{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,8]],"date-time":"2025-11-08T23:00:51Z","timestamp":1762642851049,"version":"3.37.3"},"reference-count":31,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2023,3,8]],"date-time":"2023-03-08T00:00:00Z","timestamp":1678233600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,3,8]],"date-time":"2023-03-08T00:00:00Z","timestamp":1678233600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Wireless Pers Commun"],"published-print":{"date-parts":[[2023,5]]},"DOI":"10.1007\/s11277-023-10291-w","type":"journal-article","created":{"date-parts":[[2023,3,8]],"date-time":"2023-03-08T13:03:28Z","timestamp":1678280608000},"page":"401-420","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Integrated Signing Procedure Based Data Transfer Security and Authentication Framework for Internet of Things Applications"],"prefix":"10.1007","volume":"130","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-7361-8683","authenticated-orcid":false,"given":"Nasreen","family":"Fathima","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Reshma","family":"Banu","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"G. F. Ali","family":"Ahammed","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2023,3,8]]},"reference":[{"issue":"1","key":"10291_CR1","doi-asserted-by":"publisher","first-page":"432","DOI":"10.1109\/COMST.2022.3145856","volume":"24","author":"C Cai","year":"2022","unstructured":"Cai, C., Zheng, R., & Luo, J. (2022). ubiquitous acoustic sensing on commodity IoT Devices: A survey. IEEE Communications Surveys & Tutorials, 24(1), 432\u2013454.","journal-title":"IEEE Communications Surveys & Tutorials"},{"issue":"4","key":"10291_CR2","doi-asserted-by":"publisher","first-page":"3043","DOI":"10.1109\/JIOT.2018.2829827","volume":"5","author":"T Lv","year":"2018","unstructured":"Lv, T., Lin, Z., Huang, P., & Zeng, J. (2018). Optimization of the energy-efficient relay-based massive IoT network. IEEE Internet of Things Journal, 5(4), 3043\u20133058.","journal-title":"IEEE Internet of Things Journal"},{"key":"10291_CR3","doi-asserted-by":"crossref","unstructured":"Basharat, M., Ejaz, W., Naeem, M., Khattak, A. M., Anpalagan, A., & Alfandi, O. (2017). Energy efficient resource allocation for NOMA in cellular IoT with energy harvesting. In International conference on emerging technologies, (pp. 1\u20136).","DOI":"10.1109\/ICET.2017.8281755"},{"issue":"2","key":"10291_CR4","doi-asserted-by":"publisher","first-page":"3186","DOI":"10.1109\/JIOT.2018.2880190","volume":"6","author":"A Shahini","year":"2019","unstructured":"Shahini, A., Kiani, A., & Ansari, N. (2019). Energy efficient resource allocation in EH-enabled CR networks for IoT. IEEE Internet of Things Journal, 6(2), 3186\u20133193.","journal-title":"IEEE Internet of Things Journal"},{"key":"10291_CR5","doi-asserted-by":"crossref","unstructured":"Gyamfi, E., Ansere, J. A., & Xu, L. (2019). ECC based lightweight cybersecurity solution for IoT networks utilising multi-access mobile edge computing. In Fourth international conference on fog and mobile edge computing, (pp. 149\u2013154).","DOI":"10.1109\/FMEC.2019.8795315"},{"issue":"15","key":"10291_CR6","doi-asserted-by":"publisher","first-page":"2787","DOI":"10.1016\/j.comnet.2010.05.010","volume":"54","author":"L Atzori","year":"2010","unstructured":"Atzori, L., Iera, A., & Morabito, G. (2010). The internet of things: A survey. Elsevier Computer Networks, 54(15), 2787\u20132805.","journal-title":"Elsevier Computer Networks"},{"issue":"6","key":"10291_CR7","doi-asserted-by":"publisher","first-page":"129","DOI":"10.3390\/fi11060129","volume":"11","author":"V Nundloll","year":"2019","unstructured":"Nundloll, V., Porter, B., Blair, G. S., & Emmett, B. (2019). The design and deployment of an end-to-end IoT infrastructure for the 0tural environment. MDPI-Future Internet, 11(6), 129.","journal-title":"MDPI-Future Internet"},{"issue":"1","key":"10291_CR8","doi-asserted-by":"publisher","first-page":"72","DOI":"10.1049\/et.2015.0111","volume":"10","author":"A Saint","year":"2015","unstructured":"Saint, A. (2015). Where next for the internet of things? [information technology internet of things]. Engineering & Technology, 10(1), 72\u201375.","journal-title":"Engineering & Technology"},{"key":"10291_CR9","doi-asserted-by":"crossref","unstructured":"Hui, J., & Thubert, P. (2011). Compression format for IPv6 datagrams over IEEE 802.15.4-Based Networks, RFC 6282, RFC Editor","DOI":"10.17487\/rfc6282"},{"key":"10291_CR10","unstructured":"Winter, T., Thubert, P., Brandt, A., Hui, J., Kelsey, R., Levis, P., Pister, K., Struik, R., Vasseur, J.P., and Alexander, R.(2012). RPL: Ipv6 routing protocol for low-power and lossy networks, RFC 6550, RFC Editor"},{"issue":"8","key":"10291_CR11","doi-asserted-by":"publisher","first-page":"3567","DOI":"10.1109\/TII.2018.2841049","volume":"14","author":"KR Choo","year":"2018","unstructured":"Choo, K. R., Gritzalis, S., & Park, J. H. (2018). Cryptographic solutions for industrial internet-of-things: research challenges and opportunities. IEEE Transactions on Industrial Informatics, 14(8), 3567\u20133569.","journal-title":"IEEE Transactions on Industrial Informatics"},{"issue":"8","key":"10291_CR12","doi-asserted-by":"publisher","first-page":"3599","DOI":"10.1109\/TII.2017.2773666","volume":"14","author":"X Li","year":"2018","unstructured":"Li, X., Niu, J., Bhuiyan, M. Z. A., Wu, F., Karuppiah, M., & Kumari, S. (2018). A robust ECC-based provable secure authentication protocol with privacy preserving for industrial internet of things. IEEE Transactions on Industrial Informatics, 14(8), 3599\u20133609.","journal-title":"IEEE Transactions on Industrial Informatics"},{"key":"10291_CR13","doi-asserted-by":"publisher","first-page":"1669","DOI":"10.1109\/TIFS.2022.3170276","volume":"17","author":"MR Nosouhi","year":"2022","unstructured":"Nosouhi, M. R., Sood, K., Grobler, M., & Doss, R. (2022). Towards spoofing resistant next generation IoT networks. IEEE Transactions on Information Forensics and Security, 17, 1669\u20131683.","journal-title":"IEEE Transactions on Information Forensics and Security"},{"issue":"7","key":"10291_CR14","doi-asserted-by":"publisher","first-page":"5548","DOI":"10.1109\/JIOT.2021.3109299","volume":"9","author":"J Jung","year":"2022","unstructured":"Jung, J., Kim, B., Cho, J., & Lee, B. (2022). A secure platform model based on arm platform security architecture for IoT devices. IEEE Internet of Things Journal, 9(7), 5548\u20135560.","journal-title":"IEEE Internet of Things Journal"},{"issue":"12","key":"10291_CR15","doi-asserted-by":"publisher","first-page":"9640","DOI":"10.1109\/JIOT.2021.3135789","volume":"9","author":"D Breitenbacher","year":"2022","unstructured":"Breitenbacher, D., Homoliak, I., Aung, Y. L., Elovici, Y., & Tippenhauer, N. O. (2022). HADES-IoT: A practical and effective host-based anomaly detection system for IoT devices (extended version). IEEE Internet of Things Journal, 9(12), 9640\u20139658.","journal-title":"IEEE Internet of Things Journal"},{"issue":"9","key":"10291_CR16","doi-asserted-by":"publisher","first-page":"6611","DOI":"10.1109\/JIOT.2021.3113577","volume":"9","author":"P Krishnan","year":"2022","unstructured":"Krishnan, P., Jain, K., Buyya, R., Vijayakumar, P., Nayyar, A., Bilal, M., & Song, H. (2022). MUD-based behavioral profiling security framework for software-defined IoT networks. IEEE Internet of Things Journal, 9(9), 6611\u20136622.","journal-title":"IEEE Internet of Things Journal"},{"issue":"18","key":"10291_CR17","doi-asserted-by":"publisher","first-page":"9377","DOI":"10.3390\/app12189377","volume":"12","author":"SS Hameedi","year":"2022","unstructured":"Hameedi, S. S., & Bayat, O. (2022). Improving IoT Data Security and Integrity Using Lightweight Blockchain Dynamic Table. MDPI-Applied Science, 12(18), 9377.","journal-title":"MDPI-Applied Science"},{"issue":"1","key":"10291_CR18","first-page":"157","volume":"11","author":"ND Kathamuthu","year":"2022","unstructured":"Kathamuthu, N. D., Chinnamuthu, A., Iruthayanathan, N., Ramachandran, M., & Gandomi, A. H. (2022). Deep Q-learning-based neural network with privacy preservation method for secure data transmission in internet of things (IoT) healthcare application. MDPI-Electronics, 11(1), 157.","journal-title":"MDPI-Electronics"},{"issue":"2","key":"10291_CR19","doi-asserted-by":"publisher","first-page":"101866","DOI":"10.1016\/j.asej.2022.101866","volume":"14","author":"U Panahi","year":"2023","unstructured":"Panahi, U., & Bay\u0131lm\u0131\u015f, C. (2023). Enabling secure data transmission for wireless sensor networks based IoT applications. Ain Shams Engineering Journal, 14(2), 101866. https:\/\/doi.org\/10.1016\/j.asej.2022.101866","journal-title":"Ain Shams Engineering Journal"},{"key":"10291_CR20","doi-asserted-by":"publisher","first-page":"100486","DOI":"10.1016\/j.measen.2022.100486","volume":"24","author":"R Premkumar","year":"2022","unstructured":"Premkumar, R., & Sathya Priya, S. (2022). Service Constraint NCBQ trust orient secure transmission with IoT devices for improved data security in cloud using blockchain. Measurement: Sensors, 24, 100486. https:\/\/doi.org\/10.1016\/j.measen.2022.100486","journal-title":"Measurement: Sensors"},{"issue":"1\u20132","key":"10291_CR21","doi-asserted-by":"publisher","first-page":"171","DOI":"10.1504\/IJAIP.2022.125240","volume":"23","author":"P Jyotheeswari","year":"2022","unstructured":"Jyotheeswari, P., & Jeyanthi, N. (2022). Secure data transmission for protecting the users\u2019 privacy in medical internet of things. InderScience-International Journal of Advanced Intelligence Paradigm, 23(1\u20132), 171\u2013185.","journal-title":"InderScience-International Journal of Advanced Intelligence Paradigm"},{"issue":"3","key":"10291_CR22","doi-asserted-by":"publisher","first-page":"226","DOI":"10.1504\/IJEB.2022.124324","volume":"17","author":"SM Nagarajan","year":"2022","unstructured":"Nagarajan, S. M., Anandhan, P., Muthukumaran, V., Uma, K., & Kumaran, U. (2022). Security framework for IoT and deep belief network-based healthcare system using blockchain technology. InderScience-International Journal of Electronic Business, 17(3), 226\u2013243.","journal-title":"InderScience-International Journal of Electronic Business"},{"key":"10291_CR23","doi-asserted-by":"crossref","unstructured":"Kamal, M., Parvin, S., Saleem, K., Al-Hamadi, H., & Gawanmeh, A. (2017). Efficient low cost supervisory system for Internet of Things enabled smart home. In IEEE international conference on communications workshops, (pp. 864\u2013869).","DOI":"10.1109\/ICCW.2017.7962767"},{"issue":"5","key":"10291_CR24","doi-asserted-by":"publisher","first-page":"1250","DOI":"10.1109\/JIOT.2017.2694844","volume":"4","author":"Y Yang","year":"2017","unstructured":"Yang, Y., Wu, L., Yin, G., Li, L., & Zhao, H. (2017). A survey on security and privacy issues in Internet-of-Things. IEEE Internet of Things Journal, 4(5), 1250\u20131258.","journal-title":"IEEE Internet of Things Journal"},{"issue":"1","key":"10291_CR25","doi-asserted-by":"publisher","first-page":"257","DOI":"10.1109\/JIOT.2017.2779180","volume":"5","author":"Y Liu","year":"2017","unstructured":"Liu, Y., Kuang, Y., Xiao, Y., & Xu, G. (2017). SDN-based data transfer security for Internet of Things. IEEE Internet of Things Journal, 5(1), 257\u2013268.","journal-title":"IEEE Internet of Things Journal"},{"issue":"5","key":"10291_CR26","doi-asserted-by":"publisher","first-page":"7824686","DOI":"10.1155\/2016\/7824686","volume":"12","author":"HJ Ban","year":"2016","unstructured":"Ban, H. J., Choi, J., & Kang, N. (2016). Fine-grained support of security services for resource constrained internet of things. International Journal of Distributed Sensor Networks, 12(5), 7824686.","journal-title":"International Journal of Distributed Sensor Networks"},{"issue":"3","key":"10291_CR27","doi-asserted-by":"publisher","first-page":"277","DOI":"10.1109\/LWC.2015.2408609","volume":"4","author":"SN Premnath","year":"2015","unstructured":"Premnath, S. N., & Haas, Z. J. (2015). Security and privacy in the internet-of-things under time-and-budget-limited adversary model. IEEE Wireless Communications Letters, 4(3), 277\u2013280.","journal-title":"IEEE Wireless Communications Letters"},{"key":"10291_CR28","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1155\/2016\/4313475","volume":"2016","author":"X Li","year":"2016","unstructured":"Li, X., Wang, H., Dai, H.-N., Wang, Y., & Zhao, Q. (2016). An analytical study on eavesdropping attacks in wireless nets of things. Mobile Information Systems, 2016, 1\u201310. https:\/\/doi.org\/10.1155\/2016\/4313475","journal-title":"Mobile Information Systems"},{"issue":"11","key":"10291_CR29","doi-asserted-by":"publisher","first-page":"183659","DOI":"10.1155\/2015\/183659","volume":"11","author":"J-L Hou","year":"2015","unstructured":"Hou, J.-L., & Yeh, K.-H. (2015). Novel authentication schemes for IoT based healthcare systems. International Journal of Distributed Sensor Networks, 11(11), 183659.","journal-title":"International Journal of Distributed Sensor Networks"},{"key":"10291_CR30","doi-asserted-by":"crossref","unstructured":"Kodali, R.K., Jain, V., Bose, S., & Boppana, L. (2016). IoT based smart Security and home automation system. In IEEE International conference on computing, communication and Automation, (pp. 1286\u20131289).","DOI":"10.1109\/CCAA.2016.7813916"},{"key":"10291_CR31","doi-asserted-by":"publisher","first-page":"3028","DOI":"10.1109\/ACCESS.2017.2676119","volume":"5","author":"S Challa","year":"2017","unstructured":"Challa, S., Wazid, M., Das, A. K., Kumar, N., Reddy, A. G., Yoon, E.-J., & Yoo, K.-Y. (2017). Secure Signature-Based Authenticated Key Establishment Scheme for Future IoT Applications. IEEE Access, 5, 3028\u20133043. https:\/\/doi.org\/10.1109\/ACCESS.2017.2676119","journal-title":"IEEE Access"}],"container-title":["Wireless Personal Communications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-023-10291-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11277-023-10291-w\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-023-10291-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,4,24]],"date-time":"2023-04-24T15:16:40Z","timestamp":1682349400000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11277-023-10291-w"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,3,8]]},"references-count":31,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2023,5]]}},"alternative-id":["10291"],"URL":"https:\/\/doi.org\/10.1007\/s11277-023-10291-w","relation":{},"ISSN":["0929-6212","1572-834X"],"issn-type":[{"type":"print","value":"0929-6212"},{"type":"electronic","value":"1572-834X"}],"subject":[],"published":{"date-parts":[[2023,3,8]]},"assertion":[{"value":"24 February 2023","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"8 March 2023","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"We wish to confirm that there are no known conflicts of interest associated with this publication.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}