{"id":"https://openalex.org/W4396941469","doi":"https://doi.org/10.1109/jiot.2024.3401178","title":"SE-CAS: Secure and Efficient Cross-Domain Authentication Scheme Based on Blockchain for Space TT&amp;C Networks","display_name":"SE-CAS: Secure and Efficient Cross-Domain Authentication Scheme Based on Blockchain for Space TT&amp;C Networks","publication_year":2024,"publication_date":"2024-05-15","ids":{"openalex":"https://openalex.org/W4396941469","doi":"https://doi.org/10.1109/jiot.2024.3401178"},"language":"en","primary_location":{"id":"doi:10.1109/jiot.2024.3401178","is_oa":false,"landing_page_url":"https://doi.org/10.1109/jiot.2024.3401178","pdf_url":null,"source":{"id":"https://openalex.org/S2480266640","display_name":"IEEE Internet of Things Journal","issn_l":"2327-4662","issn":["2327-4662","2372-2541"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Internet of Things Journal","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5091752280","display_name":"Chuanhua Wang","orcid":"https://orcid.org/0000-0003-0465-6536"},"institutions":[{"id":"https://openalex.org/I50760025","display_name":"Hangzhou Dianzi University","ror":"https://ror.org/0576gt767","country_code":"CN","type":"education","lineage":["https://openalex.org/I50760025"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Chuanhua Wang","raw_affiliation_strings":["School of Computer and Software, Hangzhou Dianzi University, Hangzhou, China"],"raw_orcid":"https://orcid.org/0000-0003-0465-6536","affiliations":[{"raw_affiliation_string":"School of Computer and Software, Hangzhou Dianzi University, Hangzhou, China","institution_ids":["https://openalex.org/I50760025"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5025619157","display_name":"Yang Zhang","orcid":"https://orcid.org/0000-0003-1217-3876"},"institutions":[{"id":"https://openalex.org/I50760025","display_name":"Hangzhou Dianzi University","ror":"https://ror.org/0576gt767","country_code":"CN","type":"education","lineage":["https://openalex.org/I50760025"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yang Zhang","raw_affiliation_strings":["School of Computer and Software, Hangzhou Dianzi University, Hangzhou, China"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"School of Computer and Software, Hangzhou Dianzi University, Hangzhou, China","institution_ids":["https://openalex.org/I50760025"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100406666","display_name":"Quan Zhang","orcid":"https://orcid.org/0000-0001-7778-4243"},"institutions":[{"id":"https://openalex.org/I50760025","display_name":"Hangzhou Dianzi University","ror":"https://ror.org/0576gt767","country_code":"CN","type":"education","lineage":["https://openalex.org/I50760025"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Quan Zhang","raw_affiliation_strings":["School of Computer and Software, Hangzhou Dianzi University, Hangzhou, China"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"School of Computer and Software, Hangzhou Dianzi University, Hangzhou, China","institution_ids":["https://openalex.org/I50760025"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5038452997","display_name":"Xin Xu","orcid":"https://orcid.org/0000-0003-4625-5482"},"institutions":[{"id":"https://openalex.org/I50760025","display_name":"Hangzhou Dianzi University","ror":"https://ror.org/0576gt767","country_code":"CN","type":"education","lineage":["https://openalex.org/I50760025"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xin Xu","raw_affiliation_strings":["School of Computer and Software, Hangzhou Dianzi University, Hangzhou, China"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"School of Computer and Software, Hangzhou Dianzi University, Hangzhou, China","institution_ids":["https://openalex.org/I50760025"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5060738858","display_name":"Wei Chen","orcid":"https://orcid.org/0000-0003-0121-6172"},"institutions":[{"id":"https://openalex.org/I163151501","display_name":"Hangzhou Normal University","ror":"https://ror.org/014v1mr15","country_code":"CN","type":"education","lineage":["https://openalex.org/I163151501"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Wei Chen","raw_affiliation_strings":["School of Information Science and Technology, Hangzhou Normal University, Hangzhou, China"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"School of Information Science and Technology, Hangzhou Normal University, Hangzhou, China","institution_ids":["https://openalex.org/I163151501"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5005065479","display_name":"Heji Li","orcid":null},"institutions":[{"id":"https://openalex.org/I50760025","display_name":"Hangzhou Dianzi University","ror":"https://ror.org/0576gt767","country_code":"CN","type":"education","lineage":["https://openalex.org/I50760025"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Heji Li","raw_affiliation_strings":["School of Computer and Software, Hangzhou Dianzi University, Hangzhou, China"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"School of Computer and Software, Hangzhou Dianzi University, Hangzhou, China","institution_ids":["https://openalex.org/I50760025"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5091752280"],"corresponding_institution_ids":["https://openalex.org/I50760025"],"apc_list":null,"apc_paid":null,"fwci":7.46,"has_fulltext":false,"cited_by_count":10,"citation_normalized_percentile":{"value":0.97081424,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":90,"max":99},"biblio":{"volume":"11","issue":"16","first_page":"26806","last_page":"26818"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9976999759674072,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9948999881744385,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8397021293640137},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.6980935335159302},{"id":"https://openalex.org/keywords/overhead","display_name":"Overhead (engineering)","score":0.6021303534507751},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.5734750032424927},{"id":"https://openalex.org/keywords/authentication-protocol","display_name":"Authentication protocol","score":0.4927227795124054},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.48583146929740906},{"id":"https://openalex.org/keywords/data-authentication-algorithm","display_name":"Data Authentication Algorithm","score":0.45591434836387634},{"id":"https://openalex.org/keywords/message-authentication-code","display_name":"Message authentication code","score":0.4417576789855957},{"id":"https://openalex.org/keywords/domain","display_name":"Domain (mathematical analysis)","score":0.4344193637371063},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.41899311542510986},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.2985225319862366},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.11193639039993286}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8397021293640137},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.6980935335159302},{"id":"https://openalex.org/C2779960059","wikidata":"https://www.wikidata.org/wiki/Q7113681","display_name":"Overhead (engineering)","level":2,"score":0.6021303534507751},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.5734750032424927},{"id":"https://openalex.org/C21564112","wikidata":"https://www.wikidata.org/wiki/Q4825885","display_name":"Authentication protocol","level":3,"score":0.4927227795124054},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.48583146929740906},{"id":"https://openalex.org/C168970074","wikidata":"https://www.wikidata.org/wiki/Q5227146","display_name":"Data Authentication Algorithm","level":4,"score":0.45591434836387634},{"id":"https://openalex.org/C141492731","wikidata":"https://www.wikidata.org/wiki/Q1052621","display_name":"Message authentication code","level":3,"score":0.4417576789855957},{"id":"https://openalex.org/C36503486","wikidata":"https://www.wikidata.org/wiki/Q11235244","display_name":"Domain (mathematical analysis)","level":2,"score":0.4344193637371063},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.41899311542510986},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.2985225319862366},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.11193639039993286},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/jiot.2024.3401178","is_oa":false,"landing_page_url":"https://doi.org/10.1109/jiot.2024.3401178","pdf_url":null,"source":{"id":"https://openalex.org/S2480266640","display_name":"IEEE Internet of Things Journal","issn_l":"2327-4662","issn":["2327-4662","2372-2541"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Internet of Things Journal","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.4300000071525574,"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16"}],"awards":[{"id":"https://openalex.org/G5692279471","display_name":null,"funder_award_id":"CXJJ2023066","funder_id":"https://openalex.org/F4320338470","funder_display_name":"Science Research Foundation of Zhejiang Province"}],"funders":[{"id":"https://openalex.org/F4320338470","display_name":"Science Research Foundation of Zhejiang Province","ror":null}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":47,"referenced_works":["https://openalex.org/W1570412413","https://openalex.org/W1581058907","https://openalex.org/W1892206924","https://openalex.org/W2014239329","https://openalex.org/W2068411457","https://openalex.org/W2132218667","https://openalex.org/W2527749660","https://openalex.org/W2763619062","https://openalex.org/W2791853684","https://openalex.org/W2799867512","https://openalex.org/W2846593596","https://openalex.org/W2884189562","https://openalex.org/W2905018958","https://openalex.org/W2909485178","https://openalex.org/W2942333515","https://openalex.org/W2944216014","https://openalex.org/W2944781179","https://openalex.org/W2952301413","https://openalex.org/W3010186483","https://openalex.org/W3010858269","https://openalex.org/W3084999539","https://openalex.org/W3090345358","https://openalex.org/W3120878867","https://openalex.org/W3131124683","https://openalex.org/W3163294383","https://openalex.org/W3164664215","https://openalex.org/W3173320566","https://openalex.org/W3181634186","https://openalex.org/W3197053988","https://openalex.org/W3207670224","https://openalex.org/W3207693005","https://openalex.org/W4206784086","https://openalex.org/W4210815602","https://openalex.org/W4223651617","https://openalex.org/W4285129723","https://openalex.org/W4285282745","https://openalex.org/W4285802673","https://openalex.org/W4295832118","https://openalex.org/W4296615519","https://openalex.org/W4308491198","https://openalex.org/W4309151968","https://openalex.org/W4312304622","https://openalex.org/W4319593756","https://openalex.org/W4376480521","https://openalex.org/W4386280834","https://openalex.org/W4389495243","https://openalex.org/W4390774716"],"related_works":["https://openalex.org/W1984916066","https://openalex.org/W2134444393","https://openalex.org/W2034419863","https://openalex.org/W2132505069","https://openalex.org/W2116285675","https://openalex.org/W2166668397","https://openalex.org/W2061637199","https://openalex.org/W2054202867","https://openalex.org/W3048245612","https://openalex.org/W2543818070"],"abstract_inverted_index":{"Recently,":[0],"the":[1,32],"space":[2],"TT&C":[3],"networks":[4],"have":[5],"attracted":[6],"much":[7],"attention,":[8],"as":[9],"they":[10],"can":[11,147],"provide":[12],"users":[13,36,51],"with":[14,129,178],"efficient":[15,69],"and":[16,29,55,68,90,92,109,139,156],"convenient":[17],"information":[18],"services.":[19],"However,":[20],"multiple":[21,175],"independent":[22],"management":[23,82,122],"domains":[24,54,89],"are":[25],"responsible":[26],"for":[27,115,137],"authorization":[28],"authentication":[30,41,71,104,136,181],"in":[31,35,169,173],"network,":[33],"resulting":[34],"needing":[37],"to":[38,48,77,84,112,132],"transmit":[39],"many":[40],"messages":[42,119],"when":[43],"crossing":[44],"domains.":[45],"Therefore,":[46],"how":[47],"efficiently":[49],"authenticate":[50,148],"from":[52,120,150],"different":[53,88,121,151],"protect":[56],"their":[57],"privacy":[58],"has":[59,165],"become":[60],"an":[61],"important":[62],"issue.":[63],"We":[64],"propose":[65,100],"a":[66,79,101],"secure":[67],"cross-domain":[70,103,170],"scheme":[72,146],"(SE-CAS),":[73],"which":[74],"introduces":[75],"blockchain":[76],"build":[78],"distributed":[80],"key":[81],"architecture":[83],"establish":[85],"trust":[86],"between":[87],"record":[91],"share":[93],"parameters":[94],"on":[95],"domain":[96],"nodes.":[97],"Specifically,":[98],"we":[99,124],"blockchain-based":[102],"method":[105],"that":[106,144,163],"utilizes":[107],"signatures":[108,128,131],"pseudonyms":[110],"related":[111],"user":[113],"identity":[114],"authentication.":[116],"For":[117],"massive":[118],"domains,":[123,152],"combine":[125],"lightweight":[126],"BLS":[127],"group":[130],"achieve":[133,153],"batch":[134,180],"anonymous":[135],"multi-users":[138],"tasks.":[140],"Security":[141],"analysis":[142,161],"shows":[143,162],"our":[145],"requests":[149],"conditional":[154],"privacy-preserving,":[155],"track":[157],"malicious":[158],"users.":[159],"Performance":[160],"SE-CAS":[164],"lower":[166],"computational":[167],"overhead":[168],"authentication,":[171],"especially":[172],"handling":[174],"computing":[176],"tasks,":[177],"higher":[179],"efficiency.":[182]},"counts_by_year":[{"year":2026,"cited_by_count":2},{"year":2025,"cited_by_count":7},{"year":2024,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
