{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,5]],"date-time":"2026-02-05T23:37:58Z","timestamp":1770334678137,"version":"3.49.0"},"reference-count":39,"publisher":"Springer Science and Business Media LLC","issue":"6","license":[{"start":{"date-parts":[[2022,8,27]],"date-time":"2022-08-27T00:00:00Z","timestamp":1661558400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,8,27]],"date-time":"2022-08-27T00:00:00Z","timestamp":1661558400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Peer-to-Peer Netw. Appl."],"published-print":{"date-parts":[[2022,11]]},"DOI":"10.1007\/s12083-022-01372-x","type":"journal-article","created":{"date-parts":[[2022,8,26]],"date-time":"2022-08-26T23:02:37Z","timestamp":1661554957000},"page":"2488-2502","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":19,"title":["Improved bio-inspired security scheme for privacy-preserving in the internet of things"],"prefix":"10.1007","volume":"15","author":[{"given":"Yasmine","family":"Harbi","sequence":"first","affiliation":[]},{"given":"Allaoua","family":"Refoufi","sequence":"additional","affiliation":[]},{"given":"Zibouda","family":"Aliouat","sequence":"additional","affiliation":[]},{"given":"Saad","family":"Harous","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,8,27]]},"reference":[{"issue":"3","key":"1372_CR1","doi-asserted-by":"publisher","first-page":"265","DOI":"10.1109\/JIOT.2014.2323395","volume":"1","author":"SL Keoh","year":"2014","unstructured":"Keoh SL, Kumar SS, Tschofenig H (2014) Securing the internet of things: A standardization perspective. IEEE Internet Things J 1(3):265\u2013275","journal-title":"IEEE Internet Things J"},{"key":"1372_CR2","doi-asserted-by":"crossref","unstructured":"Harbi Y, Aliouat Z, Harous S, Bentaleb A, Refoufi A (2019a) A review of security in internet of things. Wirel Pers Commun 108(1):325\u2013344","DOI":"10.1007\/s11277-019-06405-y"},{"key":"1372_CR3","doi-asserted-by":"crossref","unstructured":"Harbi Y, Aliouat Z, Hammoudi S (2018a) Enhancement of iot applications dependability using bayesian networks. In: IFIP International Conference on Computational Intelligence and Its Applications, Springer, pp 487\u2013497","DOI":"10.1007\/978-3-319-89743-1_42"},{"issue":"6","key":"1372_CR4","doi-asserted-by":"publisher","first-page":"3425","DOI":"10.1007\/s11042-014-2443-y","volume":"75","author":"M Ghadi","year":"2016","unstructured":"Ghadi M, Laouamer L, Moulahi T (2016) Securing data exchange in wireless multimedia sensor networks: perspectives and challenges. Multimed Tools Appl 75(6):3425\u20133451","journal-title":"Multimed Tools Appl"},{"key":"1372_CR5","doi-asserted-by":"publisher","first-page":"241","DOI":"10.1016\/j.comnet.2018.12.008","volume":"148","author":"P Asghari","year":"2019","unstructured":"Asghari P, Rahmani AM, Javadi HHS (2019) Internet of things applications: A systematic review. Comput Netw 148:241\u2013261","journal-title":"Comput Netw"},{"key":"1372_CR6","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2019.106866","volume":"162","author":"R Boussada","year":"2019","unstructured":"Boussada R, Hamdane B, Elhdhili ME, Saidane LA (2019) Privacy-preserving aware data transmission for iot-based e-health. Comput Netw 162:106866","journal-title":"Comput Netw"},{"issue":"6","key":"1372_CR7","doi-asserted-by":"publisher","first-page":"1945","DOI":"10.1109\/JIOT.2017.2706698","volume":"4","author":"R Li","year":"2017","unstructured":"Li R, Song T, Capurso N, Yu J, Couture J, Cheng X (2017) Iot applications on secure smart shopping system. IEEE Internet Things J 4(6):1945\u20131954","journal-title":"IEEE Internet Things J"},{"key":"1372_CR8","doi-asserted-by":"crossref","unstructured":"Wollschlaeger M, Sauter T, Jasperneite J (2017) The future of industrial communication: Automation networks in the era of the internet of things and industry 4.0. IEEE Ind Electron Mag 11(1):17\u201327","DOI":"10.1109\/MIE.2017.2649104"},{"key":"1372_CR9","doi-asserted-by":"crossref","unstructured":"Harbi Y, Aliouat Z, Refoufi A, Harous S (2019b) Efficient end-to-end security scheme for privacy-preserving in iot. In: 2019 International Conference on Networking and Advanced Systems (ICNAS), IEEE, pp 1\u20136","DOI":"10.1109\/ICNAS.2019.8807811"},{"key":"1372_CR10","doi-asserted-by":"publisher","first-page":"113292","DOI":"10.1109\/ACCESS.2021.3103725","volume":"9","author":"Y Harbi","year":"2021","unstructured":"Harbi Y, Aliouat Z, Refoufi A, Harous S (2021) Recent security trends in internet of things: A comprehensive survey. IEEE Access 9:113292\u2013113314","journal-title":"IEEE Access"},{"key":"1372_CR11","unstructured":"Vaudenay S (2006) A classical introduction to cryptography: Applications for communications security. Springer Science & Business Media"},{"key":"1372_CR12","doi-asserted-by":"crossref","unstructured":"Harbi Y, Aliouat Z, Harous S, Bentaleb A (2018b) Secure data transmission scheme based on elliptic curve cryptography for internet of things. In: International Symposium on Modelling and Implementation of Complex Systems, Springer, pp 34\u201346","DOI":"10.1007\/978-3-030-05481-6_3"},{"key":"1372_CR13","volume-title":"Report on lightweight cryptography","author":"K McKay","year":"2016","unstructured":"McKay K, Bassham L, S\u00f6nmez Turan M, Mouha N (2016) Report on lightweight cryptography. Tech. rep, National Institute of Standards and Technology"},{"key":"1372_CR14","doi-asserted-by":"crossref","unstructured":"Mohamed KS (2020) New trends in cryptography: Quantum, blockchain, lightweight, chaotic, and dna cryptography. In: New Frontiers in Cryptography, Springer, pp 65\u201387","DOI":"10.1007\/978-3-030-58996-7_4"},{"key":"1372_CR15","doi-asserted-by":"crossref","unstructured":"Rana S, Hossain S, Shoun HI, Kashem MA (2018) An effective lightweight cryptographic algorithm to secure resource-constrained devices. Int J Adv Comput Sci Appl 9(11)","DOI":"10.14569\/IJACSA.2018.091137"},{"key":"1372_CR16","doi-asserted-by":"publisher","first-page":"52858","DOI":"10.1109\/ACCESS.2019.2909554","volume":"7","author":"R Shahzadi","year":"2019","unstructured":"Shahzadi R, Anwar SM, Qamar F, Ali M, Rodrigues JJ (2019) Chaos based enhanced rc5 algorithm for security and integrity of clinical images in remote health monitoring. IEEE Access 7:52858\u201352870","journal-title":"IEEE Access"},{"key":"1372_CR17","doi-asserted-by":"crossref","unstructured":"Elhabob R, Zhao Y, Eltayieb N, Abdelgader AM, Xiong H (2019) Identity-based encryption with authorized equivalence test for cloud-assisted iot. Clust Comput pp 1\u201317","DOI":"10.1007\/s10586-019-02979-1"},{"key":"1372_CR18","doi-asserted-by":"publisher","first-page":"20596","DOI":"10.1109\/ACCESS.2018.2817615","volume":"6","author":"M Elhoseny","year":"2018","unstructured":"Elhoseny M, Ram\u00edrez-Gonz\u00e1lez G, Abu-Elnasr OM, Shawkat SA, Arunkumar N, Farouk A (2018) Secure medical data transmission model for iot-based healthcare systems. IEEE Access 6:20596\u201320608","journal-title":"IEEE Access"},{"key":"1372_CR19","doi-asserted-by":"crossref","unstructured":"Ge C, Yin C, Liu Z, Fang L, Zhu J, Ling H (2020) A privacy preserve big data analysis system for wearable wireless sensor network. Comput Secur p 101887","DOI":"10.1016\/j.cose.2020.101887"},{"key":"1372_CR20","doi-asserted-by":"crossref","unstructured":"Makhdoom I, Zhou I, Abolhasan M, Lipman J, Ni W (2020) Privysharing: A blockchain-based framework for privacy-preserving and secure data sharing in smart cities. Comput Secur 88:101653","DOI":"10.1016\/j.cose.2019.101653"},{"issue":"6","key":"1372_CR21","doi-asserted-by":"publisher","first-page":"1844","DOI":"10.1109\/JIOT.2017.2707489","volume":"4","author":"T Song","year":"2017","unstructured":"Song T, Li R, Mei B, Yu J, Xing X, Cheng X (2017) A privacy preserving communication protocol for iot applications in smart homes. IEEE Internet Things J 4(6):1844\u20131852","journal-title":"IEEE Internet Things J"},{"key":"1372_CR22","doi-asserted-by":"publisher","first-page":"183460","DOI":"10.1109\/ACCESS.2020.3028686","volume":"8","author":"T Jabeen","year":"2020","unstructured":"Jabeen T, Ashraf H, Khatoon A, Band SS, Mosavi A (2020) A lightweight genetic based algorithm for data security in wireless body area networks. IEEE Access 8:183460\u2013183469","journal-title":"IEEE Access"},{"key":"1372_CR23","doi-asserted-by":"publisher","first-page":"320","DOI":"10.1016\/j.jisa.2019.05.017","volume":"47","author":"N Nesa","year":"2019","unstructured":"Nesa N, Ghosh T, Banerjee I (2019) Design of a chaos-based encryption scheme for sensor data using a novel logarithmic chaotic map. Journal of Information Security and Applications 47:320\u2013328","journal-title":"Journal of Information Security and Applications"},{"key":"1372_CR24","doi-asserted-by":"publisher","first-page":"8737","DOI":"10.1109\/ACCESS.2018.2886384","volume":"7","author":"M Sharafi","year":"2019","unstructured":"Sharafi M, Fotouhi-Ghazvini F, Shirali M, Ghassemian M (2019) A low power cryptography solution based on chaos theory in wireless sensor nodes. IEEE Access 7:8737\u20138753","journal-title":"IEEE Access"},{"key":"1372_CR25","doi-asserted-by":"publisher","first-page":"53079","DOI":"10.1109\/ACCESS.2019.2911395","volume":"7","author":"L Yi","year":"2019","unstructured":"Yi L, Tong X, Wang Z, Zhang M, Zhu H, Liu J (2019) A novel block encryption algorithm based on chaotic s-box for wireless sensor network. IEEE Access 7:53079\u201353090","journal-title":"IEEE Access"},{"key":"1372_CR26","doi-asserted-by":"publisher","first-page":"173","DOI":"10.1016\/j.comnet.2017.08.006","volume":"127","author":"H Hellaoui","year":"2017","unstructured":"Hellaoui H, Koudil M, Bouabdallah A (2017) Energy-efficient mechanisms in security of the internet of things: A survey. Comput Netw 127:173\u2013189","journal-title":"Comput Netw"},{"issue":"21","key":"1372_CR27","doi-asserted-by":"publisher","first-page":"22703","DOI":"10.1007\/s11042-016-4333-y","volume":"76","author":"S Aljawarneh","year":"2017","unstructured":"Aljawarneh S, Yassein MB et al (2017) A resource-efficient encryption algorithm for multimedia big data. Multimed Tools Appl 76(21):22703\u201322724","journal-title":"Multimed Tools Appl"},{"key":"1372_CR28","doi-asserted-by":"crossref","unstructured":"Sivanandam S, Deepa S (2008) Genetic algorithms. In: Introduction to genetic algorithms, Springer, pp 15\u201337","DOI":"10.1007\/978-3-540-73190-0_2"},{"key":"1372_CR29","doi-asserted-by":"crossref","unstructured":"Zirem A, Senouci MR (2018) Efficient lightweight chaotic secure communication system for wsns and iot. In: 2018 International Conference on Smart Communications in Network Technologies (SaCoNeT), IEEE, pp 43\u201348","DOI":"10.1109\/SaCoNeT.2018.8585607"},{"key":"1372_CR30","doi-asserted-by":"crossref","unstructured":"Krawczyk H, Bellare M, Canetti R (1997) Hmac: Keyed-hashing for message authentication","DOI":"10.17487\/rfc2104"},{"issue":"4","key":"1372_CR31","doi-asserted-by":"publisher","first-page":"660","DOI":"10.1109\/TWC.2002.804190","volume":"1","author":"WB Heinzelman","year":"2002","unstructured":"Heinzelman WB, Chandrakasan AP, Balakrishnan H (2002) An application-specific protocol architecture for wireless microsensor networks. IEEE Trans Wireless Commun 1(4):660\u2013670","journal-title":"IEEE Trans Wireless Commun"},{"issue":"2","key":"1372_CR32","doi-asserted-by":"publisher","first-page":"198","DOI":"10.1109\/TIT.1983.1056650","volume":"29","author":"D Dolev","year":"1983","unstructured":"Dolev D, Yao A (1983) On the security of public key protocols. IEEE Trans Inf Theory 29(2):198\u2013208","journal-title":"IEEE Trans Inf Theory"},{"key":"1372_CR33","doi-asserted-by":"crossref","unstructured":"Harbi Y, Aliouat Z, Refoufi A, Harous S, Bentaleb A (2019c) Enhanced authentication and key management scheme for securing data transmission in the internet of things. Ad Hoc Networks 94:101948","DOI":"10.1016\/j.adhoc.2019.101948"},{"issue":"10","key":"1372_CR34","doi-asserted-by":"publisher","first-page":"3119","DOI":"10.1142\/S0218127405014052","volume":"15","author":"S Li","year":"2005","unstructured":"Li S, Chen G, Mou X (2005) On the dynamical degradation of digital piecewise linear chaotic maps. Int J Bifurcation Chaos 15(10):3119\u20133151","journal-title":"Int J Bifurcation Chaos"},{"issue":"4","key":"1372_CR35","doi-asserted-by":"publisher","first-page":"656","DOI":"10.1002\/j.1538-7305.1949.tb00928.x","volume":"28","author":"CE Shannon","year":"1949","unstructured":"Shannon CE (1949) Communication theory of secrecy systems. Bell Syst Tech J 28(4):656\u2013715","journal-title":"Bell Syst Tech J"},{"key":"1372_CR36","unstructured":"Avispa automated validation of internet security protocols and applications. http:\/\/www.avispa-project.org, Accessed Dec 2020"},{"key":"1372_CR37","doi-asserted-by":"crossref","unstructured":"Armando A, Basin D, Boichut Y, Chevalier Y, Compagna L, Cu\u00e9llar J, Drielsma PH, H\u00e9am PC, Kouchnarenko O, Mantovani J et\u00a0al (2005) The avispa tool for the automated validation of internet security protocols and applications. In: International conference on computer aided verification, Springer, pp 281\u2013285","DOI":"10.1007\/11513988_27"},{"key":"1372_CR38","doi-asserted-by":"publisher","first-page":"61","DOI":"10.1016\/j.entcs.2005.11.052","volume":"155","author":"L Vigan\u00f2","year":"2006","unstructured":"Vigan\u00f2 L (2006) Automated security protocol analysis with the avispa tool. Electron Notes Theor Comput Sci 155:61\u201386","journal-title":"Electron Notes Theor Comput Sci"},{"key":"1372_CR39","unstructured":"Network simulator-3. http:\/\/www.nsnam.org, Accessed Dec 2020"}],"container-title":["Peer-to-Peer Networking and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-022-01372-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s12083-022-01372-x\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-022-01372-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,11,8]],"date-time":"2022-11-08T09:40:32Z","timestamp":1667900432000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s12083-022-01372-x"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,8,27]]},"references-count":39,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2022,11]]}},"alternative-id":["1372"],"URL":"https:\/\/doi.org\/10.1007\/s12083-022-01372-x","relation":{},"ISSN":["1936-6442","1936-6450"],"issn-type":[{"value":"1936-6442","type":"print"},{"value":"1936-6450","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,8,27]]},"assertion":[{"value":"30 March 2021","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"18 August 2022","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"27 August 2022","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declaration"}},{"value":"The authors declare that they have no conflict of interest that could influence the work reported in this paper.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}