{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,16]],"date-time":"2026-01-16T02:17:55Z","timestamp":1768529875535,"version":"3.49.0"},"reference-count":38,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"1","license":[{"start":{"date-parts":[[2018,2,1]],"date-time":"2018-02-01T00:00:00Z","timestamp":1517443200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"funder":[{"DOI":"10.13039\/501100003725","name":"National Research Foundation of the Korean Government","doi-asserted-by":"publisher","award":["2016R1D1A1B03932149"],"award-info":[{"award-number":["2016R1D1A1B03932149"]}],"id":[{"id":"10.13039\/501100003725","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Internet Things J."],"published-print":{"date-parts":[[2018,2]]},"DOI":"10.1109\/jiot.2017.2780232","type":"journal-article","created":{"date-parts":[[2017,12,6]],"date-time":"2017-12-06T19:19:23Z","timestamp":1512587963000},"page":"269-282","source":"Crossref","is-referenced-by-count":354,"title":["Design of Secure User Authenticated Key Management Protocol for Generic IoT Networks"],"prefix":"10.1109","volume":"5","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-9898-0921","authenticated-orcid":false,"given":"Mohammad","family":"Wazid","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5196-9589","authenticated-orcid":false,"given":"Ashok Kumar","family":"Das","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6903-0361","authenticated-orcid":false,"given":"Vanga","family":"Odelu","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3020-3947","authenticated-orcid":false,"given":"Neeraj","family":"Kumar","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3612-1934","authenticated-orcid":false,"given":"Mauro","family":"Conti","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7311-6459","authenticated-orcid":false,"given":"Minho","family":"Jo","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref38","doi-asserted-by":"crossref","first-page":"30","DOI":"10.1109\/TCE.2014.6780922","article-title":"Enhanced three-factor security protocol for consumer USB mass storage devices","volume":"60","author":"he","year":"2014","journal-title":"IEEE Trans Consum Electron"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/JBHI.2017.2721545"},{"key":"ref32","year":"2016","journal-title":"Automated Validation of Internet Security Protocols and Applications"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2017.2732999"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2723265"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2007.12.005"},{"key":"ref36","year":"1995","journal-title":"Secure Hash Standard"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1007\/s12083-014-0285-z"},{"key":"ref34","year":"2016","journal-title":"AVISPA SPAN the Security Protocol Animator for AVISPA"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/ISCC.2013.6754963"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/UComms.2016.7583466"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1007\/s12083-014-0324-9"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2016.04.016"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2015.02.010"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.3390\/s130809589"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/WCNC.2014.6952860"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2014.03.009"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2015.2473165"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1002\/sec.1573"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-30580-4_6"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/ISSNIP.2014.6827681"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1016\/j.cmpb.2016.07.028"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1007\/s11036-017-0870-5"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2005.01.004"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1002\/sec.1591"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.3390\/s120708782"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/1868812.1868822"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2017.2707489"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2017.08.052"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2012.03.011"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2676119"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1983.1056650"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/1880022.1880027"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2002.1004593"},{"key":"ref24","year":"2001","journal-title":"Advanced Encryption Standard (AES)"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1007\/s10916-011-9700-7"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1007\/s10916-014-0016-2"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2015.2439964"}],"container-title":["IEEE Internet of Things Journal"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6488907\/8288638\/08168328.pdf?arnumber=8168328","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,12]],"date-time":"2022-01-12T16:27:43Z","timestamp":1642004863000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/8168328\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,2]]},"references-count":38,"journal-issue":{"issue":"1"},"URL":"https:\/\/doi.org\/10.1109\/jiot.2017.2780232","relation":{},"ISSN":["2327-4662"],"issn-type":[{"value":"2327-4662","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,2]]}}}