{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,29]],"date-time":"2026-01-29T20:37:35Z","timestamp":1769719055996,"version":"3.49.0"},"reference-count":69,"publisher":"SAGE Publications","issue":"4","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IFS"],"published-print":{"date-parts":[[2023,10,4]]},"abstract":"<jats:p>With the ever-increasing demand for IoT Devices which enable all objects to connect and exchange information in applications such as healthcare applications, Industry 4.0, smart cities and smart homes, etc. IoT devices play a crucial role in our day-to-day life like homes, offices, healthcare, wearable, and agriculture. With the development of IoT devices, securing device-to-device communication has attracted more and more attention and we need to ensure the privacy and security of data amongst these IoT devices. User authentication has emerged as a major security concern while connecting IoT devices and the cloud. Many authentication schemes like mutual authentication, group authentication have been proposed to ensure only authenticated users and with very high confidence we can rely on the decision-making process. Symmetric key based as well as Asymmetric key-based solutions have been proposed but due to the resource constraint nature of the IoT devices designing lightweight, robust, provably secure authentication schemes is a big challenge. This paper discusses the various authentication techniques designed for low-powered IoT devices and proposes a lightweight authentication scheme for IoT.<\/jats:p>","DOI":"10.3233\/jifs-232388","type":"journal-article","created":{"date-parts":[[2023,7,18]],"date-time":"2023-07-18T12:05:01Z","timestamp":1689681901000},"page":"5423-5439","source":"Crossref","is-referenced-by-count":11,"title":["Lightweight Security for IoT"],"prefix":"10.1177","volume":"45","author":[{"family":"Saurabh","sequence":"first","affiliation":[{"name":"Department of Computer Science & Engineering, Lovely Professional University, Jalandhar, India"}]},{"given":"Chirag","family":"Sharma","sequence":"additional","affiliation":[{"name":"Department of Computer Science & Engineering, Lovely Professional University, Jalandhar, India"}]},{"given":"Shakir","family":"Khan","sequence":"additional","affiliation":[{"name":"College of Computer and Information Sciences, Imam Mohammad Ibn Saud Islamic University (IMSIU), Riyadh, Saudi Arabia"},{"name":"Department of Computer Science and Engineering, University Centre for Research and Development (UCRD), Chandigarh University, Mohali, India"}]},{"given":"Shubham","family":"Mahajan","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Engineering, University Centre for Research and Development (UCRD), Chandigarh University, Mohali, India"},{"name":"Ajeenkya D Y Patil University, Pune, Maharashtra, (iNurture Education Solutions Pvt. Ltd., Bangalore), Pune, Maharashtra, India"},{"name":"MEU Research Unit, Middle East University, Amman, Jordan"}]},{"given":"Hatoon S.","family":"Alsagri","sequence":"additional","affiliation":[{"name":"College of Computer and Information Sciences, Imam Mohammad Ibn Saud Islamic University (IMSIU), Riyadh, Saudi Arabia"}]},{"given":"Abrar","family":"Almjally","sequence":"additional","affiliation":[{"name":"College of Computer and Information Sciences, Imam Mohammad Ibn Saud Islamic University (IMSIU), Riyadh, Saudi Arabia"}]},{"given":"Bayan Ibrahimm","family":"Alabduallah","sequence":"additional","affiliation":[{"name":"Department of Information System, College of Computer and Information Sciences, Princess Nourah Bint Abdulrahman University, Riyadh, Saudi Arabia"}]},{"given":"Asrar Ahmad","family":"Ansari","sequence":"additional","affiliation":[{"name":"Researcher\/E-Learning Consultant Medical Education Department, College of Medicine, King Saud University, Bayan Ibrahimm Alabduallah, Riyadh, Saudi Arabia"}]}],"member":"179","reference":[{"key":"10.3233\/JIFS-232388_ref2","doi-asserted-by":"crossref","first-page":"351","DOI":"10.1016\/j.adhoc.2004.04.003","article-title":"Wireless sensor and actor networks research challenges","volume":"2","author":"Ian Akyildiz","year":"2004","journal-title":"Elsevier Ad Hoc Networks"},{"issue":"3","key":"10.3233\/JIFS-232388_ref4","doi-asserted-by":"crossref","first-page":"3440","DOI":"10.1109\/JSYST.2020.2970167","article-title":"A Lightweight ECC-Based Authentication Scheme for Internet of Things (IoT)","volume":"14","author":"Hammi","year":"2020","journal-title":"IEEE Systems Journal"},{"issue":"1","key":"10.3233\/JIFS-232388_ref5","doi-asserted-by":"publisher","first-page":"288","DOI":"10.1109\/JIOT.2017.2737630","article-title":"A Lightweight Authentication Mechanism for M2M Communications in Industrial IoT Environment","volume":"6","author":"Esfahani","year":"2017","journal-title":"IEEE Internet of Things Journal"},{"key":"10.3233\/JIFS-232388_ref6","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1155\/2021\/8871204","article-title":"A Secure and Lightweight Three-Factor Remote User Authentication Protocol for Future IoT Applications","volume":"2021","author":"Bahaa Hussein Taher","year":"2021","journal-title":"Hindawi Journal of Sensors"},{"issue":"9","key":"10.3233\/JIFS-232388_ref7","doi-asserted-by":"crossref","first-page":"7949","DOI":"10.1109\/JIOT.2020.2992288","article-title":"LH-ABSC: A Lightweight Hybrid Attribute-Based Signcryption Scheme for Cloud-Fog-Assisted IoT","volume":"7","author":"Jiguo Yu","year":"2020","journal-title":"IEEE Internet of Things Journal"},{"issue":"4","key":"10.3233\/JIFS-232388_ref8","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/LSENS.2019.2905020","article-title":"Session-Key Establishment and Authentication in a Smart Home Network using Public Key Cryptography","volume":"3","author":"Shreya Dey","year":"2019","journal-title":"IEEE Sensors Letters"},{"key":"10.3233\/JIFS-232388_ref9","doi-asserted-by":"publisher","first-page":"3028","DOI":"10.1109\/ACCESS.2017.2676119","article-title":"Secure Signature-Based Authenticated Key Establishment Scheme for Future IoT Applications","volume":"5","author":"Sravani Challa","journal-title":"IEEE Access"},{"key":"10.3233\/JIFS-232388_ref10","doi-asserted-by":"publisher","DOI":"10.1109\/UEMCON.2018.8796578"},{"key":"10.3233\/JIFS-232388_ref11","doi-asserted-by":"publisher","first-page":"55382","DOI":"10.1109\/ACCESS.2019.2912998","article-title":"Provably Secure ECC-Based Device Access Control and Key Agreement Protocol for IoT Environment","volume":"7","author":"Ashok Kumar Das","year":"2019","journal-title":"IEEE Access"},{"issue":"1","key":"10.3233\/JIFS-232388_ref12","doi-asserted-by":"publisher","first-page":"555","DOI":"10.1109\/JIOT.2020.3009024","article-title":"P-HIP: A Lightweight and Privacy-Aware Host Identity Protocol for Internet of Things","volume":"8","author":"Mahmud Hossain","year":"2021","journal-title":"IEEE Internet of Things Journal"},{"issue":"7","key":"10.3233\/JIFS-232388_ref13","doi-asserted-by":"publisher","first-page":"5904","DOI":"10.1109\/JIOT.2020.3032518","article-title":"SRAM-PUF-Based Entities Authentication Scheme for Resource-Constrained IoT Devices","volume":"8","author":"Fadi Farha","year":"2021","journal-title":"IEEE Internet of Things Journal"},{"issue":"5","key":"10.3233\/JIFS-232388_ref14","doi-asserted-by":"publisher","first-page":"4598","DOI":"10.1109\/JIOT.2019.2942271","article-title":"Toward Secure and Provable Authentication for Internet of Things: Realizing Industry 4.0","volume":"7","author":"Sahil Garg","year":"2020","journal-title":"IEEE Internet of Things Journal"},{"issue":"1","key":"10.3233\/JIFS-232388_ref15","doi-asserted-by":"publisher","first-page":"621","DOI":"10.1109\/JIOT.2019.2953549","article-title":"LiKe: Lightweight Certificateless Key Agreement for Secure IoT Communications","volume":"7","author":"Pietro Tedeschi","year":"2020","journal-title":"IEEE Internet of Things Journal"},{"issue":"8","key":"10.3233\/JIFS-232388_ref16","doi-asserted-by":"publisher","first-page":"359","DOI":"10.1109\/TSUSC.2017.2716953","article-title":"Lightweight Mutual Authentication for IoT and Its Applications","volume":"14","author":"Nan Li","year":"2015","journal-title":"Journal of Latex Class Files"},{"key":"10.3233\/JIFS-232388_ref17","doi-asserted-by":"publisher","first-page":"15210","DOI":"10.1109\/ACCESS.2019.2894062","article-title":"Light-Weight and Privacy-Preserving Authentication Protocol for Mobile Payments in the Context of IoT","volume":"7","author":"Yanan Chen","year":"2019","journal-title":"IEEE Access"},{"key":"10.3233\/JIFS-232388_ref18","doi-asserted-by":"publisher","DOI":"10.1109\/GIOTS.2018.8534575"},{"issue":"5","key":"10.3233\/JIFS-232388_ref19","doi-asserted-by":"publisher","first-page":"3977","DOI":"10.1109\/JIOT.2019.2958079","article-title":"Lightweight Tag-Based PHY-Layer Authentication for IoT Devices in Smart Cities","volume":"7","author":"Pinchang Zhang","year":"2020","journal-title":"IEEE Internet of Things Journal"},{"issue":"1","key":"10.3233\/JIFS-232388_ref20","doi-asserted-by":"crossref","first-page":"233","DOI":"10.32604\/cmc.2022.017971","article-title":"A Cost-Effective Approach for NDN-Based Internet of Medical Things Deployment, Computers","volume":"70","author":"Syed Sajid Ullah","journal-title":"Materials & Continua"},{"issue":"5","key":"10.3233\/JIFS-232388_ref21","doi-asserted-by":"publisher","first-page":"8739","DOI":"10.1109\/JIOT.2019.2923373","article-title":"A Provably Secure and Lightweight Anonymous User Authenticated Session Key Exchange Scheme for Internet of Things Deployment","volume":"6","author":"Soumya Banerjee","year":"2019","journal-title":"IEEE Internet of Things Journal"},{"key":"10.3233\/JIFS-232388_ref22","doi-asserted-by":"publisher","first-page":"53922","DOI":"10.1109\/ACCESS.2019.2912870","article-title":"A Lightweight Mutual Authentication and Key Agreement Scheme for Medical Internet of Things","volume":"7","author":"Zisang Xu","year":"2019","journal-title":"IEEE Access"},{"issue":"2","key":"10.3233\/JIFS-232388_ref23","doi-asserted-by":"publisher","first-page":"57","DOI":"10.1109\/MCE.2021.3053543","article-title":"Light-Edge: A Lightweight Authentication Protocol for IoT Devices in an Edge-Cloud Environment","volume":"11","author":"Ali Shahidinejad","year":"2022","journal-title":"IEEE Consumer Electronics Magazine"},{"key":"10.3233\/JIFS-232388_ref24","first-page":"1","article-title":"A three-factor anonymous user authentication scheme for Internet of Things environments","volume":"52","author":"Hakjun Lee","year":"2020","journal-title":"Journal of Information Security and Applications"},{"key":"10.3233\/JIFS-232388_ref25","doi-asserted-by":"publisher","first-page":"165536","DOI":"10.1109\/ACCESS.2020.3021701","article-title":"A Novel Lightweight Block Cipher-Based Mutual Authentication Protocol for Constrained Environments","volume":"8","author":"Cuong Trinh","year":"2020","journal-title":"IEEE Access"},{"key":"10.3233\/JIFS-232388_ref26","doi-asserted-by":"crossref","first-page":"1114","DOI":"10.1007\/s11227-020-03318-7","article-title":"A lightweight remote user authentication scheme for IoT communication using elliptic curve cryptography","volume":"77","author":"Dipanwita Sadhukhan","journal-title":"The Journal of Supercomputing"},{"issue":"3","key":"10.3233\/JIFS-232388_ref27","doi-asserted-by":"publisher","first-page":"3440","DOI":"10.1109\/JSYST.2020.2970167","article-title":"A Lightweight ECC-Based Authentication Scheme for Internet of Things (IoT)","volume":"14","author":"Badis Hammi","year":"2020","journal-title":"IEEE Systems Journal"},{"key":"10.3233\/JIFS-232388_ref29","doi-asserted-by":"publisher","DOI":"10.1109\/IVSW.2019.8854438"},{"key":"10.3233\/JIFS-232388_ref30","doi-asserted-by":"publisher","first-page":"139244","DOI":"10.1109\/ACCESS.2020.3012121","article-title":"A secure and reliable device access control scheme for IoT based sensor cloud systems","volume":"8","author":"Shehzad Ashraf Chaudhry","year":"2020","journal-title":"IEEE Access"},{"key":"10.3233\/JIFS-232388_ref31","doi-asserted-by":"publisher","first-page":"8754","DOI":"10.1109\/ACCESS.2019.2962912","article-title":"Secure Remote Multi-Factor Authentication Scheme Based on Chaotic Map Zero-Knowledge Proof for Crowdsourcing Internet of Things","volume":"8","author":"Wenzheng Liu","year":"2019","journal-title":"IEEE Access"},{"key":"10.3233\/JIFS-232388_ref32","doi-asserted-by":"publisher","first-page":"132808","DOI":"10.1109\/ACCESS.2020.3010302","article-title":"Robust and Lightweight Key Exchange (LKE) Protocol for Industry 4.0","volume":"8","author":"Gurjot Singh Gaba","year":"2020","journal-title":"IEEE Access"},{"issue":"2s","key":"10.3233\/JIFS-232388_ref34","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3398039","article-title":"Lightweight Multi-party Authentication and Key Agreement Protocol in IoT-based E-Healthcare Service","volume":"17","author":"Amiya Kumar Sahu","journal-title":"ACM Transactions on Multimedia Computing, Communications, and Applications"},{"key":"10.3233\/JIFS-232388_ref35","doi-asserted-by":"publisher","first-page":"119387","DOI":"10.1109\/ACCESS.2020.3005592","article-title":"LAKS-NVT: Provably Secure and Lightweight Authentication and Key Agreement Scheme Without Verification Table in Medical Internet of Things","volume":"8","author":"Kisung Park","year":"2020","journal-title":"IEEE Access"},{"key":"10.3233\/JIFS-232388_ref36","doi-asserted-by":"publisher","first-page":"195914","DOI":"10.1109\/ACCESS.2020.3034219","article-title":"A Physically Secure, Lightweight Three-Factor and Anonymous User Authentication Protocol for IoT","volume":"8","author":"Zhenhua Liu","year":"2020","journal-title":"IEEE Access"},{"key":"10.3233\/JIFS-232388_ref38","doi-asserted-by":"publisher","first-page":"60539","DOI":"10.1109\/ACCESS.2020.2983117","article-title":"Lightweight Authenticated-Encryption Scheme for Internet of Things Based on Publish-Subscribe Communication","volume":"8","author":"Abebe Diro","year":"2020","journal-title":"IEEE Access"},{"key":"10.3233\/JIFS-232388_ref39","doi-asserted-by":"publisher","first-page":"85627","DOI":"10.1109\/ACCESS.2019.2926578","article-title":"Physically Secure Lightweight Anonymous User Authentication Protocol for Internet of Things Using Physically Unclonable Functions","volume":"7","author":"Soumya Banerjee","year":"2019","journal-title":"IEEE Access"},{"key":"10.3233\/JIFS-232388_ref40","doi-asserted-by":"publisher","first-page":"69722","DOI":"10.1109\/ACCESS.2020.2986480","article-title":"Robust and Lightweight Mutual Authentication Scheme in Distributed Smart Environments","volume":"8","author":"Gurjot Singh Gaba","year":"2020","journal-title":"IEEE Access"},{"issue":"12","key":"10.3233\/JIFS-232388_ref41","doi-asserted-by":"publisher","first-page":"11766","DOI":"10.1109\/JIOT.2020.3002221","article-title":"Lightweight Broadcast Authentication Protocol for Edge-Based Applications","volume":"7","author":"Mouna Nakkar","year":"2020","journal-title":"IEEE Internet of Things Journal"},{"key":"10.3233\/JIFS-232388_ref42","first-page":"1","article-title":"Lightweight Privacy-Preserving Data Sharing Scheme for Internet of Medical Things","volume":"2021","author":"Zhuo Zhao","journal-title":"Journal of Wireless Communications and Mobile Computing"},{"key":"10.3233\/JIFS-232388_ref43","doi-asserted-by":"publisher","DOI":"10.1109\/VTCSpring.2018.8417686"},{"key":"10.3233\/JIFS-232388_ref44","doi-asserted-by":"publisher","first-page":"113498","DOI":"10.1109\/ACCESS.2020.3002815","article-title":"Scalable and Secure Big Data IoT System Based on Multifactor Authentication and Lightweight Cryptography","volume":"8","author":"Saleh Atiewi","year":"2020","journal-title":"IEEE Access"},{"key":"10.3233\/JIFS-232388_ref45","doi-asserted-by":"publisher","first-page":"97267","DOI":"10.1109\/ACCESS.2020.2996264","article-title":"Security Enhancement on a Lightweight Authentication Scheme With Anonymity Fog Computing Architecture","volume":"8","author":"Lin Wang","year":"2020","journal-title":"IEEE Access"},{"key":"10.3233\/JIFS-232388_ref46","doi-asserted-by":"publisher","first-page":"48285","DOI":"10.1109\/ACCESS.2020.2979906","article-title":"A Secure Remote Mutual Authentication Scheme Based on Chaotic Map for Underwater Acoustic Networks","volume":"8","author":"Shuailiang Zhang","year":"2020","journal-title":"IEEE Access"},{"key":"10.3233\/JIFS-232388_ref47","doi-asserted-by":"publisher","first-page":"52018","DOI":"10.1109\/ACCESS.2020.2980739","article-title":"A Secure Framework for Authentication and Encryption Using Improved ECC for IoT-Based Medical Sensor Data","volume":"8","author":"Mohammad Ayoub Khan","year":"2020","journal-title":"IEEE Access"},{"issue":"5","key":"10.3233\/JIFS-232388_ref48","doi-asserted-by":"publisher","first-page":"625","DOI":"10.26599\/TST.2019.9010072","article-title":"ePUF: A Lightweight Double Identity Verification in IoT","volume":"25","author":"Bo Zhao","year":"2020","journal-title":"Tsinghua Science and Technology"},{"issue":"6","key":"10.3233\/JIFS-232388_ref50","doi-asserted-by":"publisher","first-page":"2074","DOI":"10.1109\/TII.2016.2604681","article-title":"A Mutual Authentication and Key Establishment Scheme for M2M Communication in 6LoWPAN Networks","volume":"12","author":"Yue Qiu","year":"2016","journal-title":"IEEE Transactions on Industrial Informatics"},{"issue":"6","key":"10.3233\/JIFS-232388_ref51","doi-asserted-by":"publisher","first-page":"4279","DOI":"10.1109\/TII.2020.3008012","article-title":"Efficient and Lightweight Data Streaming Authentication in Industrial Control and Automation Systems","volume":"17","author":"Jian Xu","year":"2021","journal-title":"IEEE Transactions on Industrial Informatics"},{"issue":"6","key":"10.3233\/JIFS-232388_ref52","doi-asserted-by":"publisher","first-page":"1133","DOI":"10.1109\/TDSC.2018.2857811","article-title":"Anonymous Lightweight Chaotic Map-Based Authenticated Key Agreement Protocol for Industrial Internet of Things","volume":"17","author":"Jangirala Srinivas","year":"2020","journal-title":"IEEE Transactions On Dependable And Secure Computing"},{"issue":"1","key":"10.3233\/JIFS-232388_ref53","doi-asserted-by":"publisher","first-page":"39","DOI":"10.1109\/JSYST.2019.2899580","article-title":"A Secure Three-Factor User Authentication Protocol With Forward Secrecy for Wireless Medical Sensor Network Systems","volume":"14","author":"Xiong Li","year":"2020","journal-title":"IEEE Systems Journal"},{"key":"10.3233\/JIFS-232388_ref54","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-37468-6_25"},{"issue":"12","key":"10.3233\/JIFS-232388_ref55","doi-asserted-by":"publisher","first-page":"14188","DOI":"10.1109\/TVT.2020.3038834","article-title":"A Lightweight Authentication and Attestation Scheme for In-Transit Vehicles in IoV Scenario","volume":"69","author":"Tejasvi Alladi","year":"2020","journal-title":"IEEE Transactions on Vehicular Technology"},{"key":"10.3233\/JIFS-232388_ref56","doi-asserted-by":"crossref","first-page":"168","DOI":"10.1016\/j.compeleceng.2017.04.012","article-title":"A lightweight and privacy-preserving mutual authentication scheme for wearable devices assisted by cloud server","volume":"63","author":"Fan Wua","year":"2017","journal-title":"Journal of Computers & Electrical Engineering"},{"issue":"7","key":"10.3233\/JIFS-232388_ref57","doi-asserted-by":"crossref","first-page":"01","DOI":"10.1002\/cpe.7602","article-title":"A secure communication using multifactor authentication and key agreement techniques in internet of medical things for COVID-19 patients","volume":"35","author":"Chunka","year":"2023","journal-title":"Concurrency and Computation: Practice and Experience, Wiley"},{"key":"10.3233\/JIFS-232388_ref58","first-page":"5022","article-title":"A Secure and Lightweight Data Sharing Scheme for Internet of Medical Things","volume":"8","author":"Xiuqing Lu","year":"2019","journal-title":"IEEE Access"},{"issue":"Part 3","key":"10.3233\/JIFS-232388_ref59","doi-asserted-by":"crossref","first-page":"1005","DOI":"10.1016\/j.future.2016.12.028","article-title":"A light weight authentication protocol for IoT-enabled devices in distributed Cloud Computing environment","volume":"78","author":"Ruhul Amin","year":"2018","journal-title":"Future Generation Computer Systems"},{"issue":"1","key":"10.3233\/JIFS-232388_ref60","first-page":"01","article-title":"Lightweight Cryptographic Algorithms Based on Different Model Architectures: A Systematic Review and Futuristic Applications","volume":"35","author":"Bhagat","year":"2022","journal-title":"Concurrency and Computation: Practice and Experience, Wiley"},{"key":"10.3233\/JIFS-232388_ref61","doi-asserted-by":"publisher","first-page":"98910","DOI":"10.1109\/ACCESS.2020.2995080","article-title":"A Lightweight Identity-Based Signature Scheme for Mitigation of Content Poisoning Attack in Named Data Networking With Internet of Things","volume":"8","author":"Syed Sajid Ullah","year":"2020","journal-title":"IEEE Access"},{"key":"10.3233\/JIFS-232388_ref62","doi-asserted-by":"publisher","first-page":"276","DOI":"10.1109\/TIFS.2019.2919393","article-title":"SLATE: A Secure Lightweight Entity Authentication Hardware Primitive","volume":"15","author":"Wei-Che Wang","year":"2020","journal-title":"IEEE Transactions on Information Forensics and Security"},{"issue":"10","key":"10.3233\/JIFS-232388_ref63","doi-asserted-by":"crossref","first-page":"3677","DOI":"10.1109\/JSEN.2013.2262271","article-title":"Practical Secure Communication for Integrating Wireless Sensor Networks into the Internet of Things","volume":"13","author":"Fagen Li","year":"2013","journal-title":"IEEE Sensors Journal"},{"issue":"4","key":"10.3233\/JIFS-232388_ref64","doi-asserted-by":"crossref","first-page":"227","DOI":"10.1504\/IJSNET.2022.125113","article-title":"Privacy Preservation and Security Challenges: A New Frontier Multimodal Machine Learning Research","volume":"39","author":"Kumar","year":"2022","journal-title":"International Journal of Sensor Networks Inderscience"},{"key":"10.3233\/JIFS-232388_ref65","first-page":"1","article-title":"DSSAM: Digitally Signed Secure Acknowledgement Method for Mobile Ad-hoc Network","volume":"12","author":"Srivastava","year":"2021","journal-title":"EURASIP Journal on Wireless Communications and Networking, Springer, 2021"},{"issue":"3","key":"10.3233\/JIFS-232388_ref71","doi-asserted-by":"crossref","first-page":"657","DOI":"10.1109\/TPDS.2014.2311791","article-title":"Aggregated-Proof Based Hierarchical Authentication Scheme for the Internet of Things","volume":"26","author":"Ning","year":"2015","journal-title":"IEEE Transactions on Parallel and Distributed Systems"},{"issue":"7","key":"10.3233\/JIFS-232388_ref72","first-page":"1","article-title":"A survey on recent optimal techniques for securing unmanned aerial vehicles applications","volume":"32","author":"Syed","year":"2020","journal-title":"Transactions on Emerging Telecommunications Technologies, Wiley"},{"issue":"1","key":"10.3233\/JIFS-232388_ref76","first-page":"96","article-title":"Role of Mathematical Modelling and Learning Techniques for Privacy Preservation","volume":"17","author":"Kumar","year":"2023","journal-title":"GMSARN International Journal"},{"key":"10.3233\/JIFS-232388_ref79","doi-asserted-by":"crossref","first-page":"1889","DOI":"10.3390\/sym13101889","article-title":"Smart Architectural Framework for Symmetrical Data Offloading in IoT","volume":"13","author":"Bali","year":"1889","journal-title":"Symmetry"},{"key":"10.3233\/JIFS-232388_ref80","doi-asserted-by":"publisher","first-page":"134455","DOI":"10.1109\/ACCESS.2022.3230989","article-title":"Map Making in Social Indoor Environment Through Robot Navigation Using Active SLAM","volume":"10","author":"Singh","year":"2022","journal-title":"in IEEE Access"},{"issue":"3","key":"10.3233\/JIFS-232388_ref81","doi-asserted-by":"publisher","first-page":"729","DOI":"10.1080\/09720529.2020.1794514","article-title":"Novel Technique to Detect Network Error or Modification of Votes during Transmission in Online Voting System","volume":"24","author":"Srivastava","year":"2021","journal-title":"Journal of Discrete Mathematical Sciences and Cryptography, Taylor & Francis"},{"key":"10.3233\/JIFS-232388_ref82","doi-asserted-by":"crossref","first-page":"15331","DOI":"10.1038\/s41598-022-19465-1","article-title":"DACBT: Deep Learning approach for classification of brain tumors using MRI data in IoT healthcare environment","volume":"12","author":"Haq","year":"2022","journal-title":"Science Rep"},{"key":"10.3233\/JIFS-232388_ref84","doi-asserted-by":"publisher","DOI":"10.1109\/JBHI.2023.3256974"},{"issue":"1","key":"10.3233\/JIFS-232388_ref85","doi-asserted-by":"crossref","first-page":"104","DOI":"10.21833\/ijaas.2021.01.013","article-title":"Industrial internet of things: Investigation of the applications, issues, and challenges","volume":"8","author":"Khan","year":"2021","journal-title":"International Journal of Advanced Applied Sciences"},{"key":"10.3233\/JIFS-232388_ref86","doi-asserted-by":"crossref","first-page":"22","DOI":"10.1155\/2022\/8853448","article-title":"Secure Smart Healthcare Monitoring in Industrial Internet of Things (IIoT) Ecosystem with Cosine Function Hybrid Chaotic Map Encryption","volume":"2022","author":"Khan","year":"2022","journal-title":"Scientific Programming"}],"container-title":["Journal of Intelligent &amp; Fuzzy Systems"],"original-title":[],"link":[{"URL":"https:\/\/content.iospress.com\/download?id=10.3233\/JIFS-232388","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,1,29]],"date-time":"2026-01-29T08:52:41Z","timestamp":1769676761000},"score":1,"resource":{"primary":{"URL":"https:\/\/journals.sagepub.com\/doi\/full\/10.3233\/JIFS-232388"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,10,4]]},"references-count":69,"journal-issue":{"issue":"4"},"URL":"https:\/\/doi.org\/10.3233\/jifs-232388","relation":{},"ISSN":["1064-1246","1875-8967"],"issn-type":[{"value":"1064-1246","type":"print"},{"value":"1875-8967","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,10,4]]}}}