, M., & Yanikomeroglu, H. (2014). Device-to-device communication in 5G cellular networks: Challenges, solutions, and future directions. IEEE Communications Magazine, 52(5), 86\u201392.","journal-title":"IEEE Communications Magazine"},{"key":"3930_CR17","doi-asserted-by":"publisher","first-page":"98013","DOI":"10.1109\/ACCESS.2021.3095297","volume":"9","author":"D Samanta","year":"2021","unstructured":"Samanta, D., Alahmadi, A. H., Karthikeyan, M. P., Khan, M. Z., Banerjee, A., Dalapati, G. K., & Ramakrishna, S. (2021). Cipher block chaining support vector machine for secured decentralized cloud enabled intelligent IoT architecture. IEEE Access, 9, 98013\u201398025.","journal-title":"IEEE Access"},{"key":"3930_CR18","doi-asserted-by":"publisher","first-page":"e5524","DOI":"10.1002\/dac.5524","volume":"36","author":"J Logeshwaran","year":"2023","unstructured":"Logeshwaran, J., Shanmugasundaram, N., & Lloret, J. (2023). Energy-efficient resource allocation model for device-to-device communication in 5G wireless personal area networks. International Journal of Communication Systems, 36, e5524.","journal-title":"International Journal of Communication Systems"},{"issue":"7","key":"3930_CR19","doi-asserted-by":"publisher","first-page":"789","DOI":"10.3390\/electronics10070789","volume":"10","author":"HY Chien","year":"2021","unstructured":"Chien, H. Y. (2021). Two-level-composite-hashing facilitating highly efficient anonymous IoT and D2D authentication. Electronics, 10(7), 789.","journal-title":"Electronics"},{"key":"3930_CR20","doi-asserted-by":"crossref","unstructured":"Nyangaresi, V. O., & Mohammad, Z. (2022). Session key agreement protocol for secure D2D communication. In: Proceedings of the Fifth International Conference on Safety and Security with IoT: SaSeIoT 2021, Cham: Springer International Publishing, pp. 81\u201399.","DOI":"10.1007\/978-3-030-94285-4_6"},{"issue":"4","key":"3930_CR21","doi-asserted-by":"publisher","first-page":"2659","DOI":"10.1109\/TVT.2015.2416002","volume":"65","author":"A Zhang","year":"2015","unstructured":"Zhang, A., Chen, J., Hu, R. Q., & Qian, Y. (2015). SeDS: Secure data sharing strategy for D2D communication in LTE-Advanced networks. IEEE Transactions on Vehicular Technology, 65(4), 2659\u20132672.","journal-title":"IEEE Transactions on Vehicular Technology"},{"key":"3930_CR22","doi-asserted-by":"crossref","unstructured":"Kwon, H., Hahn, C., Kim, D., Kang, K., & Hur, J. (2014). Secure device-to-device authentication in mobile multi-hop networks. In: Proceedings of Wireless Algorithms, Systems, and Applications: 9th International Conference, WASA, Harbin, China, Springer International Publishing, pp. 267\u2013278.","DOI":"10.1007\/978-3-319-07782-6_25"},{"issue":"4","key":"3930_CR23","doi-asserted-by":"publisher","first-page":"66","DOI":"10.1109\/MCOM.2014.6807948","volume":"52","author":"M Alam","year":"2014","unstructured":"Alam, M., Yang, D., Rodriguez, J., & Abd-Alhameed, R. A. (2014). Secure device-to-device communication in LTE-A. IEEE Communications Magazine, 52(4), 66\u201373.","journal-title":"IEEE Communications Magazine"},{"key":"3930_CR24","doi-asserted-by":"publisher","first-page":"510","DOI":"10.1007\/s11036-017-0870-5","volume":"22","author":"M Wang","year":"2017","unstructured":"Wang, M., Yan, Z., & Niemi, V. (2017). UAKA-D2D: Universal authentication and key agreement protocol in D2D communications. Mobile networks and Applications, 22, 510\u2013525.","journal-title":"Mobile networks and Applications"},{"key":"3930_CR25","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1155\/2019\/3263902","volume":"2019","author":"LM Al-Zubaidie","year":"2019","unstructured":"Al-Zubaidie, L. M., Zhang, Z., & Zhang, J. (2019). RAMHU: A new robust lightweight scheme for mutual users authentication in healthcare applications. Security and Communication Networks, 2019, 1\u201326.","journal-title":"Security and Communication Networks"},{"key":"3930_CR26","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2020.102403","volume":"114","author":"C Suraci","year":"2021","unstructured":"Suraci, C., Pizzi, S., Garompolo, D., Araniti, G., Molinaro, A., & Iera, A. (2021). Trusted and secured D2D-aided communications in 5G networks. Ad Hoc Networks, 114, 102403.","journal-title":"Ad Hoc Networks"},{"key":"3930_CR27","doi-asserted-by":"publisher","first-page":"102296","DOI":"10.1016\/j.sysarc.2021.102296","volume":"120","author":"AK Maurya","year":"2021","unstructured":"Maurya, A. K., Das, A. K., Jamal, S. S., & Giri, D. (2021). Secure user authentication mechanism for IoT-enabled Wireless Sensor Networks based on multiple Bloom filters. Journal of Systems Architecture, 120, 102296.","journal-title":"Journal of Systems Architecture"},{"key":"3930_CR28","doi-asserted-by":"publisher","first-page":"57485","DOI":"10.1109\/ACCESS.2022.3178121","volume":"10","author":"MA Abdel-Malek","year":"2022","unstructured":"Abdel-Malek, M. A., Akkaya, K., Bhuyan, A., & Ibrahim, A. S. (2022). A proxy Signature-Based swarm drone authentication with leader selection in 5G networks. IEEE Access, 10, 57485\u201357498.","journal-title":"IEEE Access"},{"key":"3930_CR29","doi-asserted-by":"publisher","first-page":"1210777","DOI":"10.3389\/fphy.2023.1210777","volume":"11","author":"J Miao","year":"2023","unstructured":"Miao, J., Wang, Z., Xue, X., Wang, M., Lv, J., & Li, M. (2023). Lightweight and secure D2D group communication for wireless IoT. Frontiers in Physics, 11, 1210777.","journal-title":"Frontiers in Physics"},{"key":"3930_CR30","doi-asserted-by":"publisher","first-page":"88564","DOI":"10.1109\/ACCESS.2021.3090512","volume":"9","author":"W Zhiheng","year":"2021","unstructured":"Zhiheng, W., & Jianhua, L. (2021). Flamingo search algorithm: A new swarm intelligence optimization algorithm. IEEE Access, 9, 88564\u201388582.","journal-title":"IEEE Access"},{"key":"3930_CR31","doi-asserted-by":"publisher","DOI":"10.1016\/j.cie.2021.107250","volume":"157","author":"L Abualigah","year":"2021","unstructured":"Abualigah, L., Yousri, D., Abd Elaziz, M., Ewees, A. A., Al-Qaness, M. A., & Gandomi, A. H. (2021). Aquila optimizer: A novel meta-heuristic optimization algorithm. Computers Industrial Engineering, 157, 107250.","journal-title":"Computers Industrial Engineering"}],"container-title":["Wireless Networks"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11276-025-03930-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11276-025-03930-6\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11276-025-03930-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,4,22]],"date-time":"2025-04-22T02:20:52Z","timestamp":1745288452000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11276-025-03930-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,3,6]]},"references-count":31,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2025,4]]}},"alternative-id":["3930"],"URL":"https:\/\/doi.org\/10.1007\/s11276-025-03930-6","relation":{},"ISSN":["1022-0038","1572-8196"],"issn-type":[{"value":"1022-0038","type":"print"},{"value":"1572-8196","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,3,6]]},"assertion":[{"value":"8 January 2025","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"6 March 2025","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of Interest"}},{"value":"Not Applicable.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Informed consent"}},{"value":"Not Applicable.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical approval"}}]}}