{"id":"https://openalex.org/W3157712508","doi":"https://doi.org/10.1109/jiot.2021.3075158","title":"Provably Secure Authentication Protocol for Mobile Clients in IoT Environment Using Puncturable Pseudorandom Function","display_name":"Provably Secure Authentication Protocol for Mobile Clients in IoT Environment Using Puncturable Pseudorandom Function","publication_year":2021,"publication_date":"2021-04-22","ids":{"openalex":"https://openalex.org/W3157712508","doi":"https://doi.org/10.1109/jiot.2021.3075158","mag":"3157712508"},"language":"en","primary_location":{"id":"doi:10.1109/jiot.2021.3075158","is_oa":false,"landing_page_url":"https://doi.org/10.1109/jiot.2021.3075158","pdf_url":null,"source":{"id":"https://openalex.org/S2480266640","display_name":"IEEE Internet of Things Journal","issn_l":"2327-4662","issn":["2327-4662","2372-2541"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Internet of Things Journal","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5035264127","display_name":"Muhammad Asad Saleem","orcid":"https://orcid.org/0009-0001-0308-601X"},"institutions":[{"id":"https://openalex.org/I16076960","display_name":"COMSATS University Islamabad","ror":"https://ror.org/00nqqvk19","country_code":"PK","type":"education","lineage":["https://openalex.org/I16076960"]}],"countries":["PK"],"is_corresponding":true,"raw_author_name":"Muhammad Asad Saleem","raw_affiliation_strings":["Department of Computer Science, COMSATS University Islamabad (Sahiwal Campus), Sahiwal, Pakistan"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, COMSATS University Islamabad (Sahiwal Campus), Sahiwal, Pakistan","institution_ids":["https://openalex.org/I16076960"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5013439403","display_name":"Zahid Ghaffar","orcid":"https://orcid.org/0000-0002-5546-2689"},"institutions":[{"id":"https://openalex.org/I16076960","display_name":"COMSATS University Islamabad","ror":"https://ror.org/00nqqvk19","country_code":"PK","type":"education","lineage":["https://openalex.org/I16076960"]}],"countries":["PK"],"is_corresponding":false,"raw_author_name":"Zahid Ghaffar","raw_affiliation_strings":["Department of Computer Science, COMSATS University Islamabad (Sahiwal Campus), Sahiwal, Pakistan"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, COMSATS University Islamabad (Sahiwal Campus), Sahiwal, Pakistan","institution_ids":["https://openalex.org/I16076960"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5023371922","display_name":"Khalid Mahmood","orcid":"https://orcid.org/0000-0001-5046-7766"},"institutions":[{"id":"https://openalex.org/I16076960","display_name":"COMSATS University Islamabad","ror":"https://ror.org/00nqqvk19","country_code":"PK","type":"education","lineage":["https://openalex.org/I16076960"]}],"countries":["PK"],"is_corresponding":false,"raw_author_name":"Khalid Mahmood","raw_affiliation_strings":["Department of Computer Science, COMSATS University Islamabad (Sahiwal Campus), Sahiwal, Pakistan"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, COMSATS University Islamabad (Sahiwal Campus), Sahiwal, Pakistan","institution_ids":["https://openalex.org/I16076960"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5011213078","display_name":"Ashok Kumar Das","orcid":"https://orcid.org/0000-0002-5196-9589"},"institutions":[{"id":"https://openalex.org/I64189192","display_name":"International Institute of Information Technology, Hyderabad","ror":"https://ror.org/05f11g639","country_code":"IN","type":"education","lineage":["https://openalex.org/I64189192"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Ashok Kumar Das","raw_affiliation_strings":["Center for Security, Theory and Algorithmic Research, International Institute of Information Technology Hyderabad, Hyderabad, India"],"affiliations":[{"raw_affiliation_string":"Center for Security, Theory and Algorithmic Research, International Institute of Information Technology Hyderabad, Hyderabad, India","institution_ids":["https://openalex.org/I64189192"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5076776322","display_name":"Joel J. P. C. Rodrigues","orcid":"https://orcid.org/0000-0001-8657-3800"},"institutions":[{"id":"https://openalex.org/I4210120471","display_name":"Instituto de Telecomunica\u00e7\u00f5es","ror":"https://ror.org/02ht4fk33","country_code":"PT","type":"nonprofit","lineage":["https://openalex.org/I4210120471"]},{"id":"https://openalex.org/I3121799822","display_name":"Universidade Federal do Piau\u00ed","ror":"https://ror.org/00kwnx126","country_code":"BR","type":"education","lineage":["https://openalex.org/I3121799822"]}],"countries":["BR","PT"],"is_corresponding":false,"raw_author_name":"Joel J. P. C. Rodrigues","raw_affiliation_strings":["Federal University of Piau&#x00ED;, Teresina, Brazil","Covilh\u00e3 Delegation, Instituto de Telecomunica\u00e7\u00f5es, Covilh\u00e3, Portugal","Federal University of Piau\u00ed, Teresina, Brazil"],"affiliations":[{"raw_affiliation_string":"Federal University of Piau&#x00ED;, Teresina, Brazil","institution_ids":["https://openalex.org/I3121799822"]},{"raw_affiliation_string":"Covilh\u00e3 Delegation, Instituto de Telecomunica\u00e7\u00f5es, Covilh\u00e3, Portugal","institution_ids":["https://openalex.org/I4210120471"]},{"raw_affiliation_string":"Federal University of Piau\u00ed, Teresina, Brazil","institution_ids":["https://openalex.org/I3121799822"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5072011650","display_name":"Muhammad Khurram Khan","orcid":"https://orcid.org/0000-0001-6636-0533"},"institutions":[{"id":"https://openalex.org/I28022161","display_name":"King Saud University","ror":"https://ror.org/02f81g417","country_code":"SA","type":"education","lineage":["https://openalex.org/I28022161"]}],"countries":["SA"],"is_corresponding":false,"raw_author_name":"Muhammad Khurram Khan","raw_affiliation_strings":["Center of Excellence in Information Assurance, King Saud University, Riyadh, Saudi Arabia"],"affiliations":[{"raw_affiliation_string":"Center of Excellence in Information Assurance, King Saud University, Riyadh, Saudi Arabia","institution_ids":["https://openalex.org/I28022161"]}]}],"institutions":[],"countries_distinct_count":5,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5035264127"],"corresponding_institution_ids":["https://openalex.org/I16076960"],"apc_list":null,"apc_paid":null,"fwci":1.1121,"has_fulltext":false,"cited_by_count":15,"citation_normalized_percentile":{"value":0.7863094,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":99},"biblio":{"volume":"8","issue":"22","first_page":"16613","last_page":"16622"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9883000254631042,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8653205633163452},{"id":"https://openalex.org/keywords/mutual-authentication","display_name":"Mutual authentication","score":0.621891438961029},{"id":"https://openalex.org/keywords/authentication-protocol","display_name":"Authentication protocol","score":0.6194411516189575},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.5789443254470825},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.5353719592094421},{"id":"https://openalex.org/keywords/random-oracle","display_name":"Random oracle","score":0.5225136280059814},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5011301040649414},{"id":"https://openalex.org/keywords/mobile-computing","display_name":"Mobile computing","score":0.4483187198638916},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.4176548719406128},{"id":"https://openalex.org/keywords/authentication-server","display_name":"Authentication server","score":0.41374409198760986},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.253349244594574},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.17066845297813416}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8653205633163452},{"id":"https://openalex.org/C2781221063","wikidata":"https://www.wikidata.org/wiki/Q6944186","display_name":"Mutual authentication","level":3,"score":0.621891438961029},{"id":"https://openalex.org/C21564112","wikidata":"https://www.wikidata.org/wiki/Q4825885","display_name":"Authentication protocol","level":3,"score":0.6194411516189575},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.5789443254470825},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.5353719592094421},{"id":"https://openalex.org/C94284585","wikidata":"https://www.wikidata.org/wiki/Q228184","display_name":"Random oracle","level":4,"score":0.5225136280059814},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5011301040649414},{"id":"https://openalex.org/C144543869","wikidata":"https://www.wikidata.org/wiki/Q2738570","display_name":"Mobile computing","level":2,"score":0.4483187198638916},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.4176548719406128},{"id":"https://openalex.org/C2777331311","wikidata":"https://www.wikidata.org/wiki/Q784561","display_name":"Authentication server","level":3,"score":0.41374409198760986},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.253349244594574},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.17066845297813416}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/jiot.2021.3075158","is_oa":false,"landing_page_url":"https://doi.org/10.1109/jiot.2021.3075158","pdf_url":null,"source":{"id":"https://openalex.org/S2480266640","display_name":"IEEE Internet of Things Journal","issn_l":"2327-4662","issn":["2327-4662","2372-2541"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Internet of Things Journal","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G497239743","display_name":null,"funder_award_id":"313036/2020-9","funder_id":"https://openalex.org/F4320322025","funder_display_name":"Conselho Nacional de Desenvolvimento Cient\u00edfico e Tecnol\u00f3gico"}],"funders":[{"id":"https://openalex.org/F4320322025","display_name":"Conselho Nacional de Desenvolvimento Cient\u00edfico e Tecnol\u00f3gico","ror":"https://ror.org/03swz6y49"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":25,"referenced_works":["https://openalex.org/W1561441787","https://openalex.org/W1966132871","https://openalex.org/W2029693536","https://openalex.org/W2140125353","https://openalex.org/W2262390119","https://openalex.org/W2412908136","https://openalex.org/W2753121224","https://openalex.org/W2782554795","https://openalex.org/W2805161995","https://openalex.org/W2808182497","https://openalex.org/W2920780305","https://openalex.org/W2921585229","https://openalex.org/W2952763883","https://openalex.org/W2954885714","https://openalex.org/W2980991739","https://openalex.org/W3000164966","https://openalex.org/W3000338372","https://openalex.org/W3000818175","https://openalex.org/W3002176622","https://openalex.org/W3014501349","https://openalex.org/W3084583530","https://openalex.org/W3090774478","https://openalex.org/W3095887065","https://openalex.org/W3113014612","https://openalex.org/W3130267006"],"related_works":["https://openalex.org/W4401273346","https://openalex.org/W2482813613","https://openalex.org/W2363600212","https://openalex.org/W2736044769","https://openalex.org/W2619897385","https://openalex.org/W2364805998","https://openalex.org/W2963069143","https://openalex.org/W2364053809","https://openalex.org/W2405671815","https://openalex.org/W2025655227"],"abstract_inverted_index":{"The":[0,33,169,183,196,248],"Internet":[1,31],"of":[2,8,30,36,97,105,137],"Things":[3],"(IoT)":[4],"is":[5,80,133,186,200,257],"a":[6,94,134,151,222,236],"framework":[7],"various":[9,58],"services":[10,65],"and":[11,21,42,57,91,114,128,142,189,267],"smart":[12,60],"technologies":[13,44],"that":[14,254],"mutually":[15],"communicate":[16],"information":[17],"between":[18,25],"mobile":[19,54,64,89,163,175,216,223],"devices":[20,26],"users":[22],"or":[23],"just":[24],"with":[27],"the":[28,75,84,121,158,166,203,211,226,230,241,252],"help":[29],"connectivity.":[32],"dramatic":[34],"progression":[35],"IoT":[37,122,167],"helps":[38],"numerous":[39],"network":[40],"applications":[41],"communication":[43,48,129,266],"to":[45,74,82,109,125,177,191,239,244],"introduce":[46,150],"state-of-the-art":[47],"models":[49],"for":[50,120,162],"enabling":[51],"interaction":[52],"among":[53,88],"server,":[55],"clients,":[56],"other":[59],"entities.":[61],"Now-a-days,":[62],"online":[63],"have":[66,100],"gained":[67],"huge":[68],"attention":[69],"by":[70,263],"providing":[71],"ample":[72],"convenience":[73],"distant":[76],"users.":[77],"However,":[78],"it":[79],"necessary":[81],"secure":[83],"information,":[85],"being":[86],"exchanged":[87],"clients":[90,164,176],"server.":[92,182],"Therefore,":[93],"large":[95],"number":[96],"authentication":[98,144,180],"protocols":[99,262],"been":[101],"presented":[102,201],"but":[103],"majority":[104],"them":[106],"are":[107,118,219,233],"unsuitable":[108],"fulfill":[110],"novel":[111,152],"security":[112,194,198],"requirements":[113],"standards.":[115],"Moreover,":[116,209],"they":[117],"incompatible":[119],"environment":[123],"due":[124],"higher":[126],"computation":[127,246,268],"complexity.":[130],"Consequently,":[131],"there":[132],"dire":[135],"need":[136],"developing":[138],"an":[139],"adequate,":[140],"reliable,":[141],"cost-effective":[143],"protocol.":[145],"In":[146],"this":[147],"article,":[148],"we":[149],"identity-based":[153],"key":[154],"agreement":[155],"protocol":[156,172,185,256],"using":[157,202],"puncturable":[159],"pseudorandom":[160],"functions":[161],"in":[165],"environment.":[168],"proposed":[170,184],"PSK-MC":[171],"enables":[173],"two":[174],"accomplish":[178],"mutual":[179],"via":[181],"evaluated":[187],"formally":[188],"informally":[190],"determine":[192,245],"its":[193],"strength.":[195],"formal":[197],"analysis":[199,250],"widely":[204],"used":[205,214,228],"random":[206],"oracle":[207],"model.":[208],"all":[210],"cryptographic":[212],"operations":[213,227],"at":[215,229],"client":[217],"side":[218,232],"executed":[220],"on":[221,235],"device,":[224],"while":[225],"server":[231],"implemented":[234],"desktop":[237],"machine":[238],"get":[240],"experimental":[242],"results":[243],"cost.":[247],"performance":[249],"reveals":[251],"fact":[253],"our":[255],"comparatively":[258],"better":[259],"than":[260],"related":[261],"exhibiting":[264],"least":[265],"overhead.":[269]},"counts_by_year":[{"year":2025,"cited_by_count":8},{"year":2024,"cited_by_count":3},{"year":2023,"cited_by_count":1},{"year":2022,"cited_by_count":2},{"year":2021,"cited_by_count":1}],"updated_date":"2026-03-09T08:58:05.943551","created_date":"2025-10-10T00:00:00"}
