{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,11]],"date-time":"2025-09-11T19:38:21Z","timestamp":1757619501174,"version":"3.44.0"},"reference-count":17,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2025,7,24]],"date-time":"2025-07-24T00:00:00Z","timestamp":1753315200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"},{"start":{"date-parts":[[2025,7,24]],"date-time":"2025-07-24T00:00:00Z","timestamp":1753315200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Discov Internet Things"],"DOI":"10.1007\/s43926-025-00187-5","type":"journal-article","created":{"date-parts":[[2025,7,24]],"date-time":"2025-07-24T18:35:29Z","timestamp":1753382129000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Design and analysis of secure communication protocol in the internet of things environment"],"prefix":"10.1007","volume":"5","author":[{"given":"Xiaoyan","family":"Huo","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,7,24]]},"reference":[{"issue":"1","key":"187_CR1","doi-asserted-by":"publisher","first-page":"711","DOI":"10.1007\/s12145-023-01194-2","volume":"17","author":"RN Madhusudhana","year":"2024","unstructured":"Madhusudhana RN, Kumar BA, Gajula SR. Enhanced elliptic curve- Diffie Hellman technique with big data analytics for satellite image security enhancement in internet of things systems. Earth Sci Inf. 2024;17(1):711\u201323.","journal-title":"Earth Sci Inf"},{"issue":"2","key":"187_CR2","first-page":"2199","volume":"24","author":"Y He","year":"2023","unstructured":"He Y, Kong M, Du C. Communication security analysis of intelligent transportation system using 5G internet of things from the perspective of big data. IEEE Trans Intell Transp Syst. 2023;24(2):2199\u2013207.","journal-title":"IEEE Trans Intell Transp Syst"},{"key":"187_CR3","doi-asserted-by":"crossref","unstructured":"Gupta M, Patel RB, Sharma GB. Lightweight branched blockchain security framework for Internet of Vehicles. Transactions on Emerging Telecommunications Technologies, 2023, 34(11):5596.1-5596.19.","DOI":"10.1002\/ett.4520"},{"issue":"2","key":"187_CR4","doi-asserted-by":"publisher","first-page":"305","DOI":"10.1007\/s10207-022-00637-z","volume":"22","author":"Q An","year":"2022","unstructured":"An Q, Hong WCH, Xu XS. How education level influences internet security knowledge, behaviour, and attitude: a comparison among undergraduates, postgraduates and working graduates. Int J Inf Secur. 2022;22(2):305\u201317.","journal-title":"Int J Inf Secur"},{"issue":"2","key":"187_CR5","doi-asserted-by":"publisher","first-page":"107847","DOI":"10.1016\/j.compeleceng.2022.107847","volume":"99","author":"EH Abualsauod","year":"2022","unstructured":"Abualsauod EH. A hybrid blockchain method in internet of things for privacy and security in unmanned aerial vehicles network. Comput Electr Eng. 2022;99(2):107847\u201357.","journal-title":"Comput Electr Eng"},{"issue":"16","key":"187_CR6","doi-asserted-by":"publisher","first-page":"139","DOI":"10.3390\/s23167207","volume":"23","author":"AO Khadidos","year":"2023","unstructured":"Khadidos AO, Alkubaisy ZM, Khadidos AO, Alyoubi KH, Alshareef AM, Ragab M. Binary hunter-prey optimization with machine learning-based cybersecurity solution on internet of things environment. Sensors. 2023;23(16):139\u2013209.","journal-title":"Sensors"},{"issue":"3","key":"187_CR7","doi-asserted-by":"publisher","first-page":"1197","DOI":"10.1007\/s11276-022-03185-5","volume":"29","author":"S Zehtabchi","year":"2023","unstructured":"Zehtabchi S, Daneshpour N, Safkhani M. A new method for privacy preserving association rule mining using homomorphic encryption with a secure communication protocol. Wireless Netw. 2023;29(3):1197\u2013212.","journal-title":"Wireless Netw"},{"issue":"3","key":"187_CR8","doi-asserted-by":"publisher","first-page":"1050","DOI":"10.1109\/TDSC.2023.3267979","volume":"21","author":"ZK Ding","year":"2024","unstructured":"Ding ZK, He DJ, Qiao Q, Li X, Gao Y, Chan S. A lightweight and secure communication protocol for the IoT environment. IEEE Trans Dependable Secur Comput. 2024;21(3):1050\u201367.","journal-title":"IEEE Trans Dependable Secur Comput"},{"issue":"3S","key":"187_CR9","doi-asserted-by":"publisher","first-page":"454","DOI":"10.52783\/cana.v31.801","volume":"31","author":"S Shinde","year":"2024","unstructured":"Shinde S, Walke MR, Thole RA. Quantum cryptography: mathematical foundations and practical applications for secure communication protocols. Commun Appl Nonlinear Anal. 2024;31(3S):454\u201369.","journal-title":"Commun Appl Nonlinear Anal"},{"issue":"18","key":"187_CR10","doi-asserted-by":"publisher","first-page":"30187","DOI":"10.1109\/JIOT.2024.3413010","volume":"11","author":"Z Zhang","year":"2024","unstructured":"Zhang Z, Huang Y, Huang W, Pan W, Liao Y, Zhou S. An auto-upgradable end-to-end preauthenticated secure communication protocol for UAV-aided perception intelligent system. IEEE Internet Things J. 2024;11(18):30187\u2013203.","journal-title":"IEEE Internet Things J"},{"issue":"1","key":"187_CR11","doi-asserted-by":"publisher","first-page":"42","DOI":"10.4236\/jcc.2022.101003","volume":"10","author":"YH Shao","year":"2022","unstructured":"Shao YH, Wang Y, Yang Y, Wang X. Research on a secure communication protocol based on National secret SM2 algorithm. J Comput Commun. 2022;10(1):42\u201356.","journal-title":"J Comput Commun"},{"issue":"6","key":"187_CR12","doi-asserted-by":"publisher","first-page":"68","DOI":"10.1109\/MNET.107.2100372","volume":"36","author":"JQ Zhang","year":"2022","unstructured":"Zhang JQ, Chang CH, Gu CY. Radio frequency fingerprints vs. physical unclonable functions-are they twins, competitors, or allies? IEEE Network. 2022;36(6):68\u201375.","journal-title":"IEEE Network"},{"issue":"3","key":"187_CR13","doi-asserted-by":"publisher","first-page":"1971","DOI":"10.1109\/TII.2021.3096048","volume":"18","author":"P Gope","year":"2022","unstructured":"Gope P, Millwood O, Sikdar B. A scalable protocol level approach to prevent machine learning attacks on physically unclonable function based authentication mechanisms for internet of medical things. IEEE Trans Industr Inf. 2022;18(3):1971\u201380.","journal-title":"IEEE Trans Industr Inf"},{"issue":"15","key":"187_CR14","doi-asserted-by":"publisher","first-page":"283","DOI":"10.1142\/S0218127424501864","volume":"34","author":"Q Wang","year":"2024","unstructured":"Wang Q, Wei Q, Jie S. An audio encryption algorithm based on 2d chaotic map and dynamic S-Box. Int J Bifurcat Chaos. 2024;34(15):283\u201391.","journal-title":"Int J Bifurcat Chaos"},{"issue":"4","key":"187_CR15","doi-asserted-by":"publisher","first-page":"2299","DOI":"10.1007\/s11277-024-11375-x","volume":"136","author":"H Chen","year":"2024","unstructured":"Chen H, Zhang Y, Han X. Blockchain-as-a-service for the security challenges and solutions in the internet of things environment. Wireless Pers Commun. 2024;136(4):2299\u2013327.","journal-title":"Wireless Pers Commun"},{"issue":"1","key":"187_CR16","first-page":"3","volume":"1","author":"M Gheisari","year":"2023","unstructured":"Gheisari M, Hamidpour H, Liu Y, Saedi P, Raza A, Jalili A, Rokhsati H, Amin R. Data mining techniques for web mining: A survey. Artif Intell Appl. 2023;1(1):3\u201310.","journal-title":"Artif Intell Appl"},{"issue":"11","key":"187_CR17","doi-asserted-by":"publisher","first-page":"10291","DOI":"10.1021\/acsnano.3c00487","volume":"17","author":"B Shao","year":"2023","unstructured":"Shao B, Wan T, Liao F. Highly trustworthy in-sensor cryptography for image encryption and authentication. ACS Nano. 2023;17(11):10291\u20139.","journal-title":"ACS Nano"}],"container-title":["Discover Internet of Things"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s43926-025-00187-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s43926-025-00187-5\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s43926-025-00187-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,7]],"date-time":"2025-09-07T22:15:28Z","timestamp":1757283328000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s43926-025-00187-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,7,24]]},"references-count":17,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2025,12]]}},"alternative-id":["187"],"URL":"https:\/\/doi.org\/10.1007\/s43926-025-00187-5","relation":{},"ISSN":["2730-7239"],"issn-type":[{"type":"electronic","value":"2730-7239"}],"subject":[],"published":{"date-parts":[[2025,7,24]]},"assertion":[{"value":"26 February 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"17 July 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"24 July 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"Not applicable.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"<!--Emphasis Type='Bold' removed-->Ethics and consent to participate"}},{"value":"The authors declare no competing interests.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"<!--Emphasis Type='Bold' removed-->Consent to publication"}},{"value":"Not applicable.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"<!--Emphasis Type='Bold' removed-->Clinical trial number"}},{"value":"The authors declare no competing interests.","order":5,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"82"}}