{"id":"https://openalex.org/W2920604741","doi":"https://doi.org/10.1109/jiot.2019.2902907","title":"A Secure and Efficient Access and Handover Authentication Protocol for Internet of Things in Space Information Networks","display_name":"A Secure and Efficient Access and Handover Authentication Protocol for Internet of Things in Space Information Networks","publication_year":2019,"publication_date":"2019-03-05","ids":{"openalex":"https://openalex.org/W2920604741","doi":"https://doi.org/10.1109/jiot.2019.2902907","mag":"2920604741"},"language":"en","primary_location":{"id":"doi:10.1109/jiot.2019.2902907","is_oa":false,"landing_page_url":"https://doi.org/10.1109/jiot.2019.2902907","pdf_url":null,"source":{"id":"https://openalex.org/S2480266640","display_name":"IEEE Internet of Things Journal","issn_l":"2327-4662","issn":["2327-4662","2372-2541"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Internet of Things Journal","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100688242","display_name":"Kaiping Xue","orcid":"https://orcid.org/0000-0003-2095-7523"},"institutions":[{"id":"https://openalex.org/I126520041","display_name":"University of Science and Technology of China","ror":"https://ror.org/04c4dkn09","country_code":"CN","type":"education","lineage":["https://openalex.org/I126520041","https://openalex.org/I19820366"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Kaiping Xue","raw_affiliation_strings":["Department of Electronic Engineering and Information Science, University of Science and Technology of China, Hefei, China"],"raw_orcid":"https://orcid.org/0000-0003-2095-7523","affiliations":[{"raw_affiliation_string":"Department of Electronic Engineering and Information Science, University of Science and Technology of China, Hefei, China","institution_ids":["https://openalex.org/I126520041"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5088723765","display_name":"Wei Meng","orcid":"https://orcid.org/0000-0003-0209-8753"},"institutions":[{"id":"https://openalex.org/I126520041","display_name":"University of Science and Technology of China","ror":"https://ror.org/04c4dkn09","country_code":"CN","type":"education","lineage":["https://openalex.org/I126520041","https://openalex.org/I19820366"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Wei Meng","raw_affiliation_strings":["Department of Electronic Engineering and Information Science, University of Science and Technology of China, Hefei, China"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Department of Electronic Engineering and Information Science, University of Science and Technology of China, Hefei, China","institution_ids":["https://openalex.org/I126520041"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100367940","display_name":"Shaohua Li","orcid":"https://orcid.org/0000-0001-8079-6405"},"institutions":[{"id":"https://openalex.org/I126520041","display_name":"University of Science and Technology of China","ror":"https://ror.org/04c4dkn09","country_code":"CN","type":"education","lineage":["https://openalex.org/I126520041","https://openalex.org/I19820366"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Shaohua Li","raw_affiliation_strings":["Department of Electronic Engineering and Information Science, University of Science and Technology of China, Hefei, China"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Department of Electronic Engineering and Information Science, University of Science and Technology of China, Hefei, China","institution_ids":["https://openalex.org/I126520041"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101435519","display_name":"David S. L. Wei","orcid":"https://orcid.org/0000-0002-3839-5576"},"institutions":[{"id":"https://openalex.org/I164389053","display_name":"Fordham University","ror":"https://ror.org/03qnxaf80","country_code":"US","type":"education","lineage":["https://openalex.org/I164389053"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"David S. L. Wei","raw_affiliation_strings":["Computer and Information Science Department, Fordham University, Bronx, NY, USA"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Computer and Information Science Department, Fordham University, Bronx, NY, USA","institution_ids":["https://openalex.org/I164389053"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5077173223","display_name":"Huancheng Zhou","orcid":null},"institutions":[{"id":"https://openalex.org/I126520041","display_name":"University of Science and Technology of China","ror":"https://ror.org/04c4dkn09","country_code":"CN","type":"education","lineage":["https://openalex.org/I126520041","https://openalex.org/I19820366"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Huancheng Zhou","raw_affiliation_strings":["Department of Electronic Engineering and Information Science, University of Science and Technology of China, Hefei, China"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Department of Electronic Engineering and Information Science, University of Science and Technology of China, Hefei, China","institution_ids":["https://openalex.org/I126520041"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5064573190","display_name":"Nenghai Yu","orcid":"https://orcid.org/0000-0003-4417-9316"},"institutions":[{"id":"https://openalex.org/I126520041","display_name":"University of Science and Technology of China","ror":"https://ror.org/04c4dkn09","country_code":"CN","type":"education","lineage":["https://openalex.org/I126520041","https://openalex.org/I19820366"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Nenghai Yu","raw_affiliation_strings":["Department of Electronic Engineering and Information Science, University of Science and Technology of China, Hefei, China"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Department of Electronic Engineering and Information Science, University of Science and Technology of China, Hefei, China","institution_ids":["https://openalex.org/I126520041"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5100688242"],"corresponding_institution_ids":["https://openalex.org/I126520041"],"apc_list":null,"apc_paid":null,"fwci":8.5483,"has_fulltext":false,"cited_by_count":116,"citation_normalized_percentile":{"value":0.97960747,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":98,"max":100},"biblio":{"volume":"6","issue":"3","first_page":"5485","last_page":"5499"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.9901999831199646,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.9901999831199646,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11896","display_name":"Opportunistic and Delay-Tolerant Networks","score":0.9817000031471252,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9750999808311462,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8127028942108154},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.7413312792778015},{"id":"https://openalex.org/keywords/authentication-protocol","display_name":"Authentication protocol","score":0.7097487449645996},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.6567947864532471},{"id":"https://openalex.org/keywords/handover","display_name":"Handover","score":0.51966392993927},{"id":"https://openalex.org/keywords/overhead","display_name":"Overhead (engineering)","score":0.5180449485778809},{"id":"https://openalex.org/keywords/access-control","display_name":"Access control","score":0.48809942603111267},{"id":"https://openalex.org/keywords/lightweight-extensible-authentication-protocol","display_name":"Lightweight Extensible Authentication Protocol","score":0.4818469285964966},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.47736239433288574},{"id":"https://openalex.org/keywords/bottleneck","display_name":"Bottleneck","score":0.41552895307540894},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.11482381820678711}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8127028942108154},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.7413312792778015},{"id":"https://openalex.org/C21564112","wikidata":"https://www.wikidata.org/wiki/Q4825885","display_name":"Authentication protocol","level":3,"score":0.7097487449645996},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.6567947864532471},{"id":"https://openalex.org/C111852164","wikidata":"https://www.wikidata.org/wiki/Q1414679","display_name":"Handover","level":2,"score":0.51966392993927},{"id":"https://openalex.org/C2779960059","wikidata":"https://www.wikidata.org/wiki/Q7113681","display_name":"Overhead (engineering)","level":2,"score":0.5180449485778809},{"id":"https://openalex.org/C527821871","wikidata":"https://www.wikidata.org/wiki/Q228502","display_name":"Access control","level":2,"score":0.48809942603111267},{"id":"https://openalex.org/C167169670","wikidata":"https://www.wikidata.org/wiki/Q1824705","display_name":"Lightweight Extensible Authentication Protocol","level":4,"score":0.4818469285964966},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.47736239433288574},{"id":"https://openalex.org/C2780513914","wikidata":"https://www.wikidata.org/wiki/Q18210350","display_name":"Bottleneck","level":2,"score":0.41552895307540894},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.11482381820678711},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/jiot.2019.2902907","is_oa":false,"landing_page_url":"https://doi.org/10.1109/jiot.2019.2902907","pdf_url":null,"source":{"id":"https://openalex.org/S2480266640","display_name":"IEEE Internet of Things Journal","issn_l":"2327-4662","issn":["2327-4662","2372-2541"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Internet of Things Journal","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.6499999761581421,"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions"}],"awards":[{"id":"https://openalex.org/G4776578996","display_name":null,"funder_award_id":"2016394","funder_id":"https://openalex.org/F4320322847","funder_display_name":"Youth Innovation Promotion Association of the Chinese Academy of Sciences"},{"id":"https://openalex.org/G6333748432","display_name":null,"funder_award_id":"61671420","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G6585894771","display_name":null,"funder_award_id":"2016YFB0800301","funder_id":"https://openalex.org/F4320335777","funder_display_name":"National Key Research and Development Program of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320322847","display_name":"Youth Innovation Promotion Association of the Chinese Academy of Sciences","ror":"https://ror.org/031141b54"},{"id":"https://openalex.org/F4320335777","display_name":"National Key Research and Development Program of China","ror":null},{"id":"https://openalex.org/F4320335787","display_name":"Fundamental Research Funds for the Central Universities","ror":null}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":46,"referenced_works":["https://openalex.org/W1553682138","https://openalex.org/W1586877278","https://openalex.org/W1651157241","https://openalex.org/W1656678770","https://openalex.org/W1892206924","https://openalex.org/W1919647013","https://openalex.org/W1967738308","https://openalex.org/W1970613420","https://openalex.org/W1993087005","https://openalex.org/W2003736153","https://openalex.org/W2015788181","https://openalex.org/W2018462118","https://openalex.org/W2025700917","https://openalex.org/W2027477183","https://openalex.org/W2029693536","https://openalex.org/W2036378739","https://openalex.org/W2053820118","https://openalex.org/W2058401212","https://openalex.org/W2059110084","https://openalex.org/W2061926529","https://openalex.org/W2064243176","https://openalex.org/W2068411457","https://openalex.org/W2072641892","https://openalex.org/W2082276212","https://openalex.org/W2103056119","https://openalex.org/W2106058992","https://openalex.org/W2108834246","https://openalex.org/W2141214446","https://openalex.org/W2147298014","https://openalex.org/W2156186849","https://openalex.org/W2166177812","https://openalex.org/W2166221619","https://openalex.org/W2248880694","https://openalex.org/W2266218113","https://openalex.org/W2480682359","https://openalex.org/W2562586545","https://openalex.org/W2564594089","https://openalex.org/W2566832386","https://openalex.org/W2609542722","https://openalex.org/W2793275006","https://openalex.org/W2846593596","https://openalex.org/W2901617570","https://openalex.org/W3098658574","https://openalex.org/W4210531213","https://openalex.org/W6651121328","https://openalex.org/W6731106472"],"related_works":["https://openalex.org/W2360010141","https://openalex.org/W2093798919","https://openalex.org/W2107692711","https://openalex.org/W2134444393","https://openalex.org/W3096443715","https://openalex.org/W2314541983","https://openalex.org/W4392012696","https://openalex.org/W2941888532","https://openalex.org/W2350747063","https://openalex.org/W2102741679"],"abstract_inverted_index":{"Space":[0],"information":[1],"network":[2,27,164],"(SIN)":[3],"makes":[4],"it":[5],"possible":[6],"for":[7,92,97,133],"any":[8],"object":[9],"to":[10,13,31,38,46,53,105,154,157,205],"be":[11],"connected":[12],"the":[14,19,36,57,76,106,148,152,159,163,186,233],"Internet":[15,98],"anywhere,":[16],"even":[17],"in":[18,43,75,102,115,135,183,191],"areas":[20],"with":[21,128,245],"extreme":[22],"conditions,":[23],"where":[24,147],"a":[25,72,79,120,142,178,200,223],"cellular":[26],"is":[28,35,215],"not":[29],"easy":[30],"deploy.":[32],"Access":[33],"authentication":[34,83,87,125,144,174],"key":[37],"secure":[39,80,122,216],"users'":[40],"access":[41,52],"control":[42,165],"SIN,":[44,93],"mainly":[45],"prevent":[47],"illegal":[48],"adversaries":[49],"from":[50],"getting":[51],"SIN":[54,63,103],"services.":[55],"However,":[56],"highly":[58],"complicated":[59],"communication":[60],"environment":[61],"of":[62,78,99,162,181,188,202,225,235],"(e.g.,":[64],"exposed":[65],"links,":[66],"higher":[67],"signal":[68],"delay,":[69],"etc.)":[70],"poses":[71],"challenging":[73],"issue":[74],"design":[77,119,193],"and":[81,110,123,176,220,241],"efficient":[82,124,130],"scheme.":[84],"Although":[85],"some":[86],"schemes":[88],"have":[89],"been":[90],"proposed":[91],"they":[94],"are":[95,150],"unsuitable":[96],"Things":[100],"(IoT)":[101],"due":[104],"high":[107],"signaling":[108],"overhead":[109],"insufficient":[111],"security":[112,226],"properties.":[113],"Therefore,":[114],"this":[116],"paper,":[117],"we":[118,140],"provably":[121],"protocol,":[126],"along":[127],"an":[129],"handover":[131,197,242],"mechanism,":[132],"IoT":[134],"SIN.":[136],"In":[137,228],"our":[138,192,213,236],"design,":[139],"introduce":[141],"new":[143],"system":[145],"model,":[146],"satellites":[149],"given":[151],"ability":[153],"authenticate":[155],"users":[156,203],"avoid":[158],"online":[160],"involvement":[161],"center":[166],"(NCC)":[167],"when":[168,199],"authenticating":[169],"users,":[170],"thereby":[171],"reducing":[172],"long":[173],"delay":[175,240],"avoiding":[177],"single":[179],"point":[180],"bottleneck":[182],"NCC.":[184],"Furthermore,":[185],"support":[187],"batch":[189],"verification":[190],"can":[194,221],"significantly":[195],"enhance":[196],"efficiency":[198,243],"group":[201],"switch":[204],"another":[206],"satellite.":[207],"Our":[208],"further":[209],"analysis":[210],"shows":[211,232],"that":[212],"scheme":[214,237],"against":[217],"various":[218],"attacks":[219],"meet":[222],"variety":[224],"requirements.":[227],"addition,":[229],"performance":[230],"evaluation":[231],"superiority":[234],"on":[238],"both":[239],"compared":[244],"existing":[246],"schemes.":[247]},"counts_by_year":[{"year":2026,"cited_by_count":5},{"year":2025,"cited_by_count":14},{"year":2024,"cited_by_count":25},{"year":2023,"cited_by_count":26},{"year":2022,"cited_by_count":16},{"year":2021,"cited_by_count":15},{"year":2020,"cited_by_count":10},{"year":2019,"cited_by_count":5}],"updated_date":"2026-05-07T13:39:58.223016","created_date":"2025-10-10T00:00:00"}
