{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,11]],"date-time":"2025-09-11T19:17:47Z","timestamp":1757618267681,"version":"3.44.0"},"reference-count":75,"publisher":"Springer Science and Business Media LLC","issue":"6","license":[{"start":{"date-parts":[[2025,6,12]],"date-time":"2025-06-12T00:00:00Z","timestamp":1749686400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,6,12]],"date-time":"2025-06-12T00:00:00Z","timestamp":1749686400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Wireless Netw"],"published-print":{"date-parts":[[2025,8]]},"DOI":"10.1007\/s11276-025-03980-w","type":"journal-article","created":{"date-parts":[[2025,6,12]],"date-time":"2025-06-12T04:46:18Z","timestamp":1749703578000},"page":"4087-4109","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Efficient anonymous authentication in fog-assisted smart factories with resistance to physical device capture attacks"],"prefix":"10.1007","volume":"31","author":[{"given":"Ziwen","family":"Wang","sequence":"first","affiliation":[]},{"given":"Yajun","family":"Guo","sequence":"additional","affiliation":[]},{"given":"Yimin","family":"Guo","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,6,12]]},"reference":[{"key":"3980_CR1","doi-asserted-by":"publisher","first-page":"43","DOI":"10.1007\/s12083-017-0627-8","volume":"12","author":"A Adavoudi-Jolfaei","year":"2019","unstructured":"Adavoudi-Jolfaei, A., Ashouri-Talouki, M., & Aghili, S. F. (2019). Lightweight and anonymous three-factor authentication and access control scheme for real-time applications in wireless sensor networks. Peer-to-Peer Networking and Applications, 12, 43\u201359.","journal-title":"Peer-to-Peer Networking and Applications"},{"key":"3980_CR2","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2024.103770","author":"H Ali","year":"2024","unstructured":"Ali, H., & Ahmed, I. (2024). Laaka: Lightweight anonymous authentication and key agreement scheme for secure fog-driven IoT systems. Computers & Security. https:\/\/doi.org\/10.1016\/j.cose.2024.103770","journal-title":"Computers & Security"},{"key":"3980_CR3","doi-asserted-by":"publisher","DOI":"10.1016\/j.cosrev.2024.100666","author":"Z Amiri","year":"2024","unstructured":"Amiri, Z., Heidari, A., Jafari, N., & Hosseinzadeh, M. (2024). Deep study on autonomous learning techniques for complex pattern recognition in interconnected information systems. Computer Science Review. https:\/\/doi.org\/10.1016\/j.cosrev.2024.100666","journal-title":"Computer Science Review"},{"issue":"11","key":"3980_CR4","doi-asserted-by":"publisher","first-page":"5757","DOI":"10.1007\/s00521-023-09366-3","volume":"36","author":"Z Amiri","year":"2024","unstructured":"Amiri, Z., Heidari, A., Navimipour, N. J., Esmaeilpour, M., & Yazdani, Y. (2024). The deep learning applications in IoT-based bio-and medical informatics: A systematic literature review. Neural Computing and Applications, 36(11), 5757\u20135797.","journal-title":"Neural Computing and Applications"},{"issue":"6","key":"3980_CR5","doi-asserted-by":"publisher","first-page":"4969","DOI":"10.1002\/ett.4969","volume":"35","author":"Z Amiri","year":"2024","unstructured":"Amiri, Z., Heidari, A., Zavvar, M., Navimipour, N. J., & Esmaeilpour, M. (2024). The applications of nature-inspired algorithms in internet of things-based healthcare service: A systematic literature review. Transactions on Emerging Telecommunications Technologies, 35(6), 4969. https:\/\/doi.org\/10.1002\/ett.4969","journal-title":"Transactions on Emerging Telecommunications Technologies"},{"issue":"11","key":"3980_CR6","doi-asserted-by":"publisher","first-page":"5056","DOI":"10.1002\/ett.5056","volume":"35","author":"M Asadi","year":"2024","unstructured":"Asadi, M., Jamali, M. A. J., Heidari, A., & Navimipour, N. J. (2024). Botnets unveiled: A comprehensive survey on evolving threats and defense strategies. Transactions on Emerging Telecommunications Technologies, 35(11), 5056. https:\/\/doi.org\/10.1002\/ett.5056","journal-title":"Transactions on Emerging Telecommunications Technologies"},{"key":"3980_CR7","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2021.108676","author":"T Baker","year":"2022","unstructured":"Baker, T., Asim, M., Samwini, H., Shamim, N., Alani, M. M., & Buyya, R. (2022). A blockchain-based fog-oriented lightweight framework for smart public vehicular transportation systems. Computer Networks. https:\/\/doi.org\/10.1016\/j.comnet.2021.108676","journal-title":"Computer Networks"},{"key":"3980_CR8","doi-asserted-by":"publisher","DOI":"10.3390\/electronics10121417","author":"S Banerjee","year":"2021","unstructured":"Banerjee, S., Das, A. K., Chattopadhyay, S., Jamal, S. S., Rodrigues, J. J. P. C., & Park, Y. (2021). Lightweight failover authentication mechanism for IoT-based fog computing environment. Electronics. https:\/\/doi.org\/10.3390\/electronics10121417","journal-title":"Electronics"},{"key":"3980_CR9","doi-asserted-by":"publisher","first-page":"27","DOI":"10.1007\/978-3-030-46828-6_3","volume-title":"Security with intelligent computing and big-data services 2019","author":"S-H Chang","year":"2020","unstructured":"Chang, S.-H., & Chung, P.-T. (2020). A lightweight authentication stream cypher mechanism for industrial internet of things. In L. C. Jain, S.-L. Peng, & S.-J. Wang (Eds.), Security with intelligent computing and big-data services 2019 (pp. 27\u201334). Cham: Springer."},{"issue":"1","key":"3980_CR10","doi-asserted-by":"publisher","first-page":"357","DOI":"10.1109\/TWC.2015.2473165","volume":"15","author":"C-C Chang","year":"2016","unstructured":"Chang, C.-C., & Le, H.-D. (2016). A provably secure, efficient, and flexible authentication scheme for ad hoc wireless sensor networks. IEEE Transactions on Wireless Communications, 15(1), 357\u2013366. https:\/\/doi.org\/10.1109\/TWC.2015.2473165","journal-title":"IEEE Transactions on Wireless Communications"},{"issue":"2","key":"3980_CR11","doi-asserted-by":"publisher","first-page":"1504","DOI":"10.1109\/TII.2022.3158663","volume":"19","author":"SA Chaudhry","year":"2023","unstructured":"Chaudhry, S. A., Yahya, K., Garg, S., Kaddoum, G., Hassan, M. M., & Zikria, Y. B. (2023). LAS-SG: An elliptic curve-based lightweight authentication scheme for smart grid environments. IEEE Transactions on Industrial Informatics, 19(2), 1504\u20131511. https:\/\/doi.org\/10.1109\/TII.2022.3158663","journal-title":"IEEE Transactions on Industrial Informatics"},{"issue":"3","key":"3980_CR12","doi-asserted-by":"publisher","first-page":"3167","DOI":"10.1109\/TITS.2022.3227949","volume":"24","author":"J Cui","year":"2023","unstructured":"Cui, J., Yu, J., Zhong, H., Wei, L., & Liu, L. (2023). Chaotic map-based authentication scheme using physical unclonable function for internet of autonomous vehicle. IEEE Transactions on Intelligent Transportation Systems, 24(3), 3167\u20133181. https:\/\/doi.org\/10.1109\/TITS.2022.3227949","journal-title":"IEEE Transactions on Intelligent Transportation Systems"},{"issue":"11","key":"3980_CR13","doi-asserted-by":"publisher","first-page":"4581","DOI":"10.1002\/ett.4581","volume":"33","author":"AK Das","year":"2022","unstructured":"Das, A. K., Afroz, S., Chandra, S., & Sinha, D. (2022). Macp: Multifactor authentication using physical unclonable function and fuzzy extractor based chebyshev polynomial for industrial internet of things devices. Transactions on Emerging Telecommunications Technologies, 33(11), 4581. https:\/\/doi.org\/10.1002\/ett.4581","journal-title":"Transactions on Emerging Telecommunications Technologies"},{"issue":"6","key":"3980_CR14","doi-asserted-by":"publisher","first-page":"4900","DOI":"10.1109\/JIOT.2018.2877690","volume":"5","author":"AK Das","year":"2018","unstructured":"Das, A. K., Wazid, M., Kumar, N., Vasilakos, A. V., & Rodrigues, J. J. P. C. (2018). Biometrics-based privacy-preserving user authentication scheme for cloud-based industrial internet of things deployment. IEEE Internet of Things Journal, 5(6), 4900\u20134913. https:\/\/doi.org\/10.1109\/JIOT.2018.2877690","journal-title":"IEEE Internet of Things Journal"},{"issue":"1","key":"3980_CR15","doi-asserted-by":"publisher","first-page":"193","DOI":"10.1007\/s11276-023-03471-w","volume":"30","author":"X Duan","year":"2024","unstructured":"Duan, X., Guo, Y., & Guo, Y. (2024). Design of anonymous authentication scheme for vehicle fog services using blockchain. Wireless Networks, 30(1), 193\u2013207.","journal-title":"Wireless Networks"},{"key":"3980_CR16","doi-asserted-by":"publisher","first-page":"239","DOI":"10.1016\/j.comcom.2023.09.012","volume":"211","author":"MA El-Zawawy","year":"2023","unstructured":"El-Zawawy, M. A., Kaliyar, P., Conti, M., & Katsikas, S. (2023). Honey-list based authentication protocol for industrial IoT swarms. Computer Communications, 211, 239\u2013253. https:\/\/doi.org\/10.1016\/j.comcom.2023.09.012","journal-title":"Computer Communications"},{"key":"3980_CR17","doi-asserted-by":"publisher","DOI":"10.1016\/j.ipm.2020.102468","author":"C Esposito","year":"2021","unstructured":"Esposito, C., Ficco, M., & Gupta, B. B. (2021). Blockchain-based authentication and authorization for smart city applications. Information Processing & Management. https:\/\/doi.org\/10.1016\/j.ipm.2020.102468","journal-title":"Information Processing & Management"},{"issue":"9","key":"3980_CR18","doi-asserted-by":"publisher","first-page":"6424","DOI":"10.1109\/TII.2022.3145584","volume":"18","author":"Q Fan","year":"2022","unstructured":"Fan, Q., Chen, J., Shojafar, M., Kumari, S., & He, D. (2022). Sake*: A symmetric authenticated key exchange protocol with perfect forward secrecy for industrial internet of things. IEEE Transactions on Industrial Informatics, 18(9), 6424\u20136434. https:\/\/doi.org\/10.1109\/TII.2022.3145584","journal-title":"IEEE Transactions on Industrial Informatics"},{"key":"3980_CR19","doi-asserted-by":"publisher","first-page":"87","DOI":"10.1016\/j.jpdc.2022.06.011","volume":"169","author":"A Ghafouri Mirsaraei","year":"2022","unstructured":"Ghafouri Mirsaraei, A., Barati, A., & Barati, H. (2022). A secure three-factor authentication scheme for IoT environments. Journal of Parallel and Distributed Computing, 169, 87\u2013105. https:\/\/doi.org\/10.1016\/j.jpdc.2022.06.011","journal-title":"Journal of Parallel and Distributed Computing"},{"issue":"11","key":"3980_CR20","doi-asserted-by":"publisher","first-page":"7124","DOI":"10.1109\/TIE.2016.2585081","volume":"63","author":"P Gope","year":"2016","unstructured":"Gope, P., & Hwang, T. (2016). A realistic lightweight anonymous authentication protocol for securing real-time application data access in wireless sensor networks. IEEE Transactions on Industrial Electronics, 63(11), 7124\u20137132. https:\/\/doi.org\/10.1109\/TIE.2016.2585081","journal-title":"IEEE Transactions on Industrial Electronics"},{"key":"3980_CR21","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2024.3382934","author":"Y Guo","year":"2024","unstructured":"Guo, Y., Guo, Y., Xiong, P., Yang, F., & Zhang, C. (2024). Deeper insight into why authentication schemes in IoT environments fail to achieve the desired security. IEEE Transactions on Information Forensics and Security. https:\/\/doi.org\/10.1109\/TIFS.2024.3382934","journal-title":"IEEE Transactions on Information Forensics and Security"},{"key":"3980_CR22","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2019.101965","author":"H Guo","year":"2019","unstructured":"Guo, H., Gao, Y., Xu, T., Zhang, X., & Ye, J. (2019). A secure and efficient three-factor multi-gateway authentication protocol for wireless sensor networks. Ad Hoc Networks. https:\/\/doi.org\/10.1016\/j.adhoc.2019.101965","journal-title":"Ad Hoc Networks"},{"key":"3980_CR23","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2021.102358","author":"Y Guo","year":"2021","unstructured":"Guo, Y., & Guo, Y. (2021). FogHA: An efficient handover authentication for mobile devices in fog computing. Computers & Security. https:\/\/doi.org\/10.1016\/j.cose.2021.102358","journal-title":"Computers & Security"},{"issue":"6","key":"3980_CR24","doi-asserted-by":"publisher","first-page":"4102","DOI":"10.1109\/TSC.2023.3309860","volume":"16","author":"Y Guo","year":"2023","unstructured":"Guo, Y., & Guo, Y. (2023). CS-LAKA: A lightweight authenticated key agreement protocol with critical security properties for iot environments. IEEE Transactions on Services Computing, 16(6), 4102\u20134114. https:\/\/doi.org\/10.1109\/TSC.2023.3309860","journal-title":"IEEE Transactions on Services Computing"},{"key":"3980_CR25","doi-asserted-by":"publisher","DOI":"10.1016\/j.pmcj.2024.101877","author":"Y Guo","year":"2024","unstructured":"Guo, Y., Guo, Y., Xiong, P., Yang, F., & Zhang, C. (2024). A provably secure and practical end-to-end authentication scheme for tactile industrial internet of things. Pervasive and Mobile Computing. https:\/\/doi.org\/10.1016\/j.pmcj.2024.101877","journal-title":"Pervasive and Mobile Computing"},{"issue":"4","key":"3980_CR26","doi-asserted-by":"publisher","first-page":"5057","DOI":"10.1109\/JSYST.2020.3022244","volume":"15","author":"Y Guo","year":"2021","unstructured":"Guo, Y., Zhang, Z., & Guo, Y. (2021). Fog-centric authenticated key agreement scheme without trusted parties. IEEE Systems Journal, 15(4), 5057\u20135066. https:\/\/doi.org\/10.1109\/JSYST.2020.3022244","journal-title":"IEEE Systems Journal"},{"key":"3980_CR27","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2022.108818","author":"Y Guo","year":"2022","unstructured":"Guo, Y., Zhang, Z., & Guo, Y. (2022). Secfhome: Secure remote authentication in fog-enabled smart home environment. Computer Networks. https:\/\/doi.org\/10.1016\/j.comnet.2022.108818","journal-title":"Computer Networks"},{"issue":"8","key":"3980_CR28","doi-asserted-by":"publisher","first-page":"2718","DOI":"10.1109\/TMC.2020.3048703","volume":"21","author":"Y Guo","year":"2022","unstructured":"Guo, Y., Zhang, Z., & Guo, Y. (2022). Anonymous authenticated key agreement and group proof protocol for wearable computing. IEEE Transactions on Mobile Computing, 21(8), 2718\u20132731. https:\/\/doi.org\/10.1109\/TMC.2020.3048703","journal-title":"IEEE Transactions on Mobile Computing"},{"issue":"2","key":"3980_CR29","doi-asserted-by":"publisher","first-page":"3348","DOI":"10.1109\/JIOT.2023.3297237","volume":"11","author":"Y Guo","year":"2024","unstructured":"Guo, Y., Zhang, Z., Guo, Y., & Xiong, P. (2024). BSRA: Blockchain-based secure remote authentication scheme for fog-enabled internet of things. IEEE Internet of Things Journal, 11(2), 3348\u20133361. https:\/\/doi.org\/10.1109\/JIOT.2023.3297237","journal-title":"IEEE Internet of Things Journal"},{"issue":"9","key":"3980_CR30","doi-asserted-by":"publisher","first-page":"16243","DOI":"10.1109\/JIOT.2024.3355228","volume":"11","author":"Y Han","year":"2024","unstructured":"Han, Y., Guo, H., Liu, J., Ehui, B. B., Wu, Y., & Li, S. (2024). An enhanced multifactor authentication and key agreement protocol in industrial internet of things. IEEE Internet of Things Journal, 11(9), 16243\u201316254. https:\/\/doi.org\/10.1109\/JIOT.2024.3355228","journal-title":"IEEE Internet of Things Journal"},{"issue":"27","key":"3980_CR31","doi-asserted-by":"publisher","first-page":"8252","DOI":"10.1002\/cpe.8252","volume":"36","author":"A Heidari","year":"2024","unstructured":"Heidari, A., Amiri, Z., Jamali, M. A. J., & Jafari, N. (2024). Assessment of reliability and availability of wireless sensor networks in industrial applications by considering permanent faults. Concurrency and Computation: Practice and Experience, 36(27), 8252. https:\/\/doi.org\/10.1002\/cpe.8252","journal-title":"Concurrency and Computation: Practice and Experience"},{"issue":"10","key":"3980_CR32","doi-asserted-by":"publisher","first-page":"8445","DOI":"10.1109\/JIOT.2023.3237661","volume":"10","author":"A Heidari","year":"2023","unstructured":"Heidari, A., Jafari Navimipour, N., & Unal, M. (2023). A secure intrusion detection platform using blockchain and radial basis function neural networks for internet of drones. IEEE Internet of Things Journal, 10(10), 8445\u20138454. https:\/\/doi.org\/10.1109\/JIOT.2023.3237661","journal-title":"IEEE Internet of Things Journal"},{"issue":"6","key":"3980_CR33","doi-asserted-by":"publisher","first-page":"530","DOI":"10.1002\/itl2.530","volume":"7","author":"A Heidari","year":"2024","unstructured":"Heidari, A., Navimipour, N. J., Zeadally, S., & Chamola, V. (2024). Everything you wanted to know about ChatGpt: Components, capabilities, applications, and opportunities. Internet Technology Letters, 7(6), 530. https:\/\/doi.org\/10.1002\/itl2.530","journal-title":"Internet Technology Letters"},{"issue":"6","key":"3980_CR34","doi-asserted-by":"publisher","first-page":"7521","DOI":"10.1007\/s10586-024-04351-4","volume":"27","author":"A Heidari","year":"2024","unstructured":"Heidari, A., Shishehlou, H., Darbandi, M., Navimipour, N. J., & Yalcin, S. (2024). A reliable method for data aggregation on the industrial internet of things using a hybrid optimization algorithm and density correlation degree. Cluster Computing, 27(6), 7521\u20137539.","journal-title":"Cluster Computing"},{"issue":"6","key":"3980_CR35","doi-asserted-by":"publisher","first-page":"10936","DOI":"10.1109\/JIOT.2019.2934947","volume":"6","author":"S Hussain","year":"2019","unstructured":"Hussain, S., & Chaudhry, S. A. (2019). Comments on \u201cbiometrics-based privacy-preserving user authentication scheme for cloud-based industrial internet of things deployment\u2019\u2019. IEEE Internet of Things Journal, 6(6), 10936\u201310940. https:\/\/doi.org\/10.1109\/JIOT.2019.2934947","journal-title":"IEEE Internet of Things Journal"},{"key":"3980_CR36","volume-title":"Towards the internet of things: Architectures, security, and applications","author":"M Jabraeil Jamali","year":"2019","unstructured":"Jabraeil Jamali, M., Bahrami, B., Heidari, A., Allahverdizadeh, P., & Norouzi, F. (2019). Towards the internet of things: Architectures, security, and applications. Springer."},{"key":"3980_CR37","doi-asserted-by":"publisher","unstructured":"Kalsoom, T., Ramzan, N., Ahmed, S., & Ur-Rehman, M. (2020). Advances in sensor technologies in the era of smart factory and industry 4.0. Sensors https:\/\/doi.org\/10.3390\/s20236783","DOI":"10.3390\/s20236783"},{"issue":"8","key":"3980_CR38","doi-asserted-by":"publisher","first-page":"3701","DOI":"10.1109\/TII.2018.2794991","volume":"14","author":"A Karati","year":"2018","unstructured":"Karati, A., Islam, S. H., & Karuppiah, M. (2018). Provably secure and lightweight certificateless signature scheme for IoT environments. IEEE Transactions on Industrial Informatics, 14(8), 3701\u20133711. https:\/\/doi.org\/10.1109\/TII.2018.2794991","journal-title":"IEEE Transactions on Industrial Informatics"},{"key":"3980_CR39","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2022.103003","author":"R Krishnasrija","year":"2023","unstructured":"Krishnasrija, R., Mandal, A. K., & Cortesi, A. (2023). A lightweight mutual and transitive authentication mechanism for IoT network. Ad Hoc Networks. https:\/\/doi.org\/10.1016\/j.adhoc.2022.103003","journal-title":"Ad Hoc Networks"},{"key":"3980_CR40","doi-asserted-by":"publisher","DOI":"10.3390\/s20020501","author":"E Lara","year":"2020","unstructured":"Lara, E., Aguilar, L., Sanchez, M. A., & Garcia, J. A. (2020). Lightweight authentication protocol for m2m communications of resource-constrained devices in industrial internet of things. Sensors. https:\/\/doi.org\/10.3390\/s20020501","journal-title":"Sensors"},{"issue":"8","key":"3980_CR41","doi-asserted-by":"publisher","first-page":"3599","DOI":"10.1109\/TII.2017.2773666","volume":"14","author":"X Li","year":"2018","unstructured":"Li, X., Niu, J., Bhuiyan, M. Z. A., Wu, F., Karuppiah, M., & Kumari, S. (2018). A robust ECC-based provable secure authentication protocol with privacy preserving for industrial internet of things. IEEE Transactions on Industrial Informatics, 14(8), 3599\u20133609. https:\/\/doi.org\/10.1109\/TII.2017.2773666","journal-title":"IEEE Transactions on Industrial Informatics"},{"issue":"3","key":"3980_CR42","doi-asserted-by":"publisher","first-page":"1606","DOI":"10.1109\/JIOT.2017.2787800","volume":"5","author":"X Li","year":"2018","unstructured":"Li, X., Peng, J., Niu, J., Wu, F., Liao, J., & Choo, K.-K.R. (2018). A robust and energy efficient authentication protocol for industrial internet of things. IEEE Internet of Things Journal, 5(3), 1606\u20131615. https:\/\/doi.org\/10.1109\/JIOT.2017.2787800","journal-title":"IEEE Internet of Things Journal"},{"issue":"4","key":"3980_CR43","doi-asserted-by":"publisher","first-page":"6197","DOI":"10.1109\/JSYST.2022.3152561","volume":"16","author":"Y Li","year":"2022","unstructured":"Li, Y., & Tian, Y. (2022). A lightweight and secure three-factor authentication protocol with adaptive privacy-preserving property for wireless sensor networks. IEEE Systems Journal, 16(4), 6197\u20136208. https:\/\/doi.org\/10.1109\/JSYST.2022.3152561","journal-title":"IEEE Systems Journal"},{"key":"3980_CR44","doi-asserted-by":"publisher","unstructured":"MS, R., Pattar, S., Buyya, R., KR, V., Iyengar, S. S., & Patnaik, L. M. (2019). Social internet of things (siot): Foundations, thrust areas, systematic review and future directions. Computer Communications, 139, 32\u201357. https:\/\/doi.org\/10.1016\/j.comcom.2019.03.009","DOI":"10.1016\/j.comcom.2019.03.009"},{"key":"3980_CR45","doi-asserted-by":"publisher","DOI":"10.1016\/j.sysarc.2023.102836","author":"S Niu","year":"2023","unstructured":"Niu, S., Shao, H., Su, Y., & Wang, C. (2023). Efficient heterogeneous signcryption scheme based on edge computing for industrial internet of things. Journal of Systems Architecture. https:\/\/doi.org\/10.1016\/j.sysarc.2023.102836","journal-title":"Journal of Systems Architecture"},{"key":"3980_CR46","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2023.103117","author":"VO Nyangaresi","year":"2023","unstructured":"Nyangaresi, V. O. (2023). Privacy preserving three-factor authentication protocol for secure message forwarding in wireless body area networks. Ad Hoc Networks. https:\/\/doi.org\/10.1016\/j.adhoc.2023.103117","journal-title":"Ad Hoc Networks"},{"key":"3980_CR47","doi-asserted-by":"publisher","first-page":"882","DOI":"10.1016\/j.future.2019.04.019","volume":"100","author":"A Ostad-Sharif","year":"2019","unstructured":"Ostad-Sharif, A., Arshad, H., Nikooghadam, M., & Abbasinezhad-Mood, D. (2019). Three party secure data transmission in IoT networks through design of a lightweight authenticated key agreement scheme. Future Generation Computer Systems, 100, 882\u2013892. https:\/\/doi.org\/10.1016\/j.future.2019.04.019","journal-title":"Future Generation Computer Systems"},{"issue":"2","key":"3980_CR48","doi-asserted-by":"publisher","first-page":"1338","DOI":"10.1109\/TDSC.2020.3022797","volume":"19","author":"S Qiu","year":"2022","unstructured":"Qiu, S., Wang, D., Xu, G., & Kumari, S. (2022). Practical and provably secure three-factor authentication protocol based on extended chaotic-maps for mobile lightweight devices. IEEE Transactions on Dependable and Secure Computing, 19(2), 1338\u20131351. https:\/\/doi.org\/10.1109\/TDSC.2020.3022797","journal-title":"IEEE Transactions on Dependable and Secure Computing"},{"issue":"3","key":"3980_CR49","doi-asserted-by":"publisher","first-page":"1548","DOI":"10.1007\/s12083-020-01063-5","volume":"14","author":"D Rangwani","year":"2021","unstructured":"Rangwani, D., Sadhukhan, D., Ray, S., Khan, M. K., & Dasgupta, M. (2021). A robust provable-secure privacy-preserving authentication protocol for industrial internet of things. Peer-to-peer Networking and Applications, 14(3), 1548\u20131571.","journal-title":"Peer-to-peer Networking and Applications"},{"issue":"10","key":"3980_CR50","doi-asserted-by":"publisher","first-page":"8547","DOI":"10.1109\/JIOT.2022.3202265","volume":"10","author":"S Roy","year":"2023","unstructured":"Roy, S., Das, D., Mondal, A., Mahalat, M. H., Sen, B., & Sikdar, B. (2023). PLAKE: PUF-based secure lightweight authentication and key exchange protocol for IoT. IEEE Internet of Things Journal, 10(10), 8547\u20138559. https:\/\/doi.org\/10.1109\/JIOT.2022.3202265","journal-title":"IEEE Internet of Things Journal"},{"issue":"8","key":"3980_CR51","doi-asserted-by":"publisher","first-page":"3753","DOI":"10.1007\/s11276-022-03070-1","volume":"28","author":"X Shao","year":"2022","unstructured":"Shao, X., Guo, Y., & Guo, Y. (2022). A PUF-based anonymous authentication protocol for wireless medical sensor networks. Wireless Networks, 28(8), 3753\u20133770.","journal-title":"Wireless Networks"},{"key":"3980_CR52","doi-asserted-by":"publisher","first-page":"67555","DOI":"10.1109\/ACCESS.2020.2985719","volume":"8","author":"S Shin","year":"2020","unstructured":"Shin, S., & Kwon, T. (2020). A privacy-preserving authentication, authorization, and key agreement scheme for wireless sensor networks in 5g-integrated internet of things. IEEE Access, 8, 67555\u201367571. https:\/\/doi.org\/10.1109\/ACCESS.2020.2985719","journal-title":"IEEE Access"},{"key":"3980_CR53","doi-asserted-by":"publisher","first-page":"215","DOI":"10.1016\/j.comcom.2020.06.012","volume":"160","author":"M Shuai","year":"2020","unstructured":"Shuai, M., Xiong, L., Wang, C., & Yu, N. (2020). A secure authentication scheme with forward secrecy for industrial internet of things using Rabin cryptosystem. Computer Communications, 160, 215\u2013227. https:\/\/doi.org\/10.1016\/j.comcom.2020.06.012","journal-title":"Computer Communications"},{"key":"3980_CR54","doi-asserted-by":"publisher","unstructured":"Su, X., Xie, Y., Wang, H., Liu, W., & Shui, D. (2023) Secure and efficient anonymous authentication key agreement scheme for smart industry. In: 2022 IEEE 28th International Conference on Parallel and Distributed Systems (ICPADS), pp. 250\u2013257. https:\/\/doi.org\/10.1109\/ICPADS56603.2022.00040","DOI":"10.1109\/ICPADS56603.2022.00040"},{"issue":"23","key":"3980_CR55","doi-asserted-by":"publisher","first-page":"24453","DOI":"10.1109\/JIOT.2022.3188711","volume":"9","author":"M Tanveer","year":"2022","unstructured":"Tanveer, M., Alkhayyat, A., Khan, A. U., Kumar, N., & Alharbi, A. G. (2022). REAP-IIOT: Resource-efficient authentication protocol for the industrial internet of things. IEEE Internet of Things Journal, 9(23), 24453\u201324465. https:\/\/doi.org\/10.1109\/JIOT.2022.3188711","journal-title":"IEEE Internet of Things Journal"},{"issue":"16","key":"3980_CR56","doi-asserted-by":"publisher","first-page":"8091","DOI":"10.1002\/cpe.8091","volume":"36","author":"A Vakili","year":"2024","unstructured":"Vakili, A., Al-Khafaji, H. M. R., Darbandi, M., Heidari, A., Jafari Navimipour, N., & Unal, M. (2024). A new service composition method in the cloud-based internet of things environment using a grey wolf optimization algorithm and mapreduce framework. Concurrency and Computation: Practice and Experience, 36(16), 8091. https:\/\/doi.org\/10.1002\/cpe.8091","journal-title":"Concurrency and Computation: Practice and Experience"},{"issue":"13","key":"3980_CR57","doi-asserted-by":"publisher","first-page":"10792","DOI":"10.1109\/JIOT.2021.3050676","volume":"8","author":"A Vangala","year":"2021","unstructured":"Vangala, A., Sutrala, A. K., Das, A. K., & Jo, M. (2021). Smart contract-based blockchain-envisioned authentication scheme for smart farming. IEEE Internet of Things Journal, 8(13), 10792\u201310806. https:\/\/doi.org\/10.1109\/JIOT.2021.3050676","journal-title":"IEEE Internet of Things Journal"},{"issue":"1","key":"3980_CR58","doi-asserted-by":"publisher","first-page":"112301","DOI":"10.1007\/s11432-020-2975-6","volume":"65","author":"C Wang","year":"2022","unstructured":"Wang, C., Wang, D., Xu, G., & He, D. (2022). Efficient privacy-preserving user authentication scheme with forward secrecy for industry 4.0. Science China Information Sciences, 65(1), 112301.","journal-title":"Science China Information Sciences"},{"key":"3980_CR59","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2025.111241","author":"Z Wang","year":"2025","unstructured":"Wang, Z., Guo, Y., & Guo, Y. (2025). A blockchain-based medical IoT authentication scheme resistant to combined attacks. Computer Networks. https:\/\/doi.org\/10.1016\/j.comnet.2025.111241","journal-title":"Computer Networks"},{"issue":"1","key":"3980_CR60","doi-asserted-by":"publisher","first-page":"193","DOI":"10.1109\/TDSC.2021.3129512","volume":"20","author":"Q Wang","year":"2023","unstructured":"Wang, Q., Wang, D., Cheng, C., & He, D. (2023). Quantum2fa: Efficient quantum-resistant two-factor authentication scheme for mobile devices. IEEE Transactions on Dependable and Secure Computing, 20(1), 193\u2013208. https:\/\/doi.org\/10.1109\/TDSC.2021.3129512","journal-title":"IEEE Transactions on Dependable and Secure Computing"},{"key":"3980_CR61","doi-asserted-by":"publisher","first-page":"2961","DOI":"10.1109\/TIFS.2023.3272772","volume":"18","author":"C Wang","year":"2023","unstructured":"Wang, C., Wang, D., Duan, Y., & Tao, X. (2023). Secure and lightweight user authentication scheme for cloud-assisted internet of things. IEEE Transactions on Information Forensics and Security, 18, 2961\u20132976. https:\/\/doi.org\/10.1109\/TIFS.2023.3272772","journal-title":"IEEE Transactions on Information Forensics and Security"},{"issue":"6","key":"3980_CR62","doi-asserted-by":"publisher","first-page":"3652","DOI":"10.1109\/TII.2019.2894573","volume":"15","author":"J Wan","year":"2019","unstructured":"Wan, J., Li, J., Imran, M., & Li, D. (2019). Fazal-e-Amin: A blockchain-based solution for enhancing security and privacy in smart factory. IEEE Transactions on Industrial Informatics, 15(6), 3652\u20133660. https:\/\/doi.org\/10.1109\/TII.2019.2894573","journal-title":"IEEE Transactions on Industrial Informatics"},{"key":"3980_CR63","doi-asserted-by":"publisher","first-page":"475","DOI":"10.1016\/j.future.2018.09.017","volume":"91","author":"M Wazid","year":"2019","unstructured":"Wazid, M., Das, A. K., Kumar, N., & Vasilakos, A. V. (2019). Design of secure key management and user authentication scheme for fog computing services. Future Generation Computer Systems, 91, 475\u2013492. https:\/\/doi.org\/10.1016\/j.future.2018.09.017","journal-title":"Future Generation Computer Systems"},{"issue":"2","key":"3980_CR64","doi-asserted-by":"publisher","first-page":"391","DOI":"10.1109\/TDSC.2017.2764083","volume":"17","author":"M Wazid","year":"2020","unstructured":"Wazid, M., Das, A. K., Odelu, V., Kumar, N., & Susilo, W. (2020). Secure remote user authenticated key establishment protocol for smart home environment. IEEE Transactions on Dependable and Secure Computing, 17(2), 391\u2013406. https:\/\/doi.org\/10.1109\/TDSC.2017.2764083","journal-title":"IEEE Transactions on Dependable and Secure Computing"},{"issue":"3","key":"3980_CR65","doi-asserted-by":"publisher","first-page":"1340","DOI":"10.1007\/s12083-022-01442-0","volume":"16","author":"A Wu","year":"2023","unstructured":"Wu, A., Guo, Y., & Guo, Y. (2023). A decentralized lightweight blockchain-based authentication mechanism for internet of vehicles. Peer-to-Peer Networking and Applications, 16(3), 1340\u20131353.","journal-title":"Peer-to-Peer Networking and Applications"},{"key":"3980_CR66","doi-asserted-by":"publisher","first-page":"58","DOI":"10.1016\/j.comcom.2023.04.005","volume":"205","author":"X Xu","year":"2023","unstructured":"Xu, X., Guo, Y., & Guo, Y. (2023). Fog-enabled private blockchain-based identity authentication scheme for smart home. Computer Communications, 205, 58\u201368. https:\/\/doi.org\/10.1016\/j.comcom.2023.04.005","journal-title":"Computer Communications"},{"issue":"2","key":"3980_CR67","doi-asserted-by":"publisher","first-page":"1343","DOI":"10.1109\/TII.2022.3194956","volume":"19","author":"AK Yadav","year":"2023","unstructured":"Yadav, A. K., Misra, M., Pandey, P. K., & Liyanage, M. (2023). An EAP-based mutual authentication protocol for WLAN-connected IoT devices. IEEE Transactions on Industrial Informatics, 19(2), 1343\u20131355. https:\/\/doi.org\/10.1109\/TII.2022.3194956","journal-title":"IEEE Transactions on Industrial Informatics"},{"key":"3980_CR68","doi-asserted-by":"publisher","DOI":"10.1016\/j.pmcj.2023.101843","author":"H Yang","year":"2023","unstructured":"Yang, H., Guo, Y., & Guo, Y. (2023). A PUF-based three-party authentication key establishment scheme for fog-enabled smart home. Pervasive and Mobile Computing. https:\/\/doi.org\/10.1016\/j.pmcj.2023.101843","journal-title":"Pervasive and Mobile Computing"},{"key":"3980_CR69","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2024.110240","author":"H Yang","year":"2024","unstructured":"Yang, H., Guo, Y., & Guo, Y. (2024). Blockchain-based cloud-fog collaborative smart home authentication scheme. Computer Networks. https:\/\/doi.org\/10.1016\/j.comnet.2024.110240","journal-title":"Computer Networks"},{"issue":"15","key":"3980_CR70","doi-asserted-by":"publisher","first-page":"5886","DOI":"10.1002\/dac.5886","volume":"37","author":"K Zanbouri","year":"2024","unstructured":"Zanbouri, K., Darbandi, M., Nassr, M., Heidari, A., Navimipour, N. J., & Yalc\u0131n, S. (2024). A GSO-based multi-objective technique for performance optimization of blockchain-based industrial internet of things. International Journal of Communication Systems, 37(15), 5886. https:\/\/doi.org\/10.1002\/dac.5886","journal-title":"International Journal of Communication Systems"},{"issue":"9","key":"3980_CR71","doi-asserted-by":"publisher","first-page":"5099","DOI":"10.1109\/TII.2019.2894108","volume":"15","author":"Y Zhang","year":"2019","unstructured":"Zhang, Y., Deng, R. H., Zheng, D., Li, J., Wu, P., & Cao, J. (2019). Efficient and robust certificateless signature for data crowdsensing in cloud-assisted industrial IoT. IEEE Transactions on Industrial Informatics, 15(9), 5099\u20135108. https:\/\/doi.org\/10.1109\/TII.2019.2894108","journal-title":"IEEE Transactions on Industrial Informatics"},{"issue":"10","key":"3980_CR72","doi-asserted-by":"publisher","first-page":"1142","DOI":"10.1049\/cmu2.12295","volume":"16","author":"L Zhang","year":"2022","unstructured":"Zhang, L., Xu, J., Obaidat, M. S., Li, X., & Vijayakumar, P. (2022). A PUF-based lightweight authentication and key agreement protocol for smart UAV networks. IET Communications, 16(10), 1142\u20131159. https:\/\/doi.org\/10.1049\/cmu2.12295","journal-title":"IET Communications"},{"key":"3980_CR73","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2024.103427","author":"J Zhao","year":"2024","unstructured":"Zhao, J., Huang, F., Hu, H., Liao, L., Wang, D., & Fan, L. (2024). User security authentication protocol in multi gateway scenarios of the internet of things. Ad Hoc Networks. https:\/\/doi.org\/10.1016\/j.adhoc.2024.103427","journal-title":"Ad Hoc Networks"},{"issue":"4","key":"3980_CR74","doi-asserted-by":"publisher","first-page":"3299","DOI":"10.1109\/TDSC.2022.3193570","volume":"20","author":"Y Zheng","year":"2023","unstructured":"Zheng, Y., Liu, W., Gu, C., & Chang, C.-H. (2023). PUF-based mutual authentication and key exchange protocol for peer-to-peer IoT applications. IEEE Transactions on Dependable and Secure Computing, 20(4), 3299\u20133316. https:\/\/doi.org\/10.1109\/TDSC.2022.3193570","journal-title":"IEEE Transactions on Dependable and Secure Computing"},{"key":"3980_CR75","doi-asserted-by":"publisher","first-page":"81","DOI":"10.1016\/j.comcom.2024.04.011","volume":"220","author":"S Zou","year":"2024","unstructured":"Zou, S., Cao, Q., Lu, R., Wang, C., Xu, G., Ma, H., Cheng, Y., & Xi, J. (2024). A robust and effective 3-factor authentication protocol for smart factory in IIOT. Computer Communications, 220, 81\u201393. https:\/\/doi.org\/10.1016\/j.comcom.2024.04.011","journal-title":"Computer Communications"}],"container-title":["Wireless Networks"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11276-025-03980-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11276-025-03980-w\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11276-025-03980-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,6]],"date-time":"2025-09-06T19:16:25Z","timestamp":1757186185000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11276-025-03980-w"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,6,12]]},"references-count":75,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2025,8]]}},"alternative-id":["3980"],"URL":"https:\/\/doi.org\/10.1007\/s11276-025-03980-w","relation":{},"ISSN":["1022-0038","1572-8196"],"issn-type":[{"type":"print","value":"1022-0038"},{"type":"electronic","value":"1572-8196"}],"subject":[],"published":{"date-parts":[[2025,6,12]]},"assertion":[{"value":"21 May 2025","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"12 June 2025","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}