{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,7]],"date-time":"2026-04-07T21:52:45Z","timestamp":1775598765190,"version":"3.50.1"},"reference-count":30,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2024,1,22]],"date-time":"2024-01-22T00:00:00Z","timestamp":1705881600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,1,22]],"date-time":"2024-01-22T00:00:00Z","timestamp":1705881600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Front. Comput. Sci."],"published-print":{"date-parts":[[2024,6]]},"DOI":"10.1007\/s11704-023-2595-x","type":"journal-article","created":{"date-parts":[[2024,1,22]],"date-time":"2024-01-22T13:02:53Z","timestamp":1705928573000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":9,"title":["An anonymous authentication and secure data transmission scheme for the Internet of Things based on blockchain"],"prefix":"10.1007","volume":"18","author":[{"given":"Xingxing","family":"Chen","sequence":"first","affiliation":[]},{"given":"Qingfeng","family":"Cheng","sequence":"additional","affiliation":[]},{"given":"Weidong","family":"Yang","sequence":"additional","affiliation":[]},{"given":"Xiangyang","family":"Luo","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,1,22]]},"reference":[{"key":"2595_CR1","unstructured":"Hasan M. State of IoT-Spring 2022. IOT Analytics, See https:\/\/iot-analytics.com\/product\/state-of-iot-spring-2022 website, 2022"},{"issue":"2","key":"2595_CR2","doi-asserted-by":"publisher","first-page":"1093","DOI":"10.1109\/TVT.2018.2886010","volume":"68","author":"X Wang","year":"2019","unstructured":"Wang X, Ning Z, Hu X, Wang L, Hu B, Cheng J, Leung V C M. Optimizing content dissemination for real-time traffic management in large-scale internet of vehicle systems. IEEE Transactions on Vehicular Technology, 2019, 68(2): 1093\u20131105","journal-title":"IEEE Transactions on Vehicular Technology"},{"issue":"11","key":"2595_CR3","doi-asserted-by":"publisher","first-page":"e20135","DOI":"10.2196\/20135","volume":"22","author":"J T Kelly","year":"2020","unstructured":"Kelly J T, Campbell K L, Gong E, Scuffham P. The internet of things: impact and implications for health care delivery. Journal of Medical Internet Research, 2020, 22(11): e20135","journal-title":"Journal of Medical Internet Research"},{"key":"2595_CR4","doi-asserted-by":"publisher","first-page":"101","DOI":"10.1007\/978-3-030-22773-9_8","volume-title":"Emerging Technologies for Connected Internet of Vehicles and Intelligent Transportation System Networks","author":"H Zemrane","year":"2020","unstructured":"Zemrane H, Baddi Y, Hasbi A. Internet of things smart home ecosystem. In: Elhoseny M, Hassanien A E, eds. Emerging Technologies for Connected Internet of Vehicles and Intelligent Transportation System Networks. Cham: Springer, 2020, 101\u2013125"},{"issue":"1","key":"2595_CR5","doi-asserted-by":"publisher","first-page":"103","DOI":"10.1007\/s10586-018-2823-6","volume":"22","author":"N Miloslavskaya","year":"2019","unstructured":"Miloslavskaya N, Tolstoy A. Internet of things: information security challenges and solutions. Cluster Computing, 2019, 22(1): 103\u2013119","journal-title":"Cluster Computing"},{"key":"2595_CR6","doi-asserted-by":"publisher","first-page":"395","DOI":"10.1016\/j.future.2017.11.022","volume":"82","author":"M A Khan","year":"2018","unstructured":"Khan M A, Salah K. IoT security: review, blockchain solutions, and open challenges. Future Generation Computer Systems, 2018, 82: 395\u2013411","journal-title":"Future Generation Computer Systems"},{"key":"2595_CR7","doi-asserted-by":"crossref","unstructured":"Fakhri D, Mutijarsa K. Secure IoT communication using blockchain technology. In: Proceedings of 2018 International Symposium on Electronics and Smart Devices (ISESD). 2018, 1\u20136","DOI":"10.1109\/ISESD.2018.8605485"},{"key":"2595_CR8","doi-asserted-by":"publisher","first-page":"102112","DOI":"10.1016\/j.sysarc.2021.102112","volume":"117","author":"Q Fan","year":"2021","unstructured":"Fan Q, Chen J H, Deborah L J, Luo M. A secure and efficient authentication and data sharing scheme for internet of things based on blockchain. Journal of Systems Architecture, 2021, 117: 102112","journal-title":"Journal of Systems Architecture"},{"issue":"3","key":"2595_CR9","doi-asserted-by":"publisher","first-page":"2154","DOI":"10.1109\/TII.2019.2942800","volume":"16","author":"S G Liu","year":"2020","unstructured":"Liu S G, Dibaei M, Tai Y, Chen C, Zhang J, Xiang Y. Cyber vulnerability intelligence for internet of things binary. IEEE Transactions on Industrial Informatics, 2020, 16(3): 2154\u20132163","journal-title":"IEEE Transactions on Industrial Informatics"},{"issue":"14","key":"2595_CR10","doi-asserted-by":"publisher","first-page":"e5295","DOI":"10.1002\/cpe.5295","volume":"31","author":"Z Xu","year":"2019","unstructured":"Xu Z, Xu C, Chen H, Yang F. A lightweight anonymous mutual authentication and key agreement scheme for WBAN. Concurrency and Computation: Practice and Experience, 2019, 31(14): e5295","journal-title":"Concurrency and Computation: Practice and Experience"},{"issue":"1","key":"2595_CR11","doi-asserted-by":"publisher","first-page":"47","DOI":"10.1007\/s11277-020-07237-x","volume":"117","author":"B A Alzahrani","year":"2021","unstructured":"Alzahrani B A, Irshad A, Albeshri A, Alsubhi K. A provably secure and lightweight patient-healthcare authentication protocol in wireless body area networks. Wireless Personal Communications, 2021, 117(1): 47\u201369","journal-title":"Wireless Personal Communications"},{"issue":"1","key":"2595_CR12","doi-asserted-by":"publisher","first-page":"43","DOI":"10.1007\/s12083-017-0627-8","volume":"12","author":"H Adavoudi-Jolfaei","year":"2019","unstructured":"Adavoudi-Jolfaei H, Ashouri-Talouki M, Aghili S F. Lightweight and anonymous three-factor authentication and access control scheme for real-time applications in wireless sensor networks. Peer-to-Peer Networking and Applications, 2019, 12(1): 43\u201359","journal-title":"Peer-to-Peer Networking and Applications"},{"issue":"11","key":"2595_CR13","doi-asserted-by":"publisher","first-page":"7124","DOI":"10.1109\/TIE.2016.2585081","volume":"63","author":"P Gope","year":"2016","unstructured":"Gope P, Hwang T. A realistic lightweight anonymous authentication protocol for securing real-time application data access in wireless sensor networks. IEEE Transactions on Industrial Electronics, 2016, 63(11): 7124\u20137132","journal-title":"IEEE Transactions on Industrial Electronics"},{"issue":"1","key":"2595_CR14","doi-asserted-by":"publisher","first-page":"420","DOI":"10.1007\/s12083-020-00973-8","volume":"14","author":"P Kumar","year":"2021","unstructured":"Kumar P, Chouhan L. A secure authentication scheme for IoT application in smart home. Peer-to-Peer Networking and Applications, 2021, 14(1): 420\u2013438","journal-title":"Peer-to-Peer Networking and Applications"},{"key":"2595_CR15","doi-asserted-by":"publisher","first-page":"103567","DOI":"10.1016\/j.csi.2021.103567","volume":"80","author":"B Bera","year":"2022","unstructured":"Bera B, Vangala A, Das A K, Lorenz P, Khan M K. Private blockchain-envisioned drones-assisted authentication scheme in IoT-enabled agricultural environment. Computer Standards & Interfaces, 2022, 80: 103567","journal-title":"Computer Standards & Interfaces"},{"key":"2595_CR16","doi-asserted-by":"crossref","unstructured":"Islam T, Youki R A, Chowdhury B R, Hasan A S M T. An ECC based secure communication protocol for resource constraints IoT devices in smart home. In: Proceedings of the International Conference on Big Data, IoT, and Machine Learning. 2022, 431\u2013444","DOI":"10.1007\/978-981-16-6636-0_33"},{"issue":"16","key":"2595_CR17","doi-asserted-by":"publisher","first-page":"12947","DOI":"10.1109\/JIOT.2021.3063806","volume":"8","author":"S S Panda","year":"2021","unstructured":"Panda S S, Jena D, Mohanta B K, Ramasubbareddy S, Daneshmand M, Gandomi A H. Authentication and key management in distributed IoT using blockchain technology. IEEE Internet of Things Journal, 2021, 8(16): 12947\u201312954","journal-title":"IEEE Internet of Things Journal"},{"issue":"4","key":"2595_CR18","doi-asserted-by":"publisher","first-page":"68","DOI":"10.1109\/MITP.2017.3051335","volume":"19","author":"N Kshetri","year":"2017","unstructured":"Kshetri N. Can blockchain strengthen the internet of things? IT Professional, 2017, 19(4): 68\u201372","journal-title":"IT Professional"},{"issue":"2","key":"2595_CR19","first-page":"241","volume":"13","author":"Z Cui","year":"2020","unstructured":"Cui Z, Xue F, Zhang S, Cai X, Cao Y, Zhang W, Chen J. A hybrid blockchain-based identity authentication scheme for multi-WSN. IEEE Transactions on Services Computing, 2020, 13(2): 241\u2013251","journal-title":"IEEE Transactions on Services Computing"},{"issue":"3","key":"2595_CR20","doi-asserted-by":"publisher","first-page":"2067","DOI":"10.1007\/s10586-020-03058-6","volume":"23","author":"U Khalid","year":"2020","unstructured":"Khalid U, Asim M, Baker T, Hung P C K, Tariq M A, Rafferty L. A decentralized lightweight blockchain-based authentication mechanism for IoT systems. Cluster Computing, 2020, 23(3): 2067\u20132087","journal-title":"Cluster Computing"},{"issue":"5","key":"2595_CR21","doi-asserted-by":"publisher","first-page":"3321","DOI":"10.1109\/JIOT.2021.3098007","volume":"9","author":"X Yang","year":"2022","unstructured":"Yang X, Yang X, Yi X, Khalil I, Zhou X, He D, Huang X, Nepal S. Blockchain-based secure and lightweight authentication for internet of things. IEEE Internet of Things Journal, 2022, 9(5): 3321\u20133332","journal-title":"IEEE Internet of Things Journal"},{"key":"2595_CR22","doi-asserted-by":"crossref","unstructured":"Choi K Y, Hwang J Y, Lee D H, Seo I S. ID-based authenticated key agreement for low-power mobile devices. In: Proceedings of the 10th Australasian Conference on Information Security and Privacy. 2005, 494\u2013505","DOI":"10.1007\/11506157_41"},{"issue":"2","key":"2595_CR23","doi-asserted-by":"publisher","first-page":"916","DOI":"10.1109\/TAC.2020.2997318","volume":"66","author":"Z Guo","year":"2021","unstructured":"Guo Z, Ni Y, Wong W S, Shi L. Time synchronization attack and countermeasure for multisystem scheduling in remote estimation. IEEE Transactions on Automatic Control, 2021, 66(2): 916\u2013923","journal-title":"IEEE Transactions on Automatic Control"},{"key":"2595_CR24","doi-asserted-by":"crossref","unstructured":"Tabassum N, Geetha D D, Biradar R C. Joint position estimation and synchronization of clocks in WSN. In: Proceedings of the 6th International Congress on Information and Communication Technology. 2022, 409\u2013418","DOI":"10.1007\/978-981-16-2377-6_39"},{"issue":"3","key":"2595_CR25","doi-asserted-by":"publisher","first-page":"361","DOI":"10.1007\/s001450010003","volume":"13","author":"D Pointcheval","year":"2000","unstructured":"Pointcheval D, Stern J. Security arguments for digital signatures and blind signatures. Journal of Cryptology, 2000, 13(3): 361\u2013396","journal-title":"Journal of Cryptology"},{"key":"2595_CR26","doi-asserted-by":"crossref","unstructured":"Cremers C J F. The scyther tool: verification, falsification, and analysis of security protocols. In: Proceedings of the 20th International Conference on Computer Aided Verification. 2008, 414\u2013418","DOI":"10.1007\/978-3-540-70545-1_38"},{"key":"2595_CR27","doi-asserted-by":"crossref","unstructured":"Lowe G. A hierarchy of authentication specifications. In: Proceedings of the 10th Computer Security Foundations Workshop. 1997, 31\u201343","DOI":"10.1109\/CSFW.1997.596782"},{"key":"2595_CR28","first-page":"1","volume":"2021","author":"T Y Wu","year":"2021","unstructured":"Wu T Y, Wang T, Lee Y Q, Zheng W, Kumari S, Kumar S. Improved authenticated key agreement scheme for fog-driven IoT healthcare system. Security and Communication Networks, 2021, 2021, 1\u201316","journal-title":"Security and Communication Networks"},{"issue":"1","key":"2595_CR29","doi-asserted-by":"publisher","first-page":"935","DOI":"10.1109\/JSYST.2020.2979006","volume":"15","author":"Y Li","year":"2021","unstructured":"Li Y, Cheng Q, Liu X, Li X. A secure anonymous identity-based scheme in new authentication architecture for mobile edge computing. IEEE Systems Journal, 2021, 15(1): 935\u2013946","journal-title":"IEEE Systems Journal"},{"issue":"1","key":"2595_CR30","doi-asserted-by":"publisher","first-page":"560","DOI":"10.1109\/JSYST.2019.2896064","volume":"14","author":"X Jia","year":"2020","unstructured":"Jia X, He D, Kumar N, Choo K K R A provably secure and efficient identity-based anonymous authentication scheme for mobile edge computing. IEEE Systems Journal, 2020, 14(1): 560\u2013571","journal-title":"IEEE Systems Journal"}],"container-title":["Frontiers of Computer Science"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11704-023-2595-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11704-023-2595-x\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11704-023-2595-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,11,8]],"date-time":"2024-11-08T20:47:09Z","timestamp":1731098829000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11704-023-2595-x"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,1,22]]},"references-count":30,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2024,6]]}},"alternative-id":["2595"],"URL":"https:\/\/doi.org\/10.1007\/s11704-023-2595-x","relation":{},"ISSN":["2095-2228","2095-2236"],"issn-type":[{"value":"2095-2228","type":"print"},{"value":"2095-2236","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,1,22]]},"assertion":[{"value":"22 September 2022","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"1 February 2023","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"22 January 2024","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}],"article-number":"183807"}}