{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,2]],"date-time":"2025-12-02T15:06:16Z","timestamp":1764687976931,"version":"3.37.3"},"reference-count":75,"publisher":"Springer Science and Business Media LLC","issue":"5","license":[{"start":{"date-parts":[[2021,11,23]],"date-time":"2021-11-23T00:00:00Z","timestamp":1637625600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2021,11,23]],"date-time":"2021-11-23T00:00:00Z","timestamp":1637625600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Complex Intell. Syst."],"published-print":{"date-parts":[[2022,10]]},"abstract":"<jats:title>Abstract<\/jats:title><jats:p>Nowadays, the utilization of IoT technology has been rapidly increased in various applications such as smart city, smart banking, smart transport, etc. The internet of things allows the user to collect the data easily using the different sensors installed at various locations in the open environment. The data collection process by the IoT sensors is giving access to the various services. However, due to the open communication medium, it is difficult to provide secure access to these services. In this paper, a data transmission technique has been proposed, which will provide secure communication in IoT infrastructure for smart city applications. In this method, each IoT sensor have to prove their legitimacy to the reader and the base station before the transmission of data. Hence, the IoT sensors can transmit the required data in a secure and efficient way. In the proposed technique, the proof of correction shows that the required information is not supposed to send through an online medium, it is obtained at the receiver using the Euclidean parameters shared by the IoT sensors. The proposed technique is compatible to provide the security against most of the attacks performed by the attackers. Two random variables and complex mathematical calculation are making the proposed technique more reliable than others. This technique will significantly improve the security of different data transmission services which will be helpful to improve the smart city infrastructure.<\/jats:p>","DOI":"10.1007\/s40747-021-00576-7","type":"journal-article","created":{"date-parts":[[2021,11,23]],"date-time":"2021-11-23T10:03:08Z","timestamp":1637661788000},"page":"3817-3832","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":18,"title":["Secure transmission technique for data in IoT edge computing infrastructure"],"prefix":"10.1007","volume":"8","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-9438-3281","authenticated-orcid":false,"given":"Rohit","family":"Sharma","sequence":"first","affiliation":[]},{"given":"Rajeev","family":"Arya","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,11,23]]},"reference":[{"issue":"2","key":"576_CR1","doi-asserted-by":"publisher","first-page":"99","DOI":"10.1109\/TMSCS.2015.2498605","volume":"1","author":"O Arias","year":"2015","unstructured":"Arias O, Wurm J, Hoang K, Jin Y (2015) Privacy and security in internet of things and wearable devices. IEEE Trans Multiscale Comput Syst 1(2):99\u2013109. https:\/\/doi.org\/10.1109\/TMSCS.2015.2498605","journal-title":"IEEE Trans Multiscale Comput Syst"},{"issue":"3","key":"576_CR2","doi-asserted-by":"publisher","first-page":"51","DOI":"10.1109\/MCOM.2017.1600297CM","volume":"55","author":"R Khatoun","year":"2017","unstructured":"Khatoun R, Zeadally S (2017) Cybersecurity and privacy solutions in smart cities. IEEE Commun Mag 55(3):51\u201359. https:\/\/doi.org\/10.1109\/MCOM.2017.1600297CM","journal-title":"IEEE Commun Mag"},{"issue":"4","key":"576_CR3","doi-asserted-by":"publisher","first-page":"26","DOI":"10.1109\/MITP.2016.72","volume":"18","author":"M Pouryazdan","year":"2016","unstructured":"Pouryazdan M, Kantarci B (2016) The smart citizen factor in trustworthy smart city crowdsensing. IT Prof 18(4):26\u201333","journal-title":"IT Prof"},{"issue":"6","key":"576_CR4","doi-asserted-by":"publisher","first-page":"14","DOI":"10.1109\/MNET.2016.1600110NM","volume":"30","author":"K Cabaj","year":"2016","unstructured":"Cabaj K, Mazurczyk W (2016) Using software-defined networking for ransomware mitigation: the case of cryptowall. IEEE Netw 30(6):14\u201320. https:\/\/doi.org\/10.1109\/MNET.2016.1600110NM","journal-title":"IEEE Netw"},{"issue":"5","key":"576_CR5","first-page":"1938","volume":"8","author":"S Mohurle","year":"2017","unstructured":"Mohurle S, Patil M (2017) A brief study of Wannacry threat: Ransomware attack. Int J 8(5):1938\u20131940","journal-title":"Int J"},{"key":"576_CR6","doi-asserted-by":"publisher","unstructured":"Liao K, Zhao Z, Doupe A, Ahn GJ (2016) Behind closed doors: Measurement and analysis of cryptolocker ransoms in bitcoin. 2016 APWG symposium on electronic crime research (eCrime), 1\u201313. https:\/\/doi.org\/10.1109\/ECRIME.2016.7487938","DOI":"10.1109\/ECRIME.2016.7487938"},{"key":"576_CR7","unstructured":"Angrishi K (2017) Turning internet of things (IoT) into internet of vulnerabilities (IoV): IoT botnets. arXiv preprint arXiv:1702.03681"},{"key":"576_CR8","unstructured":"Smith KL (2017) The inconvenient truth about smart cities. https:\/\/blogs.scientificamerican.com\/observations\/the-inconvenient-truth-about-smartcities\/. Accessed 16 Feb 19"},{"key":"576_CR9","doi-asserted-by":"crossref","unstructured":"Nam T, Pardo TA (2011) Smart city as urban innovation: focusing on management, policy, and context. Proceedings of the 5th international conference on theory and practice of electronic governance. ACM, pp 185\u2013194","DOI":"10.1145\/2072069.2072100"},{"issue":"1","key":"576_CR10","doi-asserted-by":"publisher","first-page":"23","DOI":"10.1108\/09685229910255160","volume":"7","author":"B Whittaker","year":"1999","unstructured":"Whittaker B (1999) What went wrong? Unsuccessful information technology projects. Inf Manag Comput Secur 7(1):23\u201330","journal-title":"Inf Manag Comput Secur"},{"issue":"5","key":"576_CR11","doi-asserted-by":"publisher","first-page":"917","DOI":"10.1111\/j.1540-6210.2007.00778.x","volume":"67","author":"S Goldfinch","year":"2007","unstructured":"Goldfinch S (2007) Pessimism, computer failure, and information systems development in the public sector. Public Adm Rev 67(5):917\u2013929","journal-title":"Public Adm Rev"},{"key":"576_CR12","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2866049","author":"OR Shishvan","year":"2018","unstructured":"Shishvan OR, Zois D, Soyata T (2018) Machine intelligence in healthcare and medical cyber physical systems: a survey. IEEE Access. https:\/\/doi.org\/10.1109\/ACCESS.2018.2866049","journal-title":"IEEE Access"},{"issue":"1","key":"576_CR13","doi-asserted-by":"publisher","first-page":"22","DOI":"10.1109\/MCAS.2015.2510198","volume":"16","author":"T Soyata","year":"2016","unstructured":"Soyata T, Copeland L, Heinzelman W (2016) RF energy harvesting for embedded systems: a survey of tradeoffs and methodology. IEEE Circuits Syst Mag (MCAS) 16(1):22\u201357. https:\/\/doi.org\/10.1109\/MCAS.2015.2510198","journal-title":"IEEE Circuits Syst Mag (MCAS)"},{"key":"576_CR14","doi-asserted-by":"crossref","unstructured":"Zhang ZK, Cho MCY, Wang CW, Hsu CW, Chen CK, Shieh S-P (2014) IoT security: ongoing challenges and research opportunities. In: Proceedings - IEEE 7th international conference on service-oriented computing and applications, SOCA 2014. Matsue, 17\u201319 Nov 2014, pp 230\u2013234","DOI":"10.1109\/SOCA.2014.58"},{"key":"576_CR15","unstructured":"Reuben, K. (2011). Municipal budget shortfalls. https:\/\/www.taxpolicycenter.org\/taxvox\/municipal-budget-shortfalls. Accessed 16 Feb 19"},{"key":"576_CR16","first-page":"32","volume":"30","author":"M Maciag","year":"2017","unstructured":"Maciag M, Wogan J (2017) With less state aid, localities look for ways to cope. Governing 30:32\u201337","journal-title":"Governing"},{"key":"576_CR17","unstructured":"Pagano MA, Hoene CW (2018) City budgets in an era of increased uncertainty: understanding the fiscal policy space of cities. Brookings Institution, Washington, DC. https:\/\/www.brookings.edu\/wp-content\/uploads\/2018\/07\/20180718_BrookingsMetro_City-fiscal-policy-Pagano-Hoene-final.pdf"},{"key":"576_CR18","doi-asserted-by":"publisher","unstructured":"Sharma N, Sultana HP, Singh R, Patil S (2019) Secure hash authentication in IoT based applications. Procedia Comput Sci 165:328\u2013335. https:\/\/doi.org\/10.1016\/j.procs.2020.01.042. ISSN 1877-0509","DOI":"10.1016\/j.procs.2020.01.042."},{"issue":"177","key":"576_CR19","doi-asserted-by":"publisher","first-page":"203","DOI":"10.1090\/S0025-5718-1987-0866109-5","volume":"48","author":"N Koblitz","year":"1987","unstructured":"Koblitz N (1987) Elliptic curve cryptosystems. Math Comput 48(177):203\u2013209","journal-title":"Math Comput"},{"key":"576_CR20","unstructured":"Recommendation for key management\u2014Part 1: General (2005) Gaithersburg, MD, USA: Special Publication 800-57 Aug."},{"key":"576_CR21","doi-asserted-by":"crossref","unstructured":"Advances in Cryptology-CRYPTO (2001) Identity-based encryption from the Weil pairing. Advances in cryptology-CRYPTO, vol. 2139. Springer, Berlin, pp 213\u2013229 LNCS","DOI":"10.1007\/3-540-44647-8_13"},{"key":"576_CR22","doi-asserted-by":"publisher","unstructured":"Romdhani I (2017) Chapter 7\u2014existing security scheme for IoT. In: Li S, Xu LD (eds) Securing the internet of things, Syngress. pp. 119\u2013130. https:\/\/doi.org\/10.1016\/B978-0-12-804458-2.00007-X. ISBN 9780128044582","DOI":"10.1016\/B978-0-12-804458-2.00007-X"},{"key":"576_CR23","series-title":"Lecture notes in computer science","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-24685-5_69","volume-title":"Computational science - ICCS 2004","author":"HW Lim","year":"2004","unstructured":"Lim HW, Robshaw MJB (2004) On identity-based cryptography and grid computing. In: Bubak M, van Albada GD, Sloot PMA, Dongarra J (eds) Computational science - ICCS 2004. Lecture notes in computer science, vol 3036. Springer, Berlin, Heidelberg. https:\/\/doi.org\/10.1007\/978-3-540-24685-5_69"},{"key":"576_CR24","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","DOI":"10.1007\/11508380_27","volume-title":"Advances in grid computing - EGC","author":"HW Lim","year":"2005","unstructured":"Lim HW, Robshaw MJB (2005) A dynamic key infrastructure for grid. In: Sloot PMA, Hoekstra AG, Priol T, Reinefeld A, Bubak M (eds) Advances in grid computing - EGC 2005. Lecture notes in computer science, vol 3470. Springer, Berlin, Heidelberg. https:\/\/doi.org\/10.1007\/11508380_27"},{"key":"576_CR25","unstructured":"Mao W (2004) An identity-based non-interactive authentication framework for computational grids. Palo Alto, CA, USA: HP Labs Tech. Rep. HPL-2004-96, Jun"},{"issue":"2","key":"576_CR26","doi-asserted-by":"publisher","first-page":"100","DOI":"10.1109\/TSUSC.2017.2714344","volume":"2","author":"A Ahmad","year":"2017","unstructured":"Ahmad A, Paul A, Khan M, Jabbar S, Rathore MMU, Chilamkurti N et al (2017) Energy efficient hierarchical resource management for mobile cloud computing. IEEE Trans Sustain Comput 2(2):100\u2013112","journal-title":"IEEE Trans Sustain Comput"},{"key":"576_CR27","doi-asserted-by":"publisher","unstructured":"Chen T, Yeh H, Shih W (2011) An advanced ecc dynamic id-based remote mutual authentication scheme for cloud computing. In: 2011 fifth FTRA international conference on multimedia and ubiquitous engineering. Loutraki, 28\u201330 June 2011, pp 155-159. https:\/\/doi.org\/10.1109\/MUE.2011.69","DOI":"10.1109\/MUE.2011.69"},{"issue":"January 1","key":"576_CR28","doi-asserted-by":"publisher","first-page":"181","DOI":"10.1016\/j.csi.2007.11.016","volume":"31","author":"T Goriparthia","year":"2009","unstructured":"Goriparthia T, Das ML, Saxena A (2009) An improved bilinear pairing based remote user authentication scheme. Comput Stand Interfaces 31(January 1):181\u2013185","journal-title":"Comput Stand Interfaces"},{"issue":"May 3","key":"576_CR29","doi-asserted-by":"publisher","first-page":"184","DOI":"10.1016\/j.cose.2005.09.002","volume":"25","author":"ML Das","year":"2006","unstructured":"Das ML, Saxena A, Gulati VP, Phafstak DB (2006) A novel remote user authentication scheme using bilinear pairings. Comput Secur 25(May 3):184\u2013189","journal-title":"Comput Secur"},{"key":"576_CR30","doi-asserted-by":"crossref","unstructured":"Khan Pathan S, Hong CS, Hee K (2009) Bilinear-pairing-based remote user authentication schemes using smart cards. In: Proceedings of 3rd international conference ubiquitous information management communication. New York, pp 356\u2013361","DOI":"10.1145\/1516241.1516303"},{"issue":"4","key":"576_CR31","doi-asserted-by":"publisher","first-page":"1365","DOI":"10.12785\/amis\/070414","volume":"7","author":"H Sun","year":"2013","unstructured":"Sun H, Wen Q, Zhang H, Jin Z (2013) A novel remote user authentication and key agreement scheme for mobile client\u2013server environment. Appl Math Inf Sci Lett 7(4):1365\u20131374","journal-title":"Appl Math Inf Sci Lett"},{"issue":"October 5","key":"576_CR32","doi-asserted-by":"publisher","first-page":"1764","DOI":"10.1109\/JIOT.2017.2723915","volume":"4","author":"P Gope","year":"2017","unstructured":"Gope P, Das AK (2017) Robust anonymous mutual authentication scheme for ntimes ubiquitous mobile cloud computing services. IEEE Internet Things J 4(October 5):1764\u20131772. https:\/\/doi.org\/10.1109\/JIOT.2017.2723915","journal-title":"IEEE Internet Things J"},{"key":"576_CR33","doi-asserted-by":"publisher","first-page":"25808","DOI":"10.1109\/ACCESS.2017.2764913","volume":"5","author":"S Roy","year":"2017","unstructured":"Roy S, Chatterjee S, Das AK, Chattopadhyay S, Kumar N, Vasilakos AV (2017) On the design of provably secure lightweight remote user authentication scheme for mobile cloud computing services. IEEE Access 5:25808\u201325825. https:\/\/doi.org\/10.1109\/ACCESS.2017.2764913","journal-title":"IEEE Access"},{"issue":"March 3","key":"576_CR34","doi-asserted-by":"publisher","first-page":"662","DOI":"10.1109\/TIFS.2016.2631950","volume":"12","author":"A Zhang","year":"2017","unstructured":"Zhang A, Wang L, Ye X, Lin X (2017) Light-weight and robust security-aware D2D-assist data transmission protocol for mobile-health systems. IEEE Trans Inf Forensics Secur 12(March 3):662\u2013675. https:\/\/doi.org\/10.1109\/TIFS.2016.2631950","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"576_CR35","doi-asserted-by":"publisher","unstructured":"Moctar CBOME, Konat\u00e9 K (2017) A survey of security challenges in cloud computing. International conference on wireless communications, signal processing and networking (WiSPNET). pp 843\u2013849. https:\/\/doi.org\/10.1109\/WiSPNET.2017.8299880","DOI":"10.1109\/WiSPNET.2017.8299880"},{"key":"576_CR36","doi-asserted-by":"publisher","unstructured":"Fotouhi M, Bayat M, Das AK, Far HAN, Pournaghi SM, Doostari MA (2020) A lightweight and secure two-factor authentication scheme for wireless body area networks in health-care IoT. Comput Netw 177: 107333. https:\/\/doi.org\/10.1016\/j.comnet.2020.107333. ISSN 1389-1286","DOI":"10.1016\/j.comnet.2020.107333"},{"key":"576_CR37","doi-asserted-by":"publisher","DOI":"10.1016\/j.scs.2019.101522","volume":"49","author":"S Jegadeesan","year":"2019","unstructured":"Jegadeesan S, Azees M, Kumar PM, Manogaran G, Chilamkurti N, Varatharajan R, Hsu C-H (2019) An efficient anonymous mutual authentication technique for providing secure communication in mobile cloud computing for smart city applications. Sustain Cities Soc 49:101522. https:\/\/doi.org\/10.1016\/j.scs.2019.101522","journal-title":"Sustain Cities Soc"},{"key":"576_CR38","doi-asserted-by":"publisher","unstructured":"Jose DV, Vijyalakshmi A (2018) An overview of security in internet of things. Procedia Comput Sci 143:744\u2013748. https:\/\/doi.org\/10.1016\/j.procs.2018.10.439. ISSN 1877-0509","DOI":"10.1016\/j.procs.2018.10.439"},{"key":"576_CR39","doi-asserted-by":"publisher","first-page":"358","DOI":"10.1016\/j.future.2021.01.021","volume":"118","author":"Z Li","year":"2021","unstructured":"Li Z, Haiyang Hu, Hua Hu, Huang B, Ge J, Chang V (2021) Security and energy-aware collaborative task offloading in D2D communication. Future Gener Comput Syst 118:358\u2013373","journal-title":"Future Gener Comput Syst"},{"key":"576_CR40","doi-asserted-by":"publisher","first-page":"52","DOI":"10.1016\/j.future.2021.03.008","volume":"122","author":"R Qi","year":"2021","unstructured":"Qi R, Ji S, Shen J, Vijayakumar P, Kumar N (2021) Security preservation in industrial medical CPS using Chebyshev map: an AI approach. Future Gener Comput Syst 122:52\u201362","journal-title":"Future Gener Comput Syst"},{"key":"576_CR41","unstructured":"National Protection and Programs Directorate Office of Cyber and Infrastructure Analysis (2015) The future of smart cities: Cyber-physical infrastructure risk. https:\/\/ics-cert.us-cert.gov\/sites\/default\/files\/documents\/OCIA%20-%20The%20Future%20of%20Smart%20Cities%20-%20Cyber-Physical%20Infrastructure%20Risk.pdf. Accessed 21 July 17"},{"key":"576_CR42","doi-asserted-by":"publisher","unstructured":"Al-Naji FH, Zagrouba R (2020) CAB-IoT: continuous authentication architecture based on blockchain for internet of things. J King Saud Univ Comput Inf Sci. https:\/\/doi.org\/10.1016\/j.jksuci.2020.11.023. ISSN 1319-1578","DOI":"10.1016\/j.jksuci.2020.11.023"},{"key":"576_CR43","volume-title":"A scalable systems approach for critical infrastructure security","author":"AB Baker","year":"2019","unstructured":"Baker AB, Eagan RJ, Falcone PK, Harris JM, Herrera GV, Hines WC et al (2019) A scalable systems approach for critical infrastructure security. Sandia National Laboratories, Albuquerque"},{"key":"576_CR44","doi-asserted-by":"publisher","first-page":"144","DOI":"10.1016\/j.cose.2018.01.001","volume":"74","author":"BAS Al-rimy","year":"2018","unstructured":"Al-rimy BAS, Maarof MA, Shaid SZM (2018) Ransomware threat success factors, taxonomy, and countermeasures: a survey and research directions. Comput Secur 74:144\u2013166","journal-title":"Comput Secur"},{"issue":"1","key":"576_CR45","doi-asserted-by":"publisher","first-page":"28","DOI":"10.1109\/MWC.2015.7054716","volume":"22","author":"N Hampton","year":"2015","unstructured":"Hampton N, Baig ZA, He D, Chan S, Guizani M (2015) Ransomware: Emergence of the cyber-extortion menace. User privacy and data trustworthiness in mobile crowd sensing. IEEE Wirel Commun 22(1):28\u201334","journal-title":"IEEE Wirel Commun"},{"key":"576_CR46","volume-title":"Ransomware: a growing menace","author":"G O\u2019Gorman","year":"2012","unstructured":"O\u2019Gorman G, McDonald G (2012) Ransomware: a growing menace. Symantec Corporation, Tempe"},{"key":"576_CR47","unstructured":"Francescani C (2016) Ransomware hackers blackmail US Police departments. https:\/\/www.nbcnews.com\/news\/us-news\/ransomware-hackersblackmail-u-s-police-departments-n561746. Accessed 16 Feb 19"},{"key":"576_CR48","unstructured":"Mathews, L. (2018). Ransomware that hit Atlanta's computers destroyed police evidence https:\/\/www.forbes.com\/sites\/leemathews\/2018\/06\/08\/ransomware-that-hit-atlantas-computers-destroyed-police-evidence\/#2143b552112d. Accessed 16 Feb 19"},{"key":"576_CR49","unstructured":"Wagstaff K (2013) Big paydays force hospitals to prepare for ransomware attacks https:\/\/www.nbcnews.com\/tech\/security\/big-paydays-force-hospitalsprepare-ransomware-attacks-n557176. Accessed 16 Feb 19"},{"issue":"512","key":"576_CR50","first-page":"25","volume":"44","author":"A Dwyer","year":"2018","unstructured":"Dwyer A (2018) The NHS cyber-attack: a look at the complex environmental conditions of WannaCry. RAD Mag 44(512):25\u201326","journal-title":"RAD Mag"},{"issue":"7","key":"576_CR51","doi-asserted-by":"publisher","first-page":"104","DOI":"10.1007\/s10916-017-0752-1","volume":"41","author":"JM Ehrenfeld","year":"2017","unstructured":"Ehrenfeld JM (2017) Wannacry, cybersecurity and health information technology: a time to act. J Med Syst 41(7):104","journal-title":"J Med Syst"},{"key":"576_CR52","doi-asserted-by":"publisher","first-page":"k2381","DOI":"10.1136\/bmj.k2381","volume":"361","author":"G Martin","year":"2018","unstructured":"Martin G, Ghafur S, Kinross J, Hankin C, Darzi A (2018) WannaCry-a year on. BMJ 361:k2381. https:\/\/doi.org\/10.1136\/bmj.k2381","journal-title":"BMJ"},{"key":"576_CR53","unstructured":"Gallagher S (2016) Ransomware locks up San Francisco public transportation ticket machines: some systems now restored; attacker demanded $73,000 https:\/\/arstechnica.com\/security\/2016\/11\/san-francisco-muni-hit-by-black-fridayransomware-attack\/. Accessed 21 July 17"},{"key":"576_CR54","unstructured":"Stewart J (2016) San Franciscos transit hack couldve been way worse\u2014and cities must prepare. https:\/\/www.wired.com\/2016\/11\/sfs-transit-hackcouldve-way-worse-cities-must-prepare\/. Accessed 21 July 17"},{"key":"576_CR55","doi-asserted-by":"crossref","unstructured":"Bay Area Rapid Transit (2017). About BART. https:\/\/www.bart.gov. Accessed 08 Oct 17. Beresford AR, Stajano F (2003) Location privacy in pervasive computing. IEEE Pervasive computing 2(1):46\u201355","DOI":"10.1109\/MPRV.2003.1186725"},{"key":"576_CR56","unstructured":"Abendroth B, Kleiner A, Nicholas P (2017) A scalable systems approach for critical infrastructure security https:\/\/mscorpmedia.azureedge.net\/mscorpmedia\/2017\/05\/IoT_WhitePaper_5_15_17.pdf. Accessed 21 July 17"},{"key":"576_CR57","doi-asserted-by":"crossref","unstructured":"Dass P, Hari O (2016) A secure authentication scheme for RFID systems. International Conference on Information Security & Privacy (ICISP2015), 11\u201312 December 2015, Nagpur, INDIA; Procedia Computer Science, vol 78. pp. 100\u2013106","DOI":"10.1016\/j.procs.2016.02.017"},{"key":"576_CR58","unstructured":"Fu J, Wu C, Chen X, Fan R, Ping L (2010) Scalable pseudo random RFID private mutual authentication. 2nd IEEE International conference on computer engineering and technology (ICCET), vol 7. pp 497\u2013500."},{"key":"576_CR59","doi-asserted-by":"crossref","unstructured":"Chang AY, Dwen-Ren T, Chang-Lung T, Yong-Jiang L (2009) An improved certificate mechanism for transactions using radio frequency identification enabled mobile phone. Security Technology; 43rd Annual International Carnahan Conference. IEEE, pp 36\u201340","DOI":"10.1109\/CCST.2009.5335567"},{"key":"576_CR60","doi-asserted-by":"publisher","unstructured":"Li J, Wang Y, Jiao B, Xu Y (2010) An authentication protocol for secure and efficient RFID communication. In: 2010 international conference on logistics systems and intelligent management (ICLSIM). Harbin, pp 1648\u20131651. https:\/\/doi.org\/10.1109\/ICLSIM.2010.5461250","DOI":"10.1109\/ICLSIM.2010.5461250"},{"key":"576_CR61","doi-asserted-by":"publisher","unstructured":"Gui Y-G, Zhang J (2013) A new authentication RFID protocol with ownership transfer. In: 2013 international conference on ICT convergence (ICTC). Jeju, Korea (South), pp 359\u2013364. https:\/\/doi.org\/10.1109\/ICTC.2013.6675373","DOI":"10.1109\/ICTC.2013.6675373"},{"key":"576_CR62","doi-asserted-by":"publisher","unstructured":"Chen M, Chen S (2015) An efficient anonymous authentication protocol for RFID systems using dynamic tokens. In: 2015 IEEE 35th international conference on distributed computing systems. Columbus, OH, pp 756\u2013757. https:\/\/doi.org\/10.1109\/ICDCS.2015.94","DOI":"10.1109\/ICDCS.2015.94"},{"key":"576_CR63","doi-asserted-by":"publisher","unstructured":"Chen T, Yeh H, Shih W (2011) An advanced ECC dynamic ID-based remote mutual authentication scheme for cloud computing. In: 2011 fifth FTRA international conference on multimedia and ubiquitous engineering. Crete, pp 155\u2013159. https:\/\/doi.org\/10.1109\/MUE.2011.69","DOI":"10.1109\/MUE.2011.69"},{"key":"576_CR64","first-page":"49","volume":"1","author":"R Heeks","year":"1999","unstructured":"Heeks R, Bhatnagar S (1999) Understanding success and failure in information age reform. Reinventing Gov Inf Age Int Pract IT Enabled Public Sect Reform 1:49\u201374","journal-title":"Reinventing Gov Inf Age Int Pract IT Enabled Public Sect Reform"},{"issue":"4","key":"576_CR65","doi-asserted-by":"publisher","first-page":"586","DOI":"10.1109\/TETC.2016.2606384","volume":"5","author":"A Mosenia","year":"2017","unstructured":"Mosenia A, Jha NK (2017) A comprehensive study of security of internet-of-things. IEEE Trans Emerg Top Comput 5(4):586\u2013602. https:\/\/doi.org\/10.1109\/TETC.2016.2606384","journal-title":"IEEE Trans Emerg Top Comput"},{"key":"576_CR66","unstructured":"Data Breach Investigations Report (2018) Executive summary. https:\/\/www.verizonenterprise.com\/resources\/reports\/rp_DBIR_2018_Report_execsummary_en_xg.pdf. Accessed 16 Feb 19"},{"key":"576_CR67","unstructured":"Bartoli A, Hern\u00e1ndez-Serrano J, Soriano M, Dohler M, Kountouris A, Barthel D (2011) Security and privacy in your smart city. Proceedings of the Barcelona smart cities congress. pp 1\u20136"},{"key":"576_CR68","unstructured":"Cerrudo C (2015) An emerging us (and world) threat: cities wide open to cyberattacks. Securing Smart Cities"},{"key":"576_CR69","doi-asserted-by":"crossref","unstructured":"Logota E, Mantas G, Rodriguez J, Marques H (2014) Analysis of the impact of denial of service attacks on centralized control in smart cities. International wireless internet conference. Springer, pp 91\u201396","DOI":"10.1007\/978-3-319-18802-7_13"},{"key":"576_CR70","unstructured":"Conti G, Cross T, Raymond D (2015) Pen testing a city. https:\/\/www.blackhat.com\/docs\/us-15\/materials\/us-15-Conti-Pen-Testing-A-City.pdf"},{"key":"576_CR71","unstructured":"Kitchin R (2016) Getting smarter about smart cities: Improving data privacy and data security. Data Protection Unit, Department of the Taoiseach"},{"key":"576_CR72","unstructured":"Internet of things privacy and security in a connected world. https:\/\/www.ftc.gov\/system\/files\/documents\/reports\/federal-trade-commission-staff-reportnovember-2013-workshop-entitled-internet-things-privacy\/150127iotrpt.pdf. Accessed 21 July 17"},{"key":"576_CR73","doi-asserted-by":"publisher","unstructured":"L\u00e9vy-Bencheton C, Darra E (2015) Cyber security for smart cities\u2014an architecture model for public transport. https:\/\/doi.org\/10.2824\/846575","DOI":"10.2824\/846575"},{"key":"576_CR74","first-page":"612","volume":"7","author":"S Ijaz","year":"2016","unstructured":"Ijaz S, Shah MA, Khan A, Ahmed M (2016) Smart cities: a survey on security concerns. Int J Adv Comput Sci Appl 7:612\u2013625","journal-title":"Int J Adv Comput Sci Appl"},{"issue":"6","key":"576_CR75","doi-asserted-by":"publisher","first-page":"2017","DOI":"10.14569\/IJACSA.2017.080650","volume":"8","author":"MA Razzaq","year":"2017","unstructured":"Razzaq MA, Gill SH, Qureshi MA, Ullah S (2017) Security issues in the Internet of Things (IoT): a comprehensive study. Int J Adv Comput Sci Appl (IJACSA) 8(6):2017. https:\/\/doi.org\/10.14569\/IJACSA.2017.080650","journal-title":"Int J Adv Comput Sci Appl (IJACSA)"}],"container-title":["Complex &amp; Intelligent Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s40747-021-00576-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s40747-021-00576-7\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s40747-021-00576-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,9,27]],"date-time":"2022-09-27T13:46:51Z","timestamp":1664286411000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s40747-021-00576-7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,11,23]]},"references-count":75,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2022,10]]}},"alternative-id":["576"],"URL":"https:\/\/doi.org\/10.1007\/s40747-021-00576-7","relation":{},"ISSN":["2199-4536","2198-6053"],"issn-type":[{"type":"print","value":"2199-4536"},{"type":"electronic","value":"2198-6053"}],"subject":[],"published":{"date-parts":[[2021,11,23]]},"assertion":[{"value":"8 June 2021","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"21 October 2021","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"23 November 2021","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"There is no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}