{"id":"https://openalex.org/W4384945984","doi":"https://doi.org/10.1109/iwcmc58020.2023.10183021","title":"Securing Fog Computing-based Industry 4.0 Communication Using Authenticated Key Agreement Scheme","display_name":"Securing Fog Computing-based Industry 4.0 Communication Using Authenticated Key Agreement Scheme","publication_year":2023,"publication_date":"2023-06-19","ids":{"openalex":"https://openalex.org/W4384945984","doi":"https://doi.org/10.1109/iwcmc58020.2023.10183021"},"language":"en","primary_location":{"id":"doi:10.1109/iwcmc58020.2023.10183021","is_oa":false,"landing_page_url":"https://doi.org/10.1109/iwcmc58020.2023.10183021","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2023 International Wireless Communications and Mobile Computing (IWCMC)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100642195","display_name":"Amit Kumar Mishra","orcid":"https://orcid.org/0000-0002-9161-9532"},"institutions":[{"id":"https://openalex.org/I60054993","display_name":"Graphic Era University","ror":"https://ror.org/03wqgqd89","country_code":"IN","type":"education","lineage":["https://openalex.org/I60054993"]}],"countries":["IN"],"is_corresponding":true,"raw_author_name":"Amit Kumar Mishra","raw_affiliation_strings":["Graphic Era Deemed to be University,Department of Computer Science and Engineering,Dehradun,India,248 002"],"affiliations":[{"raw_affiliation_string":"Graphic Era Deemed to be University,Department of Computer Science and Engineering,Dehradun,India,248 002","institution_ids":["https://openalex.org/I60054993"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5004320904","display_name":"Mohammad Wazid","orcid":"https://orcid.org/0000-0001-9898-0921"},"institutions":[{"id":"https://openalex.org/I60054993","display_name":"Graphic Era University","ror":"https://ror.org/03wqgqd89","country_code":"IN","type":"education","lineage":["https://openalex.org/I60054993"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Mohammad Wazid","raw_affiliation_strings":["Graphic Era Hill University,Department of Computer Science and Engineering,Dehradun,India,248 002","Department of Computer Science and Engineering, Graphic Era Deemed to be University, Dehradun, India"],"affiliations":[{"raw_affiliation_string":"Graphic Era Hill University,Department of Computer Science and Engineering,Dehradun,India,248 002","institution_ids":["https://openalex.org/I60054993"]},{"raw_affiliation_string":"Department of Computer Science and Engineering, Graphic Era Deemed to be University, Dehradun, India","institution_ids":["https://openalex.org/I60054993"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5023978018","display_name":"D. Singh","orcid":null},"institutions":[{"id":"https://openalex.org/I60054993","display_name":"Graphic Era University","ror":"https://ror.org/03wqgqd89","country_code":"IN","type":"education","lineage":["https://openalex.org/I60054993"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"D. P. Singh","raw_affiliation_strings":["Graphic Era Hill University,Department of Computer Science and Engineering,Dehradun,India,248 002"],"affiliations":[{"raw_affiliation_string":"Graphic Era Hill University,Department of Computer Science and Engineering,Dehradun,India,248 002","institution_ids":["https://openalex.org/I60054993"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5011213078","display_name":"Ashok Kumar Das","orcid":"https://orcid.org/0000-0002-5196-9589"},"institutions":[{"id":"https://openalex.org/I188963388","display_name":"International Institute of Information Technology","ror":"https://ror.org/02dernx73","country_code":"IN","type":"education","lineage":["https://openalex.org/I188963388"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Ashok Kumar Das","raw_affiliation_strings":["International Institute of Information Technology,Center for Security, Theory and Algorithmic Research,Hyderabad,India,500 032"],"affiliations":[{"raw_affiliation_string":"International Institute of Information Technology,Center for Security, Theory and Algorithmic Research,Hyderabad,India,500 032","institution_ids":["https://openalex.org/I188963388"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5057916222","display_name":"Mohsen Guizani","orcid":"https://orcid.org/0000-0002-8972-8094"},"institutions":[{"id":"https://openalex.org/I4210113480","display_name":"Mohamed bin Zayed University of Artificial Intelligence","ror":"https://ror.org/0258gkt32","country_code":"AE","type":"education","lineage":["https://openalex.org/I4210113480"]}],"countries":["AE"],"is_corresponding":false,"raw_author_name":"Mohsen Guizani","raw_affiliation_strings":["Mohamed bin Zayed University of Artificial Intelligence(MBZUAI),Machine Learning Department,Abu Dhabi,UAE,51133"],"affiliations":[{"raw_affiliation_string":"Mohamed bin Zayed University of Artificial Intelligence(MBZUAI),Machine Learning Department,Abu Dhabi,UAE,51133","institution_ids":["https://openalex.org/I4210113480"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5100642195"],"corresponding_institution_ids":["https://openalex.org/I60054993"],"apc_list":null,"apc_paid":null,"fwci":0.795,"has_fulltext":false,"cited_by_count":4,"citation_normalized_percentile":{"value":0.7320521,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":96,"max":98},"biblio":{"volume":null,"issue":null,"first_page":"1448","last_page":"1453"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.9965999722480774,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.9965999722480774,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9940000176429749,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.9919999837875366,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/server","display_name":"Server","score":0.800390362739563},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6994838118553162},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6808367371559143},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.6773804426193237},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.6347909569740295},{"id":"https://openalex.org/keywords/industry-4.0","display_name":"Industry 4.0","score":0.6149846315383911},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.6101629137992859},{"id":"https://openalex.org/keywords/mutual-authentication","display_name":"Mutual authentication","score":0.5047215223312378},{"id":"https://openalex.org/keywords/internet-of-things","display_name":"Internet of Things","score":0.486695796251297},{"id":"https://openalex.org/keywords/process","display_name":"Process (computing)","score":0.4221498370170593},{"id":"https://openalex.org/keywords/industrial-internet","display_name":"Industrial Internet","score":0.4149037003517151},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.1990525722503662},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.10818865895271301},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.08379527926445007}],"concepts":[{"id":"https://openalex.org/C93996380","wikidata":"https://www.wikidata.org/wiki/Q44127","display_name":"Server","level":2,"score":0.800390362739563},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6994838118553162},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6808367371559143},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.6773804426193237},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.6347909569740295},{"id":"https://openalex.org/C2777986313","wikidata":"https://www.wikidata.org/wiki/Q1661989","display_name":"Industry 4.0","level":2,"score":0.6149846315383911},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.6101629137992859},{"id":"https://openalex.org/C2781221063","wikidata":"https://www.wikidata.org/wiki/Q6944186","display_name":"Mutual authentication","level":3,"score":0.5047215223312378},{"id":"https://openalex.org/C81860439","wikidata":"https://www.wikidata.org/wiki/Q251212","display_name":"Internet of Things","level":2,"score":0.486695796251297},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.4221498370170593},{"id":"https://openalex.org/C202839342","wikidata":"https://www.wikidata.org/wiki/Q60740481","display_name":"Industrial Internet","level":3,"score":0.4149037003517151},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.1990525722503662},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.10818865895271301},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.08379527926445007}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/iwcmc58020.2023.10183021","is_oa":false,"landing_page_url":"https://doi.org/10.1109/iwcmc58020.2023.10183021","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2023 International Wireless Communications and Mobile Computing (IWCMC)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Industry, innovation and infrastructure","id":"https://metadata.un.org/sdg/9","score":0.5699999928474426}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":23,"referenced_works":["https://openalex.org/W1561441787","https://openalex.org/W2013956457","https://openalex.org/W2029693536","https://openalex.org/W2087837462","https://openalex.org/W2105114022","https://openalex.org/W2168204607","https://openalex.org/W2301424859","https://openalex.org/W2560168854","https://openalex.org/W2790487176","https://openalex.org/W2890187623","https://openalex.org/W2941876624","https://openalex.org/W2943388243","https://openalex.org/W2963491455","https://openalex.org/W2974280033","https://openalex.org/W3016857326","https://openalex.org/W3020687048","https://openalex.org/W3045866765","https://openalex.org/W3094150293","https://openalex.org/W3130639978","https://openalex.org/W3193542172","https://openalex.org/W3216006944","https://openalex.org/W4205409922","https://openalex.org/W4206388446"],"related_works":["https://openalex.org/W4283524929","https://openalex.org/W2006953289","https://openalex.org/W2932552503","https://openalex.org/W3046827176","https://openalex.org/W4380633315","https://openalex.org/W3136920987","https://openalex.org/W2899432044","https://openalex.org/W2912019491","https://openalex.org/W3113125424","https://openalex.org/W4312522256"],"abstract_inverted_index":{"Internet":[0],"of":[1,24,55],"Things":[2],"(IoT)-based":[3],"smart":[4,114],"factories":[5],"offer":[6],"the":[7,15,36,53,56,69,90,137],"manufacturing":[8,25],"sectors":[9],"a":[10,96],"great":[11],"opportunity":[12],"to":[13,32,51,64,88,156],"embrace":[14],"fourth":[16],"industrial":[17,115],"revolution":[18],"(Industry":[19],"4.0).":[20],"The":[21,47,101,129],"real-time":[22],"monitoring":[23],"operations":[26],"in":[27,95],"an":[28,79],"Industry":[29,60,98],"4.0":[30,61,99],"needs":[31],"be":[33],"ensured":[34],"by":[35],"deployed":[37],"technologies,":[38],"like":[39],"Artificial":[40],"Intelligence":[41],"(AI)":[42],"and":[43,81,117,126,132,145,151],"Big":[44],"Data":[45],"analytics.":[46],"overall":[48],"purpose":[49],"is":[50],"improve":[52],"outcomes":[54],"production":[57],"process.":[58],"However,":[59],"becomes":[62],"vulnerable":[63],"different":[65],"potential":[66,143],"attacks":[67],"as":[68,120,122,154],"communication":[70,91],"takes":[71],"place":[72],"via":[73],"public":[74],"environments.":[75],"In":[76],"this":[77],"article,":[78],"authentication":[80,107],"key":[82,110],"agreement":[83],"method":[84,139],"has":[85],"been":[86],"suggested":[87],"secure":[89,105],"that":[92,136],"can":[93,140],"occur":[94],"Fog-based":[97],"environment.":[100],"security":[102,130,150],"proposal":[103],"provides":[104],"mutual":[106],"along":[108],"with":[109],"establishment":[111],"between":[112,123],"various":[113,142],"devices":[116],"fog":[118,124],"servers,":[119],"well":[121],"servers":[125],"cloud":[127],"servers.":[128],"analysis":[131],"comparative":[133],"study":[134],"reveal":[135],"proposed":[138],"mitigate":[141],"attacks,":[144],"it":[146],"also":[147],"offers":[148],"important":[149],"functionality":[152],"attributes":[153],"compared":[155],"those":[157],"for":[158],"other":[159],"competing":[160],"schemes.":[161]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2024,"cited_by_count":3}],"updated_date":"2026-04-08T06:01:36.053099","created_date":"2025-10-10T00:00:00"}
