{"id":"https://openalex.org/W4388105822","doi":"https://doi.org/10.1109/ccci58712.2023.10290729","title":"SLA-SCA: Secure and Lightweight Authentication and Key Agreement Mechanism for Smart City Applications","display_name":"SLA-SCA: Secure and Lightweight Authentication and Key Agreement Mechanism for Smart City Applications","publication_year":2023,"publication_date":"2023-10-18","ids":{"openalex":"https://openalex.org/W4388105822","doi":"https://doi.org/10.1109/ccci58712.2023.10290729"},"language":"en","primary_location":{"id":"doi:10.1109/ccci58712.2023.10290729","is_oa":false,"landing_page_url":"http://dx.doi.org/10.1109/ccci58712.2023.10290729","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2023 International Conference on Communications, Computing, Cybersecurity, and Informatics (CCCI)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5004070690","display_name":"Bhairvi Pant","orcid":null},"institutions":[{"id":"https://openalex.org/I60054993","display_name":"Graphic Era University","ror":"https://ror.org/03wqgqd89","country_code":"IN","type":"education","lineage":["https://openalex.org/I60054993"]}],"countries":["IN"],"is_corresponding":true,"raw_author_name":"Bhairvi Pant","raw_affiliation_strings":["Graphic Era Deemed to be University,Department of Computer Science and Engineering,Dehradun,India,248002"],"affiliations":[{"raw_affiliation_string":"Graphic Era Deemed to be University,Department of Computer Science and Engineering,Dehradun,India,248002","institution_ids":["https://openalex.org/I60054993"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5051195514","display_name":"Mohammad S. Obaidat","orcid":"https://orcid.org/0000-0002-1569-9657"},"institutions":[{"id":"https://openalex.org/I114972647","display_name":"University of Jordan","ror":"https://ror.org/05k89ew48","country_code":"JO","type":"education","lineage":["https://openalex.org/I114972647"]},{"id":"https://openalex.org/I145286018","display_name":"SRM Institute of Science and Technology","ror":"https://ror.org/050113w36","country_code":"IN","type":"education","lineage":["https://openalex.org/I145286018"]},{"id":"https://openalex.org/I4210131147","display_name":"SRM University","ror":"https://ror.org/037skf023","country_code":"IN","type":"education","lineage":["https://openalex.org/I145286018","https://openalex.org/I4210131147"]},{"id":"https://openalex.org/I92403157","display_name":"University of Science and Technology Beijing","ror":"https://ror.org/02egmk993","country_code":"CN","type":"education","lineage":["https://openalex.org/I92403157"]}],"countries":["CN","IN","JO"],"is_corresponding":false,"raw_author_name":"Mohammad S. Obaidat","raw_affiliation_strings":["King Abdullah II School of Information Technology, The University of Jordan,Amman,Jordan,11942","School of Computing, SRM University, Kattankulathur, TN, India","University of Science and Technology Beijing, Beijing, China"],"affiliations":[{"raw_affiliation_string":"King Abdullah II School of Information Technology, The University of Jordan,Amman,Jordan,11942","institution_ids":["https://openalex.org/I114972647"]},{"raw_affiliation_string":"School of Computing, SRM University, Kattankulathur, TN, India","institution_ids":["https://openalex.org/I145286018","https://openalex.org/I4210131147"]},{"raw_affiliation_string":"University of Science and Technology Beijing, Beijing, China","institution_ids":["https://openalex.org/I92403157"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5109740018","display_name":"Shreya Singh","orcid":"https://orcid.org/0000-0001-9653-8419"},"institutions":[{"id":"https://openalex.org/I60054993","display_name":"Graphic Era University","ror":"https://ror.org/03wqgqd89","country_code":"IN","type":"education","lineage":["https://openalex.org/I60054993"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Shreya Singh","raw_affiliation_strings":["Graphic Era Deemed to be University,Department of Computer Science and Engineering,Dehradun,India,248002"],"affiliations":[{"raw_affiliation_string":"Graphic Era Deemed to be University,Department of Computer Science and Engineering,Dehradun,India,248002","institution_ids":["https://openalex.org/I60054993"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5104190563","display_name":"Mudita Pant","orcid":null},"institutions":[{"id":"https://openalex.org/I60054993","display_name":"Graphic Era University","ror":"https://ror.org/03wqgqd89","country_code":"IN","type":"education","lineage":["https://openalex.org/I60054993"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Mudita Pant","raw_affiliation_strings":["Graphic Era Deemed to be University,Department of Computer Science and Engineering,Dehradun,India,248002"],"affiliations":[{"raw_affiliation_string":"Graphic Era Deemed to be University,Department of Computer Science and Engineering,Dehradun,India,248002","institution_ids":["https://openalex.org/I60054993"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5004320904","display_name":"Mohammad Wazid","orcid":"https://orcid.org/0000-0001-9898-0921"},"institutions":[{"id":"https://openalex.org/I60054993","display_name":"Graphic Era University","ror":"https://ror.org/03wqgqd89","country_code":"IN","type":"education","lineage":["https://openalex.org/I60054993"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Mohammad Wazid","raw_affiliation_strings":["Graphic Era Deemed to be University,Department of Computer Science and Engineering,Dehradun,India,248002"],"affiliations":[{"raw_affiliation_string":"Graphic Era Deemed to be University,Department of Computer Science and Engineering,Dehradun,India,248002","institution_ids":["https://openalex.org/I60054993"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5011213078","display_name":"Ashok Kumar Das","orcid":"https://orcid.org/0000-0002-5196-9589"},"institutions":[{"id":"https://openalex.org/I64189192","display_name":"International Institute of Information Technology, Hyderabad","ror":"https://ror.org/05f11g639","country_code":"IN","type":"education","lineage":["https://openalex.org/I64189192"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Ashok Kumar Das","raw_affiliation_strings":["Center for Security, Theory and Algorithmic Research International Institute of Information Technology,Hyderabad,India,500032"],"affiliations":[{"raw_affiliation_string":"Center for Security, Theory and Algorithmic Research International Institute of Information Technology,Hyderabad,India,500032","institution_ids":["https://openalex.org/I64189192"]}]},{"author_position":"last","author":{"id":null,"display_name":"Kuei-Fang Hsiao","orcid":null},"institutions":[{"id":"https://openalex.org/I114580094","display_name":"The University of Texas of the Permian Basin","ror":"https://ror.org/051smbs96","country_code":"US","type":"education","lineage":["https://openalex.org/I114580094"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Kuei-Fang Hsiao","raw_affiliation_strings":["University of Texas-Permian Basin,Computer Science Department,Odessa,USA,TX 79762"],"affiliations":[{"raw_affiliation_string":"University of Texas-Permian Basin,Computer Science Department,Odessa,USA,TX 79762","institution_ids":["https://openalex.org/I114580094"]}]}],"institutions":[],"countries_distinct_count":4,"institutions_distinct_count":7,"corresponding_author_ids":["https://openalex.org/A5004070690"],"corresponding_institution_ids":["https://openalex.org/I60054993"],"apc_list":null,"apc_paid":null,"fwci":0.3961,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.63147856,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":94,"max":96},"biblio":{"volume":"26","issue":null,"first_page":"1","last_page":"7"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9988999962806702,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.9883000254631042,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7474291324615479},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.7458636164665222},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.6458394527435303},{"id":"https://openalex.org/keywords/server","display_name":"Server","score":0.6037265062332153},{"id":"https://openalex.org/keywords/mutual-authentication","display_name":"Mutual authentication","score":0.5843830704689026},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.5650618076324463},{"id":"https://openalex.org/keywords/resilience","display_name":"Resilience (materials science)","score":0.5255172252655029},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.5181935429573059},{"id":"https://openalex.org/keywords/anonymity","display_name":"Anonymity","score":0.49563896656036377},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.42820560932159424},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.30760353803634644},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.16439756751060486}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7474291324615479},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.7458636164665222},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.6458394527435303},{"id":"https://openalex.org/C93996380","wikidata":"https://www.wikidata.org/wiki/Q44127","display_name":"Server","level":2,"score":0.6037265062332153},{"id":"https://openalex.org/C2781221063","wikidata":"https://www.wikidata.org/wiki/Q6944186","display_name":"Mutual authentication","level":3,"score":0.5843830704689026},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.5650618076324463},{"id":"https://openalex.org/C2779585090","wikidata":"https://www.wikidata.org/wiki/Q3457762","display_name":"Resilience (materials science)","level":2,"score":0.5255172252655029},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.5181935429573059},{"id":"https://openalex.org/C178005623","wikidata":"https://www.wikidata.org/wiki/Q308859","display_name":"Anonymity","level":2,"score":0.49563896656036377},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.42820560932159424},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.30760353803634644},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.16439756751060486},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C97355855","wikidata":"https://www.wikidata.org/wiki/Q11473","display_name":"Thermodynamics","level":1,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/ccci58712.2023.10290729","is_oa":false,"landing_page_url":"http://dx.doi.org/10.1109/ccci58712.2023.10290729","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2023 International Conference on Communications, Computing, Cybersecurity, and Informatics (CCCI)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Sustainable cities and communities","id":"https://metadata.un.org/sdg/11","score":0.44999998807907104}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":23,"referenced_works":["https://openalex.org/W1561441787","https://openalex.org/W2006757318","https://openalex.org/W2009765199","https://openalex.org/W2029693536","https://openalex.org/W2105114022","https://openalex.org/W2775405389","https://openalex.org/W2937840480","https://openalex.org/W3003494147","https://openalex.org/W3007106793","https://openalex.org/W3009951551","https://openalex.org/W3084254285","https://openalex.org/W3153916788","https://openalex.org/W4200288111","https://openalex.org/W4206233083","https://openalex.org/W4311081064","https://openalex.org/W4379875053","https://openalex.org/W4379876612","https://openalex.org/W4381232941","https://openalex.org/W4384080261","https://openalex.org/W4384345357","https://openalex.org/W4384519469","https://openalex.org/W4386124188","https://openalex.org/W4386432146"],"related_works":["https://openalex.org/W1966494590","https://openalex.org/W1593132758","https://openalex.org/W2117874351","https://openalex.org/W2092530219","https://openalex.org/W4206398305","https://openalex.org/W2388464034","https://openalex.org/W2533125852","https://openalex.org/W2140460949","https://openalex.org/W3046827176","https://openalex.org/W4315694784"],"abstract_inverted_index":{"The":[0,140,162],"notion":[1],"of":[2,15,18,24,92,143,158],"a":[3,7,110,127,136,160],"smart":[4,118],"city":[5],"is":[6,147],"modern":[8],"concept":[9],"characterized":[10],"by":[11],"the":[12,16,48,62,105,117,122,144,154,166],"widespread":[13],"integration":[14],"Internet":[17],"Things":[19],"(IoT)":[20],"across":[21],"various":[22,155],"facets":[23],"urban":[25],"life,":[26],"including":[27],"healthcare,":[28],"traffic":[29],"management,":[30],"agriculture,":[31],"and":[32,38,45,71,84,87,121,131,173],"more.":[33],"This":[34,96],"establishes":[35],"real-time":[36],"communication":[37,55,115],"data":[39],"exchange":[40,67],"between":[41,56,116],"all":[42],"users,":[43],"servers":[44,125],"devices":[46,120],"through":[47,126],"Internet.":[49],"As":[50],"we":[51],"begin":[52],"to":[53,68,79,104,112],"discuss":[54],"parties,":[57],"one":[58],"must":[59],"also":[60],"recognize":[61],"imperative":[63],"need":[64],"for":[65],"this":[66],"be":[69],"secure":[70,114,128],"private,":[72],"as":[73,82],"such":[74,81,159],"exchanges":[75],"are":[76],"extremely":[77],"vulnerable":[78],"attacks":[80,86,157],"man-in-the-middle":[83],"replay":[85],"even":[88],"situations":[89],"like":[90],"compromising":[91],"anonymity":[93],"during":[94],"exchanges.":[95],"paper":[97],"focuses":[98],"on":[99],"finding":[100],"an":[101],"innovative":[102],"solution":[103],"same":[106],"challenge.":[107],"It":[108],"proposes":[109],"mechanism":[111],"establish":[113],"IoT":[119],"connected":[123],"cloud":[124],"mutual":[129],"authentication":[130],"key":[132],"establishment":[133],"process":[134],"with":[135],"short":[137],"name":[138],"\u201cSLA-SCA\u201d.":[139],"security":[141,172],"analysis":[142],"proposed":[145,163],"SLA-SCA":[146,164],"done,":[148],"which":[149],"proves":[150],"its":[151],"resilience":[152],"against":[153],"potential":[156],"communication.":[161],"outperformed":[165],"other":[167],"existing":[168],"schemes":[169],"regarding":[170],"important":[171],"functionality":[174],"features.":[175]},"counts_by_year":[{"year":2024,"cited_by_count":2}],"updated_date":"2026-04-16T08:26:57.006410","created_date":"2025-10-10T00:00:00"}
