{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,13]],"date-time":"2025-12-13T10:41:40Z","timestamp":1765622500759,"version":"3.48.0"},"reference-count":53,"publisher":"Springer Science and Business Media LLC","issue":"6","license":[{"start":{"date-parts":[[2025,10,1]],"date-time":"2025-10-01T00:00:00Z","timestamp":1759276800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,10,1]],"date-time":"2025-10-01T00:00:00Z","timestamp":1759276800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Peer-to-Peer Netw. Appl."],"published-print":{"date-parts":[[2025,10]]},"DOI":"10.1007\/s12083-025-02126-1","type":"journal-article","created":{"date-parts":[[2025,10,21]],"date-time":"2025-10-21T13:10:28Z","timestamp":1761052228000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["HessianAuth: A Secure and Efficient Authentication Mechanism for Resource-Constrained IoT Networks"],"prefix":"10.1007","volume":"18","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-9327-6545","authenticated-orcid":false,"given":"Debasmita","family":"Dey","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4079-8259","authenticated-orcid":false,"given":"Nirnay","family":"Ghosh","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,10,21]]},"reference":[{"key":"2126_CR1","unstructured":"Al-Zubaidie M, et\u00a0al (2019) Efficient and Secure ECDSA algorithm and its applications: a survey. arXiv:1902.10313"},{"issue":"1","key":"2126_CR2","first-page":"189","volume":"8","author":"F Anwar","year":"2020","unstructured":"Anwar F, Khan BUI, Olanrewaju RF, Pampori BR, Mir RN (2020) A comprehensive insight into game theory in relevance to cyber security. Indonesian J Electr Eng Inf (IJEEI) 8(1):189\u2013203","journal-title":"Indonesian J Electr Eng Inf (IJEEI)"},{"key":"2126_CR3","doi-asserted-by":"crossref","unstructured":"Anwar F, Khan BUI, Kiah M, Abdullah NA, Goh KW (2022) A comprehensive insight into blockchain technology: past development, present impact and future considerations. Int J Adv Comput Sci Appl 13(11)","DOI":"10.14569\/IJACSA.2022.01311101"},{"key":"2126_CR4","first-page":"281","volume-title":"Etessami, kousha and rajamani","author":"A Armando","year":"2005","unstructured":"Armando A et al (2005) The avispa tool for the automated validation of internet security protocols and applications. In: Sriram K (ed) Etessami, kousha and rajamani. Computer Aided Verification, Springer, Berlin Heidelberg, Berlin, Heidelberg, pp 281\u2013285"},{"key":"2126_CR5","first-page":"139","volume":"6","author":"S Badugu","year":"2017","unstructured":"Badugu S (2017) Role of cooja simulator in IoT. Int J Emerg Trends Technol Comput Sci 6:139","journal-title":"Int J Emerg Trends Technol Comput Sci"},{"key":"2126_CR6","doi-asserted-by":"crossref","unstructured":"Bauer J et\u00a0al (2016) ECDSA On Things: IoT integrity protection in practise. In: International conference on information and communications security, Springer, pp 3\u201317","DOI":"10.1007\/978-3-319-50011-9_1"},{"issue":"5","key":"2126_CR7","doi-asserted-by":"publisher","first-page":"1763","DOI":"10.1007\/s00500-015-1705-6","volume":"20","author":"JB Bernabe","year":"2016","unstructured":"Bernabe JB et al (2016) Taciot: multidimensional trust-aware access control system for the internet of things. Soft Comput 20(5):1763\u20131779","journal-title":"Soft Comput"},{"key":"2126_CR8","doi-asserted-by":"crossref","unstructured":"Bernabe JB et\u00a0al (2017) Holistic privacy-preserving identity management system for the internet of things. Mobile Inf Syst","DOI":"10.1155\/2017\/6384186"},{"key":"2126_CR9","doi-asserted-by":"crossref","unstructured":"Bhat B et al (2015) Des and aes performance evaluation. In: International conference on computing. Communication & Automation. IEEE, pp 887\u2013890","DOI":"10.1109\/CCAA.2015.7148500"},{"issue":"1","key":"2126_CR10","doi-asserted-by":"publisher","first-page":"18","DOI":"10.1145\/77648.77649","volume":"8","author":"M Burrows","year":"1990","unstructured":"Burrows M et al (1990) A logic of authentication. ACM Trans Comput Syst (TOCS) 8(1):18\u201336","journal-title":"ACM Trans Comput Syst (TOCS)"},{"key":"2126_CR11","doi-asserted-by":"publisher","first-page":"3028","DOI":"10.1109\/ACCESS.2017.2676119","volume":"5","author":"S Challa","year":"2017","unstructured":"Challa S et al (2017) Secure signature-based authenticated key establishment scheme for future IoT applications. IEEE Access 5:3028\u20133043","journal-title":"IEEE Access"},{"issue":"2","key":"2126_CR12","doi-asserted-by":"publisher","first-page":"492","DOI":"10.26599\/TST.2023.9010034","volume":"29","author":"H Chen","year":"2023","unstructured":"Chen H, Han X, Zhang Y (2023) Endogenous security formal definition, innovation mechanisms, and experiment research in industrial internet. Tsinghua Sci Technol 29(2):492\u2013505","journal-title":"Tsinghua Sci Technol"},{"key":"2126_CR13","doi-asserted-by":"crossref","unstructured":"Dalal HN et\u00a0al (2016) Header Encryption of IEEE802.15.4. In: 2016 IEEE Long Island Systems, Applications and Technology Conference (LISAT). IEEE, pp 1\u20136","DOI":"10.1109\/LISAT.2016.7494140"},{"key":"2126_CR14","doi-asserted-by":"crossref","unstructured":"Dey D et\u00a0al (2023) HessianAuth: an ECC-based distributed and efficient authentication mechanism for 6LoWPAN networked IoT devices. In: 24th International Conference on Distributed Computing and Networking (ICDCN). pp 227\u2013236","DOI":"10.1145\/3571306.3571407"},{"key":"2126_CR15","doi-asserted-by":"crossref","unstructured":"Eastlake\u00a03rd D et\u00a0al (2001) US Secure Hash Algorithm 1 (SHA1). Tech. rep","DOI":"10.17487\/rfc3174"},{"key":"2126_CR16","doi-asserted-by":"crossref","unstructured":"Frimpong E et\u00a0al (2020) IoT-CryptoDiet: implementing a lightweight cryptographic library based on ECDH and ECDSA for the development of secure and privacy-preserving protocols in Contiki-ng. Science and Technology Publications (SciTePress)","DOI":"10.5220\/0009405401010111"},{"key":"2126_CR17","doi-asserted-by":"crossref","unstructured":"Ghatpande S et\u00a0al (2019) A family of lightweight twisted edwards curves for the internet of things. In: Information security theory and practice: 12th IFIP WG 11.2 international conference. Springer, pp 193\u2013206","DOI":"10.1007\/978-3-030-20074-9_14"},{"key":"2126_CR18","doi-asserted-by":"publisher","first-page":"100","DOI":"10.1016\/j.adhoc.2018.01.013","volume":"82","author":"G Glissa","year":"2019","unstructured":"Glissa G et al (2019) 6lowpsec: an end-to-end security protocol for 6lowpan. Ad Hoc Netw 82:100\u2013112","journal-title":"Ad Hoc Netw"},{"key":"2126_CR19","doi-asserted-by":"crossref","unstructured":"Guo D, Chen K, Hu X, Wei Y, Li J (2019) A survey of prototype side-channel attacks based on machine learning algorithms for cryptographic chips. In: Journal of Physics: conference series. IOP Publishing, vol 1176, p 032005","DOI":"10.1088\/1742-6596\/1176\/3\/032005"},{"key":"2126_CR20","doi-asserted-by":"crossref","unstructured":"Hamalainen P et\u00a0al (2006) Design and implementation of low-area and low-power AES encryption hardware core. In: 9th EUROMICRO conference on Digital System Design (DSD\u201906). IEEE, pp 577\u2013583","DOI":"10.1109\/DSD.2006.40"},{"issue":"4","key":"2126_CR21","doi-asserted-by":"publisher","first-page":"690","DOI":"10.1109\/JSAC.2015.2393436","volume":"33","author":"JL Hernandez-Ramos","year":"2015","unstructured":"Hernandez-Ramos JL et al (2015) Toward a lightweight authentication and authorization framework for smart objects. IEEE J Sel Areas Commun 33(4):690\u2013702","journal-title":"IEEE J Sel Areas Commun"},{"key":"2126_CR22","doi-asserted-by":"crossref","unstructured":"Hussen HR et\u00a0al (2013) SAKES: Secure Authentication and Key Establishment Scheme for M2M Communication in the IP-based wireless sensor network (6L0WPAN). In: Fifth International Conference on Ubiquitous and Future Networks (ICUFN). IEEE, pp 246\u2013251","DOI":"10.1109\/ICUFN.2013.6614820"},{"key":"2126_CR23","doi-asserted-by":"publisher","unstructured":"Josefsson S et\u00a0al (2017) Edwards-Curve Digital Signature Algorithm (EdDSA). RFC 8032. https:\/\/doi.org\/10.17487\/RFC8032, https:\/\/www.rfc-editor.org\/info\/rfc8032","DOI":"10.17487\/RFC8032"},{"key":"2126_CR24","doi-asserted-by":"publisher","first-page":"210","DOI":"10.1016\/j.pmcj.2015.08.001","volume":"24","author":"S Kalra","year":"2015","unstructured":"Kalra S et al (2015) Secure authentication scheme for IoT and cloud servers. Pervasive Mob Comput 24:210\u2013223","journal-title":"Pervasive Mob Comput"},{"key":"2126_CR25","doi-asserted-by":"crossref","unstructured":"Khan BUI, Anwar F, Olanrewaju RF, Pampori BR, Mir RN (2020) A game theory-based strategic approach to ensure reliable data transmission with optimized network operations in futuristic mobile adhoc networks. Ieee Access 8:124,097\u2013124,109","DOI":"10.1109\/ACCESS.2020.3006043"},{"issue":"11","key":"2126_CR26","first-page":"544","volume":"13","author":"BUI Khan","year":"2022","unstructured":"Khan BUI, Anwar F, Rahman FDBA, Olanrewaju RF, Goh KW, Janin Z, Rahman MA (2022) Sgm: strategic game model for resisting node misbehaviour in iot-cloud ecosystem. Inf 13(11):544","journal-title":"Inf"},{"issue":"4","key":"2126_CR27","doi-asserted-by":"publisher","first-page":"307","DOI":"10.22452\/mjcs.vol35no4.2","volume":"35","author":"BUI Khan","year":"2022","unstructured":"Khan BUI, Anwar F, Rahman FDBA, Olanrewaju RF, Kiah MLBM, Rahman MA, Janin Z (2022) Exploring manet security aspects: analysis of attacks and node misbehaviour issues. Malays J Comput Sci 35(4):307\u2013338","journal-title":"Malays J Comput Sci"},{"key":"2126_CR28","doi-asserted-by":"crossref","unstructured":"Kivinen T et\u00a0al (2017) IEEE 802.15.4 Information Element for the IETF. Tech. rep","DOI":"10.17487\/RFC8137"},{"key":"2126_CR29","doi-asserted-by":"crossref","unstructured":"Kocher PC (1996) Timing attacks on implementations of diffie-hellman, rsa, dss, and other systems. In: Advances in Cryptology\u2014CRYPTO\u201996: 16th annual international cryptology conference Santa Barbara, California, USA August 18\u201322, 1996 Proceedings 16. Springer, pp 104\u2013113","DOI":"10.1007\/3-540-68697-5_9"},{"issue":"16","key":"2126_CR30","first-page":"9463","volume":"13","author":"RR Krishna","year":"2021","unstructured":"Krishna RR et al (2021) State-of-the-art review on IoT threats and attacks: taxonomy. Challenges and Solutions Sustainability 13(16):9463","journal-title":"Challenges and Solutions Sustainability"},{"issue":"12","key":"2126_CR31","doi-asserted-by":"publisher","first-page":"6428","DOI":"10.1007\/s11227-017-2048-0","volume":"74","author":"S Kumari","year":"2018","unstructured":"Kumari S et al (2018) A secure authentication scheme based on elliptic curve cryptography for IoT and cloud servers. J Supercomput 74(12):6428\u20136453","journal-title":"J Supercomput"},{"key":"2126_CR32","doi-asserted-by":"crossref","unstructured":"Mahmoud C et\u00a0al (2019) Security for internet of things: a state of the art on existing protocols and open research issues. In: Proceedings of the 9th international conference on information systems and technologies. pp 1\u20136","DOI":"10.1145\/3361570.3361622"},{"key":"2126_CR33","doi-asserted-by":"crossref","unstructured":"Mallouli F et\u00a0al (2019) A survey on cryptography: comparative study between RSA vs ECC Algorithms, and RSA vs El-Gamal algorithms. In: 2019 6th IEEE International Conference on Cyber Security and Cloud Computing (CSCloud)\/2019 5th IEEE international conference on edge computing and scalable cloud (EdgeCom)","DOI":"10.1109\/CSCloud\/EdgeCom.2019.00022"},{"key":"2126_CR34","unstructured":"Mohanty J et\u00a0al (2020) IoT security, challenges, and solutions: a review. Progress in advanced computing and intelligent engineering: Proceedings of ICACIE 2019, 2:2493\u2013504"},{"key":"2126_CR35","doi-asserted-by":"publisher","first-page":"707","DOI":"10.1007\/s11277-021-08657-z","volume":"1","author":"M Mohapatro","year":"2021","unstructured":"Mohapatro M et al (2021) An experimental study of distributed denial of service and sink hole attacks on IoT-based healthcare applications. Wireless Pers Commun 1:707\u2013724","journal-title":"Wireless Pers Commun"},{"key":"2126_CR36","unstructured":"Muhaya FB et\u00a0al (2010) Applying Hessian curves in parallel to improve elliptic curve scalar multiplication hardware. Int J Secur Its Appl 4(2)"},{"key":"2126_CR37","unstructured":"Mula M, Pintore F, Taufer D (2024) The Hessian of elliptic curves. arXiv:2407.17042"},{"key":"2126_CR38","doi-asserted-by":"crossref","unstructured":"Navas RE et\u00a0al (2018) Do not trust your neighbors! a small iot platform illustrating a man-in-the-middle attack. In: Ad-hoc, mobile, and wireless networks: 17th international conference on Ad-hoc Networks and Wireless (ADHOC-NOW 2018). Springer, pp 120\u2013125","DOI":"10.1007\/978-3-030-00247-3_11"},{"issue":"3","key":"2126_CR39","doi-asserted-by":"publisher","first-page":"217","DOI":"10.1049\/iet-ifs.2017.0075","volume":"12","author":"S Neves","year":"2018","unstructured":"Neves S et al (2018) Degenerate curve attacks: extending invalid curve attacks to edwards curves and other models. IET Inf Secur 12(3):217\u2013225","journal-title":"IET Inf Secur"},{"issue":"1","key":"2126_CR40","doi-asserted-by":"publisher","first-page":"51","DOI":"10.37934\/araset.26.1.5177","volume":"26","author":"R Olanrewaju","year":"2022","unstructured":"Olanrewaju R, Khan B, Hashim A, Sidek K, Khan Z, Daniyal H (2022) The internet of things vision: a comprehensive review of architecture, enabling technologies, adoption challenges, research open issues and contemporary applications. J Adv Res Appl Sci Eng Technol 26(1):51\u201377","journal-title":"J Adv Res Appl Sci Eng Technol"},{"issue":"23","key":"2126_CR41","doi-asserted-by":"publisher","first-page":"3982","DOI":"10.3390\/electronics11233982","volume":"11","author":"RF Olanrewaju","year":"2022","unstructured":"Olanrewaju RF, Khan BUI, Kiah MLM, Abdullah NA, Goh KW (2022) Decentralized blockchain network for resisting side-channel attacks in mobility-based iot. Electron 11(23):3982","journal-title":"Electron"},{"issue":"6","key":"2126_CR42","doi-asserted-by":"publisher","first-page":"2074","DOI":"10.1109\/TII.2016.2604681","volume":"12","author":"Y Qiu","year":"2016","unstructured":"Qiu Y et al (2016) A mutual authentication and key establishment scheme for m2m communication in 6lowpan networks. IEEE Trans Industr Inf 12(6):2074\u20132085","journal-title":"IEEE Trans Industr Inf"},{"key":"2126_CR43","unstructured":"Rogaway P et\u00a0al (2003) A Critique of CCM. Cryptology ePrint Archive"},{"issue":"9","key":"2126_CR44","doi-asserted-by":"publisher","first-page":"1780","DOI":"10.3923\/itj.2013.1780.1787","volume":"12","author":"AC Shakir","year":"2013","unstructured":"Shakir AC et al (2013) Hastening point multiplication in the ecc. Inf Technol J 12(9):1780","journal-title":"Inf Technol J"},{"key":"2126_CR45","doi-asserted-by":"crossref","unstructured":"Smart NP (2001) The Hessian form of an elliptic curve. In: International workshop on cryptographic hardware and embedded systems. Springer, pp 118\u2013125","DOI":"10.1007\/3-540-44709-1_11"},{"issue":"2","key":"2126_CR46","doi-asserted-by":"publisher","first-page":"429","DOI":"10.3390\/smartcities4020024","volume":"4","author":"AS Syed","year":"2021","unstructured":"Syed AS et al (2021) Iot in smart cities: a survey of technologies. Pract Challenges Smart Cities 4(2):429\u2013475","journal-title":"Pract Challenges Smart Cities"},{"key":"2126_CR47","doi-asserted-by":"crossref","unstructured":"Tournier J et\u00a0al (2021) A survey of IoT protocols and their security issues through the lens of a generic IoT stack. Internet of Things 16","DOI":"10.1016\/j.iot.2020.100264"},{"key":"2126_CR48","doi-asserted-by":"crossref","unstructured":"Vaidehi M et\u00a0al (2014) Design and analysis of AES-CBC mode for high security applications. In: Second International Conference on Current Trends In Engineering and Technology-ICCTET 2014. IEEE, pp 499\u2013502","DOI":"10.1109\/ICCTET.2014.6966347"},{"key":"2126_CR49","unstructured":"Vucinic M et\u00a0al (2021) Lightweight authenticated key exchange with EDHOC: design overview. Tech. rep., Technical Report hal-03434293"},{"issue":"12","key":"2126_CR50","doi-asserted-by":"publisher","first-page":"3452","DOI":"10.1109\/JSAC.2022.3213306","volume":"40","author":"W Wang","year":"2022","unstructured":"Wang W, Yang Y, Yin Z, Dev K, Zhou X, Li X, Qureshi NMF, Su C (2022) Bsif: blockchain-based secure, interactive, and fair mobile crowdsensing. IEEE J Sel Areas Commun 40(12):3452\u20133469","journal-title":"IEEE J Sel Areas Commun"},{"key":"2126_CR51","doi-asserted-by":"crossref","unstructured":"Wang W, Han Z, Zhu Y, Gadekallu TR, Wang W, Su C (2025a) Enhanced v2r authentication for vanets using group signatures and dynamic pseudonyms. IEEE Trans Intell Transp Syst","DOI":"10.1109\/TITS.2025.3539895"},{"key":"2126_CR52","doi-asserted-by":"crossref","unstructured":"Wang W, Niyato D, Xiong Z, Yin Z (2025b) Authfi: Cross-technology device authentication via commodity wifi. IEEE Trans Mobile Comput","DOI":"10.1109\/TMC.2025.3547010"},{"key":"2126_CR53","doi-asserted-by":"publisher","first-page":"171","DOI":"10.1007\/s11277-021-08629-3","volume":"121","author":"Y Xb","year":"2021","unstructured":"Xb Y et al (2021) Nomop-ecdsa: a lightweight ecdsa engine for internet of things. Wireless Pers Commun 121:171\u2013190","journal-title":"Wireless Pers Commun"}],"container-title":["Peer-to-Peer Networking and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-025-02126-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s12083-025-02126-1\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-025-02126-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,12,13]],"date-time":"2025-12-13T10:37:19Z","timestamp":1765622239000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s12083-025-02126-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,10]]},"references-count":53,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2025,10]]}},"alternative-id":["2126"],"URL":"https:\/\/doi.org\/10.1007\/s12083-025-02126-1","relation":{},"ISSN":["1936-6442","1936-6450"],"issn-type":[{"type":"print","value":"1936-6442"},{"type":"electronic","value":"1936-6450"}],"subject":[],"published":{"date-parts":[[2025,10]]},"assertion":[{"value":"27 January 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"17 September 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"21 October 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"This article contains no studies on human participants or animals performed by authors.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical Approval"}},{"value":"The authors declare no competing interests.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"305"}}