{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,27]],"date-time":"2026-02-27T05:06:26Z","timestamp":1772168786455,"version":"3.50.1"},"reference-count":27,"publisher":"SAGE Publications","issue":"7","license":[{"start":{"date-parts":[[2019,7,1]],"date-time":"2019-07-01T00:00:00Z","timestamp":1561939200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/journals.sagepub.com\/page\/policies\/text-and-data-mining-license"}],"funder":[{"DOI":"10.13039\/501100002560","name":"Soonchunhyang University","doi-asserted-by":"publisher","award":["the Soonchunhyang University research fund"],"award-info":[{"award-number":["the Soonchunhyang University research fund"]}],"id":[{"id":"10.13039\/501100002560","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100012166","name":"national basic research program of china (973 program)","doi-asserted-by":"publisher","award":["2017YFB0802300"],"award-info":[{"award-number":["2017YFB0802300"]}],"id":[{"id":"10.13039\/501100012166","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["journals.sagepub.com"],"crossmark-restriction":true},"short-container-title":["International Journal of Distributed Sensor Networks"],"published-print":{"date-parts":[[2019,7]]},"abstract":"<jats:p> Space-air-ground integrated Internet of things can improve the scope of Internet of things applications significantly by offering truly global coverage all over the world. While space-air-ground integrated Internet of things is promising to be very useful in many aspects, its deployment and application should overcome severe security threats, for example, interceptions, identity forgery, data tampering, and so on. Authentication is an essential step to protect the Internet of things security, and mutual authentication (i.e. two-way authentication) is especially important to ensure the security of both communication parties simultaneously. However, the intrinsical properties of network dynamics and wide coverage make the authentication concern in space-air-ground integrated Internet of things extremely challenging than traditional Internet of things networks. In this article, we propose MASIT, an identity-based efficient and lightweight mutual authentication scheme for space-air-ground integrated Internet of things. MASIT exploits the natural broadcast property of space-air-ground integrated Internet of things to speed up authentication process, and leverage the distinguished feature of IPv6 to support concurrent numerous nodes. Theoretically, we prove that MASIT is existential unforgeable secure under adaptively chosen message and identity Attacks. We also implement MASIT and other existing typical identity-based encryption schemes and evaluate their performance in real platforms. Experimental results showed that, MASIT outperforms the existing identity-based encryption schemes significantly, that is, the signature verification time can be reduced by 50% to 60%, and the user signature size can be reduced by 13% to 50%. <\/jats:p>","DOI":"10.1177\/1550147719860390","type":"journal-article","created":{"date-parts":[[2019,7,3]],"date-time":"2019-07-03T05:25:17Z","timestamp":1562131517000},"page":"155014771986039","update-policy":"https:\/\/doi.org\/10.1177\/sage-journals-update-policy","source":"Crossref","is-referenced-by-count":20,"title":["Toward efficient authentication for space-air-ground integrated Internet of things"],"prefix":"10.1177","volume":"15","author":[{"given":"Baokang","family":"Zhao","sequence":"first","affiliation":[{"name":"College of Computer Science and Technology, National University of Defense Technology, Changsha, P.R. China"}]},{"given":"Puguang","family":"Liu","sequence":"additional","affiliation":[{"name":"College of Computer Science and Technology, National University of Defense Technology, Changsha, P.R. China"}]},{"given":"Xiaofeng","family":"Wang","sequence":"additional","affiliation":[{"name":"College of Computer Science and Technology, National University of Defense Technology, Changsha, P.R. China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0604-3445","authenticated-orcid":false,"given":"Ilsun","family":"You","sequence":"additional","affiliation":[{"name":"Department of Information Security Engineering, Soonchunhyang University, Asan-si, Republic of Korea"}]}],"member":"179","published-online":{"date-parts":[[2019,7,3]]},"reference":[{"issue":"2","key":"bibr1-1550147719860390","first-page":"1","volume":"8","author":"Shih C","year":"2018","journal-title":"J Internet Serv Inf Secur"},{"issue":"4","key":"bibr2-1550147719860390","first-page":"37","volume":"8","author":"Taqieddin E","year":"2017","journal-title":"Jowua"},{"key":"bibr3-1550147719860390","doi-asserted-by":"publisher","DOI":"10.1063\/1.5067349"},{"key":"bibr5-1550147719860390","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2893775"},{"issue":"4","key":"bibr6-1550147719860390","first-page":"41","volume":"9","author":"Choudhary G","year":"2018","journal-title":"Jowua"},{"issue":"1","key":"bibr7-1550147719860390","first-page":"2","volume":"8","author":"Wang C","year":"2018","journal-title":"J Internet Serv Inf Secur"},{"key":"bibr8-1550147719860390","first-page":"310","volume-title":"Revised papers from the 9th annual international workshop on selected areas in cryptography (SAC \u201902)","author":"Hess F"},{"key":"bibr9-1550147719860390","first-page":"18","volume-title":"Proceedings of the 6th international workshop on theory and practice in public key cryptography: public key cryptography (PKC \u201903)","author":"Cha JC"},{"key":"bibr10-1550147719860390","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2016.2622682"},{"key":"bibr11-1550147719860390","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2018.2857775"},{"key":"bibr12-1550147719860390","doi-asserted-by":"publisher","DOI":"10.1504\/IJICS.2016.078123"},{"key":"bibr13-1550147719860390","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-015-2449-4"},{"issue":"2","key":"bibr16-1550147719860390","first-page":"79","volume":"38","author":"Hao XW","year":"2011","journal-title":"Comp Sci"},{"key":"bibr17-1550147719860390","first-page":"1","volume-title":"5th international conference on wireless communications, networking and mobile computing (WiCom\u201909)","author":"Qian Y"},{"issue":"8","key":"bibr18-1550147719860390","first-page":"1778","volume":"32","author":"Fang R","year":"2011","journal-title":"J Astronautics"},{"key":"bibr19-1550147719860390","doi-asserted-by":"publisher","DOI":"10.1155\/2011\/392529"},{"key":"bibr20-1550147719860390","doi-asserted-by":"publisher","DOI":"10.1186\/1687-1499-2011-86"},{"key":"bibr21-1550147719860390","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2015.2416396"},{"key":"bibr22-1550147719860390","doi-asserted-by":"publisher","DOI":"10.1002\/sat.1179"},{"key":"bibr24-1550147719860390","doi-asserted-by":"publisher","DOI":"10.3724\/SP.J.1146.2009.00461"},{"issue":"10","key":"bibr25-1550147719860390","first-page":"96","volume":"38","author":"Wu Y","year":"2011","journal-title":"Comp Sci"},{"key":"bibr27-1550147719860390","first-page":"446","volume-title":"International conference on security, privacy and anonymity in computation, communication and storage","author":"Li S"},{"issue":"3","key":"bibr28-1550147719860390","first-page":"97","volume":"4","author":"Jara AJ","year":"2013","journal-title":"Jowua"},{"key":"bibr29-1550147719860390","first-page":"277","volume-title":"International workshop on public key cryptography","author":"Zhang F"},{"key":"bibr30-1550147719860390","first-page":"54","volume":"2003","author":"Sakai R","year":"2003","journal-title":"IACR Cryptol"},{"key":"bibr31-1550147719860390","first-page":"515","volume-title":"International conference on the theory and application of cryptology and information security","author":"Barreto PS"},{"key":"bibr33-1550147719860390","doi-asserted-by":"publisher","DOI":"10.1007\/s00145-001-0009-4"}],"container-title":["International Journal of Distributed Sensor Networks"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/journals.sagepub.com\/doi\/pdf\/10.1177\/1550147719860390","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/journals.sagepub.com\/doi\/full-xml\/10.1177\/1550147719860390","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/journals.sagepub.com\/doi\/pdf\/10.1177\/1550147719860390","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,20]],"date-time":"2019-09-20T14:41:53Z","timestamp":1568990513000},"score":1,"resource":{"primary":{"URL":"http:\/\/journals.sagepub.com\/doi\/10.1177\/1550147719860390"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,7]]},"references-count":27,"journal-issue":{"issue":"7","published-online":{"date-parts":[[2019,7,3]]},"published-print":{"date-parts":[[2019,7]]}},"alternative-id":["10.1177\/1550147719860390"],"URL":"https:\/\/doi.org\/10.1177\/1550147719860390","relation":{},"ISSN":["1550-1477","1550-1477"],"issn-type":[{"value":"1550-1477","type":"print"},{"value":"1550-1477","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,7]]}}}