{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,24]],"date-time":"2026-01-24T15:51:57Z","timestamp":1769269917791,"version":"3.49.0"},"reference-count":33,"publisher":"Korea Multimedia Society - English Version Journal","issue":"3","license":[{"start":{"date-parts":[[2023,9,30]],"date-time":"2023-09-30T00:00:00Z","timestamp":1696032000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by-nc\/4.0\/"}],"content-domain":{"domain":["www.jmis.org"],"crossmark-restriction":true},"short-container-title":["J Multimed Inf Syst"],"DOI":"10.33851\/jmis.2023.10.3.237","type":"journal-article","created":{"date-parts":[[2023,10,18]],"date-time":"2023-10-18T07:22:58Z","timestamp":1697613778000},"page":"237-248","update-policy":"https:\/\/doi.org\/10.33851\/crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Secure and Lightweight Authentication Protocol in Internet of Things"],"prefix":"10.33851","volume":"10","author":[{"given":"Yanlong","family":"Yang","sequence":"first","affiliation":[]},{"given":"Mengzhu","family":"Lu","sequence":"additional","affiliation":[]},{"given":"Xiaohan","family":"Niu","sequence":"additional","affiliation":[]}],"member":"19702","published-online":{"date-parts":[[2023,9,30]]},"reference":[{"key":"key2.0231018092241e+13_B1","doi-asserted-by":"crossref","unstructured":"L. Atzori, A. Iera, and G. Morabito, \u201cThe internet of things: A survey,\u201d Computer Networks, vol. 54, no. 15, pp. 2787-2805, 2010. 10.1016\/j.comnet.2010.05.010","DOI":"10.1016\/j.comnet.2010.05.010"},{"key":"key2.0231018092241e+13_B2","doi-asserted-by":"crossref","unstructured":"J. Gubbi, R. Buyya, S. Marusic, and M. Palaniswami, \u201cInternet of things (IoT): A vision, architectural elements, and future directions,\u201d Future Generation Computer Systems, vol. 29, no. 7, pp. 1645-1660, 2013. 10.1016\/j.future.2013.01.010","DOI":"10.1016\/j.future.2013.01.010"},{"key":"key2.0231018092241e+13_B3","doi-asserted-by":"crossref","unstructured":"X. Du, S. Tang, Z. Lu, J. Wet, K. Gai, and P. C. K. Hung, \u201cScientific workflows in IoT environments: A data placement strategy based on heterogeneous edge-cloud computing,\u201d ACM Transactions on Management Information Systems (TMIS), vol. 13, no. 4, pp. 1-26, 2022. 10.1145\/3531327","DOI":"10.1145\/3531327"},{"key":"key2.0231018092241e+13_B4","doi-asserted-by":"crossref","unstructured":"E. Anthi, L. Williams, M. S\u0142owi\u0144ska, G. Theodorakopoulos, and P. Burnap, \u201cA supervised intrusion detection system for smart home IoT devices,\u201d IEEE Internet of Things Journal, vol. 6, no. 5, pp. 9042-9053, 2019. 10.1109\/JIOT.2019.2926365","DOI":"10.1109\/JIOT.2019.2926365"},{"key":"key2.0231018092241e+13_B5","doi-asserted-by":"crossref","unstructured":"A. Camero and E. Alba, \u201cSmart city and information technology: A review,\u201d Cities, vol. 93, pp. 84-94, 2019. 10.1016\/j.cities.2019.04.014","DOI":"10.1016\/j.cities.2019.04.014"},{"key":"key2.0231018092241e+13_B6","doi-asserted-by":"crossref","unstructured":"J. H. Nord, A. Koohang, and J. Paliszkiewicz \u201cThe internet of things: Review and theoretical framework,\u201d Expert Systems with Applications, vol. 133, pp. 97-108, 2019. 10.1016\/j.eswa.2019.05.014","DOI":"10.1016\/j.eswa.2019.05.014"},{"key":"key2.0231018092241e+13_B7","doi-asserted-by":"crossref","unstructured":"P. P. Ray, \u201cA survey on internet of things architectures,\u201d Journal of King Saud University-Computer and Information Sciences, vol. 30, no. 3, pp. 291-319, 2018. 10.1016\/j.jksuci.2016.10.003","DOI":"10.1016\/j.jksuci.2016.10.003"},{"key":"key2.0231018092241e+13_B8","doi-asserted-by":"crossref","unstructured":"C. M. Medaglia and A. Serbanati, \u201cAn overview of privacy and security issues in the internet of things,\u201d in The Internet of Things: 20th Tyrrhenian Workshop on Digital Communications, New York, NY: Springer, 2010, pp. 389-395. 10.1007\/978-1-4419-1674-7_38","DOI":"10.1007\/978-1-4419-1674-7_38"},{"key":"key2.0231018092241e+13_B9","doi-asserted-by":"crossref","unstructured":"R. H. Weber, \u201cInternet of things-new security and privacy challenges,\u201d Computer Law & Security Review, vol. 26, no. 1, pp. 23-30, 2010. 10.1016\/j.clsr.2009.11.008","DOI":"10.1016\/j.clsr.2009.11.008"},{"key":"key2.0231018092241e+13_B10","doi-asserted-by":"crossref","unstructured":"D. E. Kouicem, A. Bouabdallah, and H. Lakhlef, \u201cInternet of things security: A top-down survey,\u201d Computer Networks, vol. 141, pp. 199-221, 2018. 10.1016\/j.comnet.2018.03.012","DOI":"10.1016\/j.comnet.2018.03.012"},{"key":"key2.0231018092241e+13_B11","doi-asserted-by":"crossref","unstructured":"J. Miao, Z. Wang, X. Xue, M. Wang, J. Lv, and M. Li, \u201cLightweight and secure D2D group communication for wireless IoT,\u201d Frontiers in Physics, vol. 11, pp. 433, 2023. 10.3389\/fphy.2023.1210777","DOI":"10.3389\/fphy.2023.1210777"},{"key":"key2.0231018092241e+13_B12","doi-asserted-by":"crossref","unstructured":"A. \u010colakovi\u0107 and M. Had\u017eiali\u0107, \u201cInternet of things (IoT): A review of enabling technologies, challenges, and open research issues,\u201d Computer Networks, vol. 144, pp. 17-39, 2018. 10.1016\/j.comnet.2018.07.017","DOI":"10.1016\/j.comnet.2018.07.017"},{"key":"key2.0231018092241e+13_B13","doi-asserted-by":"crossref","unstructured":"O. K. Sahingoz, \u201cLarge scale wireless sensor networks with multi-level dynamic key management scheme,\u201d Journal of Systems Architecture, vol. 59, no. 9, pp. 801-807, 2013. 10.1016\/j.sysarc.2013.05.022","DOI":"10.1016\/j.sysarc.2013.05.022"},{"key":"key2.0231018092241e+13_B14","doi-asserted-by":"crossref","unstructured":"J. Miao, Z. Wang, X. Miao, and L. Xing, \u201cA secure and efficient lightweight vehicle group Authentication protocol in 5G networks,\u201d Wireless Communications and Mobile Computing 2021, pp. 1-12, 2021. 10.1155\/2021\/4079092","DOI":"10.1155\/2021\/4079092"},{"key":"key2.0231018092241e+13_B15","doi-asserted-by":"crossref","unstructured":"Y. P. Liao and C. M. Hsiao, \u201cA secure ECC-based RFID authentication scheme integrated with ID-verifier transfer protocol,\u201d Ad Hoc Networks, vol. 18, pp. 133-146, 2014. 10.1016\/j.adhoc.2013.02.004","DOI":"10.1016\/j.adhoc.2013.02.004"},{"key":"key2.0231018092241e+13_B16","unstructured":"R. Peeters and J. Hermans, \u201cAttack on liao and hsiao's secure ECC-based RFID authentication scheme integrated with ID-verifier transfer protocol,\u201d Cryptology ePrint Archive, vol. 399, 2013."},{"key":"key2.0231018092241e+13_B17","doi-asserted-by":"crossref","unstructured":"S. Kalra and S. K. Sood, \u201cSecure authentication scheme for IoT and cloud servers,\u201d Pervasive and Mobile Computing, vol. 24, pp, 210-223, 2015. 10.1016\/j.pmcj.2015.08.001","DOI":"10.1016\/j.pmcj.2015.08.001"},{"key":"key2.0231018092241e+13_B18","doi-asserted-by":"crossref","unstructured":"C. C. Chang, H. L. Wu, and C. Y. Sun, \u201cNotes on secure authentication scheme for IoT and cloud servers,\u201d Pervasive and Mobile Computing, vol. 38, pp. 275-278, 2017. 10.1016\/j.pmcj.2015.12.003","DOI":"10.1016\/j.pmcj.2015.12.003"},{"key":"key2.0231018092241e+13_B19","doi-asserted-by":"crossref","unstructured":"Y. P. Liao and S. S. Wang, \u201cA secure dynamic ID based remote user authentication scheme for multi-server environment,\u201d Computer Standards & Interfaces, vol. 31, no. 1, pp. 24-29, 2009. 10.1016\/j.csi.2007.10.007","DOI":"10.1016\/j.csi.2007.10.007"},{"key":"key2.0231018092241e+13_B20","doi-asserted-by":"crossref","unstructured":"B. Vaidya, D. Makrakis, and H. T. Mouftah, \u201cDevice authentication mechanism for smart energy home area networks,\u201d in Proceeding of the 2011 IEEE International Conference on Consumer Electronics (ICCE), Jan. 2011, pp. 787-788. 10.1109\/ICCE.2011.5722864","DOI":"10.1109\/ICCE.2011.5722864"},{"key":"key2.0231018092241e+13_B21","doi-asserted-by":"crossref","unstructured":"Y. Li, \u201cDesign of a key establishment protocol for smart home energy management system, in Proceeding of the 2013 Fifth International Conference on Computational Intelligence, Communication Systems and Networks, Jun. 2013, pp. 88-93.","DOI":"10.1109\/CICSYN.2013.42"},{"key":"key2.0231018092241e+13_B22","doi-asserted-by":"crossref","unstructured":"K. Han, J. Kim, and T. Shon, \u201cA novel secure key paring protocol for RF4CE ubiquitous smart home systems,\u201d Personal and Ubiquitous Computing, vol. 17, no. 5, pp. 945-949, 2013. 10.1007\/s00779-012-0541-2","DOI":"10.1007\/s00779-012-0541-2"},{"key":"key2.0231018092241e+13_B23","doi-asserted-by":"crossref","unstructured":"B. Fabian and T. Feldhaus, \u201cPrivacy-preserving data infrastructure for smart home appliances based on the octopus DHT,\u201d Computers in Industry, vol. 65, no. 8, pp. 1147-1160, 2014. 10.1016\/j.compind.2014.07.001","DOI":"10.1016\/j.compind.2014.07.001"},{"key":"key2.0231018092241e+13_B24","doi-asserted-by":"crossref","unstructured":"S. A. Chaudhry, H. Alhakami, A. Baz, and F. AI-Turjman, \u201cSecuring demand response management: A certificate based access control in smart grid edge computing infrastructure,\u201d IEEE Access, vol. 8, pp. 101235-101243, 2020. 10.1109\/ACCESS.2020.2996093","DOI":"10.1109\/ACCESS.2020.2996093"},{"key":"key2.0231018092241e+13_B25","doi-asserted-by":"crossref","unstructured":"Abbasinezhad-Mood and Nikooghadam \u201cAn anonymous ECC-based self-certified key distribution scheme for the smart grid,\u201d IEEE Transactions on Industrial Electronics, vol. 65, no. 10, pp. 7996-8004, 2018. 10.1109\/TIE.2018.2807383","DOI":"10.1109\/TIE.2018.2807383"},{"key":"key2.0231018092241e+13_B26","doi-asserted-by":"crossref","unstructured":"Y. Kim, S. Yoo, and C. Yoo, \u201cDaot: Dynamic and energy-aware authentication for smart home appliances in internet of things,\u201d IEEE International Conference on Consumer Electronics, vol. 12, no. 10, pp. 196-197, 2015.","DOI":"10.1109\/ICCE.2015.7066378"},{"key":"key2.0231018092241e+13_B27","doi-asserted-by":"crossref","unstructured":"J. Miao, Z. Wang, X. Ning, N. Xiao, W. Cai, and R. Liu, \u201cPractical and secure multifactor authentication protocol for autonomous vehicles in 5G,\u201d Software: Practice and Experience, 2022. 10.1002\/spe.3087","DOI":"10.1002\/spe.3087"},{"key":"key2.0231018092241e+13_B28","doi-asserted-by":"crossref","unstructured":"C. M. Medaglia and A. Serbanati, \u201cAn overview of pri-vacy and security issues in the internet of things,\u201d in in Proceeding of the Internet of Things: 20th Tyrrhenian Workshop on Digital Communications, 2010, pp. 389-395. 10.1007\/978-1-4419-1674-7_38","DOI":"10.1007\/978-1-4419-1674-7_38"},{"key":"key2.0231018092241e+13_B29","doi-asserted-by":"crossref","unstructured":"E. Fernandes, J. Jung, and A. Prakash, \u201cSecurity ana-lysis of emerging smart home applications, IEEE Symposium on Security and Privacy (SP),\u201d 2016, pp. 636-654. 10.1109\/SP.2016.44","DOI":"10.1109\/SP.2016.44"},{"key":"key2.0231018092241e+13_B30","doi-asserted-by":"crossref","unstructured":"P. McDaniel and S. McLaughlin, \u201cSecurity and privacy challenges in the smart grid,\u201d IEEE Security & Privacy, vol. 7, no. 3, pp. 75-77, 2009. 10.1109\/MSP.2009.76","DOI":"10.1109\/MSP.2009.76"},{"key":"key2.0231018092241e+13_B31","doi-asserted-by":"crossref","unstructured":"B. Vaidya, J. H. Park, S. S. Yeo, and J. J. P. C. Rodrigues, \u201cRobust one-time password authentication scheme using smart card for home network environment,\u201d Computer Communications, vol. 34, no. 3, pp. 326-336, 2011. 10.1016\/j.comcom.2010.03.013","DOI":"10.1016\/j.comcom.2010.03.013"},{"key":"key2.0231018092241e+13_B32","doi-asserted-by":"crossref","unstructured":"M. Wazid, A. K. Das, V. Odelu, N. Kumar, and W. Susilo, \u201cSecure remote user authenticated key esta-blishment protocol for smart home environment,\u201d IEEE Transactions on Dependable and Secure Computing, vol. 17, no. 2, pp. 391-406, 2017. 10.1109\/TDSC.2017.2764083","DOI":"10.1109\/TDSC.2017.2764083"},{"key":"key2.0231018092241e+13_B33","doi-asserted-by":"crossref","unstructured":"P. Kumar, A. Gurtov, J. Iinatti, M. Ylianttila, and M. Sain, \u201cLightweight and secure session-key establishment scheme in smart home environments,\u201d IEEE Sensors Journal, vol. 16, no. 1, pp. 254-264, 2016. 10.1109\/JSEN.2015.2475298","DOI":"10.1109\/JSEN.2015.2475298"}],"container-title":["Journal of Multimedia Information System"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/www.jmis.org\/download\/download_pdf?doi=10.33851\/JMIS.2023.10.3.237","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/www.jmis.org\/download\/download_pdf?doi=10.33851\/JMIS.2023.10.3.237","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,10,31]],"date-time":"2024-10-31T01:06:37Z","timestamp":1730336797000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.jmis.org\/archive\/view_article?doi=10.33851\/JMIS.2023.10.3.237"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,9,30]]},"references-count":33,"journal-issue":{"issue":"3","published-online":{"date-parts":[[2023,9,30]]}},"alternative-id":["10.33851\/JMIS.2023.10.3.237"],"URL":"https:\/\/doi.org\/10.33851\/jmis.2023.10.3.237","relation":{},"ISSN":["2383-7632"],"issn-type":[{"value":"2383-7632","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,9,30]]},"assertion":[{"value":"2023-05-29","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2023-07-09","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}}]}}