{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,29]],"date-time":"2025-11-29T06:56:14Z","timestamp":1764399374657,"version":"3.46.0"},"reference-count":20,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,6,25]],"date-time":"2025-06-25T00:00:00Z","timestamp":1750809600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,6,25]],"date-time":"2025-06-25T00:00:00Z","timestamp":1750809600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,6,25]]},"DOI":"10.1109\/snpd65828.2025.11252598","type":"proceedings-article","created":{"date-parts":[[2025,11,28]],"date-time":"2025-11-28T18:40:29Z","timestamp":1764355229000},"page":"117-122","source":"Crossref","is-referenced-by-count":0,"title":["A Mathematical Model for Device Authentication in Trusted Interaction in Decentralized Internet of Things Environments"],"prefix":"10.1109","author":[{"given":"Ilia","family":"Andreev","sequence":"first","affiliation":[{"name":"L.N. Gumilyov Eurasian National University,Department of Information Security,Astana,Kazakhstan"}]},{"given":"Vyacheslav","family":"Petrenko","sequence":"additional","affiliation":[{"name":"North-Caucasus Federal University,Department of Organization and Information Protection Technology,Stavropol,Russian Federation"}]},{"given":"Fariza","family":"Tebueva","sequence":"additional","affiliation":[{"name":"North-Caucasus Federal University,Department of Computational Mathematics and Cybernetics,Stavropol,Russian Federation"}]},{"given":"Dina","family":"Satybaldina","sequence":"additional","affiliation":[{"name":"LLP \"KazHackStan\",Scientific and Technical Department,Astana,Kazakhstan"}]},{"given":"Tolegen","family":"Aidynov","sequence":"additional","affiliation":[{"name":"L.N. Gumilyov Eurasian National University,Department of Information Security,Astana,Kazakhstan"}]},{"given":"Kakim","family":"Sagindykov","sequence":"additional","affiliation":[{"name":"L.N. Gumilyov Eurasian National University,Department of Information Security,Astana,Kazakhstan"}]}],"member":"263","reference":[{"issue":"11","key":"ref1","first-page":"220","article-title":"Information security threat model of agents in the decentralized environment of the Internet of Things formalizing attack scenarios","volume-title":"Forging and stamping production","author":"Tebueva","year":"2024"},{"issue":"2","key":"ref2","first-page":"955","article-title":"Lightweight and privacy-preserving authentication protocol for edge-assisted IoT","volume":"7","author":"Zhang","year":"2020","journal-title":"IEEE Internet Things J"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/3649329.3658246"},{"key":"ref4","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-030-73689-7_96","article-title":"Dynamic and Decentralized Trust Management for the Internet of Things (IoT) Paradigm","author":"Sadique","year":"2021"},{"key":"ref5","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-642-40349-1_5","article-title":"An Accurate Probabilistic Reliability Model for Silicon PUFs","volume-title":"Intrinsic-ID, Eindhoven","author":"Maes","year":"2013"},{"article-title":"Non-Binary LDPC Arithmetic Error Correction For Processing-in-Memory","year":"2025","author":"Shi","key":"ref6"},{"issue":"2","key":"ref7","first-page":"1","article-title":"A Highly Reliable Reconfigurable SRAM PUF Based on Error Correction Codes and Capacitor Preselection","volume-title":"IEEE Trans. Very Large Scale Integr. (VLSI) Syst","volume":"30","author":"Liu","year":"2024"},{"article-title":"Introduction to Physically Unclonable Functions: Properties and Applications","year":"2024","author":"Garcia-Bosque","key":"ref8"},{"key":"ref9","article-title":"EMSEC Development of a Measurement Setup for Large Scale SRAM PUF Evaluation","volume-title":"Bachelor\u2019s Thesis","author":"Will","year":"2017"},{"article-title":"Study of methods for authentication of intelligent agents in trusted interaction in the industrial Internet of things","volume-title":"FISP-2023: Fundamental problems of information security in the conditions of digital transformation. Proceedings of the V All-Russian Scientific Conference","author":"Tebueva","key":"ref10"},{"article-title":"LDPC for 100G EPON","year":"2017","author":"Zhao","key":"ref11"},{"key":"ref12","first-page":"377","article-title":"A secure and lightweight mutual authentication protocol using PUF for resource-constrained IoT devices","volume-title":"Proc. IEEE 20th Int. Conf. Smart City","author":"Jubayer"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/jproc.2014.2335155"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-74735-2_5"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-24676-3_31"},{"volume-title":"Error Control Coding","year":"2004","author":"Lin","key":"ref16"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511791338"},{"key":"ref18","first-page":"3844","article-title":"Secure PUF-based cryptographic key generation for resource-constrained IoT devices","volume":"15","author":"Liu","year":"2020","journal-title":"IEEE Trans. Inf. Forensics Secur"},{"key":"ref19","first-page":"709","article-title":"Protocol for authentication of peripheral devices using fixed bits in systems of industrial Internet of things","volume-title":"Informatics and Applied Mathematics: Proceedings of the IX International Scientific and Practical Conference","author":"Andreev"},{"article-title":"Investigation of methods for optimization of FPGA-device authentication processes in the industrial Internet of things using SRAM","volume-title":"FISP-2023: Fundamental Problems of Information Security in Digital Transformation","author":"Petrenko","key":"ref20"}],"event":{"name":"2025 IEEE\/ACIS 29th International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel\/Distributed Computing (SNPD)","start":{"date-parts":[[2025,6,25]]},"location":"Busan, Korea, Republic of","end":{"date-parts":[[2025,6,27]]}},"container-title":["2025 IEEE\/ACIS 29th International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel\/Distributed Computing (SNPD)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/11251382\/11252538\/11252598.pdf?arnumber=11252598","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,29]],"date-time":"2025-11-29T06:51:37Z","timestamp":1764399097000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11252598\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,6,25]]},"references-count":20,"URL":"https:\/\/doi.org\/10.1109\/snpd65828.2025.11252598","relation":{},"subject":[],"published":{"date-parts":[[2025,6,25]]}}}