{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,9]],"date-time":"2025-04-09T08:12:01Z","timestamp":1744186321168,"version":"3.37.3"},"reference-count":46,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2021,1,28]],"date-time":"2021-01-28T00:00:00Z","timestamp":1611792000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,1,28]],"date-time":"2021-01-28T00:00:00Z","timestamp":1611792000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/100007688","name":"American University of Beirut","doi-asserted-by":"crossref","id":[{"id":"10.13039\/100007688","id-type":"DOI","asserted-by":"crossref"}]},{"DOI":"10.13039\/100008650","name":"EIPHI Graduate School","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100008650","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Ambient Intell Human Comput"],"published-print":{"date-parts":[[2022,1]]},"DOI":"10.1007\/s12652-021-02913-7","type":"journal-article","created":{"date-parts":[[2021,1,28]],"date-time":"2021-01-28T12:12:56Z","timestamp":1611835976000},"page":"483-499","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":7,"title":["Novel one round message authentication scheme for constrained IoT devices"],"prefix":"10.1007","volume":"13","author":[{"given":"Hassan N.","family":"Noura","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1011-8665","authenticated-orcid":false,"given":"Ola","family":"Salman","sequence":"additional","affiliation":[]},{"given":"Rapha\u00ebl","family":"Couturier","sequence":"additional","affiliation":[]},{"given":"Ali","family":"Chehab","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,1,28]]},"reference":[{"issue":"3","key":"2913_CR1","doi-asserted-by":"publisher","first-page":"1441","DOI":"10.1109\/COMST.2015.2392629","volume":"17","author":"EG AbdAllah","year":"2015","unstructured":"AbdAllah EG, Hassanein HS, Zulkernine M (2015) A survey of security attacks in information-centric networking. IEEE Commun Surv Tutor 17(3):1441\u20131454","journal-title":"IEEE Commun Surv Tutor"},{"issue":"1","key":"2913_CR2","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/1687-6180-2013-126","volume":"2013","author":"A Akhavan","year":"2013","unstructured":"Akhavan A, Samsudin A, Akhshani A (2013) A novel parallel hash function based on 3d chaotic map. EURASIP J Adv Signal Process 2013(1):1\u201312","journal-title":"EURASIP J Adv Signal Process"},{"issue":"3","key":"2913_CR3","doi-asserted-by":"publisher","first-page":"211","DOI":"10.1016\/j.physleta.2007.02.021","volume":"366","author":"JM Amig\u00f3","year":"2007","unstructured":"Amig\u00f3 JM, Kocarev L, Szczepanski J (2007) Theory and practice of chaotic cryptography. Phys Lett A 366(3):211\u2013216","journal-title":"Phys Lett A"},{"issue":"2","key":"2913_CR4","doi-asserted-by":"publisher","first-page":"767","DOI":"10.1016\/j.chaos.2009.02.001","volume":"42","author":"M Amin","year":"2009","unstructured":"Amin M, Faragallah OS, Abd El-Latif AA (2009) Chaos-based hash function (cbhf) for cryptographic applications. Chaos Solitons Fract 42(2):767\u2013772","journal-title":"Chaos Solitons Fract"},{"issue":"2","key":"2913_CR5","doi-asserted-by":"publisher","first-page":"2128","DOI":"10.1109\/JIOT.2018.2873343","volume":"6","author":"S Arshad","year":"2018","unstructured":"Arshad S, Azam MA, Rehmani MH, Loo J (2018) Recent advances in information-centric networking-based internet of things (ICN-IoT). IEEE Internet Things J 6(2):2128\u20132158","journal-title":"IEEE Internet Things J"},{"key":"2913_CR6","unstructured":"Aumasson J-P, Henzen L, Meier W, Raphael C-W (2010) Phan. Sha-3 proposal blake. Submission to NIST (Round 3). http:\/\/www.131002.net\/blake\/blake.pdf. Accessed July 2020"},{"key":"2913_CR7","first-page":"585","volume":"2015","author":"R Beaulieu","year":"2015","unstructured":"Beaulieu R, Shors D, Smith J, Treatman-Clark S, Weeks B, Wingers L (2015) Simon and speck: block ciphers for the internet of things. IACR Cryptol ePrint Arch 2015:585","journal-title":"IACR Cryptol ePrint Arch"},{"key":"2913_CR8","unstructured":"Bertoni G, Daemen J, Peeters M, Van Assche G (2011) The keccak reference. Submission to NIST (Round 3). http:\/\/www.keccak.noekeon.org\/Keccak-reference-3.0.pdf. Accessed July 2020"},{"key":"2913_CR9","doi-asserted-by":"publisher","first-page":"1921","DOI":"10.1109\/JSYST.2019.2931813","volume":"14","author":"M Bilal","year":"2019","unstructured":"Bilal M, Pack S (2019) Secure distribution of protected content in information-centric networking. IEEE Syst J 14:1921\u20131932","journal-title":"IEEE Syst J"},{"key":"2913_CR10","volume-title":"The design of Rijndael: AES-the advanced encryption standard","author":"J Daemen","year":"2013","unstructured":"Daemen J, Rijmen V (2013) The design of Rijndael: AES-the advanced encryption standard. Springer Science & Business Media, Berlin"},{"key":"2913_CR11","doi-asserted-by":"crossref","unstructured":"Damg\u00e5rd I (1990) A design principle for hash functions. In: Proceedings of the 9th annual international cryptology conference on advances in cryptology, CRYPTO \u201989. UK. Springe, London, UK, pp 416\u2013427. ISBN: 3-540-97317-6","DOI":"10.1007\/0-387-34805-0_39"},{"key":"2913_CR12","unstructured":"Ferguson N, Lucks S, Schneier B, Whiting D, Mihir B, Jon C, Jesse W (2010) The Skein hash function family. Submission to NIST (round 3) 7(7.5)"},{"key":"2913_CR13","doi-asserted-by":"crossref","unstructured":"Fotiou N, Polyzos GC (2016) Securing content sharing over icn. In: Proceedings of the 3rd ACM conference on information-centric networking. ACM, pp 176\u2013185","DOI":"10.1145\/2984356.2984376"},{"key":"2913_CR14","unstructured":"Gauravaram P, Knudsen LR, Matusiewicz K, Mendel F, Rechberger C, Schl\u00e4ffer M, Thomsen SS (2009) Gr\u00f8stl\u2014a sha-3 candidate. In: Helena H, Stefan L, Bart P, Phillip R (eds) Symmetric cryptography, number 09031 in Dagstuhl seminar Proceedings, Dagstuhl, Germany, Schloss Dagstuhl\u2014Leibniz-Zentrum fuer Informatik, Germany. http:\/\/www.drops.dagstuhl.de\/opus\/volltexte\/2009\/1955. Accessed July 2020"},{"issue":"3","key":"2913_CR15","doi-asserted-by":"publisher","first-page":"1123","DOI":"10.1007\/s11071-015-2392-7","volume":"83","author":"R Guesmi","year":"2016","unstructured":"Guesmi R, Farah MAB, Kachouri A, Samet M (2016) A novel chaos-based image encryption using dna sequence operation and secure hash algorithm sha-2. Nonlinear Dyn 83(3):1123\u20131136","journal-title":"Nonlinear Dyn"},{"issue":"1\u20132","key":"2913_CR17","doi-asserted-by":"publisher","first-page":"27","DOI":"10.1007\/s11071-015-1970-z","volume":"81","author":"A Kanso","year":"2015","unstructured":"Kanso A, Ghebleh M (2015) A structure-based chaotic hashing scheme. Nonlinear Dyn 81(1\u20132):27\u201340","journal-title":"Nonlinear Dyn"},{"key":"2913_CR18","doi-asserted-by":"crossref","unstructured":"Krawczyk H, Bellare M, Canetti R (1997) Keyed-hashing for message authentication, Hmac","DOI":"10.17487\/rfc2104"},{"issue":"2","key":"2913_CR19","doi-asserted-by":"publisher","first-page":"194","DOI":"10.1109\/TDSC.2016.2550437","volume":"15","author":"B Li","year":"2016","unstructured":"Li B, Huang D, Wang Z, Zhu Y (2016) Attribute-based access control for ICN naming scheme. IEEE Trans Depend Secure Comput 15(2):194\u2013206","journal-title":"IEEE Trans Depend Secure Comput"},{"issue":"6","key":"2913_CR20","doi-asserted-by":"publisher","first-page":"1341","DOI":"10.1109\/TCSI.2006.874182","volume":"53","author":"N Masuda","year":"2006","unstructured":"Masuda N, Jakimoski G, Aihara K, Kocarev L (2006) Chaotic block ciphers: from theory to practical algorithms. Circuits Syst I Regula Pap IEEE Trans 53(6):1341\u20131352","journal-title":"Circuits Syst I Regula Pap IEEE Trans"},{"key":"2913_CR21","doi-asserted-by":"crossref","unstructured":"McGrew D, Viega J (2006) The Use of Galois Message Authentication Code (GMAC) in IPsec ESP and AH. RFC 4543 (Proposed Standard)","DOI":"10.17487\/rfc4543"},{"key":"2913_CR22","first-page":"0849385237","volume-title":"Handbook of applied cryptography","author":"AJ Menezes","year":"1996","unstructured":"Menezes AJ, Vanstone SA, Van Oorschot PC (1996) Handbook of applied cryptography, 1st edn. CRC Press Inc, Boca Raton, p 0849385237","edition":"1"},{"key":"2913_CR23","doi-asserted-by":"crossref","unstructured":"Merkle RC (1989) A certified digital signature. In: Proceedings on advances in cryptology, CRYPTO \u201989, New York, NY, USA. Springer New York, Inc, pp 218\u2013238. ISBN 0-387-97317-6. http:\/\/www.dl.acm.org\/citation.cfm?id=118209.118230","DOI":"10.1007\/0-387-34805-0_21"},{"key":"2913_CR24","volume-title":"Advanced encryption standard","author":"FP Miller","year":"2009","unstructured":"Miller FP, Vandome AF, McBrewster J (2009) Advanced encryption standard. Alpha Press, Lagos (ISBN 6130268297, 9786130268299)"},{"issue":"1","key":"2913_CR25","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1109\/TDSC.2017.2672991","volume":"16","author":"S Misra","year":"2017","unstructured":"Misra S, Reza T, Frank N, Travis M, Majd NE, Huang H (2017) Accconf: an access control framework for leveraging in-network cached data in the icn-enabled wireless edge. IEEE Trans Depend Secure Comput 16(1):5\u201317","journal-title":"IEEE Trans Depend Secure Comput"},{"key":"2913_CR26","unstructured":"Noura H (2012) Design and simulation of efficient chaos based generators, crypto-systems and hash functions. Universite de Nantes, Theses"},{"key":"2913_CR27","unstructured":"Noura H, Courousse D (2016) Method of encryption with dynamic diffusion and confusion layers, 9 June 2016. WO Patent App. PCT\/EP2015\/078,372. https:\/\/www.google.com\/patents\/WO2016087520A1?cl=en"},{"key":"2913_CR28","doi-asserted-by":"crossref","unstructured":"Noura H, Sleem L, Noura M, Mansour MM, Chehab A, Couturier R (2017) A new efficient lightweight and secure image cipher scheme. Multimed Tools Appl. ISSN 1573-7721","DOI":"10.1007\/s11042-017-5124-9"},{"issue":"14","key":"2913_CR29","doi-asserted-by":"publisher","first-page":"18383","DOI":"10.1007\/s11042-018-5660-y","volume":"77","author":"H Noura","year":"2018","unstructured":"Noura H, Chehab A, Sleem L, Noura M, Couturier R, Mansour MM (2018) One round cipher algorithm for multimedia IoT devices. Multimed Tools Appl 77(14):18383\u201318413","journal-title":"Multimed Tools Appl"},{"key":"2913_CR30","doi-asserted-by":"crossref","unstructured":"Noura H, Noura M, Chehab A, Mansour MM, Couturier R (2018b) Efficient and secure cipher scheme for multimedia contents. In: Multimedia tools and applications, pp 1\u201330","DOI":"10.1007\/s11042-018-6845-0"},{"issue":"12","key":"2913_CR31","doi-asserted-by":"publisher","first-page":"16527","DOI":"10.1007\/s11042-018-7000-7","volume":"78","author":"H Noura","year":"2019","unstructured":"Noura H, Chehab A, Noura M, Couturier R, Mansour MM (2019) Lightweight, dynamic and efficient image encryption scheme. Multimed Tools Appl 78(12):16527\u201316561","journal-title":"Multimed Tools Appl"},{"key":"2913_CR32","doi-asserted-by":"crossref","unstructured":"Noura H, Rapha\u00ebl C, Congduc P, Ali C (2019b) Lightweight stream cipher scheme for resource-constrained iot devices. In: 2019 international conference on wireless and mobile computing, networking and communications (WiMob). IEEE, pp 1\u20138","DOI":"10.1109\/WiMOB.2019.8923144"},{"key":"2913_CR33","doi-asserted-by":"publisher","first-page":"101937","DOI":"10.1016\/j.adhoc.2019.101937","volume":"94","author":"H Noura","year":"2019","unstructured":"Noura H, Salman O, Chehab A, Couturier R (2019) Preserving data security in distributed fog computing. Ad Hoc Netw 94:101937. https:\/\/doi.org\/10.1016\/j.adhoc.2019.101937","journal-title":"Ad Hoc Netw"},{"key":"2913_CR34","doi-asserted-by":"publisher","first-page":"448","DOI":"10.1016\/j.image.2019.08.005","volume":"78","author":"HN Noura","year":"2019","unstructured":"Noura HN, Chehab A, Couturier R\u00c3 (2019) Efficient and secure cipher scheme with dynamic key-dependent mode of operation. Signal Process Image Commun 78:448\u2013464","journal-title":"Signal Process Image Commun"},{"key":"2913_CR35","unstructured":"Patrizio A (2018) Idc: expect 175 zettabytes of data worldwide by 2025 | network world. https:\/\/www.networkworld.com\/article\/3325397\/idc-expect-175-zettabytes-of-data-worldwide-by-2025.html. Accessed July 2020"},{"key":"2913_CR36","volume-title":"Applied cryptography: protocols, algorithms, and source code in C","author":"B Schneier","year":"2007","unstructured":"Schneier B (2007) Applied cryptography: protocols, algorithms, and source code in C. Wiley, New York"},{"key":"2913_CR37","unstructured":"Song JH, Poovendran R, Lee J, Iwata T (2006) RFC 4493 (Informational), June"},{"key":"2913_CR38","volume-title":"Cryptography and network security: principles and practice","author":"W Stallings","year":"2017","unstructured":"Stallings W (2017) Cryptography and network security: principles and practice. Pearson, Upper Saddle River"},{"issue":"3","key":"2913_CR39","doi-asserted-by":"publisher","first-page":"1067","DOI":"10.1007\/s11071-015-2049-6","volume":"81","author":"JS Teh","year":"2015","unstructured":"Teh JS, Samsudin A, Akhavan A (2015) Parallel chaotic hash function based on the shuffle-exchange network. Nonlinear Dyn 81(3):1067\u20131079","journal-title":"Nonlinear Dyn"},{"key":"2913_CR16","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4419-5906-5","volume-title":"Encyclopedia of cryptography and security","year":"2011","unstructured":"van Tilborg HCA, Jajodia S (eds) (2011) Encyclopedia of cryptography and security, 2nd edn. Springer, Germany. https:\/\/doi.org\/10.1007\/978-1-4419-5906-5","edition":"2"},{"key":"2913_CR40","doi-asserted-by":"crossref","unstructured":"Wang X, Hongbo Y (2005) How to break md5 and other hash functions. In: EUROCRYPT. Springer","DOI":"10.1007\/11426639_2"},{"key":"2913_CR41","doi-asserted-by":"crossref","unstructured":"Wu Q (2015) A chaos-based hash function. In: 2015 international conference on cyber-enabled distributed computing and knowledge discovery (CyberC). IEEE, pp 1\u20134","DOI":"10.1109\/CyberC.2015.13"},{"issue":"1","key":"2913_CR42","doi-asserted-by":"publisher","first-page":"573","DOI":"10.2174\/1874110X01509010573","volume":"9","author":"F Xiang","year":"2015","unstructured":"Xiang F, Zhao C, Wang J, Zhang Z (2015) One-way hash function based on cascade chaos. Open Cybern Syst J 9(1):573\u2013580","journal-title":"Open Cybern Syst J"},{"key":"2913_CR43","doi-asserted-by":"crossref","unstructured":"Xue K, Zhang X, Xia Q, Wei DSL, Yue H, Wu F (2018) SEAF: a secure, efficient and accountable access control framework for information centric networking. In: IEEE INFOCOM 2018-IEEE conference on computer communications. IEEE, pp 2213\u20132221","DOI":"10.1109\/INFOCOM.2018.8486407"},{"key":"2913_CR44","doi-asserted-by":"crossref","unstructured":"Yaacoub J-P, Salman O, Noura HN, Chehab A (2020a) Security analysis of drones systems: attacks, limitations, and recommendations. In: Internet of Things, p 100218","DOI":"10.1016\/j.iot.2020.100218"},{"key":"2913_CR45","doi-asserted-by":"publisher","first-page":"581","DOI":"10.1016\/j.future.2019.12.028","volume":"105","author":"J-PA Yaacoub","year":"2020","unstructured":"Yaacoub J-PA, Noura M, Noura HN, Salman O, Yaacoub E, Couturier R, Chehab A (2020b) Securing internet of medical things systems: limitations, issues and recommendations. Future Gener Comput Syst 105:581\u2013606","journal-title":"Future Gener Comput Syst"},{"key":"2913_CR46","doi-asserted-by":"crossref","unstructured":"Yang B, Li Z, Zheng S, Yang Y (2009) Hash function construction based on coupled map lattice for communication security. In: Global mobile congress, 2009, pp 1\u20137","DOI":"10.1109\/GMC.2009.5295892"}],"container-title":["Journal of Ambient Intelligence and Humanized Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12652-021-02913-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s12652-021-02913-7\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12652-021-02913-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,31]],"date-time":"2022-01-31T18:36:59Z","timestamp":1643654219000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s12652-021-02913-7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,1,28]]},"references-count":46,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2022,1]]}},"alternative-id":["2913"],"URL":"https:\/\/doi.org\/10.1007\/s12652-021-02913-7","relation":{},"ISSN":["1868-5137","1868-5145"],"issn-type":[{"type":"print","value":"1868-5137"},{"type":"electronic","value":"1868-5145"}],"subject":[],"published":{"date-parts":[[2021,1,28]]},"assertion":[{"value":"18 July 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"14 January 2021","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"28 January 2021","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Compliance with ethical standards"}},{"value":"The authors declare that they have no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"This article does not contain any studies with human participants or animals performed by any of the authors.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical approval"}}]}}