{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T10:39:52Z","timestamp":1763462392118,"version":"3.45.0"},"reference-count":33,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T00:00:00Z","timestamp":1763424000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"},{"start":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T00:00:00Z","timestamp":1763424000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Discov Internet Things"],"DOI":"10.1007\/s43926-025-00248-9","type":"journal-article","created":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T10:37:59Z","timestamp":1763462279000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["An enhanced visual cryptography framework for smart lock authentication"],"prefix":"10.1007","volume":"5","author":[{"given":"Chihi","family":"Hasnae","sequence":"first","affiliation":[]},{"given":"Chahboun","family":"Asaad","sequence":"additional","affiliation":[]},{"given":"Mezroui","family":"Soufiane","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,11,18]]},"reference":[{"key":"248_CR1","doi-asserted-by":"publisher","first-page":"315","DOI":"10.14257\/ijsia.2013.7.5.29","volume":"7","author":"Y-S Byun","year":"2013","unstructured":"Byun Y-S, Kwak J. Security management architecture for secure smart work center. Int J Secur Appl. 2013;7:315\u201320. https:\/\/doi.org\/10.14257\/ijsia.2013.7.5.29.","journal-title":"Int J Secur Appl"},{"key":"248_CR2","doi-asserted-by":"publisher","unstructured":"Hazazi H, Shehab M. Exploring end users\u2019 perceptions of smart lock automation within the smart home environment. In: Proceedings of the 2024 European Symposium on Usable Security (EuroUSEC \u201924), pp. 112\u2013124. Association for Computing Machinery, New York, NY, USA 2024. https:\/\/doi.org\/10.1145\/3688459.3688480","DOI":"10.1145\/3688459.3688480"},{"key":"248_CR3","doi-asserted-by":"publisher","DOI":"10.1111\/exsy.13726","author":"QA Al-Haija","year":"2025","unstructured":"Al-Haija QA, Droos A. A comprehensive survey on deep learning-based intrusion detection systems in internet of things (iot). Exp Syst. 2025. https:\/\/doi.org\/10.1111\/exsy.13726.","journal-title":"Exp Syst"},{"key":"248_CR4","doi-asserted-by":"publisher","first-page":"7973","DOI":"10.1016\/j.matpr.2021.02.708","volume":"46","author":"Y Motwani","year":"2021","unstructured":"Motwani Y, Seth S, Dixit D, Bagubali A, Rajesh R. Multifactor door locking systems: A review. Mater Today Proc. 2021;46:7973\u20139. https:\/\/doi.org\/10.1016\/j.matpr.2021.02.708.","journal-title":"Mater Today Proc"},{"key":"248_CR5","doi-asserted-by":"publisher","first-page":"5905","DOI":"10.1007\/s11276-023-03376-8","volume":"30","author":"C Caballero-Gil","year":"2024","unstructured":"Caballero-Gil C, \u00c1lvarez R, Hern\u00e1ndez-Goya C, et al. Research on smart-locks cybersecurity and vulnerabilities. Wirel Netw. 2024;30:5905\u201317. https:\/\/doi.org\/10.1007\/s11276-023-03376-8.","journal-title":"Wirel Netw"},{"key":"248_CR6","doi-asserted-by":"publisher","unstructured":"Almheiri S, Albreiki S, Alnuaimi H, Alhmoudi M, Almarzooqi S, Anajemba JH, Ababneh N, Ogbonnia OO. Exploring the efficiencies and vulnerabilities of smart door control systems: A systematic review. In: Koucheryavy, A. Yevgeniand\u00a0Aziz (ed.) Internet of Things, Smart Spaces, and Next Generation Networks and Systems, pp. 98\u2013110. Springer, Cham 2024. https:\/\/doi.org\/10.1007\/978-3-031-60994-7_9","DOI":"10.1007\/978-3-031-60994-7_9"},{"key":"248_CR7","doi-asserted-by":"publisher","DOI":"10.1016\/j.bcra.2025.100350","author":"M Rahmanikivi","year":"2025","unstructured":"Rahmanikivi M, P\u00e9rez-Sol\u00e0 C, Garcia-Font V. Smartblock: a smart lock protocol over the bitcoin blockchain. Blockchain. 2025. https:\/\/doi.org\/10.1016\/j.bcra.2025.100350.","journal-title":"Blockchain"},{"issue":"2","key":"248_CR8","doi-asserted-by":"publisher","first-page":"484","DOI":"10.53982\/ajerd.2024.0702.46-j","volume":"7","author":"M Adedoyin","year":"2024","unstructured":"Adedoyin M, Olukoya F. Development of a smart lock system using qr code technology. AJERD. 2024;7(2):484\u201392. https:\/\/doi.org\/10.53982\/ajerd.2024.0702.46-j.","journal-title":"AJERD"},{"issue":"2","key":"248_CR9","doi-asserted-by":"publisher","first-page":"73","DOI":"10.25077\/jnte.v14n2.1293.2025","volume":"14","author":"M Melinda","year":"2025","unstructured":"Melinda M, Yunidar Y, Khairia S, Miftahujjannah R, Sakarkar G, Basir N. Smart door locking system for children using hc-sr04 and iot technology. Jurnal Nasional Teknik Elektro. 2025;14(2):73\u201380. https:\/\/doi.org\/10.25077\/jnte.v14n2.1293.2025.","journal-title":"Jurnal Nasional Teknik Elektro"},{"issue":"4","key":"248_CR10","first-page":"20","volume":"4","author":"BV Sundawa","year":"2025","unstructured":"Sundawa BV, Amalia Batubara FA, Nasution TAT, Pardede M. Implementation of tracking system based on jt701 smart lock technology on goods delivery service vehicles. Int J Res Vocat Stud. 2025;4(4):20\u20136.","journal-title":"Int J Res Vocat Stud"},{"key":"248_CR11","doi-asserted-by":"publisher","unstructured":"Mainini AG, Pittau F, Casolari E, Majour MS, Cavagli\u00e0 M, Riva R, Amendola G, Speroni A, Cadena JDB, Poli T. Enabling sufficiency through smart locks: Transforming office occupancy and building management for energy savings. Buildings 2025;15. https:\/\/doi.org\/10.3390\/buildings15050669","DOI":"10.3390\/buildings15050669"},{"key":"248_CR12","doi-asserted-by":"publisher","first-page":"301","DOI":"10.14257\/ijca.2014.7.12.28","volume":"7","author":"H Kim","year":"2014","unstructured":"Kim H, Sung WL. NFC based user authentication method in smartwork environment. Int J Control Autom. 2014;7:301\u201310. https:\/\/doi.org\/10.14257\/ijca.2014.7.12.28.","journal-title":"Int J Control Autom"},{"key":"248_CR13","doi-asserted-by":"publisher","first-page":"61","DOI":"10.17706\/ijcce.2016.5.1.61-70","volume":"5","author":"J Ahn","year":"2016","unstructured":"Ahn J, Lee SW, Kim H. NFC based privacy preserving user authentication scheme in mobile office. Int J Comput Commun Eng. 2016;5:61\u201370. https:\/\/doi.org\/10.17706\/ijcce.2016.5.1.61-70.","journal-title":"Int J Comput Commun Eng"},{"key":"248_CR14","doi-asserted-by":"publisher","first-page":"309","DOI":"10.9717\/kmms.2013.16.3.309","volume":"16","author":"Y Woo","year":"2013","unstructured":"Woo Y, Kwak J. A study on USIM card based user and device authentication scheme in the smartwork. J Korea Multimed Soc. 2013;16:309\u201317. https:\/\/doi.org\/10.9717\/kmms.2013.16.3.309.","journal-title":"J Korea Multimed Soc"},{"key":"248_CR15","first-page":"1605","volume":"17","author":"HG Kim","year":"2014","unstructured":"Kim HG, Hong M, Lee IY. A study on one-time password authentication scheme in smart work. J Inf. 2014;17:1605\u201318.","journal-title":"J Inf"},{"key":"248_CR16","doi-asserted-by":"publisher","first-page":"333","DOI":"10.14257\/ijsh.2013.7.6.32","volume":"7","author":"SP Hong","year":"2013","unstructured":"Hong SP, Kang S, Kim J. Design and implementation of reliable content transaction system in smartphone environment. Int J Smart Home. 2013;7:333\u201342.","journal-title":"Int J Smart Home"},{"key":"248_CR17","doi-asserted-by":"publisher","first-page":"41","DOI":"10.7236\/JIIBC.2016.16.4.41","volume":"16","author":"JO Park","year":"2016","unstructured":"Park JO. A design of authentication method for secure communication based on wearable device. J Inst Int Broadcast Commun. 2016;16:41\u20136. https:\/\/doi.org\/10.7236\/JIIBC.2016.16.4.41.","journal-title":"J Inst Int Broadcast Commun"},{"issue":"1","key":"248_CR18","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3603705","volume":"56","author":"C-W Lien","year":"2023","unstructured":"Lien C-W, Vhaduri S. Challenges and opportunities of biometric user authentication in the age of iot: A survey. ACM Comput Surv. 2023;56(1):1\u201337. https:\/\/doi.org\/10.1145\/3603705.","journal-title":"ACM Comput Surv"},{"key":"248_CR19","doi-asserted-by":"publisher","unstructured":"Mittal P, Vashista H, Srivastava A. A novel technique to secure telemedicine using blockchain and visual cryptography. In: Chaturvedi, A.H., Roy, S.U., Vashista, B.K., Tsaban, B. (eds.) Cryptology and Network Security with Machine Learning, pp. 191\u2013214. Springer, Singapore 2024. https:\/\/doi.org\/10.1007\/978-981-97-0641-9_13","DOI":"10.1007\/978-981-97-0641-9_13"},{"key":"248_CR20","doi-asserted-by":"publisher","first-page":"319","DOI":"10.1007\/s10845-012-0651-8","volume":"25","author":"Y Kim","year":"2014","unstructured":"Kim Y, Chang H. The industrial security management model for SMBs in smart work. J Intell Manuf. 2014;25:319\u201327. https:\/\/doi.org\/10.1007\/s10845-012-0651-8.","journal-title":"J Intell Manuf"},{"key":"248_CR21","doi-asserted-by":"publisher","first-page":"691","DOI":"10.1007\/s10586-013-0251-1","volume":"17","author":"JM Kim","year":"2014","unstructured":"Kim JM, Jeong HY, Cho I, et al. A secure smart-work service model based openstack for cloud computing. Cluster Comput. 2014;17:691\u2013702. https:\/\/doi.org\/10.1007\/s10586-013-0251-1.","journal-title":"Cluster Comput"},{"key":"248_CR22","doi-asserted-by":"publisher","unstructured":"Lee J-P, Lee S-H, Lee J-G, Lee J-K. In: Lee, R. (ed.) Design of Device Mutual Authentication Protocol in Smart Home Environment, pp. 135\u2013148. Springer, Cham 2019. https:\/\/doi.org\/10.1007\/978-3-319-96806-3_10","DOI":"10.1007\/978-3-319-96806-3_10"},{"key":"248_CR23","doi-asserted-by":"publisher","unstructured":"Kim T, Kim H. A system for detection of abnormal behavior in BYOD based on web usage patterns. In: Proc. Int. Conf. Inf. Commun. Technol. Converg. (ICTC), pp. 1288\u20131293 2015. https:\/\/doi.org\/10.1109\/ICTC.2015.7354798","DOI":"10.1109\/ICTC.2015.7354798"},{"key":"248_CR24","unstructured":"Koh EB, Oh J, Im C. A study on security threats and dynamic access control technology for BYOD, smart-work environment. In: Proc. Int. MultiConf. Eng. Comput. Sci., vol. 2 2014."},{"key":"248_CR25","doi-asserted-by":"publisher","first-page":"37","DOI":"10.15207\/JKCS.2020.11.10.037","volume":"11","author":"SK Park","year":"2020","unstructured":"Park SK, Kim GB, Son GJ, Lee WS, Park JP. A study on a security model for the establishment of a non-face-to-face smart work working environment in a physical network separation environment of public institutions. J Korea Converg Soc. 2020;11:37\u201344. https:\/\/doi.org\/10.15207\/JKCS.2020.11.10.037.","journal-title":"J Korea Converg Soc"},{"key":"248_CR26","doi-asserted-by":"publisher","first-page":"8831","DOI":"10.1007\/s11042-013-1627-1","volume":"74","author":"GI Heo","year":"2015","unstructured":"Heo GI, Park YJ, Park WH. Vulnerability of information disclosure in data transfer section for constructing a safe smart work infrastructure. Multimed Tools Appl. 2015;74:8831\u201347. https:\/\/doi.org\/10.1007\/s11042-013-1627-1.","journal-title":"Multimed Tools Appl"},{"key":"248_CR27","doi-asserted-by":"publisher","unstructured":"Cho S-W, Jang W-J, Lee H-W. mvoip service attack and authentication mechanism on a smart work device. In: Proceedings of 2011 International Conference on Computer Science and Network Technology, vol. 1, pp. 482\u2013486 2011. https:\/\/doi.org\/10.1109\/ICCSNT.2011.6182001","DOI":"10.1109\/ICCSNT.2011.6182001"},{"key":"248_CR28","doi-asserted-by":"publisher","first-page":"43","DOI":"10.23919\/cje.2022.00.339","volume":"33","author":"BB Ehui","year":"2024","unstructured":"Ehui BB, Chen C, Wang S, Guo H, Liu J. A secure mutual authentication protocol based on visual cryptography technique for IoT-cloud. Chin J Electron. 2024;33:43\u201357. https:\/\/doi.org\/10.23919\/cje.2022.00.339.","journal-title":"Chin J Electron"},{"key":"248_CR29","doi-asserted-by":"publisher","unstructured":"Snober MA, Droos A, Al-Haija QA. Prevention of phishing website attacks in online banking systems using visual cryptography. In: 6th Smart Cities Symposium (SCS 2022), pp. 168\u2013173. IET, Hybrid Conference, Bahrain 2022. https:\/\/doi.org\/10.1049\/icp.2023.0391","DOI":"10.1049\/icp.2023.0391"},{"key":"248_CR30","doi-asserted-by":"publisher","unstructured":"Naor M, Shamir A. Visual cryptography. In: De\u00a0Santis, A. (ed.) Advances in Cryptology \u2014 EUROCRYPT\u201994, pp. 1\u201312. Springer, Berlin, Heidelberg 1995. https:\/\/doi.org\/10.1007\/BFb0053419","DOI":"10.1007\/BFb0053419"},{"key":"248_CR31","doi-asserted-by":"publisher","unstructured":"Cimato S, Yang JCN, Wu C-C. In: Shi, Y.Q., Liu, F., Yan, W. (eds.) Visual Cryptography Based Watermarking, pp. 91\u2013109. Springer, Berlin, Heidelberg 2014. https:\/\/doi.org\/10.1007\/978-3-642-55046-1_6","DOI":"10.1007\/978-3-642-55046-1_6"},{"key":"248_CR32","doi-asserted-by":"publisher","unstructured":"M A, CR, K. Decentralized trust: Visual cryptography for transparent e-voting solutions. In: 2024 International Conference on Innovative Computing, Intelligent Communication and Smart Electrical Systems (ICSES), pp. 1\u20137 2024. https:\/\/doi.org\/10.1109\/ICSES63760.2024.10910536","DOI":"10.1109\/ICSES63760.2024.10910536"},{"key":"248_CR33","doi-asserted-by":"publisher","first-page":"3227","DOI":"10.1007\/s41870-022-01029-1","volume":"14","author":"R Maurya","year":"2022","unstructured":"Maurya R, Rao GVE, Rajitha B. Visual cryptography for securing medical images using a combination of hyperchaotic based pixel, bit scrambling, and DNA encoding. Int J Inf Technol. 2022;14:3227\u201334. https:\/\/doi.org\/10.1007\/s41870-022-01029-1.","journal-title":"Int J Inf Technol"}],"container-title":["Discover Internet of Things"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s43926-025-00248-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s43926-025-00248-9\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s43926-025-00248-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T10:38:02Z","timestamp":1763462282000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s43926-025-00248-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,11,18]]},"references-count":33,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2025,12]]}},"alternative-id":["248"],"URL":"https:\/\/doi.org\/10.1007\/s43926-025-00248-9","relation":{},"ISSN":["2730-7239"],"issn-type":[{"value":"2730-7239","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,11,18]]},"assertion":[{"value":"31 July 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"24 October 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"18 November 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"Not applicable.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethics approval and consent to participate"}},{"value":"Not applicable.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent for publication"}},{"value":"The authors declare no competing interests.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"136"}}