{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T01:23:34Z","timestamp":1760145814543,"version":"build-2065373602"},"reference-count":74,"publisher":"MDPI AG","issue":"9","license":[{"start":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T00:00:00Z","timestamp":1725840000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Computers"],"abstract":"<jats:p>The concept of Cyber\u2013Physical\u2013Social Systems (CPSSs) has emerged as a response to the need to understand the interaction between Cyber\u2013Physical Systems (CPSs) and humans. This shift from CPSs to CPSSs is primarily due to the widespread use of sensor-equipped smart devices that are closely connected to users. CPSSs have been a topic of interest for more than ten years, gaining increasing attention in recent years. The inclusion of human elements in CPS research has presented new challenges, particularly in understanding human dynamics, which adds complexity that has yet to be fully explored. CPSSs are a base class and consist of three basic components (cyberspace, physical space, and social space). We map the components of the metaverse with that of a CPSS, and we show that the metaverse is an implementation of a Cyber\u2013Physical\u2013Social System (CPSS). The metaverse is made up of computer systems with many elements, such as artificial intelligence, computer vision, image processing, mixed reality, augmented reality, and extended reality. It also comprises physical systems, controlled objects, and human interaction. The identification process in CPSSs suffers from weak security, and the authentication problem requires heavy computation. Therefore, we propose a new protocol for secure lightweight authentication in Cyber\u2013Physical\u2013Social Systems (SLACPSSs) to offer secure communication between platform servers and users as well as secure interactions between avatars. We perform a security analysis and compare the proposed protocol to the related previous ones. The analysis shows that the proposed protocol is lightweight and secure.<\/jats:p>","DOI":"10.3390\/computers13090225","type":"journal-article","created":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T03:04:18Z","timestamp":1725851058000},"page":"225","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["SLACPSS: Secure Lightweight Authentication for Cyber\u2013Physical\u2013Social Systems"],"prefix":"10.3390","volume":"13","author":[{"given":"Ahmed Zedaan M.","family":"Abed","sequence":"first","affiliation":[{"name":"Faculty of Computer and Information Sciences, Ain Shames University, Cairo 11566, Egypt"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4060-2535","authenticated-orcid":false,"given":"Tamer","family":"Abdelkader","sequence":"additional","affiliation":[{"name":"Faculty of Computer and Information Sciences, Ain Shames University, Cairo 11566, Egypt"}]},{"given":"Mohamed","family":"Hashem","sequence":"additional","affiliation":[{"name":"Faculty of Computer and Information Sciences, Ain Shames University, Cairo 11566, Egypt"}]}],"member":"1968","published-online":{"date-parts":[[2024,9,9]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","unstructured":"Zhu, Y., Tan, Y., Li, R., and Luo, X. (2015, January 22\u201323). Cyber-physical-social-thinking modeling and computing for geological information service system. Proceedings of the International Conference on Identification, Information, and Knowledge in the Internet of Things (IIKI), Beijing, China.","DOI":"10.1109\/IIKI.2015.48"},{"key":"ref_2","doi-asserted-by":"crossref","first-page":"320","DOI":"10.1109\/JAS.2015.7152667","article-title":"Cyber-physical-social system in intelligent transportation","volume":"2","author":"Xiong","year":"2015","journal-title":"IEEE CAA J. Autom. Sin."},{"key":"ref_3","doi-asserted-by":"crossref","first-page":"156","DOI":"10.1016\/J.ENG.2016.02.012","article-title":"Smart cities as cyber-physical social systems","volume":"2","author":"Cassandras","year":"2016","journal-title":"Engineering"},{"key":"ref_4","doi-asserted-by":"crossref","unstructured":"Gharib, M., Lollini, P., and Bondavalli, A. (2017, January 18\u201321). Towards an Approach for Analyzing Trust in Cyber-Physical-Social Systems. Proceedings of the 12th System of Systems Engineering Conference (SoSE), Waikoloa, HI, USA.","DOI":"10.1109\/SYSOSE.2017.7994947"},{"key":"ref_5","doi-asserted-by":"crossref","first-page":"66","DOI":"10.30871\/jaic.v4i1.2077","article-title":"Implementation of cyber-physical-social system based on service oriented architecture in smart tourism","volume":"4","author":"Ashari","year":"2020","journal-title":"J. Appl. Inform. Comput."},{"key":"ref_6","doi-asserted-by":"crossref","unstructured":"Perno, J., and Probst, C.W. (2017). Behavioural profiling in cyber-social systems. Human Aspects of Information Security, Privacy and Trust, Springer.","DOI":"10.1007\/978-3-319-58460-7_35"},{"key":"ref_7","doi-asserted-by":"crossref","unstructured":"Camtepe, S.A., and Yener, B. (2007, January 17\u201321). Modeling and detection of complex attacks. Proceedings of the Third International Conference on Security and Privacy in Communications Networks and the Workshops\u2014Secure Comm, Nice, France.","DOI":"10.1109\/SECCOM.2007.4550338"},{"key":"ref_8","doi-asserted-by":"crossref","first-page":"42404","DOI":"10.1109\/ACCESS.2022.3167441","article-title":"Cyber-Physical-Social Systems: Taxonomy, Challenges, and Opportunities","volume":"10","author":"Pasandideh","year":"2022","journal-title":"IEEE Access"},{"key":"ref_9","doi-asserted-by":"crossref","first-page":"41","DOI":"10.1386\/tear.6.1.41_1","article-title":"Integrative art education in a metaverse: Ground","volume":"6","author":"Ayiter","year":"2008","journal-title":"Technoetic Arts"},{"key":"ref_10","first-page":"50","article-title":"Looking to the future: Higher education in the Metaverse","volume":"43","author":"Collins","year":"2008","journal-title":"Educ. Rev."},{"key":"ref_11","doi-asserted-by":"crossref","first-page":"94","DOI":"10.3991\/ijet.v15i15.13025","article-title":"Virtual world as a resource for hybrid education","volume":"15","author":"Avila","year":"2020","journal-title":"Int. J. Emerg. Technol. Learn."},{"key":"ref_12","doi-asserted-by":"crossref","unstructured":"Suh, W., and Ahn, S. (2022). Utilizing the metaverse for learner-centered constructivist education in the postpandemicera: An analysis of elementary school students. J. Intell., 10.","DOI":"10.3390\/jintelligence10010017"},{"key":"ref_13","unstructured":"Miks, J., and McIlwaine, J. (2023, December 20). Keeping the World\u2019s Children Learning through COVID-19. Available online: https:\/\/www.unicef.org\/coronavirus\/keeping-worlds-children-learning-through-covid-19."},{"key":"ref_14","first-page":"1","article-title":"Simulations, learning and the metaverse: Changing cultures in legal education","volume":"5","author":"Maharg","year":"2007","journal-title":"J. Inf. Law Technol."},{"key":"ref_15","unstructured":"Kanematsu, H., Fukumura, Y., Ogawa, N., Okuda, A., Taguchi, R., and Nagai, H. (2009, January 22\u201326). Practice and Evaluation of Problem Based Learning in Metaverse. Proceedings of the ED-MEDIA 2009 (World Conference on Educational Multimedia, Hypermedia & Telecommunications), Honolulu, HI, USA."},{"key":"ref_16","doi-asserted-by":"crossref","first-page":"486","DOI":"10.3390\/encyclopedia2010031","article-title":"Metaverse","volume":"2","author":"Mystakidis","year":"2022","journal-title":"Encyclopedia"},{"key":"ref_17","doi-asserted-by":"crossref","first-page":"471","DOI":"10.1016\/j.tcm.2022.05.004","article-title":"Cardioverse: The cardiovascular medicine in the era of metaverse","volume":"33","author":"Skalidis","year":"2022","journal-title":"Trends Cardiovasc. Med."},{"key":"ref_18","unstructured":"Smith, A.H., Milton, R., Dearden, J., and Batty, M. (2008). Virtual Cities: Digital Mirrors into a Recursive World, Centre for Advanced Spatial Analysis."},{"key":"ref_19","doi-asserted-by":"crossref","first-page":"157","DOI":"10.1049\/smc2.12030","article-title":"Smart cities, metaverses, and the relevance of place","volume":"4","author":"Aurigi","year":"2022","journal-title":"IET Smart Cities"},{"key":"ref_20","doi-asserted-by":"crossref","unstructured":"Duan, H., Li, J., and Fan, S. (2021, January 20\u201324). Metaverse for Social Good: A University Campus Prototype. Proceedings of the Association for Computing Machinery, Virtual.","DOI":"10.1145\/3474085.3479238"},{"key":"ref_21","doi-asserted-by":"crossref","unstructured":"Heller, L., and Goodman, L. (2016, January 17\u201321). What do avatars want now? Posthuman embodiment and the technological sublime. Proceedings of the 22nd International Conference on Virtual System & Multimedia (VSMM), Kuala Lumpur, Malaysia.","DOI":"10.1109\/VSMM.2016.7863165"},{"key":"ref_22","doi-asserted-by":"crossref","first-page":"5071","DOI":"10.1109\/TVCG.2021.3099290","article-title":"Being an avatar for real: A survey on virtual embodiment in augmented reality","volume":"28","author":"Genay","year":"2021","journal-title":"IEEE Trans. Vis. Comput. Graph."},{"key":"ref_23","unstructured":"(2023, December 20). ISO\/IEC 23005 (MPEG-V) Standards. Available online: https:\/\/mpeg.chiariglione.org\/standards\/mpeg-v.html."},{"key":"ref_24","unstructured":"(2023, December 20). IEEE 2888 Standards. Available online: https:\/\/sagroups.ieee.org\/2888\/."},{"key":"ref_25","doi-asserted-by":"crossref","first-page":"656","DOI":"10.1109\/COMST.2022.3221119","article-title":"A full dive into realizing the edge-enabled metaverse: Visions, enabling technologies, and challenges","volume":"25","author":"Xu","year":"2023","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"ref_26","doi-asserted-by":"crossref","first-page":"39","DOI":"10.1109\/TSUSC.2018.2839623","article-title":"Machine learning based trust computational model for IoT services","volume":"4","author":"Jayasinghe","year":"2019","journal-title":"IEEE Trans. Sustain. Comput."},{"key":"ref_27","doi-asserted-by":"crossref","first-page":"319","DOI":"10.1109\/COMST.2022.3202047","article-title":"A Survey on Metaverse: Fundamentals, Security, and Privacy","volume":"25","author":"Wang","year":"2022","journal-title":"IEEE Commun. Surv."},{"key":"ref_28","unstructured":"Hu, P., Li, H., Fu, H., Cansever, D., and Mohapatra, P. (May, January 26). Dynamic defense strategy against advanced persistent threat with insiders. Proceedings of the IEEE Conference on Computer Communications (INFOCOM), Hong Kong, China."},{"key":"ref_29","doi-asserted-by":"crossref","first-page":"19","DOI":"10.1109\/TDSC.2020.2980255","article-title":"LVBS: Lightweight vehicular blockchain for secure data sharing in disaster rescue","volume":"19","author":"Su","year":"2022","journal-title":"IEEE Trans. Dependable Secur. Comput."},{"key":"ref_30","doi-asserted-by":"crossref","first-page":"3317","DOI":"10.1109\/TPWRS.2016.2631891","article-title":"The 2015 Ukraine blackout: Implications for false data injection attacks","volume":"32","author":"Liang","year":"2017","journal-title":"IEEE Trans. Power Syst."},{"key":"ref_31","doi-asserted-by":"crossref","first-page":"46","DOI":"10.1109\/MC.2008.398","article-title":"Second life and the new generation of virtual worlds","volume":"41","author":"Kumar","year":"2008","journal-title":"Computer"},{"key":"ref_32","doi-asserted-by":"crossref","first-page":"88","DOI":"10.1109\/MIC.2008.1","article-title":"3D social virtual worlds: Research issues and challenges","volume":"12","author":"Hendaoui","year":"2008","journal-title":"IEEE Internet Comput."},{"key":"ref_33","doi-asserted-by":"crossref","first-page":"52","DOI":"10.1109\/MTS.2018.2826060","article-title":"The social metaverse: Battle for privacy","volume":"37","author":"Falchuk","year":"2018","journal-title":"IEEE Technol. Soc. Mag."},{"key":"ref_34","doi-asserted-by":"crossref","first-page":"843","DOI":"10.1109\/JIOT.2016.2593898","article-title":"Facilitating the delegation of use for private devices in the era of the internet of wearable things","volume":"4","author":"Ometov","year":"2017","journal-title":"IEEE Internet Things J."},{"key":"ref_35","doi-asserted-by":"crossref","first-page":"5494","DOI":"10.1109\/TII.2021.3110808","article-title":"A verifiable privacy-preserving machine learning prediction scheme for edge-enhanced HCPSs","volume":"18","author":"Li","year":"2021","journal-title":"IEEE Trans. Ind. Inform."},{"key":"ref_36","doi-asserted-by":"crossref","first-page":"4353","DOI":"10.1109\/JIOT.2020.3026366","article-title":"LDP-based social content protection for trending topic recommendation","volume":"8","author":"Wei","year":"2021","journal-title":"IEEE Internet Things J."},{"key":"ref_37","first-page":"14671","article-title":"A survey on metaverse: The state-of-the-art, technologies, applications, and challenges","volume":"10","author":"Ning","year":"2021","journal-title":"IEEE Internet Things J."},{"key":"ref_38","doi-asserted-by":"crossref","first-page":"2209","DOI":"10.1109\/TIFS.2019.2959911","article-title":"Multiple sensitive values-oriented personalized privacy preservation based on randomized response","volume":"15","author":"Song","year":"2020","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"ref_39","doi-asserted-by":"crossref","first-page":"22619","DOI":"10.1109\/TITS.2021.3134002","article-title":"Digital twin consensus for blockchain-enabled intelligent transportation systems in smart cities","volume":"23","author":"Liao","year":"2021","journal-title":"IEEE Trans. Intell. Transp. Syst."},{"key":"ref_40","doi-asserted-by":"crossref","first-page":"3019","DOI":"10.1109\/TIFS.2018.2837648","article-title":"Toward shared ownership in the cloud","volume":"13","author":"Ritzdorf","year":"2018","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"ref_41","doi-asserted-by":"crossref","first-page":"389","DOI":"10.1109\/COMST.2019.2959013","article-title":"Cyber-physical-social systems: A state-of-the-art survey, challenges and opportunities","volume":"22","author":"Zhou","year":"2020","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"ref_42","doi-asserted-by":"crossref","first-page":"550","DOI":"10.1109\/TDSC.2019.2907942","article-title":"Immersive virtual reality attacks and the human joystick","volume":"18","author":"Casey","year":"2021","journal-title":"IEEE Trans. Dependable Secur. Comput."},{"key":"ref_43","unstructured":"(2024, January 07). The Metaverse Offers a Future Full of Potential\u2014For Terrorists and Extremists, Too. Available online: https:\/\/theconversation.com\/the-metaverse-offers-a-future-full-of-potential-for-terrorists-and-extremists-too-173622."},{"key":"ref_44","doi-asserted-by":"crossref","first-page":"13","DOI":"10.1109\/MIC.2021.3057756","article-title":"The ecosystem of digital content governance","volume":"25","author":"Almeida","year":"2021","journal-title":"IEEE Internet Comput."},{"key":"ref_45","doi-asserted-by":"crossref","unstructured":"Bruun, A., and Stentoft, M.L. (2019, January 2\u20136). Lifelogging in the wild: Participant experiences of using lifelogging as a research tool. Proceedings of the IFIP Conference on Human-Computer Interaction, Paphos, Cyprus.","DOI":"10.1007\/978-3-030-29387-1_24"},{"key":"ref_46","doi-asserted-by":"crossref","first-page":"64","DOI":"10.1109\/MWC.018.2100716","article-title":"Realizing the metaverse with edge intelligence: A match made in heaven","volume":"30","author":"Lim","year":"2023","journal-title":"IEEE Wirel. Commun."},{"key":"ref_47","unstructured":"Facebook Inc. (2021). Rebrands as Meta to Stress \u201cMetaverse\u201d Plan, Facebook Inc."},{"key":"ref_48","doi-asserted-by":"crossref","unstructured":"Leenes, R. (2008). Privacy in the metaverse: Regulating a complex social construct in a virtual world. The Future of Identity in the Information Society, Springer.","DOI":"10.1007\/978-0-387-79026-8_7"},{"key":"ref_49","doi-asserted-by":"crossref","first-page":"433","DOI":"10.1109\/TMC.2020.3007740","article-title":"ARSpy: Breaking location-based multi-player augmented reality application for user location tracking","volume":"21","author":"Shang","year":"2022","journal-title":"IEEE Trans. Mob. Comput."},{"key":"ref_50","doi-asserted-by":"crossref","first-page":"e1752","DOI":"10.1002\/cav.1752","article-title":"Virtual world, defined from a technological perspective and applied to video games, mixed reality, and the metaverse","volume":"29","author":"Nevelsteen","year":"2018","journal-title":"Comput. Animat. Virtual Worlds"},{"key":"ref_51","doi-asserted-by":"crossref","unstructured":"Nguyen, C.T., Hoang, D.T., Nguyen, D.N., and Dutkiewicz, E. (2022, January 19\u201322). Metachain: A novel blockchain-based framework for metaverse applications. Proceedings of the IEEE 95th Vehicular Technology Conference: (VTC2022-Spring), Helsinki, Finland.","DOI":"10.1109\/VTC2022-Spring54318.2022.9860983"},{"key":"ref_52","unstructured":"Sanchez, J. (2007, January 26). Second life: An interactive qualitative analysis. Proceedings of the Society for Information Technology & Teacher Education International Conference, San Antonio, TX, USA."},{"key":"ref_53","first-page":"40","article-title":"Design and implementation of multimedia teaching platform for situational teaching of music appreciation course based on virtual reality","volume":"60","author":"Gan","year":"2021","journal-title":"Int. J. Electr. Eng. Educ."},{"key":"ref_54","doi-asserted-by":"crossref","first-page":"98944","DOI":"10.1109\/ACCESS.2022.3206457","article-title":"Design of secure mutual authentication scheme for metaverse environments using blockchain","volume":"10","author":"Ryu","year":"2022","journal-title":"IEEE Access"},{"key":"ref_55","doi-asserted-by":"crossref","first-page":"79","DOI":"10.1007\/s40860-020-00098-y","article-title":"A secure mutual authentication protocol for iot environment","volume":"6","author":"Panda","year":"2020","journal-title":"J. Reliab. Intell. Environ."},{"key":"ref_56","doi-asserted-by":"crossref","first-page":"102660","DOI":"10.1016\/j.jnca.2020.102660","article-title":"Secure two-factor lightweight authentication protocol using self-certified public key cryptography for multi-server 5G networks","volume":"161","author":"Haq","year":"2020","journal-title":"J. Netw. Comput. Appl."},{"key":"ref_57","doi-asserted-by":"crossref","first-page":"17261","DOI":"10.1007\/s11227-022-04558-5","article-title":"Blockchain-based mutual authentication protocol without CA","volume":"78","author":"Li","year":"2022","journal-title":"J. Supercomput."},{"key":"ref_58","first-page":"2221","article-title":"A Full Lifecycle Authentication Scheme for Large-scale Smart IoT Application","volume":"20","author":"Chen","year":"2022","journal-title":"IEEE Trans. Dependable Secur. Comput."},{"key":"ref_59","doi-asserted-by":"crossref","first-page":"1939","DOI":"10.1007\/s12083-022-01323-6","article-title":"A secure and efficient authentication protocol for wireless applications in multi-server environment","volume":"15","author":"Kumar","year":"2022","journal-title":"Peer--Peer Netw. Appl."},{"key":"ref_60","doi-asserted-by":"crossref","first-page":"122","DOI":"10.1109\/OJCS.2022.3188249","article-title":"Fusing blockchain and AI with metaverse: A survey","volume":"3","author":"Yang","year":"2022","journal-title":"IEEE Open J. Comput. Soc."},{"key":"ref_61","doi-asserted-by":"crossref","first-page":"203","DOI":"10.1090\/S0025-5718-1987-0866109-5","article-title":"Elliptic curve cryptosystems","volume":"48","author":"Koblitz","year":"1987","journal-title":"Math. Comput."},{"key":"ref_62","doi-asserted-by":"crossref","first-page":"11511","DOI":"10.1109\/ACCESS.2022.3145959","article-title":"Secure ECC-based three-factor mutual authentication protocol for telecare medi1 cal information system","volume":"10","author":"Ryu","year":"2022","journal-title":"IEEE Access"},{"key":"ref_63","doi-asserted-by":"crossref","first-page":"2245","DOI":"10.1016\/j.patcog.2004.04.011","article-title":"BioHashing: Two factor authen1 tication featuring fingerprint data and tokenized random number","volume":"37","author":"Teoh","year":"2004","journal-title":"Pattern Recognit."},{"key":"ref_64","unstructured":"Siddhartha, V., Gaba, G.S., and Kansal, L. (2019, January 6\u20137). A Lightweight Authentication Protocol using Implicit Certificates for Securing IoT Systems. Proceedings of the International Conference on Computational Intelligence and Data Science (ICCIDS 2019), Punjab, India."},{"key":"ref_65","doi-asserted-by":"crossref","unstructured":"Sciancalepore, S., Capossele, A., Piro, G., Boggia, G., and Bianchi, G. (2015, January 18). Key Management Protocol with Implicit Certificates for IoT systems. Proceedings of the 2015 Workshop on IoT challenges in Mobile and Industrial Systems, Florence, Italy.","DOI":"10.1145\/2753476.2753477"},{"key":"ref_66","doi-asserted-by":"crossref","unstructured":"Porambage, P., Kumar, P., Schmitt, C., Gurtov, A., and Ylianttila, M. (2013, January 3\u20135). Certificate-Based Pairwise Key Establishment Protocol for Wireless Sensor Networks. Proceedings of the IEEE 16th International Conference on Computational Science and Engineering, Sydney, NSW, Australia.","DOI":"10.1109\/CSE.2013.103"},{"key":"ref_67","doi-asserted-by":"crossref","first-page":"254","DOI":"10.1109\/JSEN.2015.2475298","article-title":"Lightweight and Secure Session-Key Establishment Scheme in Smart Home Environments","volume":"16","author":"Kumar","year":"2016","journal-title":"IEEE Sens. J."},{"key":"ref_68","doi-asserted-by":"crossref","first-page":"968","DOI":"10.1109\/TIFS.2016.2647225","article-title":"Anonymous Secure Framework in Connected Smart Home Environments","volume":"12","author":"Kumar","year":"2017","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"ref_69","doi-asserted-by":"crossref","unstructured":"Li, Y. (2013, January 5\u20137). Design of a Key Establishment Protocol for Smart Home Energy Management System. Proceedings of the Fifth International Conference on Computational Intelligence, Communication Systems and Networks, Madrid, Spain.","DOI":"10.1109\/CICSYN.2013.42"},{"key":"ref_70","doi-asserted-by":"crossref","unstructured":"Vaidya, B., Makrakis, D., and Mouftah, H. (2011, January 9\u201312). Device Authentication mechanism for smart energy home area networks. In Proceeding of the IEEE, International Conference on Consumer Electronics (ICCE), Las Vegas, NV, USA.","DOI":"10.1109\/ICCE.2011.5722864"},{"key":"ref_71","doi-asserted-by":"crossref","first-page":"945","DOI":"10.1007\/s00779-012-0541-2","article-title":"A novel secure key paring protocol for rf4ce ubiquitous smart home systems","volume":"17","author":"Han","year":"2013","journal-title":"Pers. Ubiquitous Comput."},{"key":"ref_72","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1109\/LES.2016.2630729","article-title":"Public Key Authentication and Key Agreement in IoT Devices with Minimal Airtime Consumption","volume":"9","author":"Sciancalepore","year":"2017","journal-title":"IEEE Embed. Syst. Lett."},{"key":"ref_73","doi-asserted-by":"crossref","unstructured":"Patel, S., Patel, D.R., and Navik, A.P. (2016, January 22\u201324). Energy efficient integrated authentication and access control mechanisms for Internet of Things. Proceedings of the IEEE International Conference on Internet of Things and Applications (IOTA), Pune, India.","DOI":"10.1109\/IOTA.2016.7562742"},{"key":"ref_74","doi-asserted-by":"crossref","unstructured":"Hossain, M., Noor, S., and Hasan, R. (2017, January 6\u20138). HSC-IoT: A Hardware and Software Co-Verification Based Authentication Scheme for Internet of Thing. Proceedings of the 5th IEEE International Conference on Mobile Cloud Computing, Services, and Engineering (MobileCloud), San Francisco, CA, USA.","DOI":"10.1109\/MobileCloud.2017.35"}],"container-title":["Computers"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/2073-431X\/13\/9\/225\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,10]],"date-time":"2025-10-10T15:51:47Z","timestamp":1760111507000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/2073-431X\/13\/9\/225"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,9,9]]},"references-count":74,"journal-issue":{"issue":"9","published-online":{"date-parts":[[2024,9]]}},"alternative-id":["computers13090225"],"URL":"https:\/\/doi.org\/10.3390\/computers13090225","relation":{},"ISSN":["2073-431X"],"issn-type":[{"type":"electronic","value":"2073-431X"}],"subject":[],"published":{"date-parts":[[2024,9,9]]}}}