{"id":"https://openalex.org/W4390774716","doi":"https://doi.org/10.1109/jiot.2024.3351892","title":"Efficient Blockchain-Based Mutual Authentication and Session Key Agreement for Cross-Domain IIoT","display_name":"Efficient Blockchain-Based Mutual Authentication and Session Key Agreement for Cross-Domain IIoT","publication_year":2024,"publication_date":"2024-01-09","ids":{"openalex":"https://openalex.org/W4390774716","doi":"https://doi.org/10.1109/jiot.2024.3351892"},"language":"en","primary_location":{"id":"doi:10.1109/jiot.2024.3351892","is_oa":false,"landing_page_url":"https://doi.org/10.1109/jiot.2024.3351892","pdf_url":null,"source":{"id":"https://openalex.org/S2480266640","display_name":"IEEE Internet of Things Journal","issn_l":"2327-4662","issn":["2327-4662","2372-2541"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Internet of Things Journal","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5081525426","display_name":"Jie Cui","orcid":"https://orcid.org/0000-0001-7258-3418"},"institutions":[{"id":"https://openalex.org/I143868143","display_name":"Anhui University","ror":"https://ror.org/05th6yx34","country_code":"CN","type":"education","lineage":["https://openalex.org/I143868143"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Jie Cui","raw_affiliation_strings":["Key Laboratory of Intelligent Computing and Signal Processing of Ministry of Education, School of Computer Science and Technology, and the Anhui Engineering Laboratory of IoT Security Technologies, Anhui University, Hefei, China","Anhui Engineering Laboratory of IoT Security Technologies, Anhui University, Hefei, China"],"affiliations":[{"raw_affiliation_string":"Key Laboratory of Intelligent Computing and Signal Processing of Ministry of Education, School of Computer Science and Technology, and the Anhui Engineering Laboratory of IoT Security Technologies, Anhui University, Hefei, China","institution_ids":["https://openalex.org/I143868143"]},{"raw_affiliation_string":"Anhui Engineering Laboratory of IoT Security Technologies, Anhui University, Hefei, China","institution_ids":["https://openalex.org/I143868143"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5113253202","display_name":"Yihu Zhu","orcid":null},"institutions":[{"id":"https://openalex.org/I143868143","display_name":"Anhui University","ror":"https://ror.org/05th6yx34","country_code":"CN","type":"education","lineage":["https://openalex.org/I143868143"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yihu Zhu","raw_affiliation_strings":["Key Laboratory of Intelligent Computing and Signal Processing of Ministry of Education, School of Computer Science and Technology, and the Anhui Engineering Laboratory of IoT Security Technologies, Anhui University, Hefei, China","Anhui Engineering Laboratory of IoT Security Technologies, Anhui University, Hefei, China"],"affiliations":[{"raw_affiliation_string":"Key Laboratory of Intelligent Computing and Signal Processing of Ministry of Education, School of Computer Science and Technology, and the Anhui Engineering Laboratory of IoT Security Technologies, Anhui University, Hefei, China","institution_ids":["https://openalex.org/I143868143"]},{"raw_affiliation_string":"Anhui Engineering Laboratory of IoT Security Technologies, Anhui University, Hefei, China","institution_ids":["https://openalex.org/I143868143"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5016260066","display_name":"Hong Zhong","orcid":"https://orcid.org/0000-0002-0392-9734"},"institutions":[{"id":"https://openalex.org/I143868143","display_name":"Anhui University","ror":"https://ror.org/05th6yx34","country_code":"CN","type":"education","lineage":["https://openalex.org/I143868143"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Hong Zhong","raw_affiliation_strings":["Key Laboratory of Intelligent Computing and Signal Processing of Ministry of Education, School of Computer Science and Technology, and the Anhui Engineering Laboratory of IoT Security Technologies, Anhui University, Hefei, China","Anhui Engineering Laboratory of IoT Security Technologies, Anhui University, Hefei, China"],"affiliations":[{"raw_affiliation_string":"Key Laboratory of Intelligent Computing and Signal Processing of Ministry of Education, School of Computer Science and Technology, and the Anhui Engineering Laboratory of IoT Security Technologies, Anhui University, Hefei, China","institution_ids":["https://openalex.org/I143868143"]},{"raw_affiliation_string":"Anhui Engineering Laboratory of IoT Security Technologies, Anhui University, Hefei, China","institution_ids":["https://openalex.org/I143868143"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5015149253","display_name":"Qingyang Zhang","orcid":"https://orcid.org/0000-0002-2600-6748"},"institutions":[{"id":"https://openalex.org/I143868143","display_name":"Anhui University","ror":"https://ror.org/05th6yx34","country_code":"CN","type":"education","lineage":["https://openalex.org/I143868143"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Qingyang Zhang","raw_affiliation_strings":["Key Laboratory of Intelligent Computing and Signal Processing of Ministry of Education, School of Computer Science and Technology, and the Anhui Engineering Laboratory of IoT Security Technologies, Anhui University, Hefei, China","Anhui Engineering Laboratory of IoT Security Technologies, Anhui University, Hefei, China"],"affiliations":[{"raw_affiliation_string":"Key Laboratory of Intelligent Computing and Signal Processing of Ministry of Education, School of Computer Science and Technology, and the Anhui Engineering Laboratory of IoT Security Technologies, Anhui University, Hefei, China","institution_ids":["https://openalex.org/I143868143"]},{"raw_affiliation_string":"Anhui Engineering Laboratory of IoT Security Technologies, Anhui University, Hefei, China","institution_ids":["https://openalex.org/I143868143"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5077232320","display_name":"Chengjie Gu","orcid":"https://orcid.org/0009-0001-6597-168X"},"institutions":[{"id":"https://openalex.org/I184681353","display_name":"Anhui University of Science and Technology","ror":"https://ror.org/00q9atg80","country_code":"CN","type":"education","lineage":["https://openalex.org/I184681353"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Chengjie Gu","raw_affiliation_strings":["School of Public Security and Emergency Management, Anhui University of Science and Technology, Hefei, China","Security Research Institute, New H3C Group, Hefei, China"],"affiliations":[{"raw_affiliation_string":"School of Public Security and Emergency Management, Anhui University of Science and Technology, Hefei, China","institution_ids":["https://openalex.org/I184681353"]},{"raw_affiliation_string":"Security Research Institute, New H3C Group, Hefei, China","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5025668908","display_name":"Debiao He","orcid":"https://orcid.org/0000-0002-2446-7436"},"institutions":[{"id":"https://openalex.org/I37461747","display_name":"Wuhan University","ror":"https://ror.org/033vjfk17","country_code":"CN","type":"education","lineage":["https://openalex.org/I37461747"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Debiao He","raw_affiliation_strings":["School of Cyber Science and Engineering, Wuhan University, Wuhan, China","Shanghai Key Laboratory of Privacy Preserving Computation, MatrixElements Technologies, Shanghai, China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Science and Engineering, Wuhan University, Wuhan, China","institution_ids":["https://openalex.org/I37461747"]},{"raw_affiliation_string":"Shanghai Key Laboratory of Privacy Preserving Computation, MatrixElements Technologies, Shanghai, China","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5081525426"],"corresponding_institution_ids":["https://openalex.org/I143868143"],"apc_list":null,"apc_paid":null,"fwci":35.8815,"has_fulltext":false,"cited_by_count":47,"citation_normalized_percentile":{"value":0.99779253,"is_in_top_1_percent":true,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":99,"max":100},"biblio":{"volume":"11","issue":"9","first_page":"16325","last_page":"16338"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9990000128746033,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9984999895095825,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8595969676971436},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5821231603622437},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.5451475977897644},{"id":"https://openalex.org/keywords/server","display_name":"Server","score":0.5363823771476746},{"id":"https://openalex.org/keywords/trusted-third-party","display_name":"Trusted third party","score":0.5166583061218262},{"id":"https://openalex.org/keywords/session-key","display_name":"Session key","score":0.5103215575218201},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.5097476840019226},{"id":"https://openalex.org/keywords/anonymity","display_name":"Anonymity","score":0.5024960041046143},{"id":"https://openalex.org/keywords/overhead","display_name":"Overhead (engineering)","score":0.5012364387512207},{"id":"https://openalex.org/keywords/mutual-authentication","display_name":"Mutual authentication","score":0.4886167645454407},{"id":"https://openalex.org/keywords/inter-domain","display_name":"Inter-domain","score":0.4821998178958893},{"id":"https://openalex.org/keywords/blockchain","display_name":"Blockchain","score":0.47778424620628357},{"id":"https://openalex.org/keywords/security-analysis","display_name":"Security analysis","score":0.46061018109321594},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.4496781826019287},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.4323021173477173},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.2520042061805725},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.0842086672782898}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8595969676971436},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5821231603622437},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.5451475977897644},{"id":"https://openalex.org/C93996380","wikidata":"https://www.wikidata.org/wiki/Q44127","display_name":"Server","level":2,"score":0.5363823771476746},{"id":"https://openalex.org/C139089976","wikidata":"https://www.wikidata.org/wiki/Q2142273","display_name":"Trusted third party","level":2,"score":0.5166583061218262},{"id":"https://openalex.org/C191197275","wikidata":"https://www.wikidata.org/wiki/Q1755775","display_name":"Session key","level":3,"score":0.5103215575218201},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.5097476840019226},{"id":"https://openalex.org/C178005623","wikidata":"https://www.wikidata.org/wiki/Q308859","display_name":"Anonymity","level":2,"score":0.5024960041046143},{"id":"https://openalex.org/C2779960059","wikidata":"https://www.wikidata.org/wiki/Q7113681","display_name":"Overhead (engineering)","level":2,"score":0.5012364387512207},{"id":"https://openalex.org/C2781221063","wikidata":"https://www.wikidata.org/wiki/Q6944186","display_name":"Mutual authentication","level":3,"score":0.4886167645454407},{"id":"https://openalex.org/C5111613","wikidata":"https://www.wikidata.org/wiki/Q3799443","display_name":"Inter-domain","level":4,"score":0.4821998178958893},{"id":"https://openalex.org/C2779687700","wikidata":"https://www.wikidata.org/wiki/Q20514253","display_name":"Blockchain","level":2,"score":0.47778424620628357},{"id":"https://openalex.org/C38369872","wikidata":"https://www.wikidata.org/wiki/Q7445009","display_name":"Security analysis","level":2,"score":0.46061018109321594},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.4496781826019287},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.4323021173477173},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.2520042061805725},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0842086672782898},{"id":"https://openalex.org/C18787934","wikidata":"https://www.wikidata.org/wiki/Q7565105","display_name":"Source-specific multicast","level":3,"score":0.0},{"id":"https://openalex.org/C32295351","wikidata":"https://www.wikidata.org/wiki/Q899288","display_name":"Multicast","level":2,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/jiot.2024.3351892","is_oa":false,"landing_page_url":"https://doi.org/10.1109/jiot.2024.3351892","pdf_url":null,"source":{"id":"https://openalex.org/S2480266640","display_name":"IEEE Internet of Things Journal","issn_l":"2327-4662","issn":["2327-4662","2372-2541"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Internet of Things Journal","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G1303638838","display_name":null,"funder_award_id":"62325209","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G827846473","display_name":null,"funder_award_id":"62202005","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G8497496367","display_name":null,"funder_award_id":"62272002","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":40,"referenced_works":["https://openalex.org/W2096974968","https://openalex.org/W2164736940","https://openalex.org/W2169194339","https://openalex.org/W2604733939","https://openalex.org/W2793417647","https://openalex.org/W2883913974","https://openalex.org/W2893109375","https://openalex.org/W2913231348","https://openalex.org/W2915600598","https://openalex.org/W2969883781","https://openalex.org/W2976695157","https://openalex.org/W2994336423","https://openalex.org/W3009564933","https://openalex.org/W3010858269","https://openalex.org/W3011493986","https://openalex.org/W3021314365","https://openalex.org/W3036495523","https://openalex.org/W3038509227","https://openalex.org/W3045891668","https://openalex.org/W3124002030","https://openalex.org/W3124286771","https://openalex.org/W3129147017","https://openalex.org/W3130714525","https://openalex.org/W3132951757","https://openalex.org/W3135109179","https://openalex.org/W3135398899","https://openalex.org/W3135568666","https://openalex.org/W3142742079","https://openalex.org/W3150062880","https://openalex.org/W3161427599","https://openalex.org/W3178180748","https://openalex.org/W3187997040","https://openalex.org/W3195696782","https://openalex.org/W3202291135","https://openalex.org/W4205092462","https://openalex.org/W4206648042","https://openalex.org/W4213427233","https://openalex.org/W4220695501","https://openalex.org/W4313591290","https://openalex.org/W4385656760"],"related_works":["https://openalex.org/W2140125353","https://openalex.org/W2167743049","https://openalex.org/W211083189","https://openalex.org/W1542859216","https://openalex.org/W2016145875","https://openalex.org/W1966132871","https://openalex.org/W2970982858","https://openalex.org/W2283566633","https://openalex.org/W2410215724","https://openalex.org/W2953410103"],"abstract_inverted_index":{"Several":[0],"studies":[1],"have":[2,28],"introduced":[3],"edge":[4,123],"computing":[5],"and":[6,22,36,51,67,158,171],"blockchain":[7],"into":[8],"the":[9,17,34,41,72,91,112,127,131,144,150,154],"Industrial":[10],"Internet":[11],"of":[12,19,38,53,74,83,114,130,146],"Things":[13],"(IIoT)":[14],"to":[15,32,122,125,137,142],"satisfy":[16],"requirements":[18],"delay-sensitive":[20],"applications":[21],"support":[23],"cross-domain":[24,98],"authentication.":[25],"Although":[26],"there":[27],"been":[29],"many":[30],"protocols":[31,44],"ensure":[33,126],"security":[35,170],"privacy":[37],"devices":[39,54,75],"in":[40,140],"IIoT,":[42],"existing":[43],"still":[45],"suffer":[46],"from":[47,117],"problems.":[48],"Updating":[49],"keys":[50],"pseudonyms":[52,109,116,139],"by":[55],"a":[56,96,104,118],"trusted":[57,119],"third":[58,120],"party":[59,121],"(e.g.,":[60],"certificate":[61],"authority)":[62],"will":[63],"cause":[64,86],"high":[65,87],"communication":[66],"computation":[68],"overhead,":[69],"especially":[70],"when":[71],"number":[73,82,145],"becomes":[76],"much":[77],"larger.":[78],"Furthermore,":[79],"an":[80,166],"increasing":[81],"transactions":[84],"also":[85],"storage":[88,151],"overhead":[89,152],"on":[90,108,153],"blockchain.":[92,155],"Therefore,":[93],"we":[94,102],"propose":[95,103],"blockchain-based":[97],"authentication":[99],"protocol.":[100],"Specifically,":[101],"privacy-preserving":[105],"method":[106],"based":[107],"that":[110,162],"offloads":[111],"task":[113],"generating":[115],"servers":[124],"conditional":[128],"anonymity":[129],"devices.":[132],"The":[133],"device":[134],"is":[135],"allowed":[136],"request":[138],"bulk":[141],"reduce":[143],"transactions,":[147],"thus":[148],"reducing":[149],"Security":[156],"analysis":[157],"experimental":[159],"results":[160],"demonstrate":[161],"our":[163],"scheme":[164],"achieves":[165],"efficient":[167],"tradeoff":[168],"between":[169],"efficiency.":[172]},"counts_by_year":[{"year":2026,"cited_by_count":4},{"year":2025,"cited_by_count":32},{"year":2024,"cited_by_count":11}],"updated_date":"2026-04-10T15:06:20.359241","created_date":"2025-10-10T00:00:00"}
