{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,5]],"date-time":"2026-03-05T15:36:09Z","timestamp":1772724969860,"version":"3.50.1"},"reference-count":40,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"2","license":[{"start":{"date-parts":[[2020,2,1]],"date-time":"2020-02-01T00:00:00Z","timestamp":1580515200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2020,2,1]],"date-time":"2020-02-01T00:00:00Z","timestamp":1580515200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2020,2,1]],"date-time":"2020-02-01T00:00:00Z","timestamp":1580515200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61932016"],"award-info":[{"award-number":["61932016"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61822202"],"award-info":[{"award-number":["61822202"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61972294"],"award-info":[{"award-number":["61972294"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61772377"],"award-info":[{"award-number":["61772377"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61841701"],"award-info":[{"award-number":["61841701"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Opening Project of Guangdong Provincial Key Laboratory of Data Security and Privacy Protection","award":["B030301004-11"],"award-info":[{"award-number":["B030301004-11"]}]},{"name":"Cloud Technology Endowed Professorship"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Internet Things J."],"published-print":{"date-parts":[[2020,2]]},"DOI":"10.1109\/jiot.2019.2944400","type":"journal-article","created":{"date-parts":[[2019,10,1]],"date-time":"2019-10-01T03:31:18Z","timestamp":1569900678000},"page":"818-829","source":"Crossref","is-referenced-by-count":177,"title":["HomeChain: A Blockchain-Based Secure Mutual Authentication System for Smart Homes"],"prefix":"10.1109","volume":"7","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-0101-8531","authenticated-orcid":false,"given":"Chao","family":"Lin","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2446-7436","authenticated-orcid":false,"given":"Debiao","family":"He","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3020-3947","authenticated-orcid":false,"given":"Neeraj","family":"Kumar","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0070-1707","authenticated-orcid":false,"given":"Xinyi","family":"Huang","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5451-8946","authenticated-orcid":false,"given":"Pandi","family":"Vijayakumar","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9208-5336","authenticated-orcid":false,"given":"Kim-Kwang Raymond","family":"Choo","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/TR.2018.2850966"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-46568-5_53"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2016.2616861"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1145\/3054977.3055003"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/PERCOMW.2017.7917634"},{"key":"ref30","first-page":"1","article-title":"Blockchain in Internet of Things: Challenges and solutions","volume":"abs 1608 5187","author":"dorri","year":"2016","journal-title":"CoRR"},{"key":"ref37","first-page":"173","article-title":"Practical Byzantine fault tolerance","author":"castro","year":"1999","journal-title":"Proc of USENIX Symp on Operating Systems Design and Implementation (OSDI)"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1142\/S0129054115500343"},{"key":"ref35","first-page":"13","article-title":"Guide to elliptic curve cryptography","volume":"46","author":"hankerson","year":"2005","journal-title":"Comput Rev"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2016.2573746"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.17487\/rfc1760"},{"key":"ref40","first-page":"319","article-title":"Pairing-friendly elliptic curves of prime order","author":"barreto","year":"2005","journal-title":"Proc 12th Ann Workshop Selected Areas in Cryptography (SAC)"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2008.02.002"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2010.03.013"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.17487\/rfc4226"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/11506157_41"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1002\/dac.1268"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2012.03.017"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2018.2882794"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/ICCNC.2018.8390280"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2018.05.005"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2016.7510879"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1002\/spe.2414"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1002\/wcm.2562"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2018.03.024"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2008.080128"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2012.12.018"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2016.2578285"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/11814856_48"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/SUTC.2006.1636182"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/MCE.2016.2556879"},{"key":"ref9","first-page":"101","article-title":"Password authentication schemes: Current status and key issues","volume":"3","author":"tsai","year":"2006","journal-title":"Int J Netw Security"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2677520"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2018.06.004"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1006\/jcss.1999.1694"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-46416-6_22"},{"key":"ref24","doi-asserted-by":"crossref","first-page":"32","DOI":"10.1007\/978-3-319-26823-1_3","article-title":"Privacy-aware authentication in the Internet of Things","author":"gro\u00df","year":"2015","journal-title":"Proc 4th Int Conf Cryptol Netw Security (CANS)"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/WF-IoT.2014.6803122"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2008.ECP.378"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOMW.2014.6849186"}],"container-title":["IEEE Internet of Things Journal"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6488907\/8994209\/08852713.pdf?arnumber=8852713","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,4,27]],"date-time":"2022-04-27T17:27:25Z","timestamp":1651080445000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8852713\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,2]]},"references-count":40,"journal-issue":{"issue":"2"},"URL":"https:\/\/doi.org\/10.1109\/jiot.2019.2944400","relation":{},"ISSN":["2327-4662","2372-2541"],"issn-type":[{"value":"2327-4662","type":"electronic"},{"value":"2372-2541","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,2]]}}}