{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,9]],"date-time":"2025-04-09T00:08:57Z","timestamp":1744157337426,"version":"3.37.3"},"reference-count":36,"publisher":"Wiley","license":[{"start":{"date-parts":[[2020,3,24]],"date-time":"2020-03-24T00:00:00Z","timestamp":1585008000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100010822","name":"Chengdu Science and Technology Bureau","doi-asserted-by":"publisher","award":["2016-XT00-00015-GX","PSDSA201802"],"award-info":[{"award-number":["2016-XT00-00015-GX","PSDSA201802"]}],"id":[{"id":"10.13039\/501100010822","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100007538","name":"Civil Aviation Administration of China","doi-asserted-by":"publisher","award":["2016-XT00-00015-GX","PSDSA201802"],"award-info":[{"award-number":["2016-XT00-00015-GX","PSDSA201802"]}],"id":[{"id":"10.13039\/501100007538","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Security and Communication Networks"],"published-print":{"date-parts":[[2020,3,24]]},"abstract":"<jats:p>The multiserver architecture authentication (MSAA) protocol plays a significant role in achieving secure communications between devices. In recent years, researchers proposed many new MSAA protocols to gain more functionality and security. However, in the existing studies, registered users can access to all registered service providers in the system without any limitation. To ensure that the system can restrict users that are at different levels and can access to different levels of service providers, we propose a new lightweight hierarchical authentication protocol for multiserver architecture using a Merkle tree to verify user\u2019s authentication right. The proposed protocol has hierarchical authentication functionality, high security, and reasonable computation and communication costs. Moreover, the security analysis demonstrates that the proposed protocol satisfies the security requirements in practical applications, and the proposed protocol is provably secure in the general security model.<\/jats:p>","DOI":"10.1155\/2020\/2523834","type":"journal-article","created":{"date-parts":[[2020,3,24]],"date-time":"2020-03-24T23:30:35Z","timestamp":1585092635000},"page":"1-14","source":"Crossref","is-referenced-by-count":2,"title":["Efficient Hierarchical Authentication Protocol for Multiserver Architecture"],"prefix":"10.1155","volume":"2020","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-4898-657X","authenticated-orcid":true,"given":"Jiangheng","family":"Kou","sequence":"first","affiliation":[{"name":"School of Computer and Software Engineering, Xihua University, Chengdu, Sichuan 610039, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4170-2378","authenticated-orcid":true,"given":"Mingxing","family":"He","sequence":"additional","affiliation":[{"name":"School of Computer and Software Engineering, Xihua University, Chengdu, Sichuan 610039, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9900-2978","authenticated-orcid":true,"given":"Ling","family":"Xiong","sequence":"additional","affiliation":[{"name":"School of Computer and Software Engineering, Xihua University, Chengdu, Sichuan 610039, China"}]},{"given":"Zeqiong","family":"Lv","sequence":"additional","affiliation":[{"name":"School of Computer and Software Engineering, Xihua University, Chengdu, Sichuan 610039, China"}]}],"member":"311","reference":[{"key":"1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-10665-1_14"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1109\/tpds.2014.2311791"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1049\/iet-com.2018.5698"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1587\/transinf.e95.d.161"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1109\/jsyst.2014.2301517"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1109\/tifs.2015.2439964"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1109\/tifs.2017.2659640"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2017.05.009"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2017.07.040"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2016.12.028"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1177\/1550147718777654"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1109\/tetc.2015.2392380"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2016.09.009"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1109\/tifs.2016.2573746"},{"key":"16","first-page":"5529","volume":"10","year":"2016","journal-title":"KSII Transactions on Internet and Information Systems"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1109\/jsyst.2014.2322973"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.3837\/tiis.2017.12.026"},{"key":"19","doi-asserted-by":"publisher","DOI":"10.3390\/s17112681"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-017-4390-x"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.3390\/s18072394"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.1109\/jsyst.2016.2574719"},{"key":"23","doi-asserted-by":"publisher","DOI":"10.1109\/tdsc.2016.2616876"},{"key":"24","doi-asserted-by":"publisher","DOI":"10.1109\/tce.2004.1277870"},{"key":"25","doi-asserted-by":"publisher","DOI":"10.1109\/access.2018.2854798"},{"key":"26","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-24676-3_31"},{"key":"27","doi-asserted-by":"publisher","DOI":"10.1109\/tdsc.2014.2355850"},{"key":"29","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-48184-2_32"},{"key":"31","doi-asserted-by":"publisher","DOI":"10.1109\/access.2017.2666258"},{"key":"32","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-017-3956-2"},{"key":"35","doi-asserted-by":"publisher","DOI":"10.1109\/tifs.2017.2721359"},{"key":"36","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-44987-6_28"},{"key":"37","doi-asserted-by":"publisher","DOI":"10.1007\/s001450010003"},{"key":"38","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2016.10.004"},{"key":"39","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0154308"},{"key":"40","doi-asserted-by":"publisher","DOI":"10.1109\/tdsc.2016.2605087"},{"key":"41","doi-asserted-by":"publisher","DOI":"10.1109\/tii.2018.2834351"}],"container-title":["Security and Communication Networks"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/downloads.hindawi.com\/journals\/scn\/2020\/2523834.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/scn\/2020\/2523834.xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/scn\/2020\/2523834.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,3,24]],"date-time":"2020-03-24T23:30:37Z","timestamp":1585092637000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.hindawi.com\/journals\/scn\/2020\/2523834\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,3,24]]},"references-count":36,"alternative-id":["2523834","2523834"],"URL":"https:\/\/doi.org\/10.1155\/2020\/2523834","relation":{},"ISSN":["1939-0114","1939-0122"],"issn-type":[{"type":"print","value":"1939-0114"},{"type":"electronic","value":"1939-0122"}],"subject":[],"published":{"date-parts":[[2020,3,24]]}}}