{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,6]],"date-time":"2026-04-06T10:20:18Z","timestamp":1775470818253,"version":"3.50.1"},"reference-count":50,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"21","license":[{"start":{"date-parts":[[2022,11,1]],"date-time":"2022-11-01T00:00:00Z","timestamp":1667260800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2022,11,1]],"date-time":"2022-11-01T00:00:00Z","timestamp":1667260800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,11,1]],"date-time":"2022-11-01T00:00:00Z","timestamp":1667260800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100001871","name":"Funda\u00e7\u00e3o para a Ci\u00eancia e Tecnologia\/Minist\u00e9rio da Ci\u00eancia, Tecnologia e Ensino Superior (FCT\/MCTES) through national funds and when applicable co-funded EU funds","doi-asserted-by":"publisher","award":["UIDB\/50008\/2020"],"award-info":[{"award-number":["UIDB\/50008\/2020"]}],"id":[{"id":"10.13039\/501100001871","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Brazilian National Council for Scientific and Technological Development\u2014CNPq","award":["\/hbox313036\/2020-9"],"award-info":[{"award-number":["\/hbox313036\/2020-9"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Internet Things J."],"published-print":{"date-parts":[[2022,11,1]]},"DOI":"10.1109\/jiot.2022.3184293","type":"journal-article","created":{"date-parts":[[2022,6,20]],"date-time":"2022-06-20T20:34:53Z","timestamp":1655757293000},"page":"21493-21504","source":"Crossref","is-referenced-by-count":35,"title":["An Authentication Protocol for Next Generation of Constrained IoT Systems"],"prefix":"10.1109","volume":"9","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-0183-5993","authenticated-orcid":false,"given":"Samad","family":"Rostampour","sequence":"first","affiliation":[{"name":"Department of Computer Science, Vanier College, Montreal, Canada"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6818-5342","authenticated-orcid":false,"given":"Nasour","family":"Bagheri","sequence":"additional","affiliation":[{"name":"Department of Electrical Engineering, CPS2 Laboratory, Shahid Rajaee Teacher Training University, Tehran, Iran"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2545-532X","authenticated-orcid":false,"given":"Ygal","family":"Bendavid","sequence":"additional","affiliation":[{"name":"AOTI Department, UQAM University, Montreal, Canada"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1897-0828","authenticated-orcid":false,"given":"Masoumeh","family":"Safkhani","sequence":"additional","affiliation":[{"name":"Department of Computer Engineering, Shahid Rajaee Teacher Training University, Tehran, Iran"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4929-5383","authenticated-orcid":false,"given":"Saru","family":"Kumari","sequence":"additional","affiliation":[{"name":"Department of Mathematics, Chaudhary Charan Singh University, Meerut, India"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8657-3800","authenticated-orcid":false,"given":"Joel J. P. C.","family":"Rodrigues","sequence":"additional","affiliation":[{"name":"College of Computer Science and Technology, China University of Petroleum, Qingdao, China"}]}],"member":"263","reference":[{"key":"ref1","volume-title":"Guidance Statement of Intent Regarding the Security of the Internet of Things","year":"2022"},{"key":"ref2","volume-title":"IoT Cybersecurity Improvement Act of 2020","year":"2022"},{"key":"ref3","first-page":"7045","article-title":"Congressional Record (2020)","volume-title":"Proc. Debates 116th Congr."},{"key":"ref4","volume-title":"Good Practices for IoT and Smart Infrastructures Tool","year":"2022"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2021.3074054"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/j.cosrev.2022.100467"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.3026493"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2947723"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1016\/j.dcan.2022.04.027"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2021.3107538"},{"key":"ref11","volume-title":"Lightweight Cryptography (LWC) Standardization Project","year":"2020"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2018.2794996"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2019.07.004"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2020.107558"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2019.2922697"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.3390\/app10051758"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.3002221"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.3390\/s20051366"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3021701"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2021.3084946"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2926578"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/JSEN.2020.3028872"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.3030308"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2019.2942389"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2021.3068410"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1002\/ett.3813"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1002\/ett.3676"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2014.2316338"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1007\/s12652-020-02732-2"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2020.2970167"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1016\/j.egyr.2021.07.136"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2021.3117762"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.3390\/s19051141"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-46035-7_22"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1983.1056650"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1007\/s00145-008-9026-x"},{"key":"ref37","article-title":"JHAE: An authenticated encryption mode based on JH","author":"Alizadeh","year":"2014"},{"issue":"2","key":"ref38","first-page":"125","article-title":"Artemia: A family of provably secure authenticated encryption schemes","volume":"6","author":"Alizadeh","year":"2014","journal-title":"ISC Int. J. Inf. Security"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1007\/s00145-021-09398-9"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-78967-3_11"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1007\/springerreference_118"},{"key":"ref42","volume-title":"ForkAE","author":"Andreeva","year":"2022"},{"key":"ref43","volume-title":"SKINNY Family of Block Ciphers","author":"Beierle","year":"2022"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/SFCS.1997.646128"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-30580-4_6"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3034447"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3008230"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-70545-1_38"},{"key":"ref49","volume-title":"State of Enterprise IoT Security in North America: Unmanaged and Unsecured.Leadership Paper Commissioned by Armis Inc","year":"2019"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2021.102494"}],"container-title":["IEEE Internet of Things Journal"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6488907\/9926222\/09800935.pdf?arnumber=9800935","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,2,1]],"date-time":"2024-02-01T05:33:59Z","timestamp":1706765639000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9800935\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,11,1]]},"references-count":50,"journal-issue":{"issue":"21"},"URL":"https:\/\/doi.org\/10.1109\/jiot.2022.3184293","relation":{},"ISSN":["2327-4662","2372-2541"],"issn-type":[{"value":"2327-4662","type":"electronic"},{"value":"2372-2541","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,11,1]]}}}