{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,9]],"date-time":"2026-01-09T21:11:33Z","timestamp":1767993093389,"version":"3.49.0"},"reference-count":137,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"13","license":[{"start":{"date-parts":[[2025,7,1]],"date-time":"2025-07-01T00:00:00Z","timestamp":1751328000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2025,7,1]],"date-time":"2025-07-01T00:00:00Z","timestamp":1751328000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,7,1]],"date-time":"2025-07-01T00:00:00Z","timestamp":1751328000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100001381","name":"National Research Foundation, Singapore, and A*STAR under its Quantum Engineering Programme","doi-asserted-by":"publisher","award":["NRF2021-QEP2-04-P01"],"award-info":[{"award-number":["NRF2021-QEP2-04-P01"]}],"id":[{"id":"10.13039\/501100001381","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Internet Things J."],"published-print":{"date-parts":[[2025,7,1]]},"DOI":"10.1109\/jiot.2025.3551679","type":"journal-article","created":{"date-parts":[[2025,3,18]],"date-time":"2025-03-18T17:42:03Z","timestamp":1742319723000},"page":"23036-23060","source":"Crossref","is-referenced-by-count":4,"title":["QuSIM-Enhanced GSM Security: A Quantum Prover Authentication Protocol (QuPAP) for Mobile Communication"],"prefix":"10.1109","volume":"12","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-4529-4183","authenticated-orcid":false,"given":"Mansoor","family":"Ali Khan","sequence":"first","affiliation":[{"name":"Department of Electrical and Computer Engineering, National University of Singapore, 21 Lower Kent Ridge Rd, Singapore"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4629-7589","authenticated-orcid":false,"given":"Muhammad Naveed","family":"Aman","sequence":"additional","affiliation":[{"name":"School of Computing, University of Nebraska&#x2014;Lincoln, Lincoln, NE, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0084-4647","authenticated-orcid":false,"given":"Biplab","family":"Sikdar","sequence":"additional","affiliation":[{"name":"Department of Electrical and Computer Engineering, National University of Singapore, 21 Lower Kent Ridge Rd, Singapore"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"crossref","DOI":"10.1002\/9781119861775","volume-title":"English Cyber Threat Intelligence","author":"Lee","year":"2023"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/0022-0000(81)90033-7"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2016.2555335"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.2983655"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4757-6268-6"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1007\/s10207-011-0124-7"},{"key":"ref7","first-page":"1","article-title":"Cryptography based authentication methods","volume-title":"Proc. World Congr. Eng. Comput. Sci.","author":"Alia"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/3549993.3550007"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2007.01.010"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/ICCIT.2010.5711134"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2006.873653"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3019345"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1002\/spy2.428"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1186\/s40537-023-00807-3"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3225038"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/OJCOMS.2024.3372524"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2022.06.013"},{"key":"ref18","volume-title":"ISTR 23: Insights into the cyber security threat landscape","year":"2024"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/359340.359342"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1017\/cbo9780511976667"},{"key":"ref21","volume-title":"HMAC: Keyed-hashing for message authentication","author":"Krawczyk","year":"1997"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/SFCS.1994.365700"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1038\/nature23458"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1137\/s0036144598347011"},{"key":"ref25","article-title":"The keyed-hash message authentication code (HMAC)","year":"2008"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/237814.237866"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1007\/s11235-018-0437-1"},{"key":"ref28","volume-title":"English The Codebreakers: The Story of Secret Writing","author":"Kahn","year":"1967"},{"issue":"2","key":"ref29","first-page":"11","article-title":"A secure authentication system-using enhanced one time pad technique","volume":"11","author":"Raman","year":"2011","journal-title":"Int. J. Comput. Sci. Netw. Secur."},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1007\/s11128-019-2255-0"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.3390\/s22186741"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/THS.2011.6107841"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevA.60.149"},{"key":"ref34","first-page":"175","article-title":"Quantum cryptography: Public-key distribution and coin tossing","volume-title":"Proc. IEEE Conf. Comput., Syst., Signal Process.","author":"Bennett"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1007\/s10773-019-04319-w"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevLett.67.661"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevX.11.041016"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2017.09.012"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2010.01.081219"},{"key":"ref40","first-page":"23","article-title":"Strong authentication for Internet mobile application","volume-title":"Proc. Int. Conf. Appl. Electron. (AE)","author":"Dost\u00e1lek"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2017.10.002"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1002\/dac.4099"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/35.210402"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1080\/01972240802019970"},{"key":"ref45","volume-title":"GSM world news-statistics.","year":"2024"},{"key":"ref46","article-title":"GB Smartphone owners are now the global majority, new GSMA report reveals","year":"2023"},{"key":"ref47","volume-title":"Mobile Network Subscriptions Worldwide","year":"2028"},{"key":"ref48","volume-title":"E.164: The international public telecommunication numbering plan"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1093\/oxfordhb\/9780190864385.001.0001"},{"key":"ref50","volume-title":"GSM specifications."},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.5120\/18875-0138"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1109\/WMNC.2017.8248853"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.2002.1004360"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2002.806129"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1109\/CCNC.2017.7983134"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1109\/CDAN.2016.7570868"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1109\/SocialCom.2013.161"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1109\/30.809184"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2014.07.031"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2019.23442"},{"key":"ref61","volume-title":"Dancing with Qubits: How Quantum Computing Works and How it Can Change the World","author":"Sutor","year":"2019"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1140\/epjs\/s11734-021-00061-9"},{"key":"ref63","volume-title":"IBM Quantum Breaks the 100-Qubit Processor Barrier","year":"2024"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1038\/s41586-019-1666-5"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-06608-5"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1016\/j.tcs.2014.05.025"},{"key":"ref67","volume-title":"Introduction to Quantum Computing with Qiskit","author":"Coggins","year":"2021"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-19-7615-5_10"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1088\/1361-6455\/acbd27"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS51619.2021.9563302"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.1088\/1742-6596\/1941\/1\/012005"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.1140\/epjqt\/s40507-023-00170-5"},{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.1016\/j.physleta.2006.03.048"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.1007\/s11128-014-0808-9"},{"key":"ref75","doi-asserted-by":"publisher","DOI":"10.1007\/s11128-017-1681-0"},{"key":"ref76","doi-asserted-by":"publisher","DOI":"10.1142\/S0129054104002649"},{"key":"ref77","doi-asserted-by":"publisher","DOI":"10.1007\/s10773-015-2662-7"},{"key":"ref78","doi-asserted-by":"publisher","DOI":"10.1140\/epjd\/s10053-021-00279-1"},{"key":"ref79","doi-asserted-by":"publisher","DOI":"10.1007\/s11128-024-04564-x"},{"key":"ref80","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2022.07.007"},{"key":"ref81","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2017.10.017"},{"key":"ref82","doi-asserted-by":"publisher","DOI":"10.23919\/ETR.2021.9904724"},{"key":"ref83","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2005.1577930"},{"key":"ref84","doi-asserted-by":"publisher","DOI":"10.1007\/s10773-020-04692-x"},{"key":"ref85","doi-asserted-by":"publisher","DOI":"10.1142\/S0217979220500873"},{"key":"ref86","doi-asserted-by":"publisher","DOI":"10.1007\/s11128-018-1927-5"},{"key":"ref87","doi-asserted-by":"publisher","DOI":"10.1007\/s11128-018-2124-2"},{"key":"ref88","doi-asserted-by":"publisher","DOI":"10.1145\/3317549.3319728"},{"key":"ref89","doi-asserted-by":"publisher","DOI":"10.1109\/ISDPE.2007.19"},{"key":"ref90","doi-asserted-by":"publisher","DOI":"10.1038\/d41586-021-03476-5"},{"key":"ref91","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevA.65.032302"},{"key":"ref92","doi-asserted-by":"publisher","DOI":"10.1007\/s11128-013-0546-4"},{"key":"ref93","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevA.69.052319"},{"key":"ref94","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevA.68.042317"},{"key":"ref95","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevLett.94.140501"},{"key":"ref96","doi-asserted-by":"publisher","DOI":"10.1007\/s11432-020-2955-6"},{"key":"ref97","doi-asserted-by":"publisher","DOI":"10.1038\/s41377-021-00634-2"},{"key":"ref98","volume-title":"Mobile encryption application products_QuantumCTek\u2013quantum secures every bit.","year":"2024"},{"key":"ref99","volume-title":"China Telecom Launches Country\u2019S First Quantum SIM Card for Secret Phone Calls","year":"2024"},{"key":"ref100","volume-title":"SK telecom to launch hacking-proof quantum phone in April.","author":"Young-sil","year":"2022"},{"key":"ref101","volume-title":"SK telecom.","year":"2024"},{"key":"ref102","volume-title":"SK Telecom Unveils World\u2019s First QRNG-Powered 5G Smartphone"},{"key":"ref103","doi-asserted-by":"publisher","DOI":"10.1038\/d41586-024-03288-3"},{"key":"ref104","doi-asserted-by":"publisher","DOI":"10.1038\/d41586-024-04028-3"},{"key":"ref105","doi-asserted-by":"publisher","DOI":"10.1103\/physrevlett.134.090601"},{"key":"ref106","doi-asserted-by":"publisher","DOI":"10.1038\/d41586-023-01965-3"},{"key":"ref107","article-title":"Engineering challenges in all-photonic quantum repeaters","author":"Benchasattabuse","year":"2024","journal-title":"arXiv:2405.09876"},{"key":"ref108","doi-asserted-by":"publisher","DOI":"10.1038\/ncomms7908"},{"key":"ref109","doi-asserted-by":"publisher","DOI":"10.1109\/SFCS.2002.1181969"},{"key":"ref110","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-33133-6_5"},{"key":"ref111","doi-asserted-by":"publisher","DOI":"10.1007\/s42484-022-00073-1"},{"key":"ref112","doi-asserted-by":"publisher","DOI":"10.22331\/q-2021-06-15-475"},{"key":"ref113","doi-asserted-by":"publisher","DOI":"10.1109\/GCWkshps56602.2022.10008722"},{"key":"ref114","doi-asserted-by":"publisher","DOI":"10.1145\/272991.272995"},{"key":"ref115","volume-title":"Pseudorandom Number Generation: Impossibility and Compromise","author":"Haramoto","year":"2006"},{"key":"ref116","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2023.3346397"},{"key":"ref117","doi-asserted-by":"publisher","DOI":"10.1038\/s41598-021-95388-7"},{"key":"ref118","volume-title":"Quantis QRNG chips.","year":"2024"},{"key":"ref119","doi-asserted-by":"publisher","DOI":"10.1007\/s11128-023-04175-y"},{"key":"ref120","doi-asserted-by":"publisher","DOI":"10.1088\/1402-4896\/ac698b"},{"key":"ref121","doi-asserted-by":"publisher","DOI":"10.1038\/s41598-021-03286-9"},{"key":"ref122","volume-title":"Quantis QRNG USB."},{"key":"ref123","volume-title":"Samsung QRNG use case."},{"key":"ref124","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2024.3382150"},{"key":"ref125","volume-title":"16-Qubit quantum random number generator.","year":"2019"},{"key":"ref126","doi-asserted-by":"publisher","DOI":"10.1038\/299802a0"},{"key":"ref127","volume-title":"Network Security Essentials: Applications and Standards","author":"Stallings","year":"2017"},{"key":"ref128","doi-asserted-by":"publisher","DOI":"10.1002\/0471200611"},{"key":"ref129","doi-asserted-by":"publisher","DOI":"10.1049\/iet-cds.2019.0175"},{"issue":"2","key":"ref130","first-page":"27","article-title":"Computational analysis of GSM security algorithm","volume":"1","author":"Abikoye","year":"2008","journal-title":"Afr. J. Comput. ICT (IEEE Nigeria Comput. Chapter)"},{"key":"ref131","doi-asserted-by":"publisher","DOI":"10.1049\/qtc2.12032"},{"key":"ref132","doi-asserted-by":"publisher","DOI":"10.1103\/PRXQuantum.5.030347"},{"key":"ref133","article-title":"Scientists report Superconducting Qubit hits 72 GHz, offering path to scalable quantum systems","year":"2024"},{"issue":"12","key":"ref134","doi-asserted-by":"crossref","first-page":"1700","DOI":"10.1364\/OPTICA.540362","article-title":"Quantum teleportation coexisting with classical communications in optical fiber","volume":"11","author":"Thomas","year":"2024","journal-title":"Optica"},{"key":"ref135","volume-title":"World-First Quantum-Safe 5G SIM Technology","year":"2021"},{"key":"ref136","volume-title":"Toshiba\u2019s Leap in Long-Distance Quantum Communication","year":"2021"},{"key":"ref137","volume-title":"NIST Releases Three Post-Quantum Cryptography Standards","year":"2024"}],"container-title":["IEEE Internet of Things Journal"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/6488907\/11045559\/10929746.pdf?arnumber=10929746","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,24]],"date-time":"2025-06-24T06:07:14Z","timestamp":1750745234000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10929746\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,7,1]]},"references-count":137,"journal-issue":{"issue":"13"},"URL":"https:\/\/doi.org\/10.1109\/jiot.2025.3551679","relation":{},"ISSN":["2327-4662","2372-2541"],"issn-type":[{"value":"2327-4662","type":"electronic"},{"value":"2372-2541","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,7,1]]}}}