{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,6]],"date-time":"2026-01-06T13:34:30Z","timestamp":1767706470218,"version":"build-2065373602"},"reference-count":42,"publisher":"Institution of Engineering and Technology (IET)","issue":"1","license":[{"start":{"date-parts":[[2023,12,18]],"date-time":"2023-12-18T00:00:00Z","timestamp":1702857600000},"content-version":"vor","delay-in-days":351,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62272378"],"award-info":[{"award-number":["62272378"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100015401","name":"Key Research and Development Projects of Shaanxi Province","doi-asserted-by":"publisher","award":["2022ZDLSF07-07"],"award-info":[{"award-number":["2022ZDLSF07-07"]}],"id":[{"id":"10.13039\/501100015401","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100018542","name":"Natural Science Foundation of Sichuan Province","doi-asserted-by":"publisher","award":["2023NSFSC0502"],"award-info":[{"award-number":["2023NSFSC0502"]}],"id":[{"id":"10.13039\/501100018542","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["ietresearch.onlinelibrary.wiley.com"],"crossmark-restriction":true},"short-container-title":["IET Information Security"],"published-print":{"date-parts":[[2023,1]]},"abstract":"<jats:p>\n                    Anonymous data exchange is in great demand in many situations, especially in remote control systems, in which a stable, secure, and secret data channel must be established between the controlling and controlled parties to distribute control commands and return data. In the previous work, we built a two\u2010level\n                    <jats:italic>Virtual-Space<\/jats:italic>\n                    anonymous communication scheme based on the Crowds System for performing secret data exchange in remote control systems. However, as an essential part of security and anonymity, participating nodes\u2019 identity declaration and session key agreement phases were not well designed. In this paper, we redesign the identity agreement and declaration process and design an identity\u2010based\n                    <jats:italic>Virtual-Space<\/jats:italic>\n                    agreement method using the extended Chebyshev Chaotic Maps. In this approach, we transform the identity declaration process into a multilevel\n                    <jats:italic>Virtual-Space<\/jats:italic>\n                    agreement problem, where a series of security\u2010progressive\n                    <jats:italic>Virtual-Space<\/jats:italic>\n                    addresses are negotiated between the controller and the controlled nodes. The protocol can handle the case where there are multiple controllers in the system, and the negotiated\n                    <jats:italic>Virtual-Space<\/jats:italic>\n                    depends on the identity of the controller and the controlled node, so different controllers do not affect each other. The designed protocol is verified on Freenet, and we conclude this paper with a detailed security analysis of the method to prove that the method satisfies forward security.\n                  <\/jats:p>","DOI":"10.1049\/2023\/8234537","type":"journal-article","created":{"date-parts":[[2023,12,18]],"date-time":"2023-12-18T19:50:07Z","timestamp":1702929007000},"update-policy":"https:\/\/doi.org\/10.1002\/crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["A Secure Anonymous Identity\u2010Based Virtual\u2010Space Agreement Method for Crowds\u2010Based Anonymous Communicate Scheme"],"prefix":"10.1049","volume":"2023","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-8983-4049","authenticated-orcid":false,"given":"Kai","family":"Lin","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8880-581X","authenticated-orcid":false,"given":"Kaiyu","family":"Wang","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6859-3410","authenticated-orcid":false,"given":"Jin","family":"Shang","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2019-7886","authenticated-orcid":false,"given":"Qindong","family":"Sun","sequence":"additional","affiliation":[]}],"member":"265","published-online":{"date-parts":[[2023,12,18]]},"reference":[{"key":"e_1_2_12_1_2","unstructured":"ConradB.andShiraziF. A survey on tor and i2p Ninth International Conference on Internet Monitoring and Protection (ICIMP2014) 2014 ICIMP 22\u201328."},{"key":"e_1_2_12_2_2","doi-asserted-by":"publisher","DOI":"10.1145\/358549.358563"},{"key":"e_1_2_12_3_2","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-44702-4_4"},{"key":"e_1_2_12_4_2","doi-asserted-by":"publisher","DOI":"10.1145\/290163.290168"},{"key":"e_1_2_12_5_2","doi-asserted-by":"publisher","DOI":"10.1145\/3508392"},{"key":"e_1_2_12_6_2","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2021.3078175"},{"volume-title":"Physics in biology and medicine","year":"2018","author":"Davidovits P.","key":"e_1_2_12_7_2"},{"key":"e_1_2_12_8_2","doi-asserted-by":"publisher","DOI":"10.1109\/TCSI.2005.851701"},{"key":"e_1_2_12_9_2","first-page":"1","article-title":"Generating dynamical s-boxes using 1d Chebyshev chaotic maps","volume":"7","author":"Shakiba A.","year":"2020","journal-title":"Journal of Computing and Security"},{"key":"e_1_2_12_10_2","doi-asserted-by":"publisher","DOI":"10.1080\/19393555.2018.1458258"},{"key":"e_1_2_12_11_2","doi-asserted-by":"publisher","DOI":"10.1007\/s11071-011-0247-4"},{"key":"e_1_2_12_12_2","doi-asserted-by":"publisher","DOI":"10.1016\/S0960-0779(04)00387-X"},{"key":"e_1_2_12_13_2","first-page":"4815","article-title":"Efficient anonymous password-authenticated key exchange protocol to read isolated smart meters by utilization of extended Chebyshev chaotic maps","volume":"14","author":"Abbasinezhad-Mood D.","year":"2018","journal-title":"IEEE Transactions on Industrial Informatics"},{"key":"e_1_2_12_14_2","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2020.2997694"},{"key":"e_1_2_12_15_2","doi-asserted-by":"publisher","DOI":"10.1002\/ett.4752"},{"key":"e_1_2_12_16_2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3002558"},{"key":"e_1_2_12_17_2","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2015.2471095"},{"key":"e_1_2_12_18_2","doi-asserted-by":"publisher","DOI":"10.1007\/s00500-018-3112-2"},{"key":"e_1_2_12_19_2","doi-asserted-by":"publisher","DOI":"10.1007\/s11227-021-04280-8"},{"key":"e_1_2_12_20_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-19-7892-0_40"},{"key":"e_1_2_12_21_2","doi-asserted-by":"publisher","DOI":"10.3390\/s21217227"},{"key":"e_1_2_12_22_2","doi-asserted-by":"publisher","DOI":"10.1007\/s00034-005-2403-x"},{"key":"e_1_2_12_23_2","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2010.148"},{"key":"e_1_2_12_24_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2011.07.008"},{"key":"e_1_2_12_25_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.chaos.2006.09.047"},{"key":"e_1_2_12_26_2","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-44987-6_28"},{"key":"e_1_2_12_27_2","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-44702-4_1"},{"key":"e_1_2_12_28_2","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-36467-6_5"},{"key":"e_1_2_12_29_2","unstructured":"PfitzmannA.andHansenM. A terminology for talking about privacy by data minimization: Anonymity unlinkability undetectability unobservability pseudonymity and identity management 2010 Dresden Germany."},{"key":"e_1_2_12_30_2","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-36467-6_4"},{"key":"e_1_2_12_31_2","doi-asserted-by":"crossref","unstructured":"ShmatikovV.andWangM. H. Measuring relationship anonymity in mix networks Proceedings of the 5th ACM Workshop on Privacy in Electronic Society 2006 Association for Computing Machinery 59\u201362 https:\/\/doi.org\/10.1145\/1179601.1179611 2-s2.0-84885205648.","DOI":"10.1145\/1179601.1179611"},{"key":"e_1_2_12_32_2","doi-asserted-by":"crossref","unstructured":"Clau\u00dfS.andSchiffnerS. Structuring anonymity metrics Proceedings of the Second ACM Workshop on Digital Identity Management 2006 Association for Computing Machinery 55\u201362 https:\/\/doi.org\/10.1145\/1179529.1179539 2-s2.0-34547490882.","DOI":"10.1145\/1179529.1179539"},{"key":"e_1_2_12_33_2","doi-asserted-by":"crossref","unstructured":"DiazC. TroncosoC. andDanezisG. Does additional information always reduce anonymity? Proceedings of the 2007 ACM Workshop on Privacy in Electronic Society 2007 Association for Computing Machinery 72\u201375.","DOI":"10.1145\/1314333.1314347"},{"key":"e_1_2_12_34_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-75227-1_5"},{"key":"e_1_2_12_35_2","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2022.3181848"},{"key":"e_1_2_12_36_2","doi-asserted-by":"crossref","unstructured":"CaoF.andWeiW. User anonymous authentication key exchange protocol based on biometrics and password 2022 IEEE 6th Advanced Information Technology Electronic and Automation Control Conference (IAEAC) 2022 IEEE 1344\u20131350 https:\/\/doi.org\/10.1109\/IAEAC54830.2022.9929639.","DOI":"10.1109\/IAEAC54830.2022.9929639"},{"key":"e_1_2_12_37_2","doi-asserted-by":"crossref","unstructured":"TedeschiP. SciancaleporeS. andDi.PietroR. Arid: Anonymous remote identification of unmanned aerial vehicles Proceedings of the 37th Annual Computer Security Applications Conference 2021 Association for Computing Machinery 207\u2013218 https:\/\/doi.org\/10.1145\/3485832.3485834.","DOI":"10.1145\/3485832.3485834"},{"key":"e_1_2_12_38_2","doi-asserted-by":"crossref","unstructured":"ChienH.-Y. Highly efficient anonymous iot authentication using composite hashing 2021 IEEE Conference on Dependable and Secure Computing (DSC) 2021 IEEE 1\u20137 https:\/\/doi.org\/10.1109\/DSC49826.2021.9346263.","DOI":"10.1109\/DSC49826.2021.9346263"},{"key":"e_1_2_12_39_2","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-46885-4_5"},{"key":"e_1_2_12_40_2","doi-asserted-by":"publisher","DOI":"10.1093\/comjnl\/bxaa104"},{"key":"e_1_2_12_41_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-25937-4_24"},{"key":"e_1_2_12_42_2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3149315"}],"container-title":["IET Information Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/downloads.hindawi.com\/journals\/ietis\/2023\/8234537.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/ietis\/2023\/8234537.xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/ietresearch.onlinelibrary.wiley.com\/doi\/pdf\/10.1049\/2023\/8234537","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,5]],"date-time":"2025-11-05T16:50:00Z","timestamp":1762361400000},"score":1,"resource":{"primary":{"URL":"https:\/\/ietresearch.onlinelibrary.wiley.com\/doi\/10.1049\/2023\/8234537"}},"subtitle":[],"editor":[{"given":"Hyun-A","family":"Park","sequence":"additional","affiliation":[]}],"short-title":[],"issued":{"date-parts":[[2023,1]]},"references-count":42,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2023,1]]}},"alternative-id":["10.1049\/2023\/8234537"],"URL":"https:\/\/doi.org\/10.1049\/2023\/8234537","archive":["Portico"],"relation":{},"ISSN":["1751-8709","1751-8717"],"issn-type":[{"type":"print","value":"1751-8709"},{"type":"electronic","value":"1751-8717"}],"subject":[],"published":{"date-parts":[[2023,1]]},"assertion":[{"value":"2023-05-31","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2023-11-30","order":2,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2023-12-18","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}],"article-number":"8234537"}}