{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,3]],"date-time":"2026-04-03T15:05:37Z","timestamp":1775228737218,"version":"3.50.1"},"reference-count":38,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"20","license":[{"start":{"date-parts":[[2024,10,15]],"date-time":"2024-10-15T00:00:00Z","timestamp":1728950400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Internet Things J."],"published-print":{"date-parts":[[2024,10,15]]},"DOI":"10.1109\/jiot.2024.3418207","type":"journal-article","created":{"date-parts":[[2024,7,29]],"date-time":"2024-07-29T19:44:11Z","timestamp":1722282251000},"page":"32969-32984","source":"Crossref","is-referenced-by-count":8,"title":["A Lightweight PUF-Based Protocol for Dynamic and Secure Group Key Management in IoT"],"prefix":"10.1109","volume":"11","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-1417-6328","authenticated-orcid":false,"given":"Mario","family":"Barbareschi","sequence":"first","affiliation":[{"name":"Department of Electrical Engineering and Information Technologies, University of Naples Federico II, Napoli, Italy"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0964-7014","authenticated-orcid":false,"given":"Valentina","family":"Casola","sequence":"additional","affiliation":[{"name":"Department of Electrical Engineering and Information Technologies, University of Naples Federico II, Napoli, Italy"}]},{"ORCID":"https:\/\/orcid.org\/0009-0001-3677-7685","authenticated-orcid":false,"given":"Antonio","family":"Emmanuele","sequence":"additional","affiliation":[{"name":"Department of Electrical Engineering and Information Technologies, University of Naples Federico II, Napoli, Italy"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4456-1793","authenticated-orcid":false,"given":"Daniele","family":"Lombardi","sequence":"additional","affiliation":[{"name":"Department of Electrical Engineering and Information Technologies, University of Naples Federico II, Napoli, Italy"}]}],"member":"263","reference":[{"key":"ref1","article-title":"Text-S.1611: DIGIT act (2019-2020)","author":"Fischer"},{"key":"ref2","volume-title":"Mirai-Based RapperBot Worm Targets IoT Devices Via \u2018Intelligent Brute Forcing\u2019","year":"2023"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/937503.937506"},{"issue":"22","key":"ref4","first-page":"3217","article-title":"A survey of key distribution in the context of Internet of Things","volume":"97","author":"Abualghanam","year":"2019","journal-title":"J. Theor. Appl. Inf. Technol."},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/j.jpdc.2018.04.007"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2019.06.012"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/IWASI58316.2023.10164402"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1002\/cpe.805"},{"key":"ref9","first-page":"1","article-title":"Initial SRAM state as a fingerprint and source of true random numbers for RFID tags","volume-title":"Proc. Conf. RFID Secur.","author":"Holcomb"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-74735-2_5"},{"key":"ref11","first-page":"9","article-title":"Physical Unclonable functions for device authentication and secret key generation","volume-title":"Proc. 44th ACM\/IEEE Design Autom. Conf.","author":"Suh"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-44318-8_10"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2020.107593"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2016.01.012"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1983.1056650"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/3218603.3218646"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.3032757"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2015.2474705"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2022.3149117"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-12331-3_2"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/WCNC.2003.1200605"},{"key":"ref22","volume-title":"IEEE Standard for Information Technology\u2014Telecommunications and Information Exchange Between Systems\u2014Local and Metropolitan Networks\u2014Specific Requirements\u2014Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications: Higher Speed Physical Layer (PHY) Extension in the 2.4 GHz Band","year":"2000"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.7873\/DATE.2014.083"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-13051-4_19"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2018.01.059"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.2001.924302"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/584490.584504"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-015-2582-0"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2018.2840321"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2020.3002957"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2013.05.009"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/CIT\/IUCC\/DASC\/PICOM.2015.166"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1016\/j.icte.2019.08.002"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1007\/s11227-020-03561-y"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2017.2778725"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/ISCAS46773.2023.10181666"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1007\/s41635-017-0025-y"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1145\/1132863.1132867"}],"container-title":["IEEE Internet of Things Journal"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/6488907\/10708965\/10614146.pdf?arnumber=10614146","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,10,9]],"date-time":"2024-10-09T05:39:44Z","timestamp":1728452384000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10614146\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,10,15]]},"references-count":38,"journal-issue":{"issue":"20"},"URL":"https:\/\/doi.org\/10.1109\/jiot.2024.3418207","relation":{},"ISSN":["2327-4662","2372-2541"],"issn-type":[{"value":"2327-4662","type":"electronic"},{"value":"2372-2541","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,10,15]]}}}