{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,13]],"date-time":"2026-02-13T05:38:42Z","timestamp":1770961122163,"version":"3.50.1"},"reference-count":33,"publisher":"SAGE Publications","issue":"6","license":[{"start":{"date-parts":[[2021,6,1]],"date-time":"2021-06-01T00:00:00Z","timestamp":1622505600000},"content-version":"unspecified","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"FCT\/MCTES through national funds","award":["UIDB\/50008\/2020"],"award-info":[{"award-number":["UIDB\/50008\/2020"]}]},{"name":"Peng Cheng Laboratory Project of Guangdong","award":["PCL2018KP004"],"award-info":[{"award-number":["PCL2018KP004"]}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["U1836115, No. 61672295, No. 61922045, No. 61672290"],"award-info":[{"award-number":["U1836115, No. 61672295, No. 61922045, No. 61672290"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100003593","name":"conselho nacional de desenvolvimento cient\u00edfico e tecnol\u00f3gico","doi-asserted-by":"publisher","award":["313036\/2020-9"],"award-info":[{"award-number":["313036\/2020-9"]}],"id":[{"id":"10.13039\/501100003593","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Jiangsu Key Laboratory of Big Data Security and Intelligent Processing, Nanjing University of Posts and Telecommunications","award":["DSIP1901"],"award-info":[{"award-number":["DSIP1901"]}]},{"DOI":"10.13039\/501100004608","name":"Natural Science Foundation of Jiangsu Province","doi-asserted-by":"publisher","award":["BK20181408"],"award-info":[{"award-number":["BK20181408"]}],"id":[{"id":"10.13039\/501100004608","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["journals.sagepub.com"],"crossmark-restriction":true},"short-container-title":["International Journal of Distributed Sensor Networks"],"published-print":{"date-parts":[[2021,6]]},"abstract":"<jats:p> Internet of Things devices are responsible for collecting and transmitting data in smart cities, assisting smart cities to release greater potential. As Internet of Things devices are increasingly connected to smart cities, security and privacy have gradually become important issues. Recently, research works on mitigating security challenges of Internet of Things devices in smart cities mainly focused on authentication. However, in most of the existing authentication protocols, the trustworthiness evaluation of Internet of Things devices in smart cities is ignored. Considering the trustworthiness evaluation of Internet of Things devices is an important constituent of data source authentication, in this article, a cloud-aided trustworthiness evaluation mechanism is first designed to improve the credibility of the Internet of Things devices in smart cities. Furthermore, aiming at the problem that the user\u2019s privacy is easy to leak in the process of authentication, an anonymous authentication and key agreement scheme based on non-interactive zero knowledge argument is proposed. The proposed scheme can ensure the privacy preservation and data security of Internet of Things devices in smart cities. The security analysis demonstrates that the proposed scheme is secure under q-SDH problem. The experimental simulation indicates that the performance of the proposal is greatly improved compared with other similar schemes. <\/jats:p>","DOI":"10.1177\/15501477211026804","type":"journal-article","created":{"date-parts":[[2021,6,24]],"date-time":"2021-06-24T06:58:02Z","timestamp":1624517882000},"page":"155014772110268","update-policy":"https:\/\/doi.org\/10.1177\/sage-journals-update-policy","source":"Crossref","is-referenced-by-count":28,"title":["An efficient anonymous authentication and key agreement scheme with privacy-preserving for smart cities"],"prefix":"10.1177","volume":"17","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-1194-9444","authenticated-orcid":false,"given":"Xueya","family":"Xia","sequence":"first","affiliation":[{"name":"School of Computer and Software, Nanjing University of Information Science and Technology, Nanjing, China"}]},{"given":"Sai","family":"Ji","sequence":"additional","affiliation":[{"name":"School of Computer and Software, Nanjing University of Information Science and Technology, Nanjing, China"},{"name":"Suqian University, Suqian, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5451-8946","authenticated-orcid":false,"given":"Pandi","family":"Vijayakumar","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Engineering, University College of Engineering Tindivanam, Anna University Chennai, Melpakkam, India"}]},{"given":"Jian","family":"Shen","sequence":"additional","affiliation":[{"name":"School of Computer and Software, Nanjing University of Information Science and Technology, Nanjing, China"},{"name":"Cyberspace Security Research Center, Peng Cheng Laboratory, Shenzhen, China"}]},{"given":"Joel J. P. C.","family":"Rodrigues","sequence":"additional","affiliation":[{"name":"Federal University of Piau\u00ed (UFPI), Teresina, Brazil"},{"name":"Instituto de Telecomunica\u00e7\u00f5es, Covilh\u00e3, Portugal"}]}],"member":"179","published-online":{"date-parts":[[2021,6,23]]},"reference":[{"key":"bibr1-15501477211026804","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2019.2901840"},{"key":"bibr2-15501477211026804","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2019.2899617"},{"key":"bibr3-15501477211026804","doi-asserted-by":"publisher","DOI":"10.1049\/iet-net.2017.0163"},{"key":"bibr4-15501477211026804","doi-asserted-by":"publisher","DOI":"10.1016\/j.measurement.2018.07.067"},{"key":"bibr5-15501477211026804","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2016.10.026"},{"key":"bibr6-15501477211026804","doi-asserted-by":"publisher","DOI":"10.1007\/s10586-017-0848-x"},{"key":"bibr7-15501477211026804","doi-asserted-by":"publisher","DOI":"10.1109\/TIE.2006.881998"},{"key":"bibr8-15501477211026804","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2014.2311791"},{"key":"bibr9-15501477211026804","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2017.2736886"},{"key":"bibr10-15501477211026804","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2015.2492981"},{"key":"bibr11-15501477211026804","doi-asserted-by":"publisher","DOI":"10.1002\/sec.1109"},{"key":"bibr12-15501477211026804","doi-asserted-by":"publisher","DOI":"10.1007\/s10916-015-0265-8"},{"key":"bibr13-15501477211026804","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2020.2998775"},{"key":"bibr14-15501477211026804","doi-asserted-by":"publisher","DOI":"10.1109\/JBHI.2020.3007488"},{"key":"bibr15-15501477211026804","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2016.2634623"},{"key":"bibr16-15501477211026804","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-16837-7_9"},{"key":"bibr17-15501477211026804","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2016.11.024"},{"key":"bibr18-15501477211026804","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2013.145"},{"key":"bibr19-15501477211026804","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2014.2363553"},{"key":"bibr20-15501477211026804","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2015.2414399"},{"key":"bibr21-15501477211026804","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2018.2871761"},{"key":"bibr22-15501477211026804","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2020.2972623"},{"key":"bibr23-15501477211026804","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2015.2496211"},{"key":"bibr24-15501477211026804","doi-asserted-by":"publisher","DOI":"10.1016\/j.jpdc.2019.09.016"},{"key":"bibr25-15501477211026804","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2020.2992801"},{"key":"bibr26-15501477211026804","first-page":"1336","volume":"18","author":"Vasco MIG","year":"2021","journal-title":"IEEE Trans Depend Secure Comput"},{"key":"bibr27-15501477211026804","first-page":"56","volume-title":"Proceedings of the EUROCRYPT 2004, Interlaken","author":"Boneh D"},{"key":"bibr28-15501477211026804","first-page":"288","volume-title":"Proceedings of the international workshop on internet and network economics","author":"Zhao Y"},{"key":"bibr29-15501477211026804","first-page":"186","volume-title":"Proceedings of the conference on the theory and application of cryptographic techniques","author":"Fiat A"},{"key":"bibr30-15501477211026804","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2016.2519820"},{"key":"bibr31-15501477211026804","doi-asserted-by":"publisher","DOI":"10.1137\/S0097539795293172"},{"key":"bibr32-15501477211026804","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2016.2633071"},{"key":"bibr33-15501477211026804","doi-asserted-by":"publisher","DOI":"10.1016\/j.tcs.2012.01.027"}],"container-title":["International Journal of Distributed Sensor Networks"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/journals.sagepub.com\/doi\/pdf\/10.1177\/15501477211026804","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/journals.sagepub.com\/doi\/full-xml\/10.1177\/15501477211026804","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/journals.sagepub.com\/doi\/pdf\/10.1177\/15501477211026804","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,6,24]],"date-time":"2021-06-24T06:58:13Z","timestamp":1624517893000},"score":1,"resource":{"primary":{"URL":"http:\/\/journals.sagepub.com\/doi\/10.1177\/15501477211026804"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,6]]},"references-count":33,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2021,6]]}},"alternative-id":["10.1177\/15501477211026804"],"URL":"https:\/\/doi.org\/10.1177\/15501477211026804","relation":{},"ISSN":["1550-1477","1550-1477"],"issn-type":[{"value":"1550-1477","type":"print"},{"value":"1550-1477","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,6]]}}}