{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,17]],"date-time":"2025-11-17T02:09:49Z","timestamp":1763345389263,"version":"3.45.0"},"reference-count":22,"publisher":"Tech Science Press","issue":"1","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["CMC"],"published-print":{"date-parts":[[2025]]},"DOI":"10.32604\/cmc.2025.068486","type":"journal-article","created":{"date-parts":[[2025,8,8]],"date-time":"2025-08-08T08:31:53Z","timestamp":1754641913000},"page":"1937-1957","source":"Crossref","is-referenced-by-count":0,"title":["Dynamic Session Key Allocation with Time-Indexed Ascon for Low-Latency Cloud-Edge-End Communication"],"prefix":"10.32604","volume":"85","author":[{"given":"Fang-Yie","family":"Leu","sequence":"first","affiliation":[]},{"given":"Kun-Lin","family":"Tsai","sequence":"additional","affiliation":[]},{"given":"Li-Woei","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Deng-Yao","family":"Yao","sequence":"additional","affiliation":[]},{"given":"Jian-Fu","family":"Tsai","sequence":"additional","affiliation":[]},{"given":"Ju-Wei","family":"Zhu","sequence":"additional","affiliation":[]},{"given":"Guo-Wei","family":"Wang","sequence":"additional","affiliation":[]}],"member":"17807","published-online":{"date-parts":[[2025]]},"reference":[{"key":"ref1","doi-asserted-by":"crossref","first-page":"1013","DOI":"10.1016\/j.jnca.2011.12.006","article-title":"Real-time data management on wireless sensor networks: a survey","volume":"35","author":"Diallo","year":"2012","journal-title":"J Netw Comput Appl"},{"key":"ref2","doi-asserted-by":"crossref","first-page":"2609","DOI":"10.1109\/OJCOMS.2023.3323832","article-title":"Energy-sustainable IoT connectivity: vision, technological enablers, challenges, and future directions","volume":"4","author":"L\u00f3pez","year":"2023","journal-title":"IEEE Open J Commun Soc"},{"key":"ref3","first-page":"69","article-title":"Innovative applications of IoT in smart home systems: enhancing environmental monitoring with integrated sensor technologies and MQTT protocol","volume":"15","author":"Zhu","year":"2024","journal-title":"J Wirel Mob Netw Ubiquitous Comput Dependable Appl"},{"key":"ref4","doi-asserted-by":"crossref","first-page":"109202","DOI":"10.1016\/j.compeleceng.2024.109202","article-title":"Edge AI for internet of medical things: a literature review","volume":"116","author":"Rocha","year":"2024","journal-title":"Comput Electr Eng"},{"key":"ref5","first-page":"1","article-title":"Lightweight IDS framework using word embeddings for in-vehicle network security","volume":"15","author":"Kim","year":"2024","journal-title":"J Wirel Mob Netw Ubiquitous Comput Dependable Appl"},{"key":"ref6","doi-asserted-by":"crossref","first-page":"122877","DOI":"10.1016\/j.jclepro.2020.122877","article-title":"Internet of Things (IoT): opportunities, issues and challenges towards a smart and sustainable future","volume":"274","author":"Ni\u017eeti\u0107","year":"2020","journal-title":"J Clean Prod"},{"key":"ref7","doi-asserted-by":"crossref","first-page":"3619","DOI":"10.1109\/ACCESS.2017.2779844","article-title":"A survey on 5G networks for the Internet of Things: communication technologies and challenges","volume":"6","author":"Akpakwu","year":"2017","journal-title":"IEEE Access"},{"key":"ref8","first-page":"3713","article-title":"A detailed review of current AI solutions for enhancing security in Internet of Things Applications","volume":"83","author":"Ansari","year":"2025","journal-title":"Comput Mater Contin"},{"key":"ref9","doi-asserted-by":"crossref","first-page":"60","DOI":"10.1109\/MWC.2016.7721743","article-title":"Long-range communications in unlicensed bands: the rising stars in the IoT and smart city scenarios","volume":"23","author":"Centenaro","year":"2016","journal-title":"IEEE Wirel Commun"},{"key":"ref10","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/s00145-021-09398-9","article-title":"Ascon v1.2: lightweight authenticated encryption and hashing","volume":"34","author":"Dobraunig","year":"2021","journal-title":"J Cryptol"},{"key":"ref11","doi-asserted-by":"crossref","first-page":"203","DOI":"10.1007\/s41635-017-0021-2","article-title":"An evaluation of lightweight block ciphers for resource-constrained applications: area, performance and security","volume":"1","author":"Sadhukhan","year":"2017","journal-title":"J Hardw Syst Secur"},{"key":"ref12","doi-asserted-by":"crossref","first-page":"2647","DOI":"10.1109\/COMST.2024.3393230","article-title":"End-edge-cloud collaborative computing for deep learning: a comprehensive survey","volume":"26","author":"Wang","year":"2024","journal-title":"IEEE Commun Surv Tut"},{"key":"ref13","doi-asserted-by":"crossref","first-page":"1947","DOI":"10.1007\/s11277-020-07134-3","article-title":"Lightweight cryptography: a solution to secure IoT","volume":"112","author":"Dhanda","year":"2020","journal-title":"Wirel Pers Commun"},{"key":"ref14","series-title":"Proceedings of the 2016 International Conference on Advances in Computing, Communications and Informatics (ICACCI); 2016 Sep 21\u201324","first-page":"1725","article-title":"Lightweight security algorithm for low power IoT devices","author":"Goyal","year":"2016"},{"key":"ref15","doi-asserted-by":"crossref","first-page":"1050","DOI":"10.1109\/TDSC.2023.3267979","article-title":"A lightweight and secure communication protocol for the IoT environment","volume":"21","author":"Ding","year":"2023","journal-title":"IEEE Trans Dependable Secur Comput"},{"key":"ref16","series-title":"Proceedings of the 2017 IEEE 28th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC); 2017 Oct 8\u201313","first-page":"1","article-title":"Lightweight security protocols for the Internet of Things","author":"Wu","year":"2017"},{"key":"ref17","doi-asserted-by":"crossref","first-page":"89240","DOI":"10.1109\/ACCESS.2023.3306420","article-title":"A hardware architecture of NIST lightweight cryptography applied in IPSec to secure high-throughput low-latency IoT networks","volume":"11","author":"Tran","year":"2023","journal-title":"IEEE Access"},{"key":"ref18","doi-asserted-by":"crossref","first-page":"3599","DOI":"10.1109\/JIOT.2023.3297241","article-title":"Reconfigurable intelligent surface for physical layer security in 6G-IoT: designs, issues, and advances","volume":"11","author":"Khalid","year":"2023","journal-title":"IEEE Internet Things J"},{"key":"ref19","doi-asserted-by":"crossref","first-page":"4178","DOI":"10.1109\/ACCESS.2023.3349187","article-title":"Blockchain-IoT healthcare applications and trends: a review","volume":"12","author":"Al-Nbhany","year":"2024","journal-title":"IEEE Access"},{"key":"ref20","series-title":"Proceedings of the 2024 7th International Conference on Signal Processing and Information Security (ICSPIS); 2024 Nov 12\u201314","first-page":"1","article-title":"Research study on DNA-based cryptosystem for cloud, IoT, and edge computing networks","author":"Ahamed","year":"2024"},{"key":"ref21","series-title":"Proceedings of the 2024 11th International Conference on Computing for Sustainable Global Development (INDIACom); 2024 Feb 28\u2013Mar 1","first-page":"1561","article-title":"Securing IoT data: a hybrid cryptographic approach","author":"Ali"},{"key":"ref22","doi-asserted-by":"crossref","first-page":"379","DOI":"10.1002\/j.1538-7305.1948.tb01338.x","article-title":"A mathematical theory of communication","volume":"27","author":"Shannon","year":"1948","journal-title":"Bell Syst Tech J"}],"container-title":["Computers, Materials &amp; Continua"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/cdn.techscience.cn\/files\/cmc\/2025\/TSP_CMC-85-1\/TSP_CMC_68486\/TSP_CMC_68486.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,17]],"date-time":"2025-11-17T02:04:56Z","timestamp":1763345096000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.techscience.com\/cmc\/v85n1\/63583"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"references-count":22,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2025]]},"published-print":{"date-parts":[[2025]]}},"URL":"https:\/\/doi.org\/10.32604\/cmc.2025.068486","relation":{},"ISSN":["1546-2226"],"issn-type":[{"type":"electronic","value":"1546-2226"}],"subject":[],"published":{"date-parts":[[2025]]}}}