{"id":"https://openalex.org/W4220782410","doi":"https://doi.org/10.1109/icce53296.2022.9730173","title":"Identity-Based Authentication Technique for IoT Devices","display_name":"Identity-Based Authentication Technique for IoT Devices","publication_year":2022,"publication_date":"2022-01-07","ids":{"openalex":"https://openalex.org/W4220782410","doi":"https://doi.org/10.1109/icce53296.2022.9730173"},"language":"en","primary_location":{"id":"doi:10.1109/icce53296.2022.9730173","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icce53296.2022.9730173","pdf_url":null,"source":{"id":"https://openalex.org/S4363608007","display_name":"2022 IEEE International Conference on Consumer Electronics (ICCE)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2022 IEEE International Conference on Consumer Electronics (ICCE)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5071261948","display_name":"Brij B. Gupta","orcid":"https://orcid.org/0000-0003-4929-4698"},"institutions":[{"id":"https://openalex.org/I105094715","display_name":"National Institute of Technology Kurukshetra","ror":"https://ror.org/04909p852","country_code":"IN","type":"education","lineage":["https://openalex.org/I105094715"]}],"countries":["IN"],"is_corresponding":true,"raw_author_name":"Brij B. Gupta","raw_affiliation_strings":["National Institute of Technology,Kurukshetra,Haryana,India","National Institute of Technology, Kurukshetra, Haryana, India"],"affiliations":[{"raw_affiliation_string":"National Institute of Technology,Kurukshetra,Haryana,India","institution_ids":["https://openalex.org/I105094715"]},{"raw_affiliation_string":"National Institute of Technology, Kurukshetra, Haryana, India","institution_ids":["https://openalex.org/I105094715"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5042846465","display_name":"Akshat Gaurav","orcid":"https://orcid.org/0000-0002-5796-9424"},"institutions":[{"id":"https://openalex.org/I4210147267","display_name":"Ronin Institute","ror":"https://ror.org/04awze035","country_code":"US","type":"nonprofit","lineage":["https://openalex.org/I4210147267"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Akshat Gaurav","raw_affiliation_strings":["Ronin Institute,Montclair,New Jersey,U.S.,07043"],"affiliations":[{"raw_affiliation_string":"Ronin Institute,Montclair,New Jersey,U.S.,07043","institution_ids":["https://openalex.org/I4210147267"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5086102702","display_name":"Kwok Tai Chui","orcid":"https://orcid.org/0000-0001-7992-9901"},"institutions":[{"id":"https://openalex.org/I8679417","display_name":"Hong Kong Metropolitan University","ror":"https://ror.org/0349bsm71","country_code":"HK","type":"education","lineage":["https://openalex.org/I8679417"]}],"countries":["HK"],"is_corresponding":false,"raw_author_name":"Kwok Tai Chui","raw_affiliation_strings":["Hong Kong Metropolitan University (HKMU),Hong Kong","Hong Kong Metropolitan University (HKMU), Hong Kong"],"affiliations":[{"raw_affiliation_string":"Hong Kong Metropolitan University (HKMU),Hong Kong","institution_ids":["https://openalex.org/I8679417"]},{"raw_affiliation_string":"Hong Kong Metropolitan University (HKMU), Hong Kong","institution_ids":["https://openalex.org/I8679417"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5091598011","display_name":"Ching\u2010Hsien Hsu","orcid":null},"institutions":[{"id":"https://openalex.org/I4210126829","display_name":"China Medical University Hospital","ror":"https://ror.org/0368s4g32","country_code":"TW","type":"healthcare","lineage":["https://openalex.org/I4210126829"]},{"id":"https://openalex.org/I184693016","display_name":"China Medical University","ror":"https://ror.org/00v408z34","country_code":"TW","type":"education","lineage":["https://openalex.org/I184693016"]},{"id":"https://openalex.org/I143578492","display_name":"Asia University","ror":"https://ror.org/038a1tp19","country_code":"TW","type":"education","lineage":["https://openalex.org/I143578492"]},{"id":"https://openalex.org/I148099254","display_name":"National Chung Cheng University","ror":"https://ror.org/0028v3876","country_code":"TW","type":"education","lineage":["https://openalex.org/I148099254"]}],"countries":["TW"],"is_corresponding":false,"raw_author_name":"Ching-Hsien Hsu","raw_affiliation_strings":["Asia University,Department of Computer Science and Information Engineering,Taiwan","Department of Medical Research, China Medical University Hospital, China Medical University, Taiwan","Department of Computer Science and Information Engineering, Asia University, Taiwan","Department of Computer Science and Information Engineering, National Chung Cheng University, Taiwan"],"affiliations":[{"raw_affiliation_string":"Asia University,Department of Computer Science and Information Engineering,Taiwan","institution_ids":["https://openalex.org/I143578492"]},{"raw_affiliation_string":"Department of Medical Research, China Medical University Hospital, China Medical University, Taiwan","institution_ids":["https://openalex.org/I4210126829","https://openalex.org/I184693016"]},{"raw_affiliation_string":"Department of Computer Science and Information Engineering, Asia University, Taiwan","institution_ids":["https://openalex.org/I143578492"]},{"raw_affiliation_string":"Department of Computer Science and Information Engineering, National Chung Cheng University, Taiwan","institution_ids":["https://openalex.org/I148099254"]}]}],"institutions":[],"countries_distinct_count":4,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5071261948"],"corresponding_institution_ids":["https://openalex.org/I105094715"],"apc_list":null,"apc_paid":null,"fwci":3.0587,"has_fulltext":false,"cited_by_count":22,"citation_normalized_percentile":{"value":0.93039443,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":96,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"4"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.996999979019165,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/denial-of-service-attack","display_name":"Denial-of-service attack","score":0.8627241253852844},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7679853439331055},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.7419631481170654},{"id":"https://openalex.org/keywords/internet-of-things","display_name":"Internet of Things","score":0.7172434329986572},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6583870053291321},{"id":"https://openalex.org/keywords/identity","display_name":"Identity (music)","score":0.5938742756843567},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.5414670705795288},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.4721156358718872},{"id":"https://openalex.org/keywords/service","display_name":"Service (business)","score":0.42202281951904297},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.4086929261684418},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.15058556199073792}],"concepts":[{"id":"https://openalex.org/C38822068","wikidata":"https://www.wikidata.org/wiki/Q131406","display_name":"Denial-of-service attack","level":3,"score":0.8627241253852844},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7679853439331055},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.7419631481170654},{"id":"https://openalex.org/C81860439","wikidata":"https://www.wikidata.org/wiki/Q251212","display_name":"Internet of Things","level":2,"score":0.7172434329986572},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6583870053291321},{"id":"https://openalex.org/C2778355321","wikidata":"https://www.wikidata.org/wiki/Q17079427","display_name":"Identity (music)","level":2,"score":0.5938742756843567},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.5414670705795288},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.4721156358718872},{"id":"https://openalex.org/C2780378061","wikidata":"https://www.wikidata.org/wiki/Q25351891","display_name":"Service (business)","level":2,"score":0.42202281951904297},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.4086929261684418},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.15058556199073792},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C24890656","wikidata":"https://www.wikidata.org/wiki/Q82811","display_name":"Acoustics","level":1,"score":0.0},{"id":"https://openalex.org/C162324750","wikidata":"https://www.wikidata.org/wiki/Q8134","display_name":"Economics","level":0,"score":0.0},{"id":"https://openalex.org/C136264566","wikidata":"https://www.wikidata.org/wiki/Q159810","display_name":"Economy","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/icce53296.2022.9730173","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icce53296.2022.9730173","pdf_url":null,"source":{"id":"https://openalex.org/S4363608007","display_name":"2022 IEEE International Conference on Consumer Electronics (ICCE)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2022 IEEE International Conference on Consumer Electronics (ICCE)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions","score":0.47999998927116394}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":19,"referenced_works":["https://openalex.org/W1963941691","https://openalex.org/W1984685140","https://openalex.org/W2532585811","https://openalex.org/W2562586545","https://openalex.org/W2586432806","https://openalex.org/W2601292847","https://openalex.org/W2616563351","https://openalex.org/W2627093154","https://openalex.org/W2770306303","https://openalex.org/W2889533399","https://openalex.org/W2896075375","https://openalex.org/W2909941289","https://openalex.org/W2964063558","https://openalex.org/W3029946226","https://openalex.org/W3033513857","https://openalex.org/W3033597179","https://openalex.org/W3162682696","https://openalex.org/W4230124301","https://openalex.org/W4247741102"],"related_works":["https://openalex.org/W4386482731","https://openalex.org/W2765763546","https://openalex.org/W4385302085","https://openalex.org/W2360429410","https://openalex.org/W4256682929","https://openalex.org/W335511927","https://openalex.org/W2471811227","https://openalex.org/W2354346723","https://openalex.org/W2978048732","https://openalex.org/W2393362322"],"abstract_inverted_index":{"The":[0],"Internet":[1,27],"of":[2,14,28,36,50,64,70,79,98,127],"Things":[3,29],"(IoT)":[4],"is":[5,94],"a":[6,24,95],"broad":[7],"term":[8],"used":[9],"to":[10,58,130],"describe":[11],"many":[12],"types":[13],"linked":[15],"equipment":[16],"that":[17,122],"are":[18,43,56],"both":[19],"intelligent":[20],"and":[21,68,82,88],"interconnected":[22],"through":[23],"network.":[25],"These":[26,40],"devices":[30,81,93,129],"have":[31],"become":[32],"an":[33,105],"essential":[34],"part":[35],"our":[37],"everyday":[38],"lives.":[39],"devices,":[41],"however,":[42],"still":[44],"in":[45,112],"the":[46,76,124],"development":[47],"stage.":[48],"Because":[49],"their":[51],"low":[52],"computing":[53],"capacity,":[54],"they":[55],"susceptible":[57],"various":[59],"cyberattacks":[60],"like":[61],"distributed":[62],"denial":[63,69],"service":[65,71],"(DDoS)":[66],"attacks":[67],"(DoS)":[72],"attacks.":[73],"They":[74],"disrupt":[75],"normal":[77],"functioning":[78],"IoT":[80,92,106,128],"expose":[83],"sensitive":[84],"data;":[85],"therefore,":[86],"identifying":[87],"mitigating":[89],"cyber-attacks":[90],"on":[91],"critical":[96],"area":[97],"study.":[99],"In":[100],"this":[101,113],"regard,":[102],"we":[103],"proposed":[104,116],"device-specific":[107],"unique":[108,125],"identity-based":[109],"authentication":[110,120],"method":[111],"pa-per.":[114],"Our":[115],"approach":[117],"employs":[118],"lightweight":[119],"procedures":[121],"use":[123],"IDs":[126],"provide":[131],"identity":[132],"-":[133],"based":[134],"encryption.":[135]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":6},{"year":2024,"cited_by_count":7},{"year":2023,"cited_by_count":5},{"year":2022,"cited_by_count":3}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
