{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,1]],"date-time":"2025-10-01T16:20:03Z","timestamp":1759335603545,"version":"3.37.3"},"reference-count":136,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"16","license":[{"start":{"date-parts":[[2021,8,15]],"date-time":"2021-08-15T00:00:00Z","timestamp":1628985600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2021,8,15]],"date-time":"2021-08-15T00:00:00Z","timestamp":1628985600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,8,15]],"date-time":"2021-08-15T00:00:00Z","timestamp":1628985600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62072351","62002273","61802293"],"award-info":[{"award-number":["62072351","62002273","61802293"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100002858","name":"Project funded by China Postdoctoral Science Foundation","doi-asserted-by":"publisher","award":["2018M633461","2019M663631"],"award-info":[{"award-number":["2018M633461","2019M663631"]}],"id":[{"id":"10.13039\/501100002858","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100012152","name":"National Postdoctoral Program for Innovative Talents","doi-asserted-by":"publisher","award":["BX20180238"],"award-info":[{"award-number":["BX20180238"]}],"id":[{"id":"10.13039\/501100012152","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100002341","name":"Academy of Finland","doi-asserted-by":"publisher","award":["308087","335262"],"award-info":[{"award-number":["308087","335262"]}],"id":[{"id":"10.13039\/501100002341","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Shaanxi Innovation Team project","award":["2018TD-007"],"award-info":[{"award-number":["2018TD-007"]}]},{"DOI":"10.13039\/501100007128","name":"Science and Technology Planning Project of Shaanxi Province","doi-asserted-by":"publisher","award":["2020JQ-308"],"award-info":[{"award-number":["2020JQ-308"]}],"id":[{"id":"10.13039\/501100007128","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100013314","name":"111 Project","doi-asserted-by":"publisher","award":["B16037"],"award-info":[{"award-number":["B16037"]}],"id":[{"id":"10.13039\/501100013314","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100003816","name":"Huawei Technologies Group Company Ltd","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100003816","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Internet Things J."],"published-print":{"date-parts":[[2021,8,15]]},"DOI":"10.1109\/jiot.2021.3068463","type":"journal-article","created":{"date-parts":[[2021,3,24]],"date-time":"2021-03-24T20:11:00Z","timestamp":1616616660000},"page":"12855-12879","source":"Crossref","is-referenced-by-count":37,"title":["Is 5G Handover Secure and Private? A Survey"],"prefix":"10.1109","volume":"8","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-8966-9218","authenticated-orcid":false,"given":"Dongsheng","family":"Zhao","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9697-2108","authenticated-orcid":false,"given":"Zheng","family":"Yan","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1020-3915","authenticated-orcid":false,"given":"Mingjun","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Peng","family":"Zhang","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8096-3370","authenticated-orcid":false,"given":"Bin","family":"Song","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/Trustcom.2015.499"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2009.12"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243807"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/35.620533"},{"year":"2010","key":"ref31","article-title":"Network architecture; Architecture, detailed protocols and procedures; Wi-Fi-WiMAX interworking"},{"journal-title":"Wi-Fi Alliance Introduces Wi-Fi 6","year":"2021","key":"ref30"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2016.2548426"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4419-5906-5"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/CICN.2014.169"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2002.1007415"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1145\/2462096.2462110"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOMW.2007.4437813"},{"year":"2018","key":"ref29"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2937405"},{"year":"0","key":"ref22"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2013.082713.00141"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2019.2951818"},{"year":"2019","key":"ref23"},{"key":"ref101","doi-asserted-by":"publisher","DOI":"10.1007\/s11235-018-0446-0"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2019.23442"},{"key":"ref100","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-44987-6_28"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-04762-7_6"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2012.081612.112070"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-44647-8_13"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2019.2916593"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2017.8254719"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1109\/ICICSP.2018.8549809"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2016.7510994"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2015.7081072"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2014.2371999"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2010.39"},{"year":"2015","key":"ref52"},{"article-title":"Formal verification of probabilistic systems","year":"1997","author":"de alfaro","key":"ref40"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2017.2692307"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2016.2579198"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/ICCW.2016.7503785"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.001.1900662"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/35.312842"},{"key":"ref49","first-page":"5308","article-title":"Unified handover authentication between heterogeneous access systems in LTE networks","author":"cao","year":"2012","journal-title":"Proc IEEE Global Commun Conf (GLOBECOM)"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/VTCSpring.2014.7022933"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/3317549.3324927"},{"year":"2006","key":"ref46"},{"year":"2019","key":"ref45"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2009.4907409"},{"year":"2018","key":"ref47"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2016.2598968"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2018.2878035"},{"year":"2019","key":"ref44"},{"journal-title":"Intelligent physical layer security approach for V2X communication","year":"2019","author":"furqan","key":"ref43"},{"key":"ref127","doi-asserted-by":"publisher","DOI":"10.1109\/WCNC.2008.447"},{"key":"ref126","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-10847-1_16"},{"key":"ref125","doi-asserted-by":"publisher","DOI":"10.1007\/s11276-016-1277-0"},{"key":"ref124","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2015.7113232"},{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2014.6883452"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2017.11.009"},{"key":"ref129","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2015.2399291"},{"key":"ref71","first-page":"1017","article-title":"A group-based authentication and key agreement for MTC in LTE networks","author":"cao","year":"2012","journal-title":"Proc IEEE Global Commun Conf (GLOBECOM)"},{"key":"ref128","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2012.6363795"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1007\/s13369-018-3255-6"},{"key":"ref76","doi-asserted-by":"publisher","DOI":"10.1145\/1506270.1506380"},{"key":"ref130","doi-asserted-by":"publisher","DOI":"10.1109\/HPCC-SmartCity-DSS.2017.54"},{"key":"ref77","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2004.842941"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2008.4492975"},{"key":"ref75","doi-asserted-by":"publisher","DOI":"10.1109\/APSCC.2008.194"},{"key":"ref133","doi-asserted-by":"publisher","DOI":"10.1109\/CSE-EUC.2017.197"},{"key":"ref134","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45682-1_30"},{"key":"ref131","doi-asserted-by":"publisher","DOI":"10.1109\/NTMS.2018.8328700"},{"key":"ref78","doi-asserted-by":"publisher","DOI":"10.1109\/CHINACOM.2009.5339967"},{"key":"ref132","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3016945"},{"key":"ref79","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-012-0828-7"},{"key":"ref136","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2018.2863956"},{"year":"2018","key":"ref135"},{"key":"ref60","first-page":"558","article-title":"Using sparse capabilities in a distributed operating system","author":"tanenbaum","year":"1986","journal-title":"Proc 6th Int Conf Distrib Comput Syst (ICDCS)"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1109\/TNSE.2019.2937481"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1504\/IJWGS.2018.095647"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2019.2927664"},{"key":"ref64","first-page":"143","article-title":"Chameleon signatures","author":"krawczyk","year":"2000","journal-title":"Proc Network and Distributed System Security Symp (NDSS)"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2020.2980916"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2020.102812"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1109\/Trustcom.2015.505"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1007\/s11036-017-0870-5"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2014.2319555"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2017.2778090"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2014.2328098"},{"key":"ref109","doi-asserted-by":"publisher","DOI":"10.1155\/2018\/8470949"},{"key":"ref95","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2018.8422404"},{"key":"ref108","doi-asserted-by":"publisher","DOI":"10.1145\/1755688.1755697"},{"key":"ref94","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2017.09.010"},{"key":"ref107","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2011.258"},{"key":"ref93","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2010.12.100818"},{"key":"ref106","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-016-3352-3"},{"key":"ref92","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2012.06.008"},{"key":"ref105","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-015-3139-y"},{"key":"ref91","doi-asserted-by":"publisher","DOI":"10.1007\/s12083-018-0703-8"},{"key":"ref104","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-014-2029-z"},{"key":"ref90","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2010.01.091607"},{"key":"ref103","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-00012-7_45"},{"key":"ref102","doi-asserted-by":"publisher","DOI":"10.1109\/TrustCom.2016.0056"},{"key":"ref111","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-018-5912-1"},{"key":"ref112","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2017.01.023"},{"key":"ref110","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2012.02.012"},{"key":"ref98","doi-asserted-by":"publisher","DOI":"10.1002\/dac.2847"},{"key":"ref99","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2013.134"},{"key":"ref96","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2019.2931076"},{"key":"ref97","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2010.120610.101018"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2017.10.017"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/1815396.1815677"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/2905055.2905189"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2014.04.005"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2015.11.016"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-015-2904-2"},{"key":"ref118","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2019.2902907"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2010.11.010"},{"key":"ref82","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2019.2922979"},{"key":"ref117","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2010.01.081219"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2007.358968"},{"key":"ref81","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-014-1930-9"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/98.839330"},{"key":"ref84","doi-asserted-by":"publisher","DOI":"10.1155\/2018\/6251219"},{"key":"ref119","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2012.091212.120575"},{"year":"2019","key":"ref19"},{"key":"ref83","doi-asserted-by":"publisher","DOI":"10.1109\/ICIT.2015.17"},{"key":"ref114","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2018.1700863"},{"key":"ref113","doi-asserted-by":"publisher","DOI":"10.1007\/s13369-017-3037-6"},{"key":"ref116","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2007.06020042"},{"key":"ref80","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2015.09.028"},{"key":"ref115","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2018.11.012"},{"key":"ref120","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2015.7248787"},{"key":"ref89","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2019.2927204"},{"key":"ref121","doi-asserted-by":"publisher","DOI":"10.1155\/2018\/6854612"},{"key":"ref122","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-013-1246-1"},{"key":"ref123","doi-asserted-by":"publisher","DOI":"10.3390\/s140711379"},{"key":"ref85","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2017.11.004"},{"key":"ref86","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2011.110811.111240"},{"key":"ref87","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2015.7306535"},{"key":"ref88","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2017.2786228"}],"container-title":["IEEE Internet of Things Journal"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6488907\/9507560\/09385385.pdf?arnumber=9385385","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,10]],"date-time":"2022-05-10T14:53:52Z","timestamp":1652194432000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9385385\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,8,15]]},"references-count":136,"journal-issue":{"issue":"16"},"URL":"https:\/\/doi.org\/10.1109\/jiot.2021.3068463","relation":{},"ISSN":["2327-4662","2372-2541"],"issn-type":[{"type":"electronic","value":"2327-4662"},{"type":"electronic","value":"2372-2541"}],"subject":[],"published":{"date-parts":[[2021,8,15]]}}}