{"id":"https://openalex.org/W3094150293","doi":"https://doi.org/10.1109/icccnt49239.2020.9225644","title":"An Efficient Authentication Scheme for Secure Communication between Industrial IoT Devices","display_name":"An Efficient Authentication Scheme for Secure Communication between Industrial IoT Devices","publication_year":2020,"publication_date":"2020-07-01","ids":{"openalex":"https://openalex.org/W3094150293","doi":"https://doi.org/10.1109/icccnt49239.2020.9225644","mag":"3094150293"},"language":"en","primary_location":{"id":"doi:10.1109/icccnt49239.2020.9225644","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icccnt49239.2020.9225644","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2020 11th International Conference on Computing, Communication and Networking Technologies (ICCCNT)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5042430639","display_name":"Barnana Baruah","orcid":"https://orcid.org/0000-0002-8854-7152"},"institutions":[{"id":"https://openalex.org/I4210089896","display_name":"Indian Institute of Information Technology Guwahati","ror":"https://ror.org/00bb9ch64","country_code":"IN","type":"education","lineage":["https://openalex.org/I4210089896"]}],"countries":["IN"],"is_corresponding":true,"raw_author_name":"Barnana Baruah","raw_affiliation_strings":["Indian Institute of Information Technology, Guwahati, India"],"affiliations":[{"raw_affiliation_string":"Indian Institute of Information Technology, Guwahati, India","institution_ids":["https://openalex.org/I4210089896"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5025193411","display_name":"Subhasish Dhal","orcid":"https://orcid.org/0000-0002-3957-1789"},"institutions":[{"id":"https://openalex.org/I4210089896","display_name":"Indian Institute of Information Technology Guwahati","ror":"https://ror.org/00bb9ch64","country_code":"IN","type":"education","lineage":["https://openalex.org/I4210089896"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Subhasish Dhal","raw_affiliation_strings":["Indian Institute of Information Technology, Guwahati, India"],"affiliations":[{"raw_affiliation_string":"Indian Institute of Information Technology, Guwahati, India","institution_ids":["https://openalex.org/I4210089896"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5042430639"],"corresponding_institution_ids":["https://openalex.org/I4210089896"],"apc_list":null,"apc_paid":null,"fwci":1.2334,"has_fulltext":false,"cited_by_count":12,"citation_normalized_percentile":{"value":0.81518346,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":91,"max":98},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"7"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9976999759674072,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.9925000071525574,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7871413230895996},{"id":"https://openalex.org/keywords/correctness","display_name":"Correctness","score":0.6867642402648926},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5939600467681885},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.5837834477424622},{"id":"https://openalex.org/keywords/secure-communication","display_name":"Secure communication","score":0.5271995663642883},{"id":"https://openalex.org/keywords/replay-attack","display_name":"Replay attack","score":0.5144925117492676},{"id":"https://openalex.org/keywords/information-leakage","display_name":"Information leakage","score":0.4644854664802551},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.4610084891319275},{"id":"https://openalex.org/keywords/session-key","display_name":"Session key","score":0.4464094042778015},{"id":"https://openalex.org/keywords/security-analysis","display_name":"Security analysis","score":0.4270126223564148},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.4148678183555603},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.14082661271095276}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7871413230895996},{"id":"https://openalex.org/C55439883","wikidata":"https://www.wikidata.org/wiki/Q360812","display_name":"Correctness","level":2,"score":0.6867642402648926},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5939600467681885},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.5837834477424622},{"id":"https://openalex.org/C510870077","wikidata":"https://www.wikidata.org/wiki/Q7444868","display_name":"Secure communication","level":3,"score":0.5271995663642883},{"id":"https://openalex.org/C11560541","wikidata":"https://www.wikidata.org/wiki/Q1756025","display_name":"Replay attack","level":3,"score":0.5144925117492676},{"id":"https://openalex.org/C2779201187","wikidata":"https://www.wikidata.org/wiki/Q2775060","display_name":"Information leakage","level":2,"score":0.4644854664802551},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.4610084891319275},{"id":"https://openalex.org/C191197275","wikidata":"https://www.wikidata.org/wiki/Q1755775","display_name":"Session key","level":3,"score":0.4464094042778015},{"id":"https://openalex.org/C38369872","wikidata":"https://www.wikidata.org/wiki/Q7445009","display_name":"Security analysis","level":2,"score":0.4270126223564148},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.4148678183555603},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.14082661271095276},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/icccnt49239.2020.9225644","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icccnt49239.2020.9225644","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2020 11th International Conference on Computing, Communication and Networking Technologies (ICCCNT)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/9","display_name":"Industry, innovation and infrastructure","score":0.4300000071525574}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":31,"referenced_works":["https://openalex.org/W1498573661","https://openalex.org/W1569083856","https://openalex.org/W2010939995","https://openalex.org/W2089607820","https://openalex.org/W2108834246","https://openalex.org/W2110987245","https://openalex.org/W2117420234","https://openalex.org/W2140108814","https://openalex.org/W2149198337","https://openalex.org/W2267350864","https://openalex.org/W2282193493","https://openalex.org/W2410554555","https://openalex.org/W2555323242","https://openalex.org/W2592416275","https://openalex.org/W2706591630","https://openalex.org/W2744532080","https://openalex.org/W2769099100","https://openalex.org/W2784714515","https://openalex.org/W2811266402","https://openalex.org/W2902264868","https://openalex.org/W2912977751","https://openalex.org/W2918533453","https://openalex.org/W2919530665","https://openalex.org/W2920323654","https://openalex.org/W2921608598","https://openalex.org/W2953790176","https://openalex.org/W4210694990","https://openalex.org/W4298101863","https://openalex.org/W6634010886","https://openalex.org/W6764888626","https://openalex.org/W6844276550"],"related_works":["https://openalex.org/W2361094249","https://openalex.org/W2352353578","https://openalex.org/W2523399242","https://openalex.org/W4211023815","https://openalex.org/W2978473185","https://openalex.org/W2382461206","https://openalex.org/W2395263995","https://openalex.org/W2057320121","https://openalex.org/W4292348028","https://openalex.org/W216861497"],"abstract_inverted_index":{"With":[0],"the":[1,7,22,29,55,64,70,78,85,88,107,128,141,187,227,235],"advent":[2],"of":[3,10,54,63,75,81,87,90,130,144,214,226,241],"Industry":[4],"4.0":[5],"era,":[6],"industrial":[8,30,42],"Internet":[9,215],"Things":[11],"(IIoT)":[12],"has":[13],"been":[14],"recognized":[15],"as":[16,33],"a":[17,131],"promising":[18],"solution":[19],"to":[20,111,139,176],"transform":[21],"conventional":[23],"operations":[24,27,43],"into":[25],"smart":[26],"in":[28,66,137,239],"systems":[31],"such":[32,91],"manufacturing,":[34],"supply":[35],"chain,":[36],"transportation,":[37],"and":[38,52,61,115,117,122,133,174,190,218,232,246],"healthcare.":[39],"The":[40,167,195,206],"intelligent":[41],"largely":[44],"count":[45],"on":[46],"information":[47,183],"collection":[48,74],"through":[49,69],"various":[50],"sensors":[51,79],"analysis":[53],"gathered":[56],"information,":[57],"for":[58,84,98,156,200,221],"remote":[59],"operation":[60],"control":[62],"processes":[65],"real":[67],"time":[68],"Internet.":[71],"However,":[72,106],"secure":[73,99,134,158],"data":[76],"from":[77],"is":[80,127,198,208,230],"utmost":[82],"importance":[83],"realization":[86],"usefulness":[89],"system.":[92],"Researchers":[93],"have":[94],"suggested":[95],"authentication":[96,154,237],"schemes":[97,238],"communication":[100,121,135,159,188],"between":[101,160],"resource":[102,165],"constrained":[103],"IIoT":[104,145,161],"devices.":[105],"existing":[108],"works":[109],"fail":[110],"provide":[112],"adequate":[113],"security":[114,222],"privacy,":[116],"incur":[118],"high":[119],"computation,":[120,242],"storage":[123,244],"overheads.":[124],"Therefore,":[125],"there":[126],"need":[129],"lightweight":[132],"mechanism":[136],"order":[138],"reach":[140],"full":[142],"potential":[143],"systems.":[146],"To":[147],"this":[148],"end,":[149],"we":[150],"propose":[151],"an":[152],"efficient":[153],"scheme":[155,169,197,207,229],"establishing":[157],"devices,":[162],"with":[163,234],"reduced":[164],"requirements.":[166],"proposed":[168,196,228],"provides":[170],"device's":[171],"untraceability,":[172],"unlinkability":[173],"resistance":[175],"impersonation":[177],"attack,":[178,180,182],"replay":[179],"man-in-the-middle":[181],"leakage":[184],"attack":[185],"via":[186],"channel":[189],"session":[191],"key":[192],"disclosure":[193],"attack.":[194],"verified":[199],"correctness":[201],"using":[202,210],"BAN":[203],"(Burrows-Abadi-Needham)":[204],"Logic.":[205],"simulated":[209],"AVISPA":[211],"(Automated":[212],"Validation":[213],"Security":[216],"Protocols":[217],"Applications)":[219],"tool":[220],"verification.":[223],"Finally,":[224],"performance":[225],"evaluated":[231],"compared":[233],"state-of-the-art":[236],"terms":[240],"communication,":[243],"overheads":[245],"security.":[247]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":3},{"year":2023,"cited_by_count":2},{"year":2022,"cited_by_count":6}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
