{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,8]],"date-time":"2025-09-08T05:57:32Z","timestamp":1757311052663,"version":"3.37.3"},"reference-count":36,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"2","license":[{"start":{"date-parts":[[2020,2,1]],"date-time":"2020-02-01T00:00:00Z","timestamp":1580515200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2020,2,1]],"date-time":"2020-02-01T00:00:00Z","timestamp":1580515200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2020,2,1]],"date-time":"2020-02-01T00:00:00Z","timestamp":1580515200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100012166","name":"National Basic Research Program of China","doi-asserted-by":"publisher","award":["2017YFB0802000"],"award-info":[{"award-number":["2017YFB0802000"]}],"id":[{"id":"10.13039\/501100012166","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61972159","61572198"],"award-info":[{"award-number":["61972159","61572198"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100012226","name":"Fundamental Research Funds for the Central Universities","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100012226","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Internet Things J."],"published-print":{"date-parts":[[2020,2]]},"DOI":"10.1109\/jiot.2019.2948622","type":"journal-article","created":{"date-parts":[[2019,10,22]],"date-time":"2019-10-22T20:09:45Z","timestamp":1571774985000},"page":"1039-1047","source":"Crossref","is-referenced-by-count":18,"title":["Key-Free Authentication Protocol Against Subverted Indoor Smart Devices for Smart Home"],"prefix":"10.1109","volume":"7","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-7220-2021","authenticated-orcid":false,"given":"Zhigang","family":"Huang","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8786-4562","authenticated-orcid":false,"given":"Lei","family":"Zhang","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1352-4893","authenticated-orcid":false,"given":"Xinyu","family":"Meng","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9208-5336","authenticated-orcid":false,"given":"Kim-Kwang Raymond","family":"Choo","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/TIE.2019.2912789"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2008.ECP.378"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2016.7510879"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1002\/wcm.2562"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1007\/s00779-012-0541-2"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/TR.2018.2850966"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/TIE.2018.2807383"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/CICSYN.2013.42"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2868920"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2018.2797190"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2017.2705763"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/JSEN.2015.2475298"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2019.01.073"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2017.10.008"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/TCC.2019.2903254"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/TSC.2019.2937764"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1002\/dac.3507"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1016\/j.vehcom.2019.03.003"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/TCE.2011.6018903"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2017.02.017"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/ICRCCS.2009.70"},{"journal-title":"Thrangrycat Flaw Lets Attackers Plant Persistent Backdoors on Cisco Gear","year":"2019","author":"cimpanu","key":"ref6"},{"journal-title":"Hashcash - a denial of service counter-measure","year":"2002","author":"back","key":"ref29"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2018.03.024"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2018.2850299"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2017.2787800"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2018.2805896"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/ICCE.2011.5722864"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2018.2844837"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2016.2579162"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-03356-8_23"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/3196494.3196499"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1007\/11681878_12"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1007\/BF00191321"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1007\/11818175_15"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1007\/11681878_11"}],"container-title":["IEEE Internet of Things Journal"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6488907\/8994209\/08879569.pdf?arnumber=8879569","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,4,27]],"date-time":"2022-04-27T17:27:25Z","timestamp":1651080445000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8879569\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,2]]},"references-count":36,"journal-issue":{"issue":"2"},"URL":"https:\/\/doi.org\/10.1109\/jiot.2019.2948622","relation":{},"ISSN":["2327-4662","2372-2541"],"issn-type":[{"type":"electronic","value":"2327-4662"},{"type":"electronic","value":"2372-2541"}],"subject":[],"published":{"date-parts":[[2020,2]]}}}