{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,20]],"date-time":"2026-02-20T18:57:49Z","timestamp":1771613869145,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":21,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,12,6]],"date-time":"2024-12-06T00:00:00Z","timestamp":1733443200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,12,6]]},"DOI":"10.1145\/3711618.3711629","type":"proceedings-article","created":{"date-parts":[[2025,2,22]],"date-time":"2025-02-22T11:22:41Z","timestamp":1740223361000},"page":"189-193","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["A Lightweight PUF-Based Authentication Protocol for M2M Communications in Industrial IoT"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0007-9645-3539","authenticated-orcid":false,"given":"Jingxuan","family":"Fan","sequence":"first","affiliation":[{"name":"College of Computer Science, Beijing University of Technology, Beijing, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6220-4119","authenticated-orcid":false,"given":"Shanshan","family":"Tu","sequence":"additional","affiliation":[{"name":"College of Computer Science, Beijing University of Technology, Beijing, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0007-4196-7858","authenticated-orcid":false,"given":"Haoran","family":"Wang","sequence":"additional","affiliation":[{"name":"College of Computer Science, Beijing University of Technology, Beijing, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0009-8224-6517","authenticated-orcid":false,"given":"Ziyang","family":"Liu","sequence":"additional","affiliation":[{"name":"College of Computer Science, Beijing University of Technology, Beijing, Beijing, China"}]}],"member":"320","published-online":{"date-parts":[[2025,2,22]]},"reference":[{"key":"e_1_3_3_1_2_2","doi-asserted-by":"crossref","unstructured":"Tejasvi Alladi Gaurang Bansal Vinay Chamola Mohsen Guizani et\u00a0al. 2020. SecAuthUAV: A novel authentication scheme for UAV-ground station and UAV-UAV communication. IEEE Transactions on Vehicular Technology 69 12 (2020) 15068\u201315077.","DOI":"10.1109\/TVT.2020.3033060"},{"key":"e_1_3_3_1_3_2","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00013"},{"key":"e_1_3_3_1_4_2","doi-asserted-by":"crossref","unstructured":"Durbadal Chattaraj Basudeb Bera Ashok\u00a0Kumar Das Sourav Saha Pascal Lorenz and YoungHo Park. 2021. Block-CLAP: Blockchain-assisted certificateless key agreement protocol for internet of vehicles in smart transportation. IEEE Transactions on Vehicular Technology 70 8 (2021) 8092\u20138107.","DOI":"10.1109\/TVT.2021.3091163"},{"key":"e_1_3_3_1_5_2","doi-asserted-by":"publisher","unstructured":"Shehzad\u00a0Ashraf Chaudhry Jamel Nebhan Khalid Yahya and Fadi Al-Turjman. 2022. A Privacy Enhanced Authentication Scheme for Securing Smart Grid Infrastructure. IEEE Transactions on Industrial Informatics 18 7 (2022) 5000\u20135006. 10.1109\/TII.2021.3119685","DOI":"10.1109\/TII.2021.3119685"},{"key":"e_1_3_3_1_6_2","doi-asserted-by":"publisher","unstructured":"Shehzad\u00a0Ashraf Chaudhry Khalid Yahya Sahil Garg Georges Kaddoum Mohammad\u00a0Mehedi Hassan and Yousaf\u00a0Bin Zikria. 2023. LAS-SG: An Elliptic Curve-Based Lightweight Authentication Scheme for Smart Grid Environments. IEEE Transactions on Industrial Informatics 19 2 (2023) 1504\u20131511. 10.1109\/TII.2022.3158663","DOI":"10.1109\/TII.2022.3158663"},{"key":"e_1_3_3_1_7_2","doi-asserted-by":"publisher","unstructured":"Jie Cui Fengqun Wang Qingyang Zhang Chengjie Gu and Hong Zhong. 2023. Efficient Batch Authentication Scheme Based on Edge Computing in IIoT. IEEE Transactions on Network and Service Management 20 1 (2023) 357\u2013368. 10.1109\/TNSM.2022.3206378","DOI":"10.1109\/TNSM.2022.3206378"},{"key":"e_1_3_3_1_8_2","doi-asserted-by":"crossref","unstructured":"Jie Cui Yihu Zhu Hong Zhong Qingyang Zhang Chengjie Gu and Debiao He. 2024. Efficient blockchain-based mutual authentication and session key agreement for cross-domain IIoT. IEEE Internet of Things Journal (2024).","DOI":"10.1109\/JIOT.2024.3351892"},{"key":"e_1_3_3_1_9_2","doi-asserted-by":"publisher","unstructured":"Xuyang Ding Xiaoxiang Wang Ying Xie and Fagen Li. 2022. A Lightweight Anonymous Authentication Protocol for Resource-Constrained Devices in Internet of Things. IEEE Internet of Things Journal 9 3 (2022) 1818\u20131829. 10.1109\/JIOT.2021.3088641","DOI":"10.1109\/JIOT.2021.3088641"},{"key":"e_1_3_3_1_10_2","doi-asserted-by":"publisher","unstructured":"Alireza Esfahani Georgios Mantas Rainer Matischek Firooz\u00a0B. Saghezchi Jonathan Rodriguez Ani Bicaku Silia Maksuti Markus\u00a0G. Tauber Christoph Schmittner and Joaquim Bastos. 2019. A Lightweight Authentication Mechanism for M2M Communications in Industrial IoT Environment. IEEE Internet of Things Journal 6 1 (2019) 288\u2013296. 10.1109\/JIOT.2017.2737630","DOI":"10.1109\/JIOT.2017.2737630"},{"key":"e_1_3_3_1_11_2","doi-asserted-by":"publisher","unstructured":"Sahil Garg Kuljeet Kaur Georges Kaddoum Joel J. P.\u00a0C. Rodrigues and Mohsen Guizani. 2020. Secure and Lightweight Authentication Scheme for Smart Metering Infrastructure in Smart Grid. IEEE Transactions on Industrial Informatics 16 5 (2020) 3548\u20133557. 10.1109\/TII.2019.2944880","DOI":"10.1109\/TII.2019.2944880"},{"key":"e_1_3_3_1_12_2","doi-asserted-by":"crossref","unstructured":"Prosanta Gope and Tzonelih Hwang. 2016. A realistic lightweight anonymous authentication protocol for securing real-time application data access in wireless sensor networks. IEEE Transactions on industrial electronics 63 11 (2016) 7124\u20137132.","DOI":"10.1109\/TIE.2016.2585081"},{"key":"e_1_3_3_1_13_2","doi-asserted-by":"publisher","unstructured":"Prosanta Gope and Biplab Sikdar. 2019. Lightweight and Privacy-Preserving Two-Factor Authentication Scheme for IoT Devices. IEEE Internet of Things Journal 6 1 (2019) 580\u2013589. 10.1109\/JIOT.2018.2846299","DOI":"10.1109\/JIOT.2018.2846299"},{"key":"e_1_3_3_1_14_2","doi-asserted-by":"publisher","unstructured":"Yiran Han Hua Guo Jianwei Liu Brou\u00a0Bernard Ehui Yapeng Wu and Sijia Li. 2024. An Enhanced Multifactor Authentication and Key Agreement Protocol in Industrial Internet of Things. IEEE Internet of Things Journal 11 9 (2024) 16243\u201316254. 10.1109\/JIOT.2024.3355228","DOI":"10.1109\/JIOT.2024.3355228"},{"key":"e_1_3_3_1_15_2","doi-asserted-by":"crossref","unstructured":"Pls Jayalaxmi Rahul Saha Gulshan Kumar Neeraj Kumar and Tai-Hoon Kim. 2021. A taxonomy of security issues in Industrial Internet-of-Things: Scoping review for existing solutions future implications and research challenges. IEEE Access 9 (2021) 25344\u201325359.","DOI":"10.1109\/ACCESS.2021.3057766"},{"key":"e_1_3_3_1_16_2","doi-asserted-by":"publisher","unstructured":"Syeda\u00a0M. Muzammal Raja\u00a0Kumar Murugesan and N.\u00a0Z. Jhanjhi. 2021. A Comprehensive Review on Secure Routing in Internet of Things: Mitigation Methods and Trust-Based Approaches. IEEE Internet of Things Journal 8 6 (2021) 4186\u20134210. 10.1109\/JIOT.2020.3031162","DOI":"10.1109\/JIOT.2020.3031162"},{"key":"e_1_3_3_1_17_2","doi-asserted-by":"crossref","unstructured":"Martin Serror Sacha Hack Martin Henze Marko Schuba and Klaus Wehrle. 2020. Challenges and opportunities in securing the industrial internet of things. IEEE Transactions on Industrial Informatics 17 5 (2020) 2985\u20132996.","DOI":"10.1109\/TII.2020.3023507"},{"key":"e_1_3_3_1_18_2","unstructured":"Jinbiao Tan Jianhua Shi Jiafu Wan Hong-Ning Dai Jiong Jin and Rui Zhang. 2024. Blockchain-Based Data Security and Sharing for Resource-Constrained Devices in Manufacturing IoT. IEEE Internet of Things Journal (2024)."},{"key":"e_1_3_3_1_19_2","doi-asserted-by":"crossref","unstructured":"Koen Tange Michele De\u00a0Donno Xenofon Fafoutis and Nicola Dragoni. 2020. A systematic survey of industrial Internet of Things security: Requirements and fog computing opportunities. IEEE Communications Surveys & Tutorials 22 4 (2020) 2489\u20132520.","DOI":"10.1109\/COMST.2020.3011208"},{"key":"e_1_3_3_1_20_2","doi-asserted-by":"crossref","unstructured":"Yan Zhang Bing Li Jiaxin Wu Bo Liu Rui Chen and Jinke Chang. 2022. Efficient and privacy-preserving blockchain-based multifactor device authentication protocol for cross-domain IIoT. IEEE Internet of Things Journal 9 22 (2022) 22501\u201322515.","DOI":"10.1109\/JIOT.2022.3176192"},{"key":"e_1_3_3_1_21_2","doi-asserted-by":"publisher","unstructured":"Guozhu Zhao Pinchang Zhang Yulong Shen and Xiaohong Jiang. 2022. Passive User Authentication Utilizing Behavioral Biometrics for IIoT Systems. IEEE Internet of Things Journal 9 14 (2022) 12783\u201312798. 10.1109\/JIOT.2021.3138454","DOI":"10.1109\/JIOT.2021.3138454"},{"key":"e_1_3_3_1_22_2","doi-asserted-by":"publisher","unstructured":"Yue Zheng Wenye Liu Chongyan Gu and Chip-Hong Chang. 2023. PUF-Based Mutual Authentication and Key Exchange Protocol for Peer-to-Peer IoT Applications. IEEE Transactions on Dependable and Secure Computing 20 4 (2023) 3299\u20133316. 10.1109\/TDSC.2022.3193570","DOI":"10.1109\/TDSC.2022.3193570"}],"event":{"name":"ICCNS 2024: 2024 14th International Conference on Communication and Network Security","location":"Xiamen Shanghai China","acronym":"ICCNS 2024"},"container-title":["Proceedings of the 2024 14th International Conference on Communication and Network Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3711618.3711629","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3711618.3711629","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T01:18:29Z","timestamp":1750295909000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3711618.3711629"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,12,6]]},"references-count":21,"alternative-id":["10.1145\/3711618.3711629","10.1145\/3711618"],"URL":"https:\/\/doi.org\/10.1145\/3711618.3711629","relation":{},"subject":[],"published":{"date-parts":[[2024,12,6]]},"assertion":[{"value":"2025-02-22","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}