{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T08:03:21Z","timestamp":1775030601292,"version":"3.50.1"},"reference-count":52,"publisher":"Springer Science and Business Media LLC","issue":"5","license":[{"start":{"date-parts":[[2024,6,16]],"date-time":"2024-06-16T00:00:00Z","timestamp":1718496000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2024,6,16]],"date-time":"2024-06-16T00:00:00Z","timestamp":1718496000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61202458"],"award-info":[{"award-number":["61202458"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61403109"],"award-info":[{"award-number":["61403109"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100005046","name":"Natural Science Foundation of Heilongjiang Province of China","doi-asserted-by":"crossref","award":["LH2020F034"],"award-info":[{"award-number":["LH2020F034"]}],"id":[{"id":"10.13039\/501100005046","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Complex Intell. Syst."],"published-print":{"date-parts":[[2024,10]]},"abstract":"<jats:title>Abstract<\/jats:title><jats:p>As an emerging wireless communication technology, narrowband Internet of Things is widely used in various scenarios, but it also brings new security problems, especially the group authentication between terminal devices and servers. In narrowband Internet of Things, terminal devices are often deployed in unattended environments, which are vulnerable to various attacks and controlled by adversaries, resulting in identity information leakage. Secondly, a large number of terminal devices send authentication request information to the server at the same time, which is easy to cause network signaling congestion, and the centralized calculation mode of the server will cause a large delay in the authentication process. To solve these problems, we propose an edge-assisted group authentication scheme for narrowband Internet of Things. Firstly, a lightweight encryption algorithm LCHAOSAES was used to encrypt the terminal device identity to prevent the terminal device identity information leakage. Then, the edge computing method was used to add an edge network layer to the NB-IoT system architecture to assist in completing the group authentication of massive terminal devices, and the edge assistance could realize decentralization and reduce the load of centralized processing of the server. The Burrows Abadi Needham logic verification, informal security analysis and performance analysis show that the proposed scheme is robust under malicious attacks such as replay attack, man-in-the-middle attack and insider attack, and has less signaling overhead and delay.<\/jats:p>","DOI":"10.1007\/s40747-024-01514-z","type":"journal-article","created":{"date-parts":[[2024,6,16]],"date-time":"2024-06-16T17:01:33Z","timestamp":1718557293000},"page":"6597-6618","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["An edge-assisted group authentication scheme for the narrowband internet of things"],"prefix":"10.1007","volume":"10","author":[{"given":"Guosheng","family":"Zhao","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0009-0008-1910-6530","authenticated-orcid":false,"given":"Huan","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Jian","family":"Wang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,6,16]]},"reference":[{"key":"1514_CR1","unstructured":"Holst A (2021) Number of IoT connected devices worldwide 2019\u20132030. https:\/\/www.statista.com\/statistics\/1183457\/iot-connected-devices-worldwide"},{"issue":"3","key":"1514_CR2","doi-asserted-by":"publisher","first-page":"117","DOI":"10.1109\/MCOM.2017.1600510CM","volume":"55","author":"Y-P Wang","year":"2017","unstructured":"Wang Y-P, Lin X, Adhikary A, Grovlen A, Sui Y, Blankenship Y, Bergman J, Razaghi H (2017) A primer on 3GPP narrowband Internet of Things. IEEE Commun Mag 55(3):117\u2013123","journal-title":"IEEE Commun Mag"},{"key":"1514_CR3","doi-asserted-by":"crossref","unstructured":"Wang B, Li S (2020) The research of security in NB-IoT. In: Proceedings of the 2020 4th International Conference on Electronic Information Technology and Computer Engineering. ACM, New York, pp 275\u2013279","DOI":"10.1145\/3443467.3443767"},{"key":"1514_CR4","doi-asserted-by":"crossref","unstructured":"Zayas AD, Merino P (2017) The 3GPP NB-IoT system architecture for the Internet of Things. 2017 IEEE International Conference on Communications Workshops (ICC Workshops). Piscataway, IEEE, pp 277\u2013282","DOI":"10.1109\/ICCW.2017.7962670"},{"key":"1514_CR5","first-page":"83","volume":"17","author":"Y Shi","year":"2017","unstructured":"Shi Y (2017) Key technologies and application prospects of NB-IoT. Telecom World 17:83","journal-title":"Telecom World"},{"key":"1514_CR6","unstructured":"Ericsson S (2021) Ericsson mobility report. [Online]. https:\/\/www.ericsson.com\/4af5df\/assets\/local\/press-releases\/asia"},{"key":"1514_CR7","doi-asserted-by":"crossref","unstructured":"Mangalvedhe N, Ratasuk R, Ghosh A (2016) NB-IoT deployment study for low power wide area cellular IoT. In: 2016 IEEE 27th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC). IEEE, Piscataway, pp 1-6. https:\/\/doi.org\/10.1109\/PIMRC.2016.7794567","DOI":"10.1109\/PIMRC.2016.7794567"},{"issue":"9","key":"1514_CR8","doi-asserted-by":"publisher","first-page":"1893","DOI":"10.1109\/TC.2012.251","volume":"62","author":"L Harn","year":"2012","unstructured":"Harn L (2012) Group authentication. IEEE Trans Comput 62(9):1893\u20131898. https:\/\/doi.org\/10.1109\/TC.2012.251","journal-title":"IEEE Trans Comput"},{"issue":"04","key":"1514_CR9","first-page":"765","volume":"59","author":"X Li","year":"2022","unstructured":"Li X, Chen B, Yang D, Wu G (2022) Review of security protocols in edge computing environments. J Comput Res Dev 59(04):765\u2013780","journal-title":"J Comput Res Dev"},{"issue":"1","key":"1514_CR10","doi-asserted-by":"publisher","first-page":"840","DOI":"10.1109\/JIOT.2022.3204335","volume":"10","author":"M Nakkar","year":"2022","unstructured":"Nakkar M, AlTawy R, Youssef A (2022) Gase: a lightweight group authentication scheme with key agreement for edge computing applications. IEEE Internet Things J 10(1):840\u2013854. https:\/\/doi.org\/10.1109\/JIOT.2022.3204335","journal-title":"IEEE Internet Things J"},{"key":"1514_CR11","doi-asserted-by":"crossref","unstructured":"Dey S, Ye Q, Sampalli S (2018) AMLT: A mutual authentication scheme for mobile cloud computing. In: 2018 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData). IEEE, pp 700\u2013705","DOI":"10.1109\/Cybermatics_2018.2018.00140"},{"key":"1514_CR12","doi-asserted-by":"publisher","first-page":"101327","DOI":"10.1109\/ACCESS.2019.2930814","volume":"7","author":"MS Pardeshi","year":"2019","unstructured":"Pardeshi MS, Yuan S-M (2019) SMAP fog\/edge: a secure mutual authentication protocol for fog\/edge. IEEE Access 7:101327\u2013101335","journal-title":"IEEE Access"},{"issue":"6","key":"1514_CR13","first-page":"1089","volume":"18","author":"MH Ibrahim","year":"2016","unstructured":"Ibrahim MH (2016) OCTOPUS: an edge-fog mutual authentication scheme. Int J Netw Secur 18(6):1089\u20131101","journal-title":"Int J Netw Secur"},{"key":"1514_CR14","doi-asserted-by":"publisher","unstructured":"Amor A B, Abid M, Meddeb A (2017) A privacy-preserving authentication scheme in an edge-fog environment. In: 2017 IEEE\/ACS 14th International Conference on Computer Systems and Applications (AICCSA), Hammamet, Tunisia, pp. 1225\u20131231. https:\/\/doi.org\/10.1109\/AICCSA.2017.57","DOI":"10.1109\/AICCSA.2017.57"},{"issue":"1","key":"1514_CR15","doi-asserted-by":"publisher","first-page":"560","DOI":"10.1109\/JSYST.2019.2896064","volume":"14","author":"X Jia","year":"2019","unstructured":"Jia X, He D, Kumar N, Choo K-KR (2019) A provably secure and efficient identity-based anonymous authentication scheme for mobile edge computing. IEEE Syst J 14(1):560\u2013571","journal-title":"IEEE Syst J"},{"key":"1514_CR16","doi-asserted-by":"publisher","unstructured":"Kaur K, Garg S, Kaddoum G, Guizani MK, Jayakody DN (2019) A lightweight and privacy-preserving authentication protocol for mobile edge computing. 2019 IEEE Global Communications Conference (GLOBECOM), Waikoloa, HI, USA, 2019, pp. 1\u20136. https:\/\/doi.org\/10.1109\/GLOBECOM38437.2019.9013856","DOI":"10.1109\/GLOBECOM38437.2019.9013856"},{"key":"1514_CR17","doi-asserted-by":"publisher","unstructured":"Lai C, Li H, Lu R, Jiang R, Shen X (2013) LGTH: a lightweight group authentication protocol for machine-type communication in LTE networks. In: 2013 IEEE Global Communications Conference (GLOBECOM), Atlanta, GA, USA, 2013, pp. 832\u2013837. https:\/\/doi.org\/10.1109\/GLOCOM.2013.6831176","DOI":"10.1109\/GLOCOM.2013.6831176"},{"key":"1514_CR18","doi-asserted-by":"crossref","unstructured":"Lai C, Li H, Lu R, Jiang R, Shen X (2014) SEGR: A secure and efficient group roaming scheme for machine to machine communications between 3GPP and WiMAX networks. In: 2014 IEEE International Conference on Communications (ICC), Sydney, NSW, Australia, 2014, pp. 1011\u20131016","DOI":"10.1109\/ICC.2014.6883452"},{"issue":"17","key":"1514_CR19","doi-asserted-by":"publisher","first-page":"3282","DOI":"10.1002\/sec.1252","volume":"8","author":"J Cao","year":"2015","unstructured":"Cao J, Ma M, Li H (2015) GBAAM: group-based access authentication for MTC in LTE networks. Secur Commun Netw 8(17):3282\u20133299","journal-title":"Secur Commun Netw"},{"issue":"3","key":"1514_CR20","doi-asserted-by":"publisher","first-page":"408","DOI":"10.1109\/JIOT.2015.2495321","volume":"3","author":"J Li","year":"2015","unstructured":"Li J, Wen M, Zhang T (2015) Group-based authentication and key agreement with dynamic policy updating for MTC in LTE-A networks. IEEE Internet Things J 3(3):408\u2013417. https:\/\/doi.org\/10.1109\/JIOT.2015.2495321","journal-title":"IEEE Internet Things J"},{"key":"1514_CR21","doi-asserted-by":"publisher","first-page":"66","DOI":"10.1016\/j.comnet.2016.02.007","volume":"99","author":"C Lai","year":"2016","unstructured":"Lai C, Lu R, Zheng D, Li H, Shen X (2016) GLARM: Group-based lightweight authentication scheme for resource-constrained machine to machine communications. Comput Netw 99:66\u201381","journal-title":"Comput Netw"},{"issue":"4","key":"1514_CR22","doi-asserted-by":"publisher","first-page":"965","DOI":"10.1007\/s11277-010-0104-7","volume":"62","author":"Y-W Chen","year":"2012","unstructured":"Chen Y-W, Wang J-T, Chi K-H, Tseng C-C (2012) Group-based authentication and key agreement. Wireless Pers Commun 62(4):965\u2013979","journal-title":"Wireless Pers Commun"},{"issue":"17","key":"1514_CR23","doi-asserted-by":"publisher","first-page":"3492","DOI":"10.1016\/j.comnet.2013.08.003","volume":"57","author":"C Lai","year":"2013","unstructured":"Lai C, Li H, Lu R, Shen X (2013) SE-AKA: a secure and efficient group authentication and key agreement protocol for LTE networks. Comput Netw 57(17):3492\u20133510. https:\/\/doi.org\/10.1016\/j.comnet.2013.08.003","journal-title":"Comput Netw"},{"issue":"11","key":"1514_CR24","doi-asserted-by":"publisher","DOI":"10.1155\/2013\/304601","volume":"9","author":"R Jiang","year":"2013","unstructured":"Jiang R, Lai C, Luo J, Wang X, Wang H (2013) EAP-based group authentication and key agreement protocol for machine-type communications. Int J Distrib Sens Netw 9(11):304601","journal-title":"Int J Distrib Sens Netw"},{"issue":"2","key":"1514_CR25","doi-asserted-by":"publisher","first-page":"87","DOI":"10.1504\/IJGUC.2014.060189","volume":"45","author":"Y Zhang","year":"2014","unstructured":"Zhang Y, Chen J, Li H, Cao J, Lai C (2014) Group-based authentication and key agreement for machine-type communication. Int J Grid Util Comput 45(2):87\u201395. https:\/\/doi.org\/10.1504\/IJGUC.2014.060189","journal-title":"Int J Grid Util Comput"},{"issue":"3","key":"1514_CR26","doi-asserted-by":"publisher","first-page":"414","DOI":"10.1002\/ett.2635","volume":"26","author":"C Lai","year":"2015","unstructured":"Lai C, Li H, Li X, Cao J (2015) A novel group access authentication and key agreement protocol for machine-type communication. Trans Emerg Telecommun Technol 26(3):414\u2013431","journal-title":"Trans Emerg Telecommun Technol"},{"issue":"2","key":"1514_CR27","doi-asserted-by":"publisher","first-page":"1561","DOI":"10.1109\/JIOT.2018.2846803","volume":"6","author":"J Cao","year":"2018","unstructured":"Cao J, Yu P, Ma M, Gao W (2018) Fast authentication and data transfer scheme for massive NB-IoT devices in 3GPP 5G network. IEEE Internet Things J 6(2):1561\u20131575. https:\/\/doi.org\/10.1109\/JIOT.2018.2846803","journal-title":"IEEE Internet Things J"},{"key":"1514_CR28","doi-asserted-by":"crossref","unstructured":"Yu P, Cao J, Ma M, Li H, Niu B, Li F (2019) Quantum-resistance authentication and data transmission scheme for NB-IoT in 3GPP 5G networks. In: 2019 IEEE Wireless Communications and Networking Conference (WCNC), Marrakesh, Morocco, 2019, pp. 1\u20137","DOI":"10.1109\/WCNC.2019.8885686"},{"issue":"6","key":"1514_CR29","doi-asserted-by":"publisher","first-page":"9794","DOI":"10.1109\/JIOT.2019.2931724","volume":"6","author":"J Cao","year":"2019","unstructured":"Cao J, Yu P, Xiang X, Ma M, Li H (2019) Anti-quantum fast authentication and data transmission scheme for massive devices in 5G NB-IoT system. IEEE Internet Things J 6(6):9794\u20139805","journal-title":"IEEE Internet Things J"},{"key":"1514_CR30","doi-asserted-by":"publisher","first-page":"114721","DOI":"10.1109\/ACCESS.2019.2936123","volume":"7","author":"Y Zhang","year":"2019","unstructured":"Zhang Y, Ren F, Wu A, Zhang T, Cao J, Zheng D (2019) Certificateless multi-party authenticated encryption for NB-IoT terminals in 5G networks. IEEE Access 7:114721\u2013114730. https:\/\/doi.org\/10.1109\/ACCESS.2019.2936123","journal-title":"IEEE Access"},{"issue":"5","key":"1514_CR31","doi-asserted-by":"publisher","first-page":"3642","DOI":"10.1109\/JIOT.2021.3098224","volume":"9","author":"X Ren","year":"2021","unstructured":"Ren X, Cao J, Ma M, Li H, Zhang Y (2021) A novel PUF-based group authentication and data transmission scheme for NB-IoT in 3GPP 5G networks. IEEE Internet Things J 9(5):3642\u20133656","journal-title":"IEEE Internet Things J"},{"issue":"12","key":"1514_CR32","first-page":"152","volume":"42","author":"X Chang","year":"2021","unstructured":"Chang X, Zhan J, Wang Z (2021) Low-cost group-based identity security authentication protocol for NB-IoT nodes. J Commun 42(12):152\u2013162","journal-title":"J Commun"},{"key":"1514_CR33","doi-asserted-by":"crossref","unstructured":"Halperin D, Heydt-Benjamin T S, Ransford B et al (2008) Pacemakers and implantable cardiac defib-rillators: Software radio attacks and zero-power defenses. In: Proceedings of IEEE Symposium on Security and Privacy (S P), pp 129\u2013142","DOI":"10.1109\/SP.2008.31"},{"key":"1514_CR34","doi-asserted-by":"crossref","unstructured":"Brik V, Banerjee S, Gruteser M et al (2008) Wireless device identification with radiometric signatures. In: Proceedings of ACM International Conference on Mobile Computing and Networking (MobiCom), pp 116\u2013127","DOI":"10.1145\/1409944.1409959"},{"key":"1514_CR35","doi-asserted-by":"crossref","unstructured":"Newsome J, Shi E, Song D et al (2004) The Sybil attack in sensor networks: Analysis and defenses. in: Proceedings of IEEE\/ACM International Conference on Information Processing in Sensor Networks (IPSN), pp 259\u2013268","DOI":"10.1145\/984622.984660"},{"key":"1514_CR36","doi-asserted-by":"crossref","unstructured":"Wang W, Farid H (2007) Exposing digital forgeries in video by detecting duplication. In: Proceedings of ACM Workshop on Multimedia security (MM Sec), New York, NY, United States, pp 35\u201342","DOI":"10.1145\/1288869.1288876"},{"issue":"6","key":"1514_CR37","doi-asserted-by":"publisher","first-page":"16","DOI":"10.1109\/MCOM.2015.7120011","volume":"53","author":"W Trappe","year":"2015","unstructured":"Trappe W (2015) The challenges facing physical layer security. IEEE Commun Mag 53(6):16\u201320","journal-title":"IEEE Commun Mag"},{"issue":"3","key":"1514_CR38","doi-asserted-by":"publisher","first-page":"1550","DOI":"10.1109\/SURV.2014.012314.00178","volume":"16","author":"A Mukherjee","year":"2014","unstructured":"Mukherjee A, Fakoorian SAA, Huang J et al (2014) Principles of physical layer security in multiuser wireless networks: a survey. IEEE Commun Surv Tutor 16(3):1550\u20131573","journal-title":"IEEE Commun Surv Tutor"},{"issue":"1","key":"1514_CR39","doi-asserted-by":"publisher","first-page":"282","DOI":"10.1109\/COMST.2020.3042188","volume":"23","author":"N Xie","year":"2020","unstructured":"Xie N, Li Z, Tan H (2020) A survey of physical-layer authentication in wireless communications. IEEE Commun Surv Tutor 23(1):282\u2013310","journal-title":"IEEE Commun Surv Tutor"},{"issue":"2","key":"1514_CR40","first-page":"224","volume":"7","author":"G Li","year":"2019","unstructured":"Li G, Yu J, Hu A (2019) Research on physical-layer security based on device and channel characteristics. J Cryptol Res 7(2):224\u2013248","journal-title":"J Cryptol Res"},{"issue":"10","key":"1514_CR41","first-page":"3039","volume":"39","author":"R Jia","year":"2018","unstructured":"Jia R, Wang Y, Wang X (2018) A lightweight encryption scheme for narrowband Internet of Things. Comput Eng Des 39(10):3039\u20133044","journal-title":"Comput Eng Des"},{"key":"1514_CR42","unstructured":"Yu B, Yue Y, Dai Z, Su J (2004) Realization of key exchange of DH scheme over elliptic curve. In: Microcomputer Application Society of Chinese Instrument Society. Proceedings of the 16th National Conference on Computer Science and Technology Applications (CACIS). University of Science and Technology of China, pp 403-409"},{"key":"1514_CR43","doi-asserted-by":"crossref","unstructured":"Koblitz N, Menezes A, Vanstone S (2000) The state of elliptic curve cryptography. Des Codes Crypt 19:173\u2013193","DOI":"10.1023\/A:1008354106356"},{"key":"1514_CR44","doi-asserted-by":"publisher","first-page":"727","DOI":"10.1016\/j.future.2017.08.042","volume":"82","author":"F Wu","year":"2018","unstructured":"Wu F, Li X, Sangaiah AK, Xu L, Kumari S, Wu L, Shen J (2018) A lightweight and robust two-factor authentication scheme for personalized healthcare systems using wireless medical sensor networks. Fut Gen Comput Syst 82:727\u2013737. https:\/\/doi.org\/10.1016\/j.future.2017.08.042","journal-title":"Fut Gen Comput Syst"},{"issue":"2","key":"1514_CR45","doi-asserted-by":"publisher","first-page":"198","DOI":"10.1109\/TIT.1983.1056650","volume":"29","author":"D Dolev","year":"1983","unstructured":"Dolev D, Yao A (1983) On the security of public key protocols. IEEE Trans Inf Theory 29(2):198\u2013208","journal-title":"IEEE Trans Inf Theory"},{"key":"1514_CR46","doi-asserted-by":"publisher","unstructured":"Wu T-Y, Lee Z, Obaidat MS, Kumari S, Kumar S, Chen C-M (2020) An authenticated key exchange protocol for multi-server architecture in 5G networks. IEEE Access 8:28096\u201328108. https:\/\/doi.org\/10.1109\/ACCESS.2020.2969986","DOI":"10.1109\/ACCESS.2020.2969986"},{"issue":"1","key":"1514_CR47","doi-asserted-by":"publisher","first-page":"18","DOI":"10.1145\/77648.77649","volume":"8","author":"M Burrows","year":"1990","unstructured":"Burrows M, Abadi M, Needham R (1990) A logic of authentication. ACM Trans Comput Syst (TOCS) 8(1):18\u201336","journal-title":"ACM Trans Comput Syst (TOCS)"},{"issue":"4","key":"1514_CR48","doi-asserted-by":"publisher","first-page":"708","DOI":"10.1109\/TDSC.2016.2605087","volume":"15","author":"D Wang","year":"2016","unstructured":"Wang D, Wang P (2016) Two birds with one stone: two-factor authentication with security beyond conventional bound. IEEE Trans Depend Secur Comput 15(4):708\u2013722. https:\/\/doi.org\/10.1109\/TDSC.2016.2605087","journal-title":"IEEE Trans Depend Secur Comput"},{"issue":"2","key":"1514_CR49","doi-asserted-by":"publisher","first-page":"1338","DOI":"10.1109\/TDSC.2020.3022797","volume":"19","author":"S Qiu","year":"2020","unstructured":"Qiu S, Wang D, Xu G, Kumari S (2020) Practical and provably secure three-factor authentication protocol based on extended chaotic-maps for mobile lightweight devices. IEEE Trans Depend Secur Comput 19(2):1338\u20131351. https:\/\/doi.org\/10.1109\/TDSC.2020.3022797","journal-title":"IEEE Trans Depend Secur Comput"},{"issue":"3","key":"1514_CR50","doi-asserted-by":"publisher","DOI":"10.1002\/dac.3860","volume":"32","author":"J Cao","year":"2019","unstructured":"Cao J, Ma M, Li H (2019) LPPA: Lightweight privacy-preservation access authentication scheme for massive devices in fifth generation (5G) cellular networks. Int J Commun Syst 32(3):e3860","journal-title":"Int J Commun Syst"},{"issue":"2","key":"1514_CR51","doi-asserted-by":"publisher","first-page":"380","DOI":"10.1002\/acs.3529","volume":"37","author":"Z Zhang","year":"2023","unstructured":"Zhang Z, Song X, Sun X, Stojanovic V (2023) Hybrid-driven-based fuzzy secure filtering for nonlinear parabolic partial differential equation systems with cyber attacks. Int J Adapt Control Signal Process 37(2):380\u2013398","journal-title":"Int J Adapt Control Signal Process"},{"issue":"7","key":"1514_CR52","doi-asserted-by":"publisher","first-page":"8997","DOI":"10.1007\/s11063-023-11189-1","volume":"55","author":"X Song","year":"2023","unstructured":"Song X, Wu N, Song S, Stojanovic V (2023) Switching-like event-triggered state estimation for reaction-diffusion neural networks against DoS attacks. Neural Process Lett 55(7):8997\u20139018","journal-title":"Neural Process Lett"}],"container-title":["Complex &amp; Intelligent Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s40747-024-01514-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s40747-024-01514-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s40747-024-01514-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,9,14]],"date-time":"2024-09-14T15:14:23Z","timestamp":1726326863000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s40747-024-01514-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,6,16]]},"references-count":52,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2024,10]]}},"alternative-id":["1514"],"URL":"https:\/\/doi.org\/10.1007\/s40747-024-01514-z","relation":{},"ISSN":["2199-4536","2198-6053"],"issn-type":[{"value":"2199-4536","type":"print"},{"value":"2198-6053","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,6,16]]},"assertion":[{"value":"28 November 2023","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"29 May 2024","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"16 June 2024","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"No confict of interest exits in the submission of this manuscript, and manuscript is approved by all authors for publication.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"I would like to declare on behalf of my co-authors that the work described was original research that has not been published previously, and not under consideration for publication elsewhere, in whole or in part.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethics approval"}},{"value":"We would like to submit the manuscript entitled \u201cAn Edge-Assisted Group Authentication Scheme for the Narrowband Internet of Things\u201d, which we wish to be considered for publication in \u201cArtifcial Intelligence Review\u201d.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent for publication"}}]}}