{"id":"https://openalex.org/W4321609002","doi":"https://doi.org/10.1109/jiot.2023.3245360","title":"Nested Hash Access With Post Quantum Encryption for Mission-Critical IoT Communications","display_name":"Nested Hash Access With Post Quantum Encryption for Mission-Critical IoT Communications","publication_year":2023,"publication_date":"2023-02-23","ids":{"openalex":"https://openalex.org/W4321609002","doi":"https://doi.org/10.1109/jiot.2023.3245360"},"language":"en","primary_location":{"id":"doi:10.1109/jiot.2023.3245360","is_oa":false,"landing_page_url":"https://doi.org/10.1109/jiot.2023.3245360","pdf_url":null,"source":{"id":"https://openalex.org/S2480266640","display_name":"IEEE Internet of Things Journal","issn_l":"2327-4662","issn":["2327-4662","2372-2541"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Internet of Things Journal","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100734239","display_name":"Dongyang Xu","orcid":null},"institutions":[{"id":"https://openalex.org/I87445476","display_name":"Xi'an Jiaotong University","ror":"https://ror.org/017zhmm22","country_code":"CN","type":"education","lineage":["https://openalex.org/I87445476"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Dongyang Xu","raw_affiliation_strings":["School of Information and Communications Engineering, Xi&#x2019;an Jiaotong University, Xi&#x2019;an, China"],"affiliations":[{"raw_affiliation_string":"School of Information and Communications Engineering, Xi&#x2019;an Jiaotong University, Xi&#x2019;an, China","institution_ids":["https://openalex.org/I87445476"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100349496","display_name":"Lei Liu","orcid":"https://orcid.org/0000-0001-8173-0408"},"institutions":[{"id":"https://openalex.org/I149594827","display_name":"Xidian University","ror":"https://ror.org/05s92vm98","country_code":"CN","type":"education","lineage":["https://openalex.org/I149594827"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Lei Liu","raw_affiliation_strings":["Guangzhou Institute of Technology, Xidian University, Guangzhou, China"],"affiliations":[{"raw_affiliation_string":"Guangzhou Institute of Technology, Xidian University, Guangzhou, China","institution_ids":["https://openalex.org/I149594827"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100404886","display_name":"Ning Zhang","orcid":"https://orcid.org/0000-0002-8781-4925"},"institutions":[{"id":"https://openalex.org/I74413500","display_name":"University of Windsor","ror":"https://ror.org/01gw3d370","country_code":"CA","type":"education","lineage":["https://openalex.org/I74413500"]}],"countries":["CA"],"is_corresponding":false,"raw_author_name":"Ning Zhang","raw_affiliation_strings":["Department of Electrical and Computer Engineering, University of Windsor, Windsor, Canada"],"affiliations":[{"raw_affiliation_string":"Department of Electrical and Computer Engineering, University of Windsor, Windsor, Canada","institution_ids":["https://openalex.org/I74413500"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5061453937","display_name":"Mianxiong Dong","orcid":"https://orcid.org/0000-0002-2788-3451"},"institutions":[{"id":"https://openalex.org/I41725924","display_name":"Muroran Institute of Technology","ror":"https://ror.org/04rymkk69","country_code":"JP","type":"education","lineage":["https://openalex.org/I41725924"]}],"countries":["JP"],"is_corresponding":false,"raw_author_name":"Mianxiong Dong","raw_affiliation_strings":["Department of Sciences and Informatics, Muroran Institute of Technology, Muroran, Japan"],"affiliations":[{"raw_affiliation_string":"Department of Sciences and Informatics, Muroran Institute of Technology, Muroran, Japan","institution_ids":["https://openalex.org/I41725924"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5035919267","display_name":"Victor C. M. Leung","orcid":"https://orcid.org/0000-0003-3529-2640"},"institutions":[{"id":"https://openalex.org/I141945490","display_name":"University of British Columbia","ror":"https://ror.org/03rmrcq20","country_code":"CA","type":"education","lineage":["https://openalex.org/I141945490"]}],"countries":["CA"],"is_corresponding":false,"raw_author_name":"Victor C. M. Leung","raw_affiliation_strings":["Department of Electrical and Computer Engineering, University of British Columbia, Vancouver, Canada"],"affiliations":[{"raw_affiliation_string":"Department of Electrical and Computer Engineering, University of British Columbia, Vancouver, Canada","institution_ids":["https://openalex.org/I141945490"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5041520627","display_name":"James A. Ritcey","orcid":"https://orcid.org/0000-0002-6951-5083"},"institutions":[{"id":"https://openalex.org/I201448701","display_name":"University of Washington","ror":"https://ror.org/00cvxb145","country_code":"US","type":"education","lineage":["https://openalex.org/I201448701"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"James A. Ritcey","raw_affiliation_strings":["Department of Electrical and Computer Engineering, University of Washington, Seattle, WA, USA"],"affiliations":[{"raw_affiliation_string":"Department of Electrical and Computer Engineering, University of Washington, Seattle, WA, USA","institution_ids":["https://openalex.org/I201448701"]}]}],"institutions":[],"countries_distinct_count":4,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5100734239"],"corresponding_institution_ids":["https://openalex.org/I87445476"],"apc_list":null,"apc_paid":null,"fwci":3.3832,"has_fulltext":false,"cited_by_count":26,"citation_normalized_percentile":{"value":0.92821235,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":98,"max":99},"biblio":{"volume":"10","issue":"14","first_page":"12204","last_page":"12218"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9973999857902527,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9962000250816345,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8343392610549927},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.6113341450691223},{"id":"https://openalex.org/keywords/preamble","display_name":"Preamble","score":0.5714945197105408},{"id":"https://openalex.org/keywords/hash-function","display_name":"Hash function","score":0.5504065155982971},{"id":"https://openalex.org/keywords/decoding-methods","display_name":"Decoding methods","score":0.5330983996391296},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.529796302318573},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.34574228525161743},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.2709697484970093},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.26731812953948975},{"id":"https://openalex.org/keywords/channel","display_name":"Channel (broadcasting)","score":0.15928098559379578}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8343392610549927},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.6113341450691223},{"id":"https://openalex.org/C2780691134","wikidata":"https://www.wikidata.org/wiki/Q1129448","display_name":"Preamble","level":3,"score":0.5714945197105408},{"id":"https://openalex.org/C99138194","wikidata":"https://www.wikidata.org/wiki/Q183427","display_name":"Hash function","level":2,"score":0.5504065155982971},{"id":"https://openalex.org/C57273362","wikidata":"https://www.wikidata.org/wiki/Q576722","display_name":"Decoding methods","level":2,"score":0.5330983996391296},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.529796302318573},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.34574228525161743},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.2709697484970093},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.26731812953948975},{"id":"https://openalex.org/C127162648","wikidata":"https://www.wikidata.org/wiki/Q16858953","display_name":"Channel (broadcasting)","level":2,"score":0.15928098559379578}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/jiot.2023.3245360","is_oa":false,"landing_page_url":"https://doi.org/10.1109/jiot.2023.3245360","pdf_url":null,"source":{"id":"https://openalex.org/S2480266640","display_name":"IEEE Internet of Things Journal","issn_l":"2327-4662","issn":["2327-4662","2372-2541"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Internet of Things Journal","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G1987255656","display_name":null,"funder_award_id":"62001368","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G5599540591","display_name":null,"funder_award_id":"2022GY-093","funder_id":"https://openalex.org/F4320336350","funder_display_name":"Key Research and Development Projects of Shaanxi Province"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320336350","display_name":"Key Research and Development Projects of Shaanxi Province","ror":null}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":41,"referenced_works":["https://openalex.org/W1513904472","https://openalex.org/W1522463291","https://openalex.org/W1524013832","https://openalex.org/W1964199489","https://openalex.org/W1965275036","https://openalex.org/W1983578087","https://openalex.org/W1998752794","https://openalex.org/W2002872113","https://openalex.org/W2015301486","https://openalex.org/W2035769579","https://openalex.org/W2087498122","https://openalex.org/W2111319461","https://openalex.org/W2117354552","https://openalex.org/W2262889796","https://openalex.org/W2280566217","https://openalex.org/W2490928013","https://openalex.org/W2507521523","https://openalex.org/W2733433850","https://openalex.org/W2766306243","https://openalex.org/W2796873235","https://openalex.org/W2810958316","https://openalex.org/W2887708552","https://openalex.org/W2929535634","https://openalex.org/W2929612105","https://openalex.org/W2947710575","https://openalex.org/W2949110138","https://openalex.org/W2964113506","https://openalex.org/W2967819419","https://openalex.org/W2968746919","https://openalex.org/W2981906516","https://openalex.org/W2994672234","https://openalex.org/W3002949983","https://openalex.org/W3033821423","https://openalex.org/W3042888165","https://openalex.org/W3046202155","https://openalex.org/W3061744087","https://openalex.org/W3092528183","https://openalex.org/W3097080421","https://openalex.org/W3102300252","https://openalex.org/W3105117883","https://openalex.org/W3126165479"],"related_works":["https://openalex.org/W3131553538","https://openalex.org/W2369766703","https://openalex.org/W3204754495","https://openalex.org/W2392460115","https://openalex.org/W4402159933","https://openalex.org/W2391859761","https://openalex.org/W4402160580","https://openalex.org/W2893442187","https://openalex.org/W3023219121","https://openalex.org/W2035244949"],"abstract_inverted_index":{"Secure":[0],"ultrareliable":[1],"low-latency":[2],"communication":[3],"(URLLC)":[4],"has":[5],"become":[6],"a":[7,64,99,163],"crucial":[8],"requirement":[9],"of":[10,13,37,147,166,183,186,201,209,221],"mission-critical":[11,213],"Internet":[12],"Things":[14],"(IoT)":[15],"applications":[16],"and":[17,25,55,82,92,96,102,116],"use":[18],"cases,":[19],"including":[20],"automotive":[21],"driving,":[22],"remote":[23],"surgery,":[24],"many":[26],"others.":[27],"However,":[28],"it":[29],"is":[30,112],"still":[31],"challenging":[32],"to":[33,72,90,119,180,205],"protect":[34],"initial":[35,51],"access":[36,52,67],"massive":[38],"IoT":[39,214],"devices":[40],"over":[41],"wireless":[42,58],"channels,":[43],"especially":[44],"when":[45],"malicious":[46],"quantum":[47],"adversaries":[48],"paralyze":[49],"the":[50,124,131,145,151,181,199,207,219],"by":[53],"overhearing":[54],"tampering":[56],"critical":[57],"messages,":[59],"i.e.,":[60],"preambles.":[61],"We":[62,128],"propose":[63],"nested":[65,83],"hash":[66,84],"system":[68,77,202,211],"with":[69,162],"post-quantum":[70],"encryption":[71,103],"solve":[73],"this":[74],"issue.":[75],"The":[76],"performs":[78],"random":[79],"repetition":[80,115,148],"coding":[81,85],"on":[86,106,144],"multidomain":[87],"physical-layer":[88],"resources":[89],"encode":[91],"decode":[93],"preambles":[94],"precisely":[95],"resiliently.":[97],"Particularly,":[98],"subtle":[100],"compression":[101],"mechanism":[104],"based":[105],"quasi-cyclic":[107],"(QC)-moderate-density":[108],"parity-check":[109],"(MDPC)":[110],"code":[111,132],"proposed":[113,223],"between":[114],"hashing":[117],"operations":[118],"avoid":[120],"passive":[121],"eavesdropping":[122],"during":[123],"preamble":[125,152,187],"encoding":[126],"process.":[127],"show":[129,218],"that":[130],"information":[133],"can":[134,155,197],"be":[135,156],"maintained":[136],"at":[137],"128-bit":[138],"or":[139],"higher":[140],"privacy":[141],"level,":[142],"depending":[143],"length":[146],"code.":[149],"Besides,":[150],"decoding":[153,167,188],"process":[154],"proved":[157],"secure":[158],"agaisnt":[159],"active":[160],"attacks":[161],"tolerable":[164],"loss":[165],"errors.":[168],"Then,":[169],"we":[170,196],"formulate":[171],"two":[172],"nonconvex":[173],"integer":[174],"programming":[175],"problems,":[176],"each":[177],"problem":[178],"corresponding":[179],"minimization":[182],"upper":[184],"bound":[185],"error":[189],"in":[190],"an":[191],"example":[192],"application":[193],"scenario.":[194],"Finally,":[195],"derive":[198],"expressions":[200],"failure":[203],"probability":[204],"evaluate":[206],"reliability":[208],"URLLC":[210],"under":[212],"scenarios.":[215],"Simulation":[216],"results":[217],"effectiveness":[220],"our":[222],"scheme":[224],"despite":[225],"attack.":[226]},"counts_by_year":[{"year":2026,"cited_by_count":2},{"year":2025,"cited_by_count":7},{"year":2024,"cited_by_count":5},{"year":2023,"cited_by_count":12}],"updated_date":"2026-04-02T15:55:50.835912","created_date":"2025-10-10T00:00:00"}
