{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,8]],"date-time":"2026-04-08T11:44:40Z","timestamp":1775648680827,"version":"3.50.1"},"reference-count":38,"publisher":"Wiley","issue":"1","license":[{"start":{"date-parts":[[2023,5,24]],"date-time":"2023-05-24T00:00:00Z","timestamp":1684886400000},"content-version":"vor","delay-in-days":143,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"Research and Development of Core Technologies in the Field of Security","award":["R221006L"],"award-info":[{"award-number":["R221006L"]}]},{"name":"Research and Development of Core Technologies in the Field of Security","award":["R22100XA"],"award-info":[{"award-number":["R22100XA"]}]},{"name":"Research on the Strategy of Information Technology Application Innovation","award":["R221006L"],"award-info":[{"award-number":["R221006L"]}]},{"name":"Research on the Strategy of Information Technology Application Innovation","award":["R22100XA"],"award-info":[{"award-number":["R22100XA"]}]}],"content-domain":{"domain":["onlinelibrary.wiley.com"],"crossmark-restriction":true},"short-container-title":["International Journal of Intelligent Systems"],"published-print":{"date-parts":[[2023,1]]},"abstract":"<jats:p>With the development of Internet of Things (IoT) technology, massive heterogeneous equipment involving all walks of life has been connected to networks. However, many current authentication methods have poor robustness and cannot ensure the safety of access equipment due to the complexity and uncertainty of the network environment. To deal with this problem, a hierarchical authentication system was proposed in this paper. First, an equipment identification method (EIM), using stack denoising autoencoders (SDAs), is developed to weaken the uncertainty to recognize the type of access equipment. Second, an equipment authentication method (EAM), based on the identification result and similarity theory, is designed to improve the verification accuracy to guarantee the credibility of access equipment. Third, the proposed hierarchical authentication system was tested in a real access platform. The experimental results demonstrated the satisfactory performance of this proposed hierarchical authentication system.<\/jats:p>","DOI":"10.1155\/2023\/8899697","type":"journal-article","created":{"date-parts":[[2023,5,24]],"date-time":"2023-05-24T20:05:07Z","timestamp":1684958707000},"update-policy":"https:\/\/doi.org\/10.1002\/crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["A Hierarchical Authentication System for Access Equipment in Internet of Things"],"prefix":"10.1155","volume":"2023","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-9279-9109","authenticated-orcid":false,"given":"Hui-Juan","family":"Zhang","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8877-2846","authenticated-orcid":false,"given":"Shen","family":"He","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9780-9233","authenticated-orcid":false,"given":"Jia","family":"Chen","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0009-0003-5292-554X","authenticated-orcid":false,"given":"Kai","family":"Yang","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0009-0007-7334-8605","authenticated-orcid":false,"given":"Peng","family":"Ran","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0009-0006-1564-090X","authenticated-orcid":false,"given":"Jiake","family":"Chen","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"311","published-online":{"date-parts":[[2023,5,24]]},"reference":[{"key":"e_1_2_9_1_2","doi-asserted-by":"publisher","DOI":"10.1007\/s12652-018-0965-2"},{"key":"e_1_2_9_2_2","doi-asserted-by":"publisher","DOI":"10.1002\/int.22993"},{"key":"e_1_2_9_3_2","doi-asserted-by":"publisher","DOI":"10.1109\/jiot.2020.3004346"},{"key":"e_1_2_9_4_2","doi-asserted-by":"publisher","DOI":"10.1109\/access.2019.2907793"},{"key":"e_1_2_9_5_2","doi-asserted-by":"publisher","DOI":"10.1109\/tii.2018.2841049"},{"key":"e_1_2_9_6_2","doi-asserted-by":"publisher","DOI":"10.1002\/int.22472"},{"key":"e_1_2_9_7_2","doi-asserted-by":"publisher","DOI":"10.23919\/icn.2021.0005"},{"key":"e_1_2_9_8_2","first-page":"9211","article-title":"A novel Internet of Things based fall detection system in smart home","volume":"37","author":"Ahmed I.","year":"2019","journal-title":"International Journal of Intelligent Systems"},{"key":"e_1_2_9_9_2","doi-asserted-by":"publisher","DOI":"10.1109\/comst.2019.2910750"},{"key":"e_1_2_9_10_2","doi-asserted-by":"publisher","DOI":"10.1109\/jiot.2017.2767291"},{"key":"e_1_2_9_11_2","doi-asserted-by":"publisher","DOI":"10.1109\/MCE.2020.3024512"},{"key":"e_1_2_9_12_2","unstructured":"TremletC.andJonesS. E. Systems and methods for authentication based on physically unclonable functions 2017 5 363\u2013375."},{"key":"e_1_2_9_13_2","doi-asserted-by":"publisher","DOI":"10.3390\/s21082685"},{"key":"e_1_2_9_14_2","doi-asserted-by":"publisher","DOI":"10.1109\/access.2019.2912998"},{"key":"e_1_2_9_15_2","doi-asserted-by":"publisher","DOI":"10.1109\/access.2021.3110707"},{"key":"e_1_2_9_16_2","doi-asserted-by":"publisher","DOI":"10.1109\/jiot.2015.2495321"},{"key":"e_1_2_9_17_2","doi-asserted-by":"publisher","DOI":"10.1109\/comst.2015.2459691"},{"key":"e_1_2_9_18_2","doi-asserted-by":"publisher","DOI":"10.1109\/tdsc.2016.2601610"},{"key":"e_1_2_9_19_2","doi-asserted-by":"publisher","DOI":"10.1109\/tvt.2018.2805700"},{"key":"e_1_2_9_20_2","doi-asserted-by":"publisher","DOI":"10.1109\/access.2015.2445817"},{"key":"e_1_2_9_21_2","doi-asserted-by":"publisher","DOI":"10.1109\/jsyst.2017.2685524"},{"key":"e_1_2_9_22_2","doi-asserted-by":"publisher","DOI":"10.1016\/s1004-4132(08)60094-8"},{"key":"e_1_2_9_23_2","doi-asserted-by":"publisher","DOI":"10.1093\/comjnl\/bxw039"},{"key":"e_1_2_9_24_2","doi-asserted-by":"publisher","DOI":"10.1109\/tdsc.2018.2867462"},{"key":"e_1_2_9_25_2","doi-asserted-by":"publisher","DOI":"10.1109\/access.2020.3011137"},{"key":"e_1_2_9_26_2","doi-asserted-by":"publisher","DOI":"10.1109\/access.2019.2941913"},{"key":"e_1_2_9_27_2","doi-asserted-by":"publisher","DOI":"10.1109\/jiot.2020.3041042"},{"key":"e_1_2_9_28_2","doi-asserted-by":"publisher","DOI":"10.3390\/su9040513"},{"key":"e_1_2_9_29_2","first-page":"244","article-title":"Simulation of fingerprint matching identity authentication in wireless local area network","volume":"7","author":"Wang Y. C.","year":"2017","journal-title":"Computer Simulation"},{"key":"e_1_2_9_30_2","doi-asserted-by":"crossref","unstructured":"KamvarS. D.andSchlosserM. T. The eigentrust algorithm for reputation management in P2P networks Proceedings of the 12th international conference on World Wide Web May 2003 New York NY USA.","DOI":"10.1145\/775240.775242"},{"key":"e_1_2_9_31_2","doi-asserted-by":"publisher","DOI":"10.1109\/tbiom.2019.2912401"},{"key":"e_1_2_9_32_2","doi-asserted-by":"publisher","DOI":"10.1109\/tetc.2014.2379991"},{"key":"e_1_2_9_33_2","doi-asserted-by":"publisher","DOI":"10.1109\/tifs.2019.2911170"},{"key":"e_1_2_9_34_2","first-page":"132","article-title":"A quantitative trust assessment method based on bayesian network","volume":"26","author":"Lin Q.","year":"2019","journal-title":"Compute & Technology and development"},{"key":"e_1_2_9_35_2","first-page":"56","article-title":"Access control system based on cross-layer behaviour trust in internet of things","volume":"37","author":"Chen D.","year":"2018","journal-title":"Journal of Chinese Computer Systems"},{"key":"e_1_2_9_36_2","doi-asserted-by":"publisher","DOI":"10.1007\/s40815-020-00845-6"},{"key":"e_1_2_9_37_2","doi-asserted-by":"publisher","DOI":"10.1109\/lpt.2022.3199106"},{"key":"e_1_2_9_38_2","doi-asserted-by":"publisher","DOI":"10.1109\/tvt.2022.3169090"}],"container-title":["International Journal of Intelligent Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/downloads.hindawi.com\/journals\/ijis\/2023\/8899697.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/ijis\/2023\/8899697.xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1155\/2023\/8899697","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,12,31]],"date-time":"2024-12-31T05:27:34Z","timestamp":1735622854000},"score":1,"resource":{"primary":{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/10.1155\/2023\/8899697"}},"subtitle":[],"editor":[{"given":"Lianyong","family":"Qi","sequence":"additional","affiliation":[],"role":[{"role":"editor","vocabulary":"crossref"}]}],"short-title":[],"issued":{"date-parts":[[2023,1]]},"references-count":38,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2023,1]]}},"alternative-id":["10.1155\/2023\/8899697"],"URL":"https:\/\/doi.org\/10.1155\/2023\/8899697","archive":["Portico"],"relation":{},"ISSN":["0884-8173","1098-111X"],"issn-type":[{"value":"0884-8173","type":"print"},{"value":"1098-111X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,1]]},"assertion":[{"value":"2023-01-21","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2023-05-11","order":2,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2023-05-24","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}],"article-number":"8899697"}}