{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,5]],"date-time":"2026-02-05T11:36:58Z","timestamp":1770291418227,"version":"3.49.0"},"reference-count":16,"publisher":"Oxford University Press (OUP)","issue":"1","license":[{"start":{"date-parts":[[2025,4,7]],"date-time":"2025-04-07T00:00:00Z","timestamp":1743984000000},"content-version":"vor","delay-in-days":96,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,1,17]]},"abstract":"<jats:title>Abstract<\/jats:title>\n               <jats:p>The Internet of Things (IoT) comprises a complex network of smart objects that collect and exchange data with each other via the public Internet. Radio-frequency identification (RFID) technology is currently one of the most important IoT technologies. To achieve the goal of intelligent management of items, radio-frequency identification tags retain messages gathered by the reader before transmitting them to the backend system processing and analysis. This creates a vast knowledge network. Considering that, personal information and privacy exposure, malicious tracking, and counterfeiting behaviours remain unresolved issues in the security area, we provide a lattice-based authentication technique in this research. The proposed lattice-based lightweight anonymous authentication protocol (LBAA) was based on the Inhomogeneous Small Integer Solution (ISIS) problem, which aids in resistance to quantum attacks. Additionally, the features of unforgeability, scalability, mutual authentication, availability, and perfect forward secrecy were attained. LBAA protocol offered anonymity and untraceability to both an adversary and an honest-but-curious backend server. The suggested approach provided defence against man-in-the-middle attacks tags collaboration attacks desynchronization attacks, track and trace attacks, and replay and impersonation attacks. To achieve this, we analyse the proposed protocol using both informal and formal analysis methods, such as the Real-or-Random (ROR) model and Scyther tools. Additionally, effectiveness of the proposed technique was compared to current studies.<\/jats:p>","DOI":"10.1093\/cybsec\/tyaf004","type":"journal-article","created":{"date-parts":[[2025,4,7]],"date-time":"2025-04-07T17:13:47Z","timestamp":1744046027000},"source":"Crossref","is-referenced-by-count":2,"title":["A post-quantum lattice-based lightweight anonymous authentication scheme for IoT"],"prefix":"10.1093","volume":"11","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-4359-9901","authenticated-orcid":false,"given":"Sadra","family":"Fathenojavan","sequence":"first","affiliation":[{"name":"Department of Algorithms and Computation, School of Engineering Science, College of Engineering, University of Tehran , Tehran 1417614411 ,","place":["Iran"]}]},{"given":"Ali","family":"Moeini","sequence":"additional","affiliation":[{"name":"Department of Algorithms and Computation, School of Engineering Science, College of Engineering, University of Tehran , Tehran 1417614411 ,","place":["Iran"]}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0082-036X","authenticated-orcid":false,"given":"Hamid Haj Seyyed","family":"Javadi","sequence":"additional","affiliation":[{"name":"Department of Computer Engineering, University of Shahed , Tehran 1417614411 ,","place":["Iran"]}]}],"member":"286","published-online":{"date-parts":[[2025,4,7]]},"reference":[{"key":"2025040714292248200_bib1","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/s42400-021-00104-7","article-title":"A decade of research on patterns and architectures for IoT security","volume":"5","author":"Rajmohan","year":"2022","journal-title":"Cybersecurity"},{"key":"2025040714292248200_bib2","doi-asserted-by":"publisher","first-page":"489","DOI":"10.3390\/s22020489","article-title":"A comparative study of post-quantum cryptosystems for Internet-of-Things applications","volume":"22","author":"Septien-Hernandez","year":"2022","journal-title":"Sensors"},{"key":"2025040714292248200_bib3","article-title":"Lighting the way to a smart world: lattice-based cryptography for Internet of Things","author":"Xu","year":"2018"},{"key":"2025040714292248200_bib4","doi-asserted-by":"publisher","first-page":"e200","DOI":"10.1002\/spy2.200","article-title":"Securing the future Internet of Things with post-quantum cryptography","volume":"5","author":"Kumar","year":"2022","journal-title":"Secur Priv"},{"key":"2025040714292248200_bib5","first-page":"70","article-title":"Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer","volume":"31","author":"Greenwell","year":"2000","journal-title":"Coll Math J"},{"key":"2025040714292248200_bib6","doi-asserted-by":"crossref","first-page":"228","DOI":"10.1007\/978-981-16-7502-7_25","article-title":"A lattice-based anonymous authentication for privacy protection of medical data","volume-title":"Proceedings of the International Conference on Data Mining and Big Data","author":"Cui","year":"2021"},{"key":"2025040714292248200_bib7","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/s42400-022-00122-z","article-title":"A fully dynamic forward-secure group signature from lattice","volume":"5","author":"Liao","year":"2022","journal-title":"Cybersecurity"},{"key":"2025040714292248200_bib8","doi-asserted-by":"publisher","first-page":"103053","DOI":"10.1016\/j.jisa.2021.103053","article-title":"A new lattice-based authentication scheme for IoT","volume":"64","author":"Akleylek","year":"2022","journal-title":"J Inf Secur Appl"},{"key":"2025040714292248200_bib9","doi-asserted-by":"publisher","first-page":"155014771986222","DOI":"10.1177\/1550147719862223","article-title":"An radio-frequency identification security authentication mechanism for Internet of Things applications","volume":"15","author":"Wu","year":"2019","journal-title":"Int J Distrib Sens Netw"},{"key":"2025040714292248200_bib10","doi-asserted-by":"publisher","first-page":"100","DOI":"10.1016\/j.procs.2016.02.017","article-title":"A secure authentication scheme for RFID systems","volume":"78","author":"Dass","year":"2016","journal-title":"Proc Comput Sci"},{"key":"2025040714292248200_bib11","doi-asserted-by":"publisher","first-page":"69","DOI":"10.1016\/j.comcom.2021.09.031","article-title":"Post-quantum lightweight identity-based two-party authenticated key exchange protocol for Internet of Vehicles with probable security","volume":"181","author":"Gupta","year":"2022","journal-title":"Comput Commun"},{"key":"2025040714292248200_bib12","doi-asserted-by":"publisher","first-page":"283","DOI":"10.1561\/0400000074","article-title":"A decade of lattice cryptography","volume":"10","author":"Peikert","year":"2016","journal-title":"FNT Theoret Comput Sci"},{"key":"2025040714292248200_bib13","doi-asserted-by":"crossref","first-page":"99","DOI":"10.1145\/237814.237838","article-title":"Generating hard instances of lattice problems","volume-title":"Proceedings of the Twenty-Eighth Annual ACM Symposium on Theory of Computing","author":"Ajtai","year":"1996"},{"key":"2025040714292248200_bib14","doi-asserted-by":"publisher","first-page":"e3255","DOI":"10.1002\/ett.3255","article-title":"Design of lattice-based ElGamal encryption and signature schemes using SIS problem","volume":"29","author":"Gupta","year":"2018","journal-title":"Trans Emerg Tel Tech"},{"key":"2025040714292248200_bib15","doi-asserted-by":"publisher","first-page":"43","DOI":"10.54644\/jte.2024.1523","article-title":"Advancing security protocol verification: a comparative study of Scyther, Tamarin","volume":"19","author":"Le","year":"2024","journal-title":"JTE"},{"key":"2025040714292248200_bib16","first-page":"279","article-title":"Improved straight-line extraction in the random oracle model with applications to signature aggregation","volume-title":"Proceedings of the International Conference on the Theory and Application of Cryptology and Information Security","author":"Kondi","year":"2022"}],"container-title":["Journal of Cybersecurity"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/academic.oup.com\/cybersecurity\/article-pdf\/11\/1\/tyaf004\/62883686\/tyaf004.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/academic.oup.com\/cybersecurity\/article-pdf\/11\/1\/tyaf004\/62883686\/tyaf004.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,4,7]],"date-time":"2025-04-07T17:14:18Z","timestamp":1744046058000},"score":1,"resource":{"primary":{"URL":"https:\/\/academic.oup.com\/cybersecurity\/article\/doi\/10.1093\/cybsec\/tyaf004\/8107703"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"references-count":16,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2025,1,17]]}},"URL":"https:\/\/doi.org\/10.1093\/cybsec\/tyaf004","relation":{},"ISSN":["2057-2085","2057-2093"],"issn-type":[{"value":"2057-2085","type":"print"},{"value":"2057-2093","type":"electronic"}],"subject":[],"published-other":{"date-parts":[[2025]]},"published":{"date-parts":[[2025]]},"article-number":"tyaf004"}}