{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,15]],"date-time":"2026-03-15T23:04:54Z","timestamp":1773615894651,"version":"3.50.1"},"reference-count":9,"publisher":"Allerton Press","issue":"8","license":[{"start":{"date-parts":[[2021,12,1]],"date-time":"2021-12-01T00:00:00Z","timestamp":1638316800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2021,12,1]],"date-time":"2021-12-01T00:00:00Z","timestamp":1638316800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Aut. Control Comp. Sci."],"published-print":{"date-parts":[[2021,12]]},"DOI":"10.3103\/s0146411621080034","type":"journal-article","created":{"date-parts":[[2022,3,1]],"date-time":"2022-03-01T03:03:08Z","timestamp":1646103788000},"page":"1087-1091","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Authentication of Control Devices in the Internet of Things with the Architecture of Edge Computing"],"prefix":"10.3103","volume":"55","author":[{"given":"E. B.","family":"Aleksandrova","sequence":"first","affiliation":[]},{"given":"A. Yu.","family":"Oblogina","sequence":"additional","affiliation":[]},{"given":"E. N.","family":"Shkorkina","sequence":"additional","affiliation":[]}],"member":"1627","published-online":{"date-parts":[[2022,3,1]]},"reference":[{"key":"7438_CR1","doi-asserted-by":"publisher","unstructured":"Zegzhda, P., Zegzhda, D., Kalinin, M., Pechenkin, A., Minin, A., and Lavrova, D., Safe integration of SIEM systems with Internet of Things: Data aggregation, integrity control, and bioinspired safe routing, Proc. 9th Int. Conf. on Security of Information and Networks, Newark, N.J., 2016, New York: Association for Computing Machinery, 2016, pp. 81\u201387. \u00a0https:\/\/doi.org\/10.1145\/2947626.2947639","DOI":"10.1145\/2947626.2947639"},{"key":"7438_CR2","doi-asserted-by":"publisher","unstructured":"Lim, S., Kalinin, M., and Zegzhda, P., Bioinspired intrusion detection in ITC infrastructures, Technological Transformation: A New Role for Human, Machines and Management. TT 2020, Schaumburg, H., Korablev, V., and Ungvari, L., Eds., Lecture Notes in Networks and Systems, vol. 157, Cham: Springer, 2021, pp. 10\u201322. https:\/\/doi.org\/10.1007\/978-3-030-64430-7_2","DOI":"10.1007\/978-3-030-64430-7_2"},{"key":"7438_CR3","doi-asserted-by":"publisher","first-page":"971","DOI":"10.3103\/S0146411618080084","volume":"52","author":"R.A. Demidov","year":"2018","unstructured":"Demidov, R.A., Zegzhda, P.D., and Kalinin, M.O., Threat analysis of cyber security in wireless adhoc networks using hybrid neural network model, Autom. Control Comput. Sci., 2018, vol. 52, no. 8, pp. 971\u2013976. \u00a0https:\/\/doi.org\/10.3103\/S0146411618080084","journal-title":"Autom. Control Comput. Sci."},{"key":"7438_CR4","doi-asserted-by":"publisher","first-page":"965","DOI":"10.3103\/S0146411618080072","volume":"52","author":"R.A. Demidov","year":"2018","unstructured":"Demidov, R.A., Pechenkin, A.I., Zegzhda, P.D., and Kalinin, M.O., Application model of modern artificial neural network methods for the analysis of information systems security, Autom. Control Comput. Sci., 2018, vol.\u00a052, no. 8, pp. 965\u2013970. \u00a0https:\/\/doi.org\/10.3103\/S0146411618080072","journal-title":"Autom. Control Comput. Sci."},{"key":"7438_CR5","unstructured":"How edge computing complements the cloud in IoT: A guide on how edge computing complements the cloud in IoT, Bosch.IO. https:\/\/bosch.io\/resources\/white-paper\/iot-edge-computing. Cited March 10, 2021."},{"key":"7438_CR6","doi-asserted-by":"publisher","first-page":"195","DOI":"10.1016\/j.dcan.2019.08.006","volume":"6","author":"K. Sha","year":"2020","unstructured":"Sha, K., Yang, T.A., Wei, W., and Davari, S., A survey of edge computing based designs for IoT security, Digital Commun. \n               Networks, 2020, vol. 6, no. 2, pp. 195\u2013202. \u00a0https:\/\/doi.org\/10.1016\/j.dcan.2019.08.006","journal-title":"Networks"},{"key":"7438_CR7","doi-asserted-by":"publisher","first-page":"11766","DOI":"10.1109\/JIOT.2020.3002221","volume":"7","author":"M. Nakkar","year":"2020","unstructured":"Nakkar, M., Altawy, R., and Youssef, A., Lightweight broadcast authentication protocol for edge-based applications, IEEE Internet Things J., 2020, vol. 7, no. 12, pp. 11766\u201311777. \u00a0https:\/\/doi.org\/10.1109\/JIOT.2020.3002221","journal-title":"IEEE Internet Things J."},{"key":"7438_CR8","doi-asserted-by":"publisher","unstructured":"Yang, A., Weng, J., Yang, K., Huang, C., and Shen, X., Delegating authentication to edge: a decentralized authentication architecture for vehicular networks, IEEE Trans. Intell. Transp. Syst., 2020, pp. 1\u201315. \u00a0https:\/\/doi.org\/10.1109\/TITS.2020.3024000","DOI":"10.1109\/TITS.2020.3024000"},{"key":"7438_CR9","doi-asserted-by":"publisher","unstructured":"Shahidinejad, A., Ghobaei-Arani, M., Souri, A., Shojafar, M., and Kumari, S., Light-Edge: A lightweight authentication protocol for IoT devices in an edge-cloud environment, IEEE Consum. Electron. Mag., 2021, p. 1. https:\/\/doi.org\/10.1109\/MCE.2021.3053543","DOI":"10.1109\/MCE.2021.3053543"}],"container-title":["Automatic Control and Computer Sciences"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.3103\/S0146411621080034.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.3103\/S0146411621080034","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.3103\/S0146411621080034.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,15]],"date-time":"2026-03-15T22:06:34Z","timestamp":1773612394000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.3103\/S0146411621080034"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,12]]},"references-count":9,"journal-issue":{"issue":"8","published-print":{"date-parts":[[2021,12]]}},"alternative-id":["7438"],"URL":"https:\/\/doi.org\/10.3103\/s0146411621080034","relation":{},"ISSN":["0146-4116","1558-108X"],"issn-type":[{"value":"0146-4116","type":"print"},{"value":"1558-108X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,12]]},"assertion":[{"value":"20 April 2021","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"20 April 2021","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"20 April 2021","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"1 March 2022","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"The authors declare that they have no conflicts of interest.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"CONFLICT OF INTEREST"}}]}}