{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,10]],"date-time":"2026-04-10T02:32:20Z","timestamp":1775788340458,"version":"3.50.1"},"reference-count":42,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"9","license":[{"start":{"date-parts":[[2024,5,1]],"date-time":"2024-05-01T00:00:00Z","timestamp":1714521600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2024,5,1]],"date-time":"2024-05-01T00:00:00Z","timestamp":1714521600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,5,1]],"date-time":"2024-05-01T00:00:00Z","timestamp":1714521600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62272002"],"award-info":[{"award-number":["62272002"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62202005"],"award-info":[{"award-number":["62202005"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62325209"],"award-info":[{"award-number":["62325209"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Excellent Youth Foundation of Anhui Scientific Committee","award":["2108085J31"],"award-info":[{"award-number":["2108085J31"]}]},{"name":"Natural Science Foundation of Anhui Province, China","award":["2208085QF198"],"award-info":[{"award-number":["2208085QF198"]}]},{"name":"University Synergy Innovation Program of Anhui Province","award":["GXXT-2022-049"],"award-info":[{"award-number":["GXXT-2022-049"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Internet Things J."],"published-print":{"date-parts":[[2024,5,1]]},"DOI":"10.1109\/jiot.2024.3351892","type":"journal-article","created":{"date-parts":[[2024,1,9]],"date-time":"2024-01-09T20:42:15Z","timestamp":1704832935000},"page":"16325-16338","source":"Crossref","is-referenced-by-count":44,"title":["Efficient Blockchain-Based Mutual Authentication and Session Key Agreement for Cross-Domain IIoT"],"prefix":"10.1109","volume":"11","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-7258-3418","authenticated-orcid":false,"given":"Jie","family":"Cui","sequence":"first","affiliation":[{"name":"Key Laboratory of Intelligent Computing and Signal Processing of Ministry of Education, School of Computer Science and Technology, and the Anhui Engineering Laboratory of IoT Security Technologies, Anhui University, Hefei, China"}]},{"given":"Yihu","family":"Zhu","sequence":"additional","affiliation":[{"name":"Key Laboratory of Intelligent Computing and Signal Processing of Ministry of Education, School of Computer Science and Technology, and the Anhui Engineering Laboratory of IoT Security Technologies, Anhui University, Hefei, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0392-9734","authenticated-orcid":false,"given":"Hong","family":"Zhong","sequence":"additional","affiliation":[{"name":"Key Laboratory of Intelligent Computing and Signal Processing of Ministry of Education, School of Computer Science and Technology, and the Anhui Engineering Laboratory of IoT Security Technologies, Anhui University, Hefei, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2600-6748","authenticated-orcid":false,"given":"Qingyang","family":"Zhang","sequence":"additional","affiliation":[{"name":"Key Laboratory of Intelligent Computing and Signal Processing of Ministry of Education, School of Computer Science and Technology, and the Anhui Engineering Laboratory of IoT Security Technologies, Anhui University, Hefei, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0001-6597-168X","authenticated-orcid":false,"given":"Chengjie","family":"Gu","sequence":"additional","affiliation":[{"name":"School of Public Security and Emergency Management, Anhui University of Science and Technology, Hefei, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2446-7436","authenticated-orcid":false,"given":"Debiao","family":"He","sequence":"additional","affiliation":[{"name":"School of Cyber Science and Engineering, Wuhan University, Wuhan, China"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2021.108040"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1007\/s11831-021-09622-6"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/FIT.2012.53"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2019.106522"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/ICICS49469.2020.239563"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2019.2936278"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/MCE.2021.3053543"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2021.3138989"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/s11227-022-04411-9"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.3837\/tiis.2016.12.021"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TCSS.2021.3056540"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1016\/j.sysarc.2021.102024"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1016\/j.sysarc.2021.102112"},{"key":"ref14","volume-title":"The Digitization of the World From Edge to Core","volume":"16","author":"Rydning","year":"2018"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2021.3107443"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.3024703"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2023.3234178"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1016\/j.vehcom.2018.07.001"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2019.02.003"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2023.3303010"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/ICC40277.2020.9148863"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1155\/2021\/6679882"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2019.2943118"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1016\/j.pmcj.2020.101194"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1007\/s13369-020-05276-x"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2018.09.017"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-022-11927-y"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/AICCSA.2017.57"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/GLOBECOM38437.2019.9013856"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2019.2896064"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2020.2979006"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-46416-6_22"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/TCSS.2021.3076209"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2020.2980916"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2020.3002096"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2021.3063806"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/MCE.2021.3061808"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2021.3098007"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2021.3116049"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1007\/s001450010003"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1145\/1180405.1180453"},{"key":"ref42","volume-title":"Open-source code of the implementation of the BMASKA using the proverif tool","author":"Zhu","year":"2023"}],"container-title":["IEEE Internet of Things Journal"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6488907\/10508620\/10384713.pdf?arnumber=10384713","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,5,3]],"date-time":"2024-05-03T18:58:25Z","timestamp":1714762705000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10384713\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,5,1]]},"references-count":42,"journal-issue":{"issue":"9"},"URL":"https:\/\/doi.org\/10.1109\/jiot.2024.3351892","relation":{},"ISSN":["2327-4662","2372-2541"],"issn-type":[{"value":"2327-4662","type":"electronic"},{"value":"2372-2541","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,5,1]]}}}