{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,3]],"date-time":"2025-06-03T09:40:02Z","timestamp":1748943602388,"version":"3.41.0"},"reference-count":30,"publisher":"Springer Science and Business Media LLC","issue":"5","license":[{"start":{"date-parts":[[2025,4,17]],"date-time":"2025-04-17T00:00:00Z","timestamp":1744848000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,4,17]],"date-time":"2025-04-17T00:00:00Z","timestamp":1744848000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Wireless Netw"],"published-print":{"date-parts":[[2025,6]]},"DOI":"10.1007\/s11276-025-03951-1","type":"journal-article","created":{"date-parts":[[2025,4,17]],"date-time":"2025-04-17T07:39:08Z","timestamp":1744875548000},"page":"3571-3589","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["SqueezeNet-based key generation for secure device-to-device group authentication in 5G wireless networks"],"prefix":"10.1007","volume":"31","author":[{"given":"K. Prabhu","family":"Chandran","sequence":"first","affiliation":[]},{"given":"Gangu","family":"Dharmaraju","sequence":"additional","affiliation":[]},{"given":"Alok","family":"Misra","sequence":"additional","affiliation":[]},{"given":"Aleem","family":"Ali","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,4,17]]},"reference":[{"issue":"11","key":"3951_CR1","doi-asserted-by":"publisher","first-page":"7021","DOI":"10.1109\/TWC.2020.3007702","volume":"19","author":"Z Shang","year":"2020","unstructured":"Shang, Z., Ma, M., & Li, X. (2020). A secure group-oriented device-to-device authentication protocol for 5G wireless networks. IEEE Transactions on Wireless Communications, 19(11), 7021\u20137032.","journal-title":"IEEE Transactions on Wireless Communications"},{"issue":"3","key":"3951_CR2","doi-asserted-by":"publisher","first-page":"1617","DOI":"10.1109\/COMST.2016.2532458","volume":"18","author":"M Agarwal","year":"2016","unstructured":"Agarwal, M., Roy, A., & Saxena, N. (2016). Next generation 5G wireless networks: A comprehensive survey. IEEE Communications Surveys & Tutorials, 18(3), 1617\u20131655.","journal-title":"IEEE Communications Surveys & Tutorials"},{"issue":"1","key":"3951_CR3","doi-asserted-by":"publisher","first-page":"170","DOI":"10.1109\/COMST.2019.2951818","volume":"22","author":"J Cao","year":"2019","unstructured":"Cao, J., Ma, M., Li, H., Ma, R., Sun, Y., Yu, P., & Xiong, L. (2019). A survey on security aspects for 3GPP 5G networks. IEEE Communications Surveys & Tutorials, 22(1), 170\u2013195.","journal-title":"IEEE Communications Surveys & Tutorials"},{"issue":"7","key":"3951_CR4","doi-asserted-by":"publisher","first-page":"1645","DOI":"10.1016\/j.future.2013.01.010","volume":"29","author":"J Gubbi","year":"2013","unstructured":"Gubbi, J., Buyya, R., Marusic, S., & Palaniswami, M. (2013). Internet of Things (IoT): A vision, architectural elements, and future directions. Future Generation Computer Systems, 29(7), 1645\u20131660.","journal-title":"Future Generation Computer Systems"},{"key":"3951_CR5","doi-asserted-by":"publisher","first-page":"909","DOI":"10.1016\/j.future.2018.04.027","volume":"108","author":"A Tewari","year":"2020","unstructured":"Tewari, A., & Gupta, B. B. (2020). Security, privacy and trust of different layers in Internet-of-Things (IoTs) framework. Future Generation Computer Systems, 108, 909\u2013920.","journal-title":"Future Generation Computer Systems"},{"key":"3951_CR6","doi-asserted-by":"publisher","first-page":"403","DOI":"10.1007\/s12083-020-00963-w","volume":"14","author":"M Vivekanandan","year":"2021","unstructured":"Vivekanandan, M., & Srinivasulu Reddy, U. (2021). BIDAPSCA5G: Blockchain-based Internet of Things (IoT) device to device authentication protocol for smart city applications using 5G technology. Peer-to-Peer Networking and Applications, 14, 403\u2013419.","journal-title":"Peer-to-Peer Networking and Applications"},{"issue":"3","key":"3951_CR7","doi-asserted-by":"publisher","first-page":"428","DOI":"10.1109\/JIOT.2015.2497712","volume":"3","author":"Z Zhou","year":"2015","unstructured":"Zhou, Z., Dong, M., Ota, K., Wang, G., & Yang, L. T. (2015). Energy-efficient resource allocation for D2D communications under laying cloud-RAN-based LTE-A networks. IEEE Internet of Things Journal, 3(3), 428\u2013438.","journal-title":"IEEE Internet of Things Journal"},{"key":"3951_CR8","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2021.102351","volume":"108","author":"SW Shah","year":"2021","unstructured":"Shah, S. W., Syed, N. F., Shaghaghi, A., Anwar, A., Baig, Z., & Doss, R. (2021). LCDA: Lightweight continuous device-to-device authentication for a zero trust architecture (ZTA). Computers & Security, 108, 102351.","journal-title":"Computers & Security"},{"issue":"4","key":"3951_CR9","doi-asserted-by":"publisher","first-page":"3970","DOI":"10.1109\/JSYST.2017.2773633","volume":"12","author":"RI Ansari","year":"2017","unstructured":"Ansari, R. I., Chrysostomou, C., Hassan, S. A., Guizani, M., Mumtaz, S., Rodriguez, J., & Rodrigues, J. J. (2017). 5G D2D networks: Techniques, challenges, and prospects. IEEE Systems Journal, 12(4), 3970\u20133984.","journal-title":"IEEE Systems Journal"},{"key":"3951_CR10","doi-asserted-by":"publisher","first-page":"99","DOI":"10.1016\/j.jnca.2016.06.004","volume":"71","author":"P Gandotra","year":"2016","unstructured":"Gandotra, P., & Jha, R. K. (2016). Device-to-device communication in cellular networks: A survey. Journal of Network and Computer Applications, 71, 99\u2013117.","journal-title":"Journal of Network and Computer Applications"},{"issue":"3","key":"3951_CR11","doi-asserted-by":"publisher","first-page":"4232","DOI":"10.1109\/JSYST.2020.2979044","volume":"14","author":"I Ioannou","year":"2020","unstructured":"Ioannou, I., Vassiliou, V., Christophorou, C., & Pitsillides, A. (2020). Distributed artificial intelligence solution for D2D communication in 5G networks. IEEE Systems Journal, 14(3), 4232\u20134241.","journal-title":"IEEE Systems Journal"},{"issue":"6","key":"3951_CR12","doi-asserted-by":"publisher","first-page":"1389","DOI":"10.1007\/s10207-022-00620-8","volume":"21","author":"R Kishore","year":"2022","unstructured":"Kishore, R., Ioannou, I., Christophorou, C., Prabagarane, N., Vassiliou, V., Vignesh, S., Vinayak, H., Venkatesh, S., & Pitsillides, A. (2022). A security protocol for D2D communications in 5G networks using elliptic curve cryptography. International Journal of Information Security, 21(6), 1389\u20131408.","journal-title":"International Journal of Information Security"},{"issue":"11","key":"3951_CR13","doi-asserted-by":"publisher","first-page":"2571","DOI":"10.1109\/TMM.2017.2700621","volume":"19","author":"D Wu","year":"2017","unstructured":"Wu, D., Zhou, L., & Cai, Y. (2017). Social-aware rate based content sharing mode selection for D2D content sharing scenarios. IEEE Transactions on Multimedia, 19(11), 2571\u20132582.","journal-title":"IEEE Transactions on Multimedia"},{"issue":"2","key":"3951_CR14","first-page":"234","volume":"3","author":"A Patil","year":"2012","unstructured":"Patil, A., & Sawant, H. K. (2012). Technical specification group services and system aspects IP multimedia subsystem (IMS). International Journal of Electronics Communication and Computer Engineering, 3(2), 234\u2013238.","journal-title":"International Journal of Electronics Communication and Computer Engineering"},{"key":"3951_CR15","doi-asserted-by":"crossref","unstructured":"Shang, Z., Ma, M., & Li, X. (2019) A certificates authentication protocol for D2D group communications in 5G cellular networks. In 2019 IEEE Global Communications Conference (GLOBECOM) (pp. 1\u20137). IEEE.","DOI":"10.1109\/GLOBECOM38437.2019.9014047"},{"key":"3951_CR16","doi-asserted-by":"publisher","first-page":"510","DOI":"10.1007\/s11036-017-0870-5","volume":"22","author":"M Wang","year":"2017","unstructured":"Wang, M., Yan, Z., & Niemi, V. (2017). UAKA-D2D: Universal authentication and key agreement protocol in D2D communications. Mobile Networks and Applications, 22, 510\u2013525.","journal-title":"Mobile Networks and Applications"},{"key":"3951_CR17","doi-asserted-by":"crossref","unstructured":"Sedidi, R., & Kumar, A. Key exchange protocols for secure device-to-device (D2D) communication in 5G. In 2016 Wireless Days (WD) (pp. 1\u20136). IEEE.","DOI":"10.1109\/WD.2016.7461477"},{"issue":"8","key":"3951_CR18","doi-asserted-by":"publisher","first-page":"3637","DOI":"10.1109\/TII.2017.2778090","volume":"14","author":"M Wang","year":"2017","unstructured":"Wang, M., & Yan, Z. (2017). Privacy-preserving authentication and key agreement protocols for D2D group communications. IEEE Transactions on Industrial Informatics, 14(8), 3637\u20133647.","journal-title":"IEEE Transactions on Industrial Informatics"},{"key":"3951_CR19","doi-asserted-by":"publisher","first-page":"15","DOI":"10.1016\/j.vehcom.2018.09.003","volume":"14","author":"J Cui","year":"2018","unstructured":"Cui, J., Tao, X., Zhang, J., Xu, Y., & Zhong, H. (2018). HCPA-GKA: A hash function-based conditional privacy-preserving authentication and group-key agreement scheme for VANETs. Vehicular Communications, 14, 15\u201325.","journal-title":"Vehicular Communications"},{"issue":"11","key":"3951_CR20","doi-asserted-by":"publisher","first-page":"2352","DOI":"10.1109\/TIFS.2015.2447933","volume":"10","author":"L Zhang","year":"2015","unstructured":"Zhang, L., Wu, Q., Domingo-Ferrer, J., Qin, B., & Dong, Z. (2015). Round-efficient and sender-unrestricted dynamic group key agreement protocol for secure group communications. IEEE Transactions on Information Forensics and Security, 10(11), 2352\u20132364.","journal-title":"IEEE Transactions on Information Forensics and Security"},{"issue":"18","key":"3951_CR21","doi-asserted-by":"publisher","first-page":"3321","DOI":"10.3390\/math10183321","volume":"10","author":"WK Lai","year":"2022","unstructured":"Lai, W. K., Shieh, C. S., & Yang, C. P. (2022). A D2D group communication scheme using bidirectional and incremental a-star search to configure paths. Mathematics, 10(18), 3321.","journal-title":"Mathematics"},{"key":"3951_CR22","doi-asserted-by":"publisher","first-page":"103204","DOI":"10.1016\/j.jnca.2021.103204","volume":"193","author":"X Yan","year":"2021","unstructured":"Yan, X., & Ma, M. (2021). A lightweight and secure handover authentication scheme for 5G network using neighbour base stations. Journal of Network and Computer Applications, 193, 103204.","journal-title":"Journal of Network and Computer Applications"},{"issue":"3","key":"3951_CR23","doi-asserted-by":"publisher","first-page":"520","DOI":"10.3390\/electronics9030520","volume":"9","author":"BA Alzahrani","year":"2020","unstructured":"Alzahrani, B. A., Chaudhry, S. A., Barnawi, A., Al-Barakati, A., & Shon, T. (2020). An anonymous device to device authentication protocol using ECC and self-certified public keys usable in Internet of Things based autonomous devices. Electronics, 9(3), 520.","journal-title":"Electronics"},{"key":"3951_CR24","doi-asserted-by":"crossref","unstructured":"Pham, C. D., Nguyen, T. L., & Dang, T. K. (2019). Resource-constrained IoT authentication protocol: An ECC-based hybrid scheme for device-to-server and device-to-device communications. In Future Data and Security Engineering: 6th International Conference, FDSE 2019, Nha Trang City, Vietnam, November 27\u201329, 2019, Proceedings (Vol. 6, pp. 446\u2013466). Springer International Publishing.","DOI":"10.1007\/978-3-030-35653-8_30"},{"issue":"7","key":"3951_CR25","doi-asserted-by":"publisher","first-page":"789","DOI":"10.3390\/electronics10070789","volume":"10","author":"HY Chien","year":"2021","unstructured":"Chien, H. Y. (2021). Two-level-composite-hashing facilitating highly efficient anonymous IoT and D2D authentication. Electronics, 10(7), 789.","journal-title":"Electronics"},{"key":"3951_CR26","doi-asserted-by":"crossref","unstructured":"Miao, J., Wang, Z., Xue, X., Wang, M., Lv, J., & Li, M. (2023). Lightweight and secure D2D group communication for wireless IoT. Frontiers in Physics.","DOI":"10.3389\/fphy.2023.1210777"},{"key":"3951_CR27","unstructured":"Chaithanya, D. J., & Anitha, S. (2023). Enhancing security in device-to-device communication of 5G networks through hybrid method using AES and Huffman encoding. Journal of Namibian Studies."},{"key":"3951_CR28","doi-asserted-by":"publisher","first-page":"6135","DOI":"10.1109\/OJCOMS.2024.3463019","volume":"5","author":"MJ Sobouti","year":"2024","unstructured":"Sobouti, M. J., Adarbah, H. Y., Miraghajanian, M., Mohajerzadeh, A., Qazani, M. R. C., & Yanikomeroglu, H. (2024). Cooperative high-rate and low-latency transmission, employing two-tier narrow-band Internet-of-Things and bluetooth low-energy networks. IEEE Open Journal of the Communications Society, 5, 6135\u20136149.","journal-title":"IEEE Open Journal of the Communications Society"},{"key":"3951_CR29","doi-asserted-by":"publisher","DOI":"10.1016\/j.mehy.2020.109761","volume":"140","author":"F Ucar","year":"2020","unstructured":"Ucar, F., & Korkmaz, D. (2020). COVIDiagnosis-net: Deep Bayes-SqueezeNet based diagnosis of the coronavirus disease 2019 (COVID-19) from X-ray images. Medical Hypotheses, 140, 109761.","journal-title":"Medical Hypotheses"},{"issue":"9","key":"3951_CR30","doi-asserted-by":"publisher","first-page":"4915","DOI":"10.1109\/TNNLS.2021.3062754","volume":"33","author":"Y Ding","year":"2021","unstructured":"Ding, Y., Tan, F., Qin, Z., Cao, M., Choo, K. K. R., & Qin, Z. (2021). Deep-Key Gen: A deep learning-based stream cypher generator for medical image encryption and decryption. IEEE Transactions on Neural Networks and Learning Systems, 33(9), 4915\u20134929.","journal-title":"IEEE Transactions on Neural Networks and Learning Systems"}],"container-title":["Wireless Networks"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11276-025-03951-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11276-025-03951-1\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11276-025-03951-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,3]],"date-time":"2025-06-03T09:12:30Z","timestamp":1748941950000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11276-025-03951-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,4,17]]},"references-count":30,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2025,6]]}},"alternative-id":["3951"],"URL":"https:\/\/doi.org\/10.1007\/s11276-025-03951-1","relation":{},"ISSN":["1022-0038","1572-8196"],"issn-type":[{"type":"print","value":"1022-0038"},{"type":"electronic","value":"1572-8196"}],"subject":[],"published":{"date-parts":[[2025,4,17]]},"assertion":[{"value":"18 March 2025","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"17 April 2025","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interest"}}]}}