{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,18]],"date-time":"2026-01-18T06:31:42Z","timestamp":1768717902569,"version":"3.49.0"},"reference-count":21,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2025,4,23]],"date-time":"2025-04-23T00:00:00Z","timestamp":1745366400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"},{"start":{"date-parts":[[2025,4,23]],"date-time":"2025-04-23T00:00:00Z","timestamp":1745366400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Discov Internet Things"],"DOI":"10.1007\/s43926-025-00145-1","type":"journal-article","created":{"date-parts":[[2025,4,23]],"date-time":"2025-04-23T12:54:00Z","timestamp":1745412840000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Internet of things encryption technology combining elliptic curve cryptosystem, hash function, and RFID-based authentication"],"prefix":"10.1007","volume":"5","author":[{"given":"Bin","family":"Zheng","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,4,23]]},"reference":[{"issue":"4","key":"145_CR1","doi-asserted-by":"publisher","first-page":"5091","DOI":"10.1007\/s11042-022-12169-8","volume":"82","author":"M Gupta","year":"2023","unstructured":"Gupta M, Singh VP, Gupta KK, Shukla PK. An efficient image encryption technique based on two-level security for internet of things. Multimedia Tools Applicat. 2023;82(4):5091\u2013111.","journal-title":"Multimedia Tools Applicat"},{"issue":"15","key":"145_CR2","doi-asserted-by":"publisher","first-page":"13544","DOI":"10.1109\/JIOT.2023.3262660","volume":"10","author":"L Pu","year":"2023","unstructured":"Pu L, Lin C, Chen B, He D. User-friendly public-key authenticated encryption with keyword search for industrial internet of things. IEEE Internet Things J. 2023;10(15):13544\u201355.","journal-title":"IEEE Internet Things J"},{"issue":"2","key":"145_CR3","doi-asserted-by":"publisher","first-page":"1121","DOI":"10.1007\/s11277-021-09173-w","volume":"123","author":"R Hedayati","year":"2022","unstructured":"Hedayati R, Mostafavi S. A lightweight image encryption algorithm for secure communications in multimedia Internet of Things. Wireless Pers Commun. 2022;123(2):1121\u201343.","journal-title":"Wireless Pers Commun"},{"issue":"1","key":"145_CR4","doi-asserted-by":"publisher","first-page":"1148","DOI":"10.1109\/JIOT.2023.3288560","volume":"11","author":"J Feng","year":"2023","unstructured":"Feng J, Wang J, Zhu Y, Han K. A hybrid chaotic encryption ASIC with dynamic precision for internet of things. IEEE Int Things J. 2023;11(1):1148\u201363.","journal-title":"IEEE Int Things J"},{"issue":"4","key":"145_CR5","doi-asserted-by":"publisher","first-page":"5489","DOI":"10.1109\/JSYST.2022.3140850","volume":"16","author":"C Liu","year":"2022","unstructured":"Liu C, Zhang Y, Xu J, Zhao J, Xiang S. Ensuring the security and performance of IoT communication by improving encryption and decryption with the lightweight cipher uBlock. IEEE Syst J. 2022;16(4):5489\u2013500.","journal-title":"IEEE Syst J"},{"issue":"13","key":"145_CR6","doi-asserted-by":"publisher","first-page":"11773","DOI":"10.1109\/JIOT.2023.3244544","volume":"10","author":"S Zhu","year":"2023","unstructured":"Zhu S, Xu X, Gao H, Xiao F. CMTSNN: A deep learning model for multiclassification of abnormal and encrypted traffic of Internet of Things. IEEE Int Things J. 2023;10(13):11773\u201391.","journal-title":"IEEE Int Things J"},{"issue":"12","key":"145_CR7","doi-asserted-by":"publisher","first-page":"11377","DOI":"10.1016\/j.aej.2022.05.002","volume":"61","author":"MM Khayyat","year":"2022","unstructured":"Khayyat MM, Khayyat MM, Abdel-Khalek S, Mansour RF. Blockchain enabled optimal Hopfield Chaotic Neural network based secure encryption technique for industrial internet of things environment. Alex Eng J. 2022;61(12):11377\u201389.","journal-title":"Alex Eng J"},{"issue":"13","key":"145_CR8","doi-asserted-by":"publisher","first-page":"15567","DOI":"10.1007\/s11227-022-04442-2","volume":"78","author":"M Kalaiarasi","year":"2022","unstructured":"Kalaiarasi M, Venkatasubramani VR, Vinoth Thyagarajan V, Rajaram S. A parallel elliptic curve crypto-processor architecture with reduced clock cycle for FPGA platforms. J Supercomput. 2022;78(13):15567\u201397.","journal-title":"J Supercomput"},{"issue":"3","key":"145_CR9","doi-asserted-by":"publisher","first-page":"3867","DOI":"10.1007\/s11042-021-11687-1","volume":"81","author":"Z Bashir","year":"2022","unstructured":"Bashir Z, Malik MGA, Hussain M, Iqbal N. Multiple RGB images encryption algorithm based on elliptic curve, improved Diffie Hellman protocol. Multimedia Tools Applicat. 2022;81(3):3867\u201397.","journal-title":"Multimedia Tools Applicat"},{"issue":"3","key":"145_CR10","doi-asserted-by":"publisher","first-page":"991","DOI":"10.1007\/s11276-022-02903-3","volume":"28","author":"AFX Ametepe","year":"2022","unstructured":"Ametepe AFX, Ahouandjinou ASRM, Ezin EC. Robust encryption method based on AES-CBC using elliptic curves Diffie-Hellman to secure data in wireless sensor networks. Wireless Netw. 2022;28(3):991\u20131001.","journal-title":"Wireless Netw"},{"issue":"9","key":"145_CR11","doi-asserted-by":"publisher","first-page":"6785","DOI":"10.1016\/j.aej.2021.12.023","volume":"61","author":"G Ye","year":"2022","unstructured":"Ye G, Liu M, Wu M. Double image encryption algorithm based on compressive sensing and elliptic curve. Alex Eng J. 2022;61(9):6785\u201395.","journal-title":"Alex Eng J"},{"issue":"4","key":"145_CR12","first-page":"644","volume":"71","author":"DSV Prasad","year":"2022","unstructured":"Prasad DSV, Sekhar PS, Prasanth AVV, Ganesh KNS, Madhuri KR, Prasad TVVD. Digital image encryption algorithm based on elliptic curve public cryptosystem. Mathe Statistian Eng Applicat. 2022;71(4):644\u201355.","journal-title":"Mathe Statistian Eng Applicat"},{"issue":"8","key":"145_CR13","doi-asserted-by":"publisher","first-page":"10893","DOI":"10.1007\/s11227-021-04252-y","volume":"78","author":"M Gao","year":"2022","unstructured":"Gao M, Lu YB. URAP: a new ultra-lightweight RFID authentication protocol in passive RFID system. J Supercomput. 2022;78(8):10893\u2013905.","journal-title":"J Supercomput"},{"issue":"6","key":"145_CR14","doi-asserted-by":"publisher","first-page":"6338","DOI":"10.1109\/JSEN.2023.3242132","volume":"23","author":"TF Lee","year":"2023","unstructured":"Lee TF, Lin KW, Hsieh YP, Lee KC. Lightweight cloud computing-based RFID authentication protocols using PUF for e-healthcare systems. IEEE Sens J. 2023;23(6):6338\u201349.","journal-title":"IEEE Sens J"},{"issue":"5","key":"145_CR15","doi-asserted-by":"publisher","first-page":"2105","DOI":"10.1007\/s11276-023-03234-7","volume":"29","author":"S Kumar","year":"2023","unstructured":"Kumar S, Banka H, Kaushik B. Ultra-lightweight blockchain-enabled RFID authentication protocol for supply chain in the domain of 5G mobile edge computing. Wireless Netw. 2023;29(5):2105\u201326.","journal-title":"Wireless Netw"},{"issue":"2","key":"145_CR16","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3571749","volume":"35","author":"SN Krishna","year":"2023","unstructured":"Krishna SN, Madnani K, Mazo M Jr, Pandya P. From non-punctuality to non-adjacency: a quest for decidability of timed temporal logics with quantifiers. Formal Aspects Comput. 2023;35(2):1\u201350.","journal-title":"Formal Aspects Comput"},{"issue":"2","key":"145_CR17","doi-asserted-by":"publisher","first-page":"1391","DOI":"10.1109\/JIOT.2022.3207229","volume":"10","author":"L Cheng","year":"2022","unstructured":"Cheng L, Meng F. Certificateless public key authenticated searchable encryption with enhanced security model in IIoT applications. IEEE Internet Things J. 2022;10(2):1391\u2013400.","journal-title":"IEEE Internet Things J"},{"issue":"8","key":"145_CR18","doi-asserted-by":"publisher","first-page":"10907","DOI":"10.1007\/s11042-022-12044-6","volume":"81","author":"NJ De Dieu","year":"2022","unstructured":"De Dieu NJ, Ruben FSV, Nestor T, Zeric NT, Jacques K. Dynamic analysis of a novel chaotic system with no linear terms and use for DNA-based image encryption. Multimedia Tools Applicat. 2022;81(8):10907\u201334.","journal-title":"Multimedia Tools Applicat"},{"issue":"4","key":"145_CR19","doi-asserted-by":"publisher","first-page":"3759","DOI":"10.1007\/s40747-022-00756-z","volume":"9","author":"K Munjal","year":"2023","unstructured":"Munjal K, Bhatia R. A systematic review of homomorphic encryption and its contributions in healthcare industry. Complex Intell Syst. 2023;9(4):3759\u201386.","journal-title":"Complex Intell Syst"},{"issue":"6","key":"145_CR20","doi-asserted-by":"publisher","first-page":"10441","DOI":"10.1109\/JIOT.2023.3325996","volume":"11","author":"S Chen","year":"2023","unstructured":"Chen S, Li J, Zhang Y, Han J. Efficient revocable attribute-based encryption with verifiable data integrity. IEEE Int Things J. 2023;11(6):10441\u201351.","journal-title":"IEEE Int Things J"},{"issue":"5","key":"145_CR21","doi-asserted-by":"publisher","first-page":"6855","DOI":"10.1007\/s11227-023-05712-3","volume":"80","author":"NC Gowda","year":"2024","unstructured":"Gowda NC, Manvi SS, Malakreddy AB, Buyya R. TAKM-FC: two-way authentication with efficient key management in fog computing environments. J Supercomput. 2024;80(5):6855\u201390.","journal-title":"J Supercomput"}],"container-title":["Discover Internet of Things"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s43926-025-00145-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s43926-025-00145-1\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s43926-025-00145-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,4,23]],"date-time":"2025-04-23T12:54:01Z","timestamp":1745412841000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s43926-025-00145-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,4,23]]},"references-count":21,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2025,12]]}},"alternative-id":["145"],"URL":"https:\/\/doi.org\/10.1007\/s43926-025-00145-1","relation":{},"ISSN":["2730-7239"],"issn-type":[{"value":"2730-7239","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,4,23]]},"assertion":[{"value":"31 August 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"9 April 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"23 April 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"An ethics statement was not required for this study type, no human or animal subjects or materials were used.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethics approval and consent to participate"}},{"value":"Not applicable.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent for publication"}},{"value":"The authors declare no competing interests.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflicts of interest"}}],"article-number":"43"}}