{"id":"https://openalex.org/W4415048260","doi":"https://doi.org/10.1109/access.2025.3620017","title":"Innovative Integration of GBA and Hybrid TESLA for Securing IoT Authentication in 5G and 6G Networks","display_name":"Innovative Integration of GBA and Hybrid TESLA for Securing IoT Authentication in 5G and 6G Networks","publication_year":2025,"publication_date":"2025-01-01","ids":{"openalex":"https://openalex.org/W4415048260","doi":"https://doi.org/10.1109/access.2025.3620017"},"language":"en","primary_location":{"id":"doi:10.1109/access.2025.3620017","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2025.3620017","pdf_url":null,"source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://doi.org/10.1109/access.2025.3620017","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5000552525","display_name":"Khouloud Eledlebi","orcid":"https://orcid.org/0000-0002-4355-4041"},"institutions":[{"id":"https://openalex.org/I176601375","display_name":"Khalifa University of Science and Technology","ror":"https://ror.org/05hffr360","country_code":"AE","type":"education","lineage":["https://openalex.org/I176601375"]}],"countries":["AE"],"is_corresponding":true,"raw_author_name":"Khouloud Eledlebi","raw_affiliation_strings":["Department of Computer Science, Center for Secure Cyber-Physical Systems, Khalifa University, Abu Dhabi, United Arab Emirates","Department of Computer Science, Center for Secure Cyber-Physical Systems, Khalifa University, PO 127788, Abu Dhabi, UAE"],"raw_orcid":"https://orcid.org/0000-0002-4355-4041","affiliations":[{"raw_affiliation_string":"Department of Computer Science, Center for Secure Cyber-Physical Systems, Khalifa University, Abu Dhabi, United Arab Emirates","institution_ids":["https://openalex.org/I176601375"]},{"raw_affiliation_string":"Department of Computer Science, Center for Secure Cyber-Physical Systems, Khalifa University, PO 127788, Abu Dhabi, UAE","institution_ids":["https://openalex.org/I176601375"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5045872771","display_name":"David Khoury","orcid":"https://orcid.org/0000-0003-3333-6574"},"institutions":[{"id":"https://openalex.org/I2802487185","display_name":"Universit\u00e9 du littoral c\u00f4te d'opale","ror":"https://ror.org/02gdcg342","country_code":"FR","type":"education","lineage":["https://openalex.org/I2802487185"]}],"countries":["FR"],"is_corresponding":false,"raw_author_name":"David Khoury","raw_affiliation_strings":["Laboratoire d&#x2019;Informatique Signal et Image de la C&#x00F4;te d&#x2019;Opale (LISIC UR 4491), Universit&#x00E9; du Littoral C&#x00F4;te d&#x2019;Opale, Calais, France"],"raw_orcid":"https://orcid.org/0000-0003-3333-6574","affiliations":[{"raw_affiliation_string":"Laboratoire d&#x2019;Informatique Signal et Image de la C&#x00F4;te d&#x2019;Opale (LISIC UR 4491), Universit&#x00E9; du Littoral C&#x00F4;te d&#x2019;Opale, Calais, France","institution_ids":["https://openalex.org/I2802487185"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5021883896","display_name":"Samir Haddad","orcid":"https://orcid.org/0000-0003-0292-2765"},"institutions":[{"id":"https://openalex.org/I168913471","display_name":"University of Balamand","ror":"https://ror.org/01xvwxv41","country_code":"LB","type":"education","lineage":["https://openalex.org/I168913471"]}],"countries":["LB"],"is_corresponding":false,"raw_author_name":"Samir Haddad","raw_affiliation_strings":["Department of Computer Science and Mathematics, Faculty of Arts and Sciences, University of Balamand, Koura, Lebanon","Department of Computer Science and Mathematics, Faculty of Arts and Sciences, University of Balamand, Koura P.O. Box 100, Lebanon"],"raw_orcid":"https://orcid.org/0000-0003-0292-2765","affiliations":[{"raw_affiliation_string":"Department of Computer Science and Mathematics, Faculty of Arts and Sciences, University of Balamand, Koura, Lebanon","institution_ids":["https://openalex.org/I168913471"]},{"raw_affiliation_string":"Department of Computer Science and Mathematics, Faculty of Arts and Sciences, University of Balamand, Koura P.O. Box 100, Lebanon","institution_ids":["https://openalex.org/I168913471"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5079360048","display_name":"Patrick Sondi","orcid":"https://orcid.org/0000-0001-9484-7357"},"institutions":[{"id":"https://openalex.org/I205703379","display_name":"Institut Mines-T\u00e9l\u00e9com","ror":"https://ror.org/025vp2923","country_code":"FR","type":"facility","lineage":["https://openalex.org/I205703379"]}],"countries":["FR"],"is_corresponding":false,"raw_author_name":"Patrick Sondi","raw_affiliation_strings":["Center for Digital Systems, IMT Nord Europe, Institut Mines-T&#x00E9;l&#x00E9;com, Lille, France"],"raw_orcid":"https://orcid.org/0000-0001-9484-7357","affiliations":[{"raw_affiliation_string":"Center for Digital Systems, IMT Nord Europe, Institut Mines-T&#x00E9;l&#x00E9;com, Lille, France","institution_ids":["https://openalex.org/I205703379"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5082540819","display_name":"Hyeran Mun","orcid":"https://orcid.org/0000-0002-5238-2392"},"institutions":[{"id":"https://openalex.org/I176601375","display_name":"Khalifa University of Science and Technology","ror":"https://ror.org/05hffr360","country_code":"AE","type":"education","lineage":["https://openalex.org/I176601375"]}],"countries":["AE"],"is_corresponding":false,"raw_author_name":"Hyeran Mun","raw_affiliation_strings":["Department of Computer Science, Center for Secure Cyber-Physical Systems, Khalifa University, Abu Dhabi, United Arab Emirates","Department of Computer Science, Center for Secure Cyber-Physical Systems, Khalifa University, PO 127788, Abu Dhabi, UAE"],"raw_orcid":"https://orcid.org/0000-0002-5238-2392","affiliations":[{"raw_affiliation_string":"Department of Computer Science, Center for Secure Cyber-Physical Systems, Khalifa University, Abu Dhabi, United Arab Emirates","institution_ids":["https://openalex.org/I176601375"]},{"raw_affiliation_string":"Department of Computer Science, Center for Secure Cyber-Physical Systems, Khalifa University, PO 127788, Abu Dhabi, UAE","institution_ids":["https://openalex.org/I176601375"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5050792779","display_name":"Kassem Danach","orcid":"https://orcid.org/0000-0001-6469-672X"},"institutions":[{"id":"https://openalex.org/I3130829635","display_name":"Al-Kafa\u00e0t University","ror":"https://ror.org/04k0d3t24","country_code":"LB","type":"education","lineage":["https://openalex.org/I3130829635"]}],"countries":["LB"],"is_corresponding":false,"raw_author_name":"Kassem M. Danach","raw_affiliation_strings":["Basic and Applied Sciences Research Center, Al Maaref University, Beirut, Lebanon","Basic and Applied Sciences Research Center, Al Maaref University, Beirut P.O. Box 5078/25, Lebanon"],"raw_orcid":"https://orcid.org/0000-0001-6469-672X","affiliations":[{"raw_affiliation_string":"Basic and Applied Sciences Research Center, Al Maaref University, Beirut, Lebanon","institution_ids":["https://openalex.org/I3130829635"]},{"raw_affiliation_string":"Basic and Applied Sciences Research Center, Al Maaref University, Beirut P.O. Box 5078/25, Lebanon","institution_ids":["https://openalex.org/I3130829635"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5074699182","display_name":"Jinane Sayah","orcid":"https://orcid.org/0009-0003-7018-1660"},"institutions":[{"id":"https://openalex.org/I168913471","display_name":"University of Balamand","ror":"https://ror.org/01xvwxv41","country_code":"LB","type":"education","lineage":["https://openalex.org/I168913471"]}],"countries":["LB"],"is_corresponding":false,"raw_author_name":"Jinane Sayah","raw_affiliation_strings":["Department of Telecom and Networks, Issam Fares Faculty of Technology, University of Balamand, Koura, Lebanon","Department of Telecom and Networks, Issam Fares Faculty of Technology, University of Balamand, Koura P.O. Box 100, Lebanon"],"raw_orcid":"https://orcid.org/0009-0003-7018-1660","affiliations":[{"raw_affiliation_string":"Department of Telecom and Networks, Issam Fares Faculty of Technology, University of Balamand, Koura, Lebanon","institution_ids":["https://openalex.org/I168913471"]},{"raw_affiliation_string":"Department of Telecom and Networks, Issam Fares Faculty of Technology, University of Balamand, Koura P.O. Box 100, Lebanon","institution_ids":["https://openalex.org/I168913471"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5075830877","display_name":"Ernesto Damiani","orcid":"https://orcid.org/0000-0002-9557-6496"},"institutions":[{"id":"https://openalex.org/I176601375","display_name":"Khalifa University of Science and Technology","ror":"https://ror.org/05hffr360","country_code":"AE","type":"education","lineage":["https://openalex.org/I176601375"]}],"countries":["AE"],"is_corresponding":false,"raw_author_name":"Ernesto Damiani","raw_affiliation_strings":["Department of Computer Science, Center for Secure Cyber-Physical Systems, Khalifa University, Abu Dhabi, United Arab Emirates","Department of Computer Science, Center for Secure Cyber-Physical Systems, Khalifa University, PO 127788, Abu Dhabi, UAE"],"raw_orcid":"https://orcid.org/0000-0002-9557-6496","affiliations":[{"raw_affiliation_string":"Department of Computer Science, Center for Secure Cyber-Physical Systems, Khalifa University, Abu Dhabi, United Arab Emirates","institution_ids":["https://openalex.org/I176601375"]},{"raw_affiliation_string":"Department of Computer Science, Center for Secure Cyber-Physical Systems, Khalifa University, PO 127788, Abu Dhabi, UAE","institution_ids":["https://openalex.org/I176601375"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5044552714","display_name":"Chan Yeob Yeun","orcid":"https://orcid.org/0000-0002-1398-952X"},"institutions":[{"id":"https://openalex.org/I176601375","display_name":"Khalifa University of Science and Technology","ror":"https://ror.org/05hffr360","country_code":"AE","type":"education","lineage":["https://openalex.org/I176601375"]}],"countries":["AE"],"is_corresponding":false,"raw_author_name":"Chan Yeob Yeun","raw_affiliation_strings":["Department of Computer Science, Center for Secure Cyber-Physical Systems, Khalifa University, Abu Dhabi, United Arab Emirates","Department of Computer Science, Center for Secure Cyber-Physical Systems, Khalifa University, PO 127788, Abu Dhabi, UAE"],"raw_orcid":"https://orcid.org/0000-0002-1398-952X","affiliations":[{"raw_affiliation_string":"Department of Computer Science, Center for Secure Cyber-Physical Systems, Khalifa University, Abu Dhabi, United Arab Emirates","institution_ids":["https://openalex.org/I176601375"]},{"raw_affiliation_string":"Department of Computer Science, Center for Secure Cyber-Physical Systems, Khalifa University, PO 127788, Abu Dhabi, UAE","institution_ids":["https://openalex.org/I176601375"]}]}],"institutions":[],"countries_distinct_count":3,"institutions_distinct_count":9,"corresponding_author_ids":["https://openalex.org/A5000552525"],"corresponding_institution_ids":["https://openalex.org/I176601375"],"apc_list":{"value":1850,"currency":"USD","value_usd":1850},"apc_paid":{"value":1850,"currency":"USD","value_usd":1850},"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.31449496,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"13","issue":null,"first_page":"176097","last_page":"176109"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10273","display_name":"IoT and Edge/Fog Computing","score":0.9854999780654907,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10273","display_name":"IoT and Edge/Fog Computing","score":0.9854999780654907,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11932","display_name":"Wireless Body Area Networks","score":0.9779000282287598,"subfield":{"id":"https://openalex.org/subfields/2204","display_name":"Biomedical Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12079","display_name":"IoT Networks and Protocols","score":0.9447000026702881,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.620199978351593},{"id":"https://openalex.org/keywords/synchronization","display_name":"Synchronization (alternating current)","score":0.5641999840736389},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.5253999829292297},{"id":"https://openalex.org/keywords/hash-function","display_name":"Hash function","score":0.4900999963283539},{"id":"https://openalex.org/keywords/symmetric-key-algorithm","display_name":"Symmetric-key algorithm","score":0.4569999873638153},{"id":"https://openalex.org/keywords/server","display_name":"Server","score":0.45329999923706055},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.4410000145435333},{"id":"https://openalex.org/keywords/protocol","display_name":"Protocol (science)","score":0.4375999867916107},{"id":"https://openalex.org/keywords/cryptographic-protocol","display_name":"Cryptographic protocol","score":0.42590001225471497},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.4050999879837036}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8726999759674072},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.620199978351593},{"id":"https://openalex.org/C2778562939","wikidata":"https://www.wikidata.org/wiki/Q1298791","display_name":"Synchronization (alternating current)","level":3,"score":0.5641999840736389},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.5472000241279602},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.5253999829292297},{"id":"https://openalex.org/C99138194","wikidata":"https://www.wikidata.org/wiki/Q183427","display_name":"Hash function","level":2,"score":0.4900999963283539},{"id":"https://openalex.org/C65302260","wikidata":"https://www.wikidata.org/wiki/Q327675","display_name":"Symmetric-key algorithm","level":4,"score":0.4569999873638153},{"id":"https://openalex.org/C93996380","wikidata":"https://www.wikidata.org/wiki/Q44127","display_name":"Server","level":2,"score":0.45329999923706055},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.4410000145435333},{"id":"https://openalex.org/C2780385302","wikidata":"https://www.wikidata.org/wiki/Q367158","display_name":"Protocol (science)","level":3,"score":0.4375999867916107},{"id":"https://openalex.org/C33884865","wikidata":"https://www.wikidata.org/wiki/Q1254335","display_name":"Cryptographic protocol","level":3,"score":0.42590001225471497},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.4050999879837036},{"id":"https://openalex.org/C21564112","wikidata":"https://www.wikidata.org/wiki/Q4825885","display_name":"Authentication protocol","level":3,"score":0.39899998903274536},{"id":"https://openalex.org/C191197275","wikidata":"https://www.wikidata.org/wiki/Q1755775","display_name":"Session key","level":3,"score":0.3785000145435333},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.3637999892234802},{"id":"https://openalex.org/C186967261","wikidata":"https://www.wikidata.org/wiki/Q5082128","display_name":"Mobile device","level":2,"score":0.3628000020980835},{"id":"https://openalex.org/C141492731","wikidata":"https://www.wikidata.org/wiki/Q1052621","display_name":"Message authentication code","level":3,"score":0.357699990272522},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.34369999170303345},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.3382999897003174},{"id":"https://openalex.org/C108037233","wikidata":"https://www.wikidata.org/wiki/Q11375","display_name":"Wireless network","level":3,"score":0.3319000005722046},{"id":"https://openalex.org/C81860439","wikidata":"https://www.wikidata.org/wiki/Q251212","display_name":"Internet of Things","level":2,"score":0.33180001378059387},{"id":"https://openalex.org/C207609745","wikidata":"https://www.wikidata.org/wiki/Q4944086","display_name":"Bootstrapping (finance)","level":2,"score":0.33059999346733093},{"id":"https://openalex.org/C144543869","wikidata":"https://www.wikidata.org/wiki/Q2738570","display_name":"Mobile computing","level":2,"score":0.3255999982357025},{"id":"https://openalex.org/C2781221063","wikidata":"https://www.wikidata.org/wiki/Q6944186","display_name":"Mutual authentication","level":3,"score":0.32420000433921814},{"id":"https://openalex.org/C510870077","wikidata":"https://www.wikidata.org/wiki/Q7444868","display_name":"Secure communication","level":3,"score":0.32100000977516174},{"id":"https://openalex.org/C548217200","wikidata":"https://www.wikidata.org/wiki/Q251","display_name":"Java","level":2,"score":0.3124000132083893},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.2944999933242798},{"id":"https://openalex.org/C73468433","wikidata":"https://www.wikidata.org/wiki/Q1639918","display_name":"Hybrid cryptosystem","level":4,"score":0.29109999537467957},{"id":"https://openalex.org/C178148046","wikidata":"https://www.wikidata.org/wiki/Q217491","display_name":"Network Time Protocol","level":3,"score":0.289900004863739},{"id":"https://openalex.org/C39217717","wikidata":"https://www.wikidata.org/wiki/Q1432354","display_name":"Hardware security module","level":3,"score":0.2809999883174896},{"id":"https://openalex.org/C71743495","wikidata":"https://www.wikidata.org/wiki/Q2845210","display_name":"Power analysis","level":3,"score":0.2784000039100647},{"id":"https://openalex.org/C12269588","wikidata":"https://www.wikidata.org/wiki/Q132364","display_name":"Communications protocol","level":2,"score":0.2766000032424927},{"id":"https://openalex.org/C99674996","wikidata":"https://www.wikidata.org/wiki/Q1414155","display_name":"Key exchange","level":4,"score":0.2667999863624573},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.26159998774528503},{"id":"https://openalex.org/C123657996","wikidata":"https://www.wikidata.org/wiki/Q12271","display_name":"Architecture","level":2,"score":0.2572000026702881},{"id":"https://openalex.org/C40305131","wikidata":"https://www.wikidata.org/wiki/Q2616305","display_name":"Obfuscation","level":2,"score":0.25619998574256897},{"id":"https://openalex.org/C163258240","wikidata":"https://www.wikidata.org/wiki/Q25342","display_name":"Power (physics)","level":2,"score":0.25589999556541443},{"id":"https://openalex.org/C2779182362","wikidata":"https://www.wikidata.org/wiki/Q17126187","display_name":"Session (web analytics)","level":2,"score":0.2551000118255615},{"id":"https://openalex.org/C95491727","wikidata":"https://www.wikidata.org/wiki/Q992968","display_name":"Mobile telephony","level":3,"score":0.25}],"mesh":[],"locations_count":3,"locations":[{"id":"doi:10.1109/access.2025.3620017","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2025.3620017","pdf_url":null,"source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},{"id":"pmh:oai:HAL:hal-05310193v1","is_oa":false,"landing_page_url":"https://imt-nord-europe.hal.science/hal-05310193","pdf_url":null,"source":{"id":"https://openalex.org/S4306402512","display_name":"HAL (Le Centre pour la Communication Scientifique Directe)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I1294671590","host_organization_name":"Centre National de la Recherche Scientifique","host_organization_lineage":["https://openalex.org/I1294671590"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"IEEE Access, 2025, 13, pp.176097-176109. &#x27E8;10.1109/ACCESS.2025.3620017&#x27E9;","raw_type":"Journal articles"},{"id":"pmh:oai:doaj.org/article:bb3477b0b46d4a85b2f80cb9bfc0737c","is_oa":true,"landing_page_url":"https://doaj.org/article/bb3477b0b46d4a85b2f80cb9bfc0737c","pdf_url":null,"source":{"id":"https://openalex.org/S4306401280","display_name":"DOAJ (DOAJ: Directory of Open Access Journals)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by-sa","license_id":"https://openalex.org/licenses/cc-by-sa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"IEEE Access, Vol 13, Pp 176097-176109 (2025)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1109/access.2025.3620017","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2025.3620017","pdf_url":null,"source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":[],"abstract_inverted_index":{"This":[0,121],"paper":[1],"presents":[2],"a":[3],"novel":[4],"enhancement":[5],"in":[6,21,94,127],"the":[7,12,22,42,54,64,91],"Hybrid":[8,103,124],"TESLA":[9,104],"protocol,":[10],"integrating":[11],"Generic":[13],"Bootstrapping":[14],"Architecture":[15],"(GBA)":[16],"to":[17],"replace":[18],"public-key":[19],"cryptography":[20],"synchronization":[23,80],"phase.":[24],"The":[25,102],"proposed":[26],"protocol":[27,65],"securely":[28],"establishes":[29],"communication":[30],"between":[31,81],"IoT":[32,70],"devices":[33],"and":[34,49,83,99,109],"application":[35],"servers":[36],"without":[37],"transmitting":[38],"sensitive":[39],"credentials":[40],"over":[41],"network":[43,57],"by":[44],"leveraging":[45],"GBA\u2019s":[46],"symmetric":[47],"encryption":[48],"session":[50],"key":[51],"generation.":[52],"Utilizing":[53],"existing":[55],"mobile":[56,135],"infrastructure,":[58],"GBA":[59,87],"ensures":[60,113],"secure":[61],"authentication,":[62],"making":[63],"highly":[66],"suitable":[67],"for":[68],"resource-constrained":[69],"environments.":[71],"A":[72],"simulation":[73],"analysis":[74],"conducted":[75],"using":[76],"Java":[77],"demonstrated":[78],"successful":[79],"clients":[82],"servers,":[84],"with":[85],"previous":[86],"experimental":[88],"results":[89],"confirming":[90],"protocol\u2019s":[92,105],"efficiency":[93],"terms":[95],"of":[96,107],"authentication":[97],"time":[98],"power":[100],"consumption.":[101],"use":[106],"SHA-2":[108],"SHA-3":[110],"hashing":[111],"functions":[112],"minimal":[114],"computational":[115],"demands":[116],"while":[117],"maintaining":[118],"robust":[119],"cybersecurity.":[120],"integration":[122],"expands":[123],"TESLA\u2019s":[125],"utility":[126],"metaverse":[128],"environments,":[129],"enabling":[130],"secure,":[131],"seamless":[132],"interactions":[133],"across":[134],"networks.":[136]},"counts_by_year":[],"updated_date":"2026-05-07T13:39:58.223016","created_date":"2025-10-11T00:00:00"}
