{"id":"https://openalex.org/W4313591290","doi":"https://doi.org/10.1109/jiot.2023.3234178","title":"SAPFS: An Efficient Symmetric-Key Authentication Key Agreement Scheme With Perfect Forward Secrecy for Industrial Internet of Things","display_name":"SAPFS: An Efficient Symmetric-Key Authentication Key Agreement Scheme With Perfect Forward Secrecy for Industrial Internet of Things","publication_year":2023,"publication_date":"2023-01-04","ids":{"openalex":"https://openalex.org/W4313591290","doi":"https://doi.org/10.1109/jiot.2023.3234178"},"language":"en","primary_location":{"id":"doi:10.1109/jiot.2023.3234178","is_oa":false,"landing_page_url":"https://doi.org/10.1109/jiot.2023.3234178","pdf_url":null,"source":{"id":"https://openalex.org/S2480266640","display_name":"IEEE Internet of Things Journal","issn_l":"2327-4662","issn":["2327-4662","2372-2541"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Internet of Things Journal","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5028075398","display_name":"Yunru Zhang","orcid":"https://orcid.org/0000-0003-2313-6560"},"institutions":[{"id":"https://openalex.org/I37461747","display_name":"Wuhan University","ror":"https://ror.org/033vjfk17","country_code":"CN","type":"education","lineage":["https://openalex.org/I37461747"]},{"id":"https://openalex.org/I5343935","display_name":"Guilin University of Electronic Technology","ror":"https://ror.org/05arjae42","country_code":"CN","type":"education","lineage":["https://openalex.org/I5343935"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Yunru Zhang","raw_affiliation_strings":["Key Laboratory of Aerospace Information Security and Trusted Computing of Ministry of Education, School of Cyber Science and Engineering, Wuhan University, Wuhan, China","Guangxi Key Laboratory of Trusted Software, Guilin University of Electronic Technology, Guilin, China"],"affiliations":[{"raw_affiliation_string":"Key Laboratory of Aerospace Information Security and Trusted Computing of Ministry of Education, School of Cyber Science and Engineering, Wuhan University, Wuhan, China","institution_ids":["https://openalex.org/I37461747"]},{"raw_affiliation_string":"Guangxi Key Laboratory of Trusted Software, Guilin University of Electronic Technology, Guilin, China","institution_ids":["https://openalex.org/I5343935"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5025668908","display_name":"Debiao He","orcid":"https://orcid.org/0000-0002-2446-7436"},"institutions":[{"id":"https://openalex.org/I37461747","display_name":"Wuhan University","ror":"https://ror.org/033vjfk17","country_code":"CN","type":"education","lineage":["https://openalex.org/I37461747"]},{"id":"https://openalex.org/I82880672","display_name":"Beihang University","ror":"https://ror.org/00wk2mp56","country_code":"CN","type":"education","lineage":["https://openalex.org/I82880672"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Debiao He","raw_affiliation_strings":["School of Cyber Science and Engineering, Wuhan University, Wuhan, China","Hangzhou Innovation Institute, Beihang University, Hangzhou, China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Science and Engineering, Wuhan University, Wuhan, China","institution_ids":["https://openalex.org/I37461747"]},{"raw_affiliation_string":"Hangzhou Innovation Institute, Beihang University, Hangzhou, China","institution_ids":["https://openalex.org/I82880672"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5028044712","display_name":"Pandi Vijayakumar","orcid":"https://orcid.org/0000-0001-5451-8946"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Pandi Vijayakumar","raw_affiliation_strings":["Department of Computer Science and Engineering, University College of Engineering Tindivanam, Tindivanam, India"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Engineering, University College of Engineering Tindivanam, Tindivanam, India","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5088264677","display_name":"Min Luo","orcid":"https://orcid.org/0000-0002-1819-9332"},"institutions":[{"id":"https://openalex.org/I152269853","display_name":"Qilu University of Technology","ror":"https://ror.org/04hyzq608","country_code":"CN","type":"education","lineage":["https://openalex.org/I152269853"]},{"id":"https://openalex.org/I37461747","display_name":"Wuhan University","ror":"https://ror.org/033vjfk17","country_code":"CN","type":"education","lineage":["https://openalex.org/I37461747"]},{"id":"https://openalex.org/I4210142748","display_name":"Shandong Academy of Sciences","ror":"https://ror.org/04y8d6y55","country_code":"CN","type":"education","lineage":["https://openalex.org/I4210142748"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Min Luo","raw_affiliation_strings":["School of Cyber Science and Engineering, Wuhan University, Wuhan, China","Shandong Provincial Key Laboratory of Computer Networks, Qilu University of Technology (Shandong Academy of Sciences), Jinan, China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Science and Engineering, Wuhan University, Wuhan, China","institution_ids":["https://openalex.org/I37461747"]},{"raw_affiliation_string":"Shandong Provincial Key Laboratory of Computer Networks, Qilu University of Technology (Shandong Academy of Sciences), Jinan, China","institution_ids":["https://openalex.org/I4210142748","https://openalex.org/I152269853"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5031931063","display_name":"Xinyi Huang","orcid":"https://orcid.org/0000-0003-0070-1707"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Xinyi Huang","raw_affiliation_strings":["Artificial Intelligence Thrust, Information Hub, Hong Kong University of Science and Technology (Guangzhou), Guangzhou, China"],"affiliations":[{"raw_affiliation_string":"Artificial Intelligence Thrust, Information Hub, Hong Kong University of Science and Technology (Guangzhou), Guangzhou, China","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5028075398"],"corresponding_institution_ids":["https://openalex.org/I37461747","https://openalex.org/I5343935"],"apc_list":null,"apc_paid":null,"fwci":10.4665,"has_fulltext":false,"cited_by_count":51,"citation_normalized_percentile":{"value":0.98671863,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":97,"max":100},"biblio":{"volume":"10","issue":"11","first_page":"9716","last_page":"9726"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.9991000294685364,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.9991000294685364,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9965999722480774,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9958999752998352,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8362069129943848},{"id":"https://openalex.org/keywords/forward-secrecy","display_name":"Forward secrecy","score":0.7788362503051758},{"id":"https://openalex.org/keywords/random-oracle","display_name":"Random oracle","score":0.7364176511764526},{"id":"https://openalex.org/keywords/hash-function","display_name":"Hash function","score":0.6683095097541809},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.5490161180496216},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5477398037910461},{"id":"https://openalex.org/keywords/key-exchange","display_name":"Key exchange","score":0.5372396111488342},{"id":"https://openalex.org/keywords/mutual-authentication","display_name":"Mutual authentication","score":0.5235595107078552},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.49706271290779114},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.4792380630970001},{"id":"https://openalex.org/keywords/message-authentication-code","display_name":"Message authentication code","score":0.428547739982605},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.3407484292984009},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.3276197910308838},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.3252614140510559}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8362069129943848},{"id":"https://openalex.org/C205009425","wikidata":"https://www.wikidata.org/wiki/Q935662","display_name":"Forward secrecy","level":4,"score":0.7788362503051758},{"id":"https://openalex.org/C94284585","wikidata":"https://www.wikidata.org/wiki/Q228184","display_name":"Random oracle","level":4,"score":0.7364176511764526},{"id":"https://openalex.org/C99138194","wikidata":"https://www.wikidata.org/wiki/Q183427","display_name":"Hash function","level":2,"score":0.6683095097541809},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.5490161180496216},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5477398037910461},{"id":"https://openalex.org/C99674996","wikidata":"https://www.wikidata.org/wiki/Q1414155","display_name":"Key exchange","level":4,"score":0.5372396111488342},{"id":"https://openalex.org/C2781221063","wikidata":"https://www.wikidata.org/wiki/Q6944186","display_name":"Mutual authentication","level":3,"score":0.5235595107078552},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.49706271290779114},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.4792380630970001},{"id":"https://openalex.org/C141492731","wikidata":"https://www.wikidata.org/wiki/Q1052621","display_name":"Message authentication code","level":3,"score":0.428547739982605},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.3407484292984009},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.3276197910308838},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.3252614140510559}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/jiot.2023.3234178","is_oa":false,"landing_page_url":"https://doi.org/10.1109/jiot.2023.3234178","pdf_url":null,"source":{"id":"https://openalex.org/S2480266640","display_name":"IEEE Internet of Things Journal","issn_l":"2327-4662","issn":["2327-4662","2372-2541"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Internet of Things Journal","raw_type":"journal-article"},{"id":"pmh:oai:repository.hkust.edu.hk:1783.1-124338","is_oa":false,"landing_page_url":"https://repository.hkust.edu.hk/ir/Record/1783.1-124338","pdf_url":null,"source":{"id":"https://openalex.org/S4306401796","display_name":"Rare & Special e-Zone (The Hong Kong University of Science and Technology)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I200769079","host_organization_name":"Hong Kong University of Science and Technology","host_organization_lineage":["https://openalex.org/I200769079"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"Article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16","score":0.8299999833106995}],"awards":[{"id":"https://openalex.org/G3433609741","display_name":null,"funder_award_id":"2021CXGC010107","funder_id":"https://openalex.org/F4320333596","funder_display_name":"Key Technology Research and Development Program of Shandong"},{"id":"https://openalex.org/G3926053986","display_name":null,"funder_award_id":"2020CXGC010107","funder_id":"https://openalex.org/F4320333596","funder_display_name":"Key Technology Research and Development Program of Shandong"},{"id":"https://openalex.org/G4117558629","display_name":null,"funder_award_id":"U21A20466","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G4190834028","display_name":null,"funder_award_id":"62172307","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G5497752695","display_name":null,"funder_award_id":"2021YFA1000600","funder_id":"https://openalex.org/F4320335777","funder_display_name":"National Key Research and Development Program of China"},{"id":"https://openalex.org/G8837115174","display_name":null,"funder_award_id":"2020-Y10-A-019","funder_id":"https://openalex.org/F4320321125","funder_display_name":"Beihang University"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320321125","display_name":"Beihang University","ror":"https://ror.org/00wk2mp56"},{"id":"https://openalex.org/F4320333596","display_name":"Key Technology Research and Development Program of Shandong","ror":null},{"id":"https://openalex.org/F4320335777","display_name":"National Key Research and Development Program of China","ror":null}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":27,"referenced_works":["https://openalex.org/W1836013889","https://openalex.org/W1994386233","https://openalex.org/W2517336287","https://openalex.org/W2586333888","https://openalex.org/W2765411180","https://openalex.org/W2898274421","https://openalex.org/W2906443033","https://openalex.org/W2947337737","https://openalex.org/W2952763883","https://openalex.org/W2966248640","https://openalex.org/W2972878892","https://openalex.org/W2973245241","https://openalex.org/W2982497264","https://openalex.org/W3006652224","https://openalex.org/W3009951551","https://openalex.org/W3011493986","https://openalex.org/W3013498527","https://openalex.org/W3015853335","https://openalex.org/W3034804175","https://openalex.org/W3034976616","https://openalex.org/W3043271373","https://openalex.org/W3084583530","https://openalex.org/W3110603219","https://openalex.org/W3135101338","https://openalex.org/W3175331500","https://openalex.org/W3179046031","https://openalex.org/W6638495166"],"related_works":["https://openalex.org/W2140125353","https://openalex.org/W3006652224","https://openalex.org/W4401273346","https://openalex.org/W2947414929","https://openalex.org/W110317680","https://openalex.org/W4390545723","https://openalex.org/W2359065662","https://openalex.org/W2604277541","https://openalex.org/W2790635691","https://openalex.org/W1517710990"],"abstract_inverted_index":{"An":[0],"edge-cloud":[1],"Industrial":[2],"Internet":[3],"of":[4,13,27,121,153],"Things":[5],"(IIoT)":[6],"can":[7],"help":[8],"meet":[9],"the":[10,23,43,119,122,138],"computing":[11],"requirements":[12],"industrial":[14],"applications,":[15],"particularly":[16],"in":[17],"time":[18],"and":[19,25,37,57,73,95,106,115,126,158],"latency-sensitive":[20],"services.":[21],"Ensuring":[22],"security":[24],"privacy":[26],"(sensitive)":[28],"information":[29],"collected":[30],"by":[31],"IIoT":[32],"end":[33],"devices":[34,53],"is":[35,134],"crucial,":[36],"has":[38],"an":[39],"important":[40],"impact":[41],"on":[42,92],"decision":[44],"making":[45],"as":[46,48],"well":[47],"operational":[49],"safety.":[50],"However,":[51],"these":[52],"are":[54],"energy":[55],"constrained":[56],"vulnerable":[58],"to":[59,69,109],"corruption.":[60],"The":[61,99],"authentication":[62,82,94],"schemes":[63,150],"suitable":[64],"for":[65],"this":[66,76],"environment":[67],"need":[68],"be":[70],"lightweight,":[71],"efficient,":[72],"concise.":[74],"In":[75],"article,":[77],"we":[78,130],"propose":[79],"a":[80,85,143],"symmetric-key":[81],"scheme":[83,101],"with":[84,146],"perfect":[86],"forward":[87],"secrecy":[88],"(SAPFS),":[89],"which":[90],"relies":[91],"both":[93],"derivation":[96],"master":[97,128],"keys.":[98],"SAPFS":[100,133],"uses":[102],"only":[103],"XOR":[104],"operation":[105],"hash":[107,124],"function":[108,125],"achieve":[110],"mutual":[111],"authentication,":[112],"key":[113],"exchange,":[114],"message":[116],"integrity.":[117],"On":[118],"condition":[120],"irreversible":[123],"indistinguishable":[127],"keys,":[129],"demonstrate":[131],"that":[132],"provably":[135],"secure":[136],"under":[137],"random":[139],"oracle":[140],"model.":[141],"Finally,":[142],"comparative":[144],"summary":[145],"three":[147],"other":[148],"competing":[149],"(in":[151],"terms":[152],"communication":[154],"cost,":[155],"storage":[156],"requirement,":[157],"computation":[159],"complexity)":[160],"demonstrates":[161],"its":[162],"utility.":[163]},"counts_by_year":[{"year":2025,"cited_by_count":21},{"year":2024,"cited_by_count":25},{"year":2023,"cited_by_count":5}],"updated_date":"2026-03-04T09:10:02.777135","created_date":"2025-10-10T00:00:00"}
