{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,1]],"date-time":"2026-05-01T08:42:25Z","timestamp":1777624945080,"version":"3.51.4"},"reference-count":48,"publisher":"IGI Global","issue":"1","license":[{"start":{"date-parts":[[2024,3,26]],"date-time":"2024-03-26T00:00:00Z","timestamp":1711411200000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/3.0\/deed.en_US"},{"start":{"date-parts":[[2024,3,26]],"date-time":"2024-03-26T00:00:00Z","timestamp":1711411200000},"content-version":"am","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/3.0\/deed.en_US"},{"start":{"date-parts":[[2024,3,26]],"date-time":"2024-03-26T00:00:00Z","timestamp":1711411200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/3.0\/deed.en_US"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,3,26]]},"abstract":"<p>In edge computing scenarios, due to the wide distribution of devices, complex application environments, and limited computing and storage capabilities, their authentication and access control efficiency is low. To address the above issues, a secure trusted authentication scheme based on semantic Long Short-Term Memory (LSTM) and blockchain is proposed for IoT applications. The attribute-based access control model is optimized, combining blockchain technology with access control models, effectively improving the robustness and credibility of access control systems. Semantic LSTM is used to predict environmental attributes that can further restrict user access and dynamically meet the minimum permission granting requirements. Experiments show that when the number of certificates is 60, the computational overhead of the proposed method is only 203s, which is lower than other state-of-the-art methods. Therefore, the performance of the proposed schema in information security protection in IoT environments shows promise as a scalable authentication solution for IoT applications.<\/p>","DOI":"10.4018\/ijswis.341233","type":"journal-article","created":{"date-parts":[[2024,3,26]],"date-time":"2024-03-26T19:12:36Z","timestamp":1711480356000},"page":"1-27","source":"Crossref","is-referenced-by-count":7,"title":["A Trusted Authentication Scheme Using Semantic LSTM and Blockchain in IoT Access Control System"],"prefix":"10.4018","volume":"20","author":[{"given":"Ge","family":"Zhao","sequence":"first","affiliation":[{"name":"The Third Research Institute of the Ministry of Public Security, China"}]},{"given":"Xiangrong","family":"Li","sequence":"additional","affiliation":[{"name":"Beijing University of Technology, China"}]},{"given":"Hao","family":"Li","sequence":"additional","affiliation":[{"name":"Xi'an University of Arts and Science, China"}]}],"member":"2432","reference":[{"key":"IJSWIS.341233-0","doi-asserted-by":"publisher","DOI":"10.1007\/s00500-019-04220-y"},{"key":"IJSWIS.341233-1","doi-asserted-by":"publisher","DOI":"10.22667\/JISIS.2020.08.31.047"},{"key":"IJSWIS.341233-2","doi-asserted-by":"publisher","DOI":"10.1109\/JSEN.2019.2935035"},{"key":"IJSWIS.341233-3","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2020.113385"},{"key":"IJSWIS.341233-4","doi-asserted-by":"publisher","DOI":"10.1093\/jcde\/qwab007"},{"key":"IJSWIS.341233-5","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2019.2942211"},{"key":"IJSWIS.341233-6","doi-asserted-by":"publisher","DOI":"10.3390\/fi14090250"},{"key":"IJSWIS.341233-7","doi-asserted-by":"publisher","DOI":"10.4018\/IJSWIS.297034"},{"key":"IJSWIS.341233-8","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2021.3078072"},{"key":"IJSWIS.341233-9","doi-asserted-by":"publisher","DOI":"10.4018\/IJSSCI.285593"},{"key":"IJSWIS.341233-10","doi-asserted-by":"publisher","DOI":"10.1109\/TGCN.2021.3062972"},{"key":"IJSWIS.341233-11","doi-asserted-by":"publisher","DOI":"10.3390\/s23218686"},{"key":"IJSWIS.341233-12","doi-asserted-by":"publisher","DOI":"10.1145\/3599957.3606239"},{"key":"IJSWIS.341233-13","doi-asserted-by":"publisher","DOI":"10.1002\/cpe.4946"},{"key":"IJSWIS.341233-14","doi-asserted-by":"publisher","DOI":"10.4018\/IJSWIS.302895"},{"key":"IJSWIS.341233-15","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2022.3189699"},{"key":"IJSWIS.341233-16","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2019.01.006"},{"key":"IJSWIS.341233-17","doi-asserted-by":"publisher","DOI":"10.3390\/pr11030723"},{"key":"IJSWIS.341233-18","doi-asserted-by":"publisher","DOI":"10.1109\/ICAST55766.2022.10039664"},{"key":"IJSWIS.341233-19","doi-asserted-by":"publisher","DOI":"10.4018\/IJCAC.297094"},{"key":"IJSWIS.341233-20","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2020.102615"},{"key":"IJSWIS.341233-21","doi-asserted-by":"publisher","DOI":"10.4018\/IJCAC.305216"},{"key":"IJSWIS.341233-22","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2018.000-5"},{"key":"IJSWIS.341233-23","doi-asserted-by":"publisher","DOI":"10.1109\/MITP.2017.3051335"},{"key":"IJSWIS.341233-24","doi-asserted-by":"publisher","DOI":"10.1145\/1815961.1816021"},{"key":"IJSWIS.341233-25","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2022.3170594"},{"key":"IJSWIS.341233-26","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2020.01.023"},{"key":"IJSWIS.341233-27","doi-asserted-by":"crossref","unstructured":"Mamta, Gupta, B., Li, K., Leung, V.C., Psannis, K.E., & Yamaguchi, S. (2021). Blockchain-assisted secure fine-grained searchable encryption for a cloud-based healthcare cyber-physical system. IEEE\/CAA Journal of Automatica Sinica. IEEE.","DOI":"10.1109\/JAS.2021.1004003"},{"key":"IJSWIS.341233-28","doi-asserted-by":"publisher","DOI":"10.1145\/3078861.3078874"},{"key":"IJSWIS.341233-29","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2018.2812239"},{"key":"IJSWIS.341233-30","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2896065"},{"key":"IJSWIS.341233-31","doi-asserted-by":"publisher","DOI":"10.4018\/IJSWIS.300824"},{"key":"IJSWIS.341233-32","doi-asserted-by":"publisher","DOI":"10.1109\/Blockchain53845.2021.00071"},{"key":"IJSWIS.341233-33","doi-asserted-by":"publisher","DOI":"10.1109\/PerComWorkshops56833.2023.10150302"},{"key":"IJSWIS.341233-34","doi-asserted-by":"publisher","DOI":"10.3390\/s20143951"},{"key":"IJSWIS.341233-35","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-16-6542-4_17"},{"key":"IJSWIS.341233-36","doi-asserted-by":"publisher","DOI":"10.4018\/IJSWIS.306260"},{"key":"IJSWIS.341233-37","doi-asserted-by":"publisher","DOI":"10.3390\/s22020530"},{"key":"IJSWIS.341233-38","doi-asserted-by":"publisher","DOI":"10.1109\/AEMCSE51986.2021.00015"},{"key":"IJSWIS.341233-39","doi-asserted-by":"publisher","DOI":"10.1109\/ICCNC.2018.8390280"},{"key":"IJSWIS.341233-40","doi-asserted-by":"publisher","DOI":"10.1145\/3373477.3373498"},{"key":"IJSWIS.341233-41","doi-asserted-by":"publisher","DOI":"10.1155\/2021\/9931460"},{"key":"IJSWIS.341233-42","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2913682"},{"key":"IJSWIS.341233-43","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2888940"},{"key":"IJSWIS.341233-44","doi-asserted-by":"publisher","DOI":"10.1109\/IPDPS47924.2020.00045"},{"key":"IJSWIS.341233-45","doi-asserted-by":"publisher","DOI":"10.1002\/int.22293"},{"key":"IJSWIS.341233-46","doi-asserted-by":"publisher","DOI":"10.3233\/JIFS-189318"},{"key":"IJSWIS.341233-47","doi-asserted-by":"publisher","DOI":"10.1109\/HPCA47549.2020.00041"}],"container-title":["International Journal on Semantic Web and Information Systems"],"original-title":[],"language":"ng","link":[{"URL":"https:\/\/www.igi-global.com\/viewtitle.aspx?TitleId=341233","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,5]],"date-time":"2025-02-05T11:27:27Z","timestamp":1738754847000},"score":1,"resource":{"primary":{"URL":"https:\/\/services.igi-global.com\/resolvedoi\/resolve.aspx?doi=10.4018\/IJSWIS.341233"}},"subtitle":[""],"short-title":[],"issued":{"date-parts":[[2024,3,26]]},"references-count":48,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2024,1]]}},"URL":"https:\/\/doi.org\/10.4018\/ijswis.341233","relation":{},"ISSN":["1552-6283","1552-6291"],"issn-type":[{"value":"1552-6283","type":"print"},{"value":"1552-6291","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,3,26]]}}}