{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,17]],"date-time":"2025-10-17T14:25:53Z","timestamp":1760711153672,"version":"3.37.3"},"reference-count":29,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2023,3,14]],"date-time":"2023-03-14T00:00:00Z","timestamp":1678752000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,3,14]],"date-time":"2023-03-14T00:00:00Z","timestamp":1678752000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Wireless Pers Commun"],"published-print":{"date-parts":[[2023,6]]},"DOI":"10.1007\/s11277-023-10349-9","type":"journal-article","created":{"date-parts":[[2023,3,14]],"date-time":"2023-03-14T16:02:27Z","timestamp":1678809747000},"page":"1661-1675","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["A Lightweight and Robust Stream Cipher Based on PI for Intelligent Transportation Systems"],"prefix":"10.1007","volume":"130","author":[{"given":"Hongyu","family":"Wang","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3847-7659","authenticated-orcid":false,"given":"Chingfang","family":"Hsu","sequence":"additional","affiliation":[]},{"given":"Lein","family":"Harn","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,3,14]]},"reference":[{"key":"10349_CR1","doi-asserted-by":"publisher","first-page":"131101","DOI":"10.1007\/s11432-018-9929-x","volume":"63","author":"L Jiao","year":"2020","unstructured":"Jiao, L., Hao, Y., & Feng, D. (2020). Stream cipher designs: a review. Science China Information Sciences, 63, 131101. https:\/\/doi.org\/10.1007\/s11432-018-9929-x","journal-title":"Science China Information Sciences"},{"issue":"12","key":"10349_CR2","doi-asserted-by":"publisher","first-page":"3285","DOI":"10.1109\/TPDS.2013.2295809","volume":"25","author":"X Chen","year":"2014","unstructured":"Chen, X., Li, J., Huang, X., Li, J., Xiang, Y., & Wong, D. S. (2014). Secure outsourced attribute-based signatures. IEEE Transactions on Parallel and Distributed Systems, 25(12), 3285\u20133294.","journal-title":"IEEE Transactions on Parallel and Distributed Systems"},{"key":"10349_CR3","first-page":"1","volume":"2022","author":"L Bai","year":"2022","unstructured":"Bai, L., Hsu, C., Harn, L., et al. (2022). A practical lightweight anonymous authentication and key establishment scheme for resource-asymmetric smart environments[J]. IEEE Transactions on Dependable and Secure Computing, 2022, 1\u201311.","journal-title":"IEEE Transactions on Dependable and Secure Computing"},{"issue":"12","key":"10349_CR4","doi-asserted-by":"publisher","first-page":"3729","DOI":"10.1109\/TKDE.2020.2975777","volume":"33","author":"X Chen","year":"2021","unstructured":"Chen, X., Li, H., Li, J., Wang, Q., Huang, X., Susilo, W., & Xiang, Y. (2021). Publicly verifiable databases with all efficient updating operations. IEEE Transactions on Knowledge and Data Engineering, 33(12), 3729\u20133740.","journal-title":"IEEE Transactions on Knowledge and Data Engineering"},{"issue":"8","key":"10349_CR5","doi-asserted-by":"publisher","first-page":"14287","DOI":"10.1109\/JIOT.2021.3068364","volume":"18","author":"C Peng","year":"2021","unstructured":"Peng, C., Luo, M., Li, L., Choo, K.-K.R., & He, D. (2021). Efficient certificateless online\/offline signature scheme for wireless body area networks. IEEE Internet of Things Journal, 18(8), 14287\u201314298.","journal-title":"IEEE Internet of Things Journal"},{"key":"10349_CR6","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2020.3025288","author":"J Shen","year":"2020","unstructured":"Shen, J., Gui, Z., Chen, X., Zhang, J., & Xiang, Y. (2020). Lightweight and certificateless multi-receiver secure data transmission protocol for wireless body area networks. IEEE Transactions on Dependable and Secure Computing. https:\/\/doi.org\/10.1109\/TDSC.2020.3025288","journal-title":"IEEE Transactions on Dependable and Secure Computing"},{"issue":"6","key":"10349_CR7","doi-asserted-by":"publisher","first-page":"996","DOI":"10.1109\/TDSC.2017.2725953","volume":"16","author":"J Shen","year":"2019","unstructured":"Shen, J., Zhou, T., He, D., Zhang, Y., Sun, X., & Xiang, Y. (2019). Block design-based key agreement for group data sharing in cloud computing. IEEE Transactions on Dependable and Secure Computing, 16(6), 996\u20131010.","journal-title":"IEEE Transactions on Dependable and Secure Computing"},{"key":"10349_CR8","doi-asserted-by":"publisher","first-page":"191","DOI":"10.1007\/978-3-540-68351-3_15","volume":"4986","author":"S Babbage","year":"2008","unstructured":"Babbage, S., & Dodd, M. (2008). The stream cipher MICKEY 2.0. ECRYPT Stream Cipher, 4986, 191\u2013209.","journal-title":"ECRYPT Stream Cipher"},{"key":"10349_CR9","doi-asserted-by":"crossref","unstructured":"Bonnerji, R., Sarkar, S., Rarhi, K., et al. (2018). COZMO-A new lightweight stream cipher[C]. 2018 Second International Conference on Green Computing and Internet of Things (ICGCIoT). IEEE, pp. 565\u2013568.","DOI":"10.1109\/ICGCIoT.2018.8752965"},{"issue":"2","key":"10349_CR10","first-page":"287","volume":"2","author":"AK Khende","year":"2013","unstructured":"Khende, A. K., & Agarwal, H. (2013). A survey report on various cryptanalysis techniques. International Journal of Soft Computing and Engineering (IJSCE), 2(2), 287\u2013293.","journal-title":"International Journal of Soft Computing and Engineering (IJSCE)"},{"issue":"3","key":"10349_CR11","first-page":"220","volume":"19","author":"N Komninos","year":"2012","unstructured":"Komninos, N. (2012). Morpheus: Aword-oriented stream cipher[J]. International Journal of Computer Research, 19(3), 220.","journal-title":"International Journal of Computer Research"},{"issue":"7","key":"10349_CR12","doi-asserted-by":"publisher","first-page":"853","DOI":"10.3390\/sym11070853","volume":"11","author":"L Ding","year":"2019","unstructured":"Ding, L., Liu, C., Zhang, Y., & Ding, Q. (2019). A new lightweight stream cipher based on chaos. Symmetry, 11(7), 853.","journal-title":"Symmetry"},{"issue":"2","key":"10349_CR13","doi-asserted-by":"publisher","first-page":"1","DOI":"10.46586\/tosc.v2022.i2.1-42","volume":"2022","author":"M Hamann","year":"2022","unstructured":"Hamann, M., Moch, A., Krause, M., & Mikhalev, V. (2022). The DRACO stream cipher: A power-efficient small-state stream cipher with full provable security against TMDTO attacks. IACR Transactions on Symmetric Cryptology, 2022(2), 1\u201342.","journal-title":"IACR Transactions on Symmetric Cryptology"},{"key":"10349_CR14","unstructured":"Shemaili, M.B., Yeun, C.Y., Mubarak, K., Zemerly, M.J. (2012) A new lightweight hybrid cryptographic algorithm for the Internet of Things. The 7th International Conference for Internet Technology and Secured Transactions (ICITST-2012), London, UK, pp. 87\u201392."},{"key":"10349_CR15","doi-asserted-by":"publisher","first-page":"587","DOI":"10.1007\/s12046-007-0044-4","volume":"32","author":"E Karakas","year":"2007","unstructured":"Karakas, E., & Vardarbasi, S. (2007). Speed control of SR motor by self-tuning fuzzy PI controller with artificial neural network. Sadhana, 32, 587\u2013596.","journal-title":"Sadhana"},{"key":"10349_CR16","first-page":"107","volume-title":"Chameleon\u2014A new kind of stream cipher","author":"R Anderson","year":"1997","unstructured":"Anderson, R., & Manifavas, C. (1997). Chameleon\u2014A new kind of stream cipher (pp. 107\u2013113). Springer."},{"key":"10349_CR17","unstructured":"Chan, V., D\u2019Ambrogio, A., Zacharewicz, G., Mustafee, N., Wainer, G., Page, E. (2017). Proceedings of the 2017 Winter Simulation Conference W. K, HISTORY OF UNIFORM RANDOM NUMBER GENERATION Pierre L\u2019Ecuyer DIRO, GERAD, and CIRRELT Pavillon Aisenstadt, Universite\u00b4 de Montreal Montre\u00b4al (Que\u00b4bec), CANADA."},{"key":"10349_CR18","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1038\/s41467-017-00869-x","volume":"8","author":"H Jiang","year":"2017","unstructured":"Jiang, H., Belkin, D., Savel\u2019ev, S. E., et al. (2017). A novel true random number generator based on a stochastic diffusive memristor. Nature Communications, 8, 1.","journal-title":"Nature Communications"},{"issue":"9","key":"10349_CR19","doi-asserted-by":"publisher","first-page":"51","DOI":"10.1109\/MC.2011.291","volume":"44","author":"R Roman","year":"2011","unstructured":"Roman, R., Najera, P., & Lopez, J. (2011). Securing the Internet of Things. Computer, 44(9), 51\u201358.","journal-title":"Computer"},{"issue":"9","key":"10349_CR20","doi-asserted-by":"publisher","first-page":"7928","DOI":"10.1109\/JIOT.2020.2990428","volume":"7","author":"T Liu","year":"2020","unstructured":"Liu, T., Wang, Y., Li, Y., Tong, X., Qi, L., & Jiang, N. (2020). Privacy protection based on stream cipher for spatiotemporal data. IoT IEEE Internet of Things Journal, 7(9), 7928\u20137940.","journal-title":"IoT IEEE Internet of Things Journal"},{"key":"10349_CR21","doi-asserted-by":"publisher","first-page":"269","DOI":"10.1007\/978-3-642-40861-8_40","volume":"276","author":"MAB Shemaili","year":"2014","unstructured":"Shemaili, M. A. B., Yeun, C. Y., Zemerly, M. J., & Mubarak, K. (2014). A novel hybrid cellular automata based cipher system for Internet of Things. Future Information Technology, 276, 269\u2013276.","journal-title":"Future Information Technology"},{"key":"10349_CR22","unstructured":"Shemaili, M.B., Yeun, C. Y., Mubarak, K., Zemerly, J. (2012). A new lightweight hybrid cryptographic algorithm for the internet of things. International Conference for Internet Technology and Secured Transactions, pp. 87\u201392."},{"key":"10349_CR23","doi-asserted-by":"crossref","unstructured":"Noura, H., Couturier, R., Pham, C., Chehab, A. (2019) Lightweight stream cipher scheme for resource-constrained IoT devices. International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob), pp. 1\u20138.","DOI":"10.1109\/WiMOB.2019.8923144"},{"key":"10349_CR24","doi-asserted-by":"publisher","first-page":"20920","DOI":"10.1109\/ACCESS.2020.2967070","volume":"8","author":"Y He","year":"2020","unstructured":"He, Y., Wang, G., Li, W., & Ren, Y. (2020). Improved cube attacks on some authenticated encryption ciphers and stream ciphers in the Internet of Things. IEEE Access, 8, 20920\u201320930.","journal-title":"IEEE Access"},{"key":"10349_CR25","doi-asserted-by":"crossref","unstructured":"Kamali, H.M., Azar, K. Z., Roshanisefat, S., Vakil, A., Homayoun, H., Sasan, A. (2020) ExTru: A Lightweight, Fast, and Secure Expirable Trust for the Internet of Things. IEEE 14th Dallas Circuits and Systems Conference (DCAS), pp. 1\u20136.","DOI":"10.1109\/DCAS51144.2020.9330632"},{"key":"10349_CR26","first-page":"1035","volume":"10","author":"MI Shujaa","year":"2020","unstructured":"Shujaa, M. I., & Hussein, N. A. (2020). DNA computing based stream cipher for internet of things using MQTT protocol. International Journal of Electrical and Computer Engineering, 10, 1035\u20131042.","journal-title":"International Journal of Electrical and Computer Engineering"},{"key":"10349_CR27","doi-asserted-by":"crossref","unstructured":"Tahir, R., Tahir, H., McDonald-Maier, K., Fernando, A. (2016) A novel ICMetric based framework for securing the Internet of Things. IEEE International Conference on Consumer Electronics (ICCE), pp. 469\u2013470.","DOI":"10.1109\/ICCE.2016.7430694"},{"key":"10349_CR28","doi-asserted-by":"publisher","first-page":"75","DOI":"10.1007\/s11139-014-9560-0","volume":"38","author":"HH Chan","year":"2015","unstructured":"Chan, H. H. (2015). Analogues of the Brent-Salamin algorithm for evaluating PI. The Ramanujan Journal, 38, 75\u2013100.","journal-title":"The Ramanujan Journal"},{"key":"10349_CR29","doi-asserted-by":"crossref","unstructured":"Rukhin, A., Soto, J., Nechvatal, J., et al. (2001) A statistical test suite for random and pseudorandom number generators for cryptographic applications[R]. Booz-allen and hamilton inc mclean va.","DOI":"10.6028\/NIST.SP.800-22"}],"container-title":["Wireless Personal Communications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-023-10349-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11277-023-10349-9\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-023-10349-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,5,17]],"date-time":"2023-05-17T13:14:07Z","timestamp":1684329247000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11277-023-10349-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,3,14]]},"references-count":29,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2023,6]]}},"alternative-id":["10349"],"URL":"https:\/\/doi.org\/10.1007\/s11277-023-10349-9","relation":{},"ISSN":["0929-6212","1572-834X"],"issn-type":[{"type":"print","value":"0929-6212"},{"type":"electronic","value":"1572-834X"}],"subject":[],"published":{"date-parts":[[2023,3,14]]},"assertion":[{"value":"25 February 2023","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"14 March 2023","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}