{"id":"https://openalex.org/W7125812339","doi":"https://doi.org/10.1002/spy2.70189","title":"SmartAgri\u2010IDQ: Quantum\u2010Resistant Identity\u2010Based Data Authentication Protocol for Smart Agriculture IoT","display_name":"SmartAgri\u2010IDQ: Quantum\u2010Resistant Identity\u2010Based Data Authentication Protocol for Smart Agriculture IoT","publication_year":2026,"publication_date":"2026-01-27","ids":{"openalex":"https://openalex.org/W7125812339","doi":"https://doi.org/10.1002/spy2.70189"},"language":"en","primary_location":{"id":"doi:10.1002/spy2.70189","is_oa":false,"landing_page_url":"https://doi.org/10.1002/spy2.70189","pdf_url":null,"source":{"id":"https://openalex.org/S4210233143","display_name":"Security and Privacy","issn_l":"2475-6725","issn":["2475-6725"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320595","host_organization_name":"Wiley","host_organization_lineage":["https://openalex.org/P4310320595"],"host_organization_lineage_names":["Wiley"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"SECURITY AND PRIVACY","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5124024643","display_name":"Lacchita Soni","orcid":null},"institutions":[{"id":"https://openalex.org/I2799532815","display_name":"Madan Mohan Malaviya University of Technology","ror":"https://ror.org/04h1w2j35","country_code":"IN","type":"education","lineage":["https://openalex.org/I2799532815"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Lacchita Soni","raw_affiliation_strings":["Department of Mathematics and Scientific Computing Madan Mohan Malaviya University of Technology  Gorakhpur Uttar Pradesh India"],"raw_orcid":"https://orcid.org/0009-0000-8077-3318","affiliations":[{"raw_affiliation_string":"Department of Mathematics and Scientific Computing Madan Mohan Malaviya University of Technology  Gorakhpur Uttar Pradesh India","institution_ids":["https://openalex.org/I2799532815"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5123929885","display_name":"Harish Chandra","orcid":null},"institutions":[{"id":"https://openalex.org/I2799532815","display_name":"Madan Mohan Malaviya University of Technology","ror":"https://ror.org/04h1w2j35","country_code":"IN","type":"education","lineage":["https://openalex.org/I2799532815"]}],"countries":["IN"],"is_corresponding":true,"raw_author_name":"Harish Chandra","raw_affiliation_strings":["Department of Mathematics and Scientific Computing Madan Mohan Malaviya University of Technology  Gorakhpur Uttar Pradesh India"],"raw_orcid":"https://orcid.org/0000-0001-5232-6043","affiliations":[{"raw_affiliation_string":"Department of Mathematics and Scientific Computing Madan Mohan Malaviya University of Technology  Gorakhpur Uttar Pradesh India","institution_ids":["https://openalex.org/I2799532815"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5123996210","display_name":"Daya Sagar Gupta","orcid":null},"institutions":[{"id":"https://openalex.org/I132153292","display_name":"Indian Institute of Technology Patna","ror":"https://ror.org/01ft5vz71","country_code":"IN","type":"education","lineage":["https://openalex.org/I132153292"]}],"countries":["IN"],"is_corresponding":true,"raw_author_name":"Daya Sagar Gupta","raw_affiliation_strings":["Department of Mathematics Indian Institute of Technology, Patna  Bihta Bihar India"],"raw_orcid":"https://orcid.org/0000-0001-5401-7287","affiliations":[{"raw_affiliation_string":"Department of Mathematics Indian Institute of Technology, Patna  Bihta Bihar India","institution_ids":["https://openalex.org/I132153292"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5123929885","https://openalex.org/A5123996210"],"corresponding_institution_ids":["https://openalex.org/I132153292","https://openalex.org/I2799532815"],"apc_list":{"value":3140,"currency":"USD","value_usd":3140},"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.14660007,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"9","issue":"2","first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.24140000343322754,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.24140000343322754,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10273","display_name":"IoT and Edge/Fog Computing","score":0.13830000162124634,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.07840000092983246,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.6029999852180481},{"id":"https://openalex.org/keywords/safeguard","display_name":"Safeguard","score":0.5087000131607056},{"id":"https://openalex.org/keywords/random-oracle","display_name":"Random oracle","score":0.5062000155448914},{"id":"https://openalex.org/keywords/cryptographic-protocol","display_name":"Cryptographic protocol","score":0.4973999857902527},{"id":"https://openalex.org/keywords/data-security","display_name":"Data security","score":0.42170000076293945},{"id":"https://openalex.org/keywords/certificate","display_name":"Certificate","score":0.414000004529953},{"id":"https://openalex.org/keywords/protocol","display_name":"Protocol (science)","score":0.3939000070095062},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.37700000405311584}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7383999824523926},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6349999904632568},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.6029999852180481},{"id":"https://openalex.org/C2780771206","wikidata":"https://www.wikidata.org/wiki/Q3271761","display_name":"Safeguard","level":2,"score":0.5087000131607056},{"id":"https://openalex.org/C94284585","wikidata":"https://www.wikidata.org/wiki/Q228184","display_name":"Random oracle","level":4,"score":0.5062000155448914},{"id":"https://openalex.org/C33884865","wikidata":"https://www.wikidata.org/wiki/Q1254335","display_name":"Cryptographic protocol","level":3,"score":0.4973999857902527},{"id":"https://openalex.org/C10511746","wikidata":"https://www.wikidata.org/wiki/Q899388","display_name":"Data security","level":3,"score":0.42170000076293945},{"id":"https://openalex.org/C96865113","wikidata":"https://www.wikidata.org/wiki/Q2946816","display_name":"Certificate","level":2,"score":0.414000004529953},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.4115000069141388},{"id":"https://openalex.org/C2780385302","wikidata":"https://www.wikidata.org/wiki/Q367158","display_name":"Protocol (science)","level":3,"score":0.3939000070095062},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.37700000405311584},{"id":"https://openalex.org/C205383636","wikidata":"https://www.wikidata.org/wiki/Q14746","display_name":"Merkle tree","level":4,"score":0.37540000677108765},{"id":"https://openalex.org/C2779960059","wikidata":"https://www.wikidata.org/wiki/Q7113681","display_name":"Overhead (engineering)","level":2,"score":0.375},{"id":"https://openalex.org/C38369872","wikidata":"https://www.wikidata.org/wiki/Q7445009","display_name":"Security analysis","level":2,"score":0.31940001249313354},{"id":"https://openalex.org/C29983905","wikidata":"https://www.wikidata.org/wiki/Q7445066","display_name":"Security service","level":3,"score":0.305400013923645},{"id":"https://openalex.org/C81860439","wikidata":"https://www.wikidata.org/wiki/Q251212","display_name":"Internet of Things","level":2,"score":0.2870999872684479},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.2637999951839447},{"id":"https://openalex.org/C93996380","wikidata":"https://www.wikidata.org/wiki/Q44127","display_name":"Server","level":2,"score":0.2635999917984009},{"id":"https://openalex.org/C121822524","wikidata":"https://www.wikidata.org/wiki/Q5157582","display_name":"Computer security model","level":2,"score":0.2621999979019165},{"id":"https://openalex.org/C206345919","wikidata":"https://www.wikidata.org/wiki/Q20380951","display_name":"Resource (disambiguation)","level":2,"score":0.25540000200271606},{"id":"https://openalex.org/C527648132","wikidata":"https://www.wikidata.org/wiki/Q189900","display_name":"Information security","level":2,"score":0.25519999861717224},{"id":"https://openalex.org/C557945733","wikidata":"https://www.wikidata.org/wiki/Q389772","display_name":"Data transmission","level":2,"score":0.25450000166893005}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1002/spy2.70189","is_oa":false,"landing_page_url":"https://doi.org/10.1002/spy2.70189","pdf_url":null,"source":{"id":"https://openalex.org/S4210233143","display_name":"Security and Privacy","issn_l":"2475-6725","issn":["2475-6725"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320595","host_organization_name":"Wiley","host_organization_lineage":["https://openalex.org/P4310320595"],"host_organization_lineage_names":["Wiley"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"SECURITY AND PRIVACY","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/2","score":0.6747831702232361,"display_name":"Zero hunger"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":41,"referenced_works":["https://openalex.org/W590625283","https://openalex.org/W626997161","https://openalex.org/W1569083856","https://openalex.org/W1972050218","https://openalex.org/W2036194448","https://openalex.org/W2095746246","https://openalex.org/W2125093890","https://openalex.org/W2137147061","https://openalex.org/W2142048307","https://openalex.org/W2404826793","https://openalex.org/W2504833738","https://openalex.org/W2535431598","https://openalex.org/W2620986197","https://openalex.org/W2734706783","https://openalex.org/W2769200374","https://openalex.org/W2769429001","https://openalex.org/W2799690280","https://openalex.org/W2810034163","https://openalex.org/W2900583946","https://openalex.org/W2903608625","https://openalex.org/W2920009094","https://openalex.org/W2944396970","https://openalex.org/W2969264604","https://openalex.org/W3023115576","https://openalex.org/W3100768346","https://openalex.org/W3112498453","https://openalex.org/W3129108357","https://openalex.org/W3138029532","https://openalex.org/W3193651812","https://openalex.org/W3202959585","https://openalex.org/W4211205765","https://openalex.org/W4224126802","https://openalex.org/W4224862610","https://openalex.org/W4226060968","https://openalex.org/W4361006122","https://openalex.org/W4379468619","https://openalex.org/W4390187433","https://openalex.org/W4399068515","https://openalex.org/W4401317264","https://openalex.org/W4404737747","https://openalex.org/W4412960542"],"related_works":[],"abstract_inverted_index":{"ABSTRACT":[0],"The":[1,91,116],"Internet":[2],"of":[3,93,126,137],"Things":[4],"(IoT)":[5],"has":[6,48,59,143,170],"significantly":[7],"transformed":[8],"industries,":[9],"including":[10,42],"agriculture,":[11],"by":[12],"optimizing":[13],"resources":[14],"and":[15,86,129,152,167,177],"enhancing":[16],"monitoring.":[17],"Smart":[18],"agriculture":[19,76,189],"IoT":[20,29],"protocols":[21],"utilize":[22],"sensors":[23],"for":[24],"data":[25,43,83],"transmission":[26],"over":[27],"the":[28,69,94,101,124,135,138,147,153,163,182],"network.":[30],"Due":[31],"to":[32,52,122],"its":[33],"open":[34],"communication":[35,178],"medium,":[36],"it":[37,58,88],"faces":[38],"significant":[39],"security":[40,50,92,136,159],"challenges,":[41],"authentication,":[44],"etc.":[45],"Current":[46],"literature":[47],"various":[49],"methods":[51],"safeguard":[53,74],"IoT\u2010enabled":[54],"smart":[55,75,188],"agriculture.":[56],"However,":[57],"been":[60,144,171],"seen":[61],"that":[62],"such":[63,105],"traditional":[64],"systems":[65],"are":[66],"weak":[67],"against":[68],"futuristic":[70],"quantum":[71],"computers.":[72],"To":[73,133,161],"IoT,":[77],"we":[78],"propose":[79],"a":[80,165],"quantum\u2010resistance":[81],"identity\u2010based":[82,117],"authentication":[84,96],"protocol":[85],"call":[87],"as":[89,106],"SmartAgri\u2010IDQ.":[90],"proposed":[95,139],"mechanism":[97],"is":[98,120],"based":[99,173],"on":[100,174],"lattice":[102],"hard":[103],"assumptions":[104],"small":[107],"integer":[108],"solution":[109],"(SIS)":[110],"or":[111],"inhomogeneous":[112],"SIS":[113],"(ISIS)":[114],"problems.":[115],"cryptography":[118],"(IBC)":[119],"used":[121],"avoid":[123],"overhead":[125],"certificate":[127],"management":[128],"public\u2010key":[130],"infrastructure":[131],"(PKI).":[132],"validate":[134],"scheme,":[140],"formal":[141],"analysis":[142,169],"done":[145],"using":[146],"Random":[148],"Oracle":[149],"Model":[150],"(ROM)":[151],"Scyther":[154],"tool,":[155],"along":[156],"with":[157],"informal":[158],"analysis.":[160],"evaluate":[162],"efficiency,":[164],"performance":[166],"comparative":[168],"estimated":[172],"storage,":[175],"computation,":[176],"costs,":[179],"which":[180],"affirms":[181],"protocol's":[183],"suitability":[184],"in":[185],"resource":[186],"constraints":[187],"IoT.":[190]},"counts_by_year":[],"updated_date":"2026-01-28T23:18:48.515280","created_date":"2026-01-28T00:00:00"}
