{"id":"https://openalex.org/W4400491126","doi":"https://doi.org/10.1109/aiiot61789.2024.10578981","title":"Anonymous Batch Message Authentication Aided by Edge Servers in Industrial Internet of Thing","display_name":"Anonymous Batch Message Authentication Aided by Edge Servers in Industrial Internet of Thing","publication_year":2024,"publication_date":"2024-05-29","ids":{"openalex":"https://openalex.org/W4400491126","doi":"https://doi.org/10.1109/aiiot61789.2024.10578981"},"language":"en","primary_location":{"id":"doi:10.1109/aiiot61789.2024.10578981","is_oa":false,"landing_page_url":"http://dx.doi.org/10.1109/aiiot61789.2024.10578981","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2024 IEEE World AI IoT Congress (AIIoT)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5111068369","display_name":"Han Yu","orcid":null},"institutions":[{"id":"https://openalex.org/I102345215","display_name":"Xihua University","ror":"https://ror.org/04gwtvf26","country_code":"CN","type":"education","lineage":["https://openalex.org/I102345215"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Han Yu","raw_affiliation_strings":["Xihua University,School of Computer and Software Engineering,Sichuan,China"],"affiliations":[{"raw_affiliation_string":"Xihua University,School of Computer and Software Engineering,Sichuan,China","institution_ids":["https://openalex.org/I102345215"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101604033","display_name":"Jianhong Zhou","orcid":"https://orcid.org/0000-0002-4594-6196"},"institutions":[{"id":"https://openalex.org/I102345215","display_name":"Xihua University","ror":"https://ror.org/04gwtvf26","country_code":"CN","type":"education","lineage":["https://openalex.org/I102345215"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jianhong Zhou","raw_affiliation_strings":["Xihua University,School of Computer and Software Engineering,Sichuan,China"],"affiliations":[{"raw_affiliation_string":"Xihua University,School of Computer and Software Engineering,Sichuan,China","institution_ids":["https://openalex.org/I102345215"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5071592220","display_name":"Maode Ma","orcid":"https://orcid.org/0000-0003-1438-7018"},"institutions":[{"id":"https://openalex.org/I60342839","display_name":"Qatar University","ror":"https://ror.org/00yhnba62","country_code":"QA","type":"education","lineage":["https://openalex.org/I60342839"]}],"countries":["QA"],"is_corresponding":false,"raw_author_name":"Maode Ma","raw_affiliation_strings":["Qatar University,College of Engineering,Qatar"],"affiliations":[{"raw_affiliation_string":"Qatar University,College of Engineering,Qatar","institution_ids":["https://openalex.org/I60342839"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5111068369"],"corresponding_institution_ids":["https://openalex.org/I102345215"],"apc_list":null,"apc_paid":null,"fwci":0.7272,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.71292058,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":91,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"584","last_page":"590"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9052000045776367,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9052000045776367,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/server","display_name":"Server","score":0.7823728322982788},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6527889370918274},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.6441203951835632},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.5541611313819885},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5268206596374512},{"id":"https://openalex.org/keywords/enhanced-data-rates-for-gsm-evolution","display_name":"Enhanced Data Rates for GSM Evolution","score":0.5160291194915771},{"id":"https://openalex.org/keywords/message-authentication-code","display_name":"Message authentication code","score":0.4951259195804596},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.42672374844551086},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.3451043963432312},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.332086980342865},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.17358118295669556},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.16860482096672058}],"concepts":[{"id":"https://openalex.org/C93996380","wikidata":"https://www.wikidata.org/wiki/Q44127","display_name":"Server","level":2,"score":0.7823728322982788},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6527889370918274},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.6441203951835632},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.5541611313819885},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5268206596374512},{"id":"https://openalex.org/C162307627","wikidata":"https://www.wikidata.org/wiki/Q204833","display_name":"Enhanced Data Rates for GSM Evolution","level":2,"score":0.5160291194915771},{"id":"https://openalex.org/C141492731","wikidata":"https://www.wikidata.org/wiki/Q1052621","display_name":"Message authentication code","level":3,"score":0.4951259195804596},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.42672374844551086},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.3451043963432312},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.332086980342865},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.17358118295669556},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.16860482096672058}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/aiiot61789.2024.10578981","is_oa":false,"landing_page_url":"http://dx.doi.org/10.1109/aiiot61789.2024.10578981","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2024 IEEE World AI IoT Congress (AIIoT)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":11,"referenced_works":["https://openalex.org/W1541979851","https://openalex.org/W2320588269","https://openalex.org/W2898565097","https://openalex.org/W3020396993","https://openalex.org/W3081218576","https://openalex.org/W3107123545","https://openalex.org/W4234803735","https://openalex.org/W4295832118","https://openalex.org/W4318619326","https://openalex.org/W4323545840","https://openalex.org/W4380839239"],"related_works":["https://openalex.org/W2166668397","https://openalex.org/W2116285675","https://openalex.org/W1533309011","https://openalex.org/W3048245612","https://openalex.org/W1980599209","https://openalex.org/W4220718301","https://openalex.org/W1555715488","https://openalex.org/W2061637199","https://openalex.org/W2997078490","https://openalex.org/W2127227843"],"abstract_inverted_index":{"In":[0],"industrial":[1],"IoT":[2],"(IIoT)":[3],"systems,":[4],"a":[5,82],"large":[6],"amount":[7,74],"of":[8,69,75,159],"privacy-sensitive":[9],"data":[10,51,76],"could":[11],"be":[12],"generated":[13,77],"during":[14],"operation,":[15],"which":[16,92],"results":[17,149],"in":[18,31,44,157],"stringent":[19],"requirements":[20],"for":[21],"communication":[22,162],"latency,":[23],"reliability,":[24],"and":[25,54,72,115,121,161],"security.":[26],"However,":[27],"the":[28,32,45,49,67,73,98,103,107,110,119,122,146,152],"resource":[29],"constraint":[30],"IIoT":[33],"systems":[34],"prevents":[35],"legacy":[36],"resource-intensive":[37],"security":[38,52],"measures":[39],"from":[40],"being":[41],"used":[42],"directly":[43],"systems.":[46],"To":[47],"address":[48],"massive":[50],"issue":[53],"consider":[55],"that":[56,151],"resourceconstrained":[57],"devices":[58,71],"need":[59],"to":[60,97,101],"perform":[61],"more":[62],"message":[63,85,94],"authentication":[64,86,95,104,114],"operations":[65,96],"as":[66],"number":[68],"smart":[70],"increase":[78],"dramatically,":[79],"we":[80],"propose":[81],"new":[83],"batch":[84],"protocol":[87,128,154],"supported":[88],"by":[89,133],"edge":[90,99],"computing,":[91],"offloads":[93],"servers":[100],"reduce":[102],"burden":[105],"on":[106],"device.":[108],"At":[109],"same":[111],"time,":[112],"mutual":[113],"key":[116],"agreement":[117],"between":[118],"device":[120],"server":[123],"are":[124],"realized.":[125],"The":[126],"proposed":[127,153],"has":[129],"been":[130],"formally":[131],"evaluated":[132],"using":[134],"Scyther":[135],"tools":[136],"demonstrating":[137],"its":[138],"resilience":[139],"against":[140],"major":[141],"typical":[142],"malicious":[143],"attacks.":[144],"Furthermore,":[145],"performance":[147],"evaluation":[148],"show":[150],"is":[155],"efficient":[156],"terms":[158],"computational":[160],"costs.":[163]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":1}],"updated_date":"2026-03-12T08:34:05.389933","created_date":"2025-10-10T00:00:00"}
