{"id":"https://openalex.org/W4408323753","doi":"https://doi.org/10.1109/jiot.2025.3549979","title":"A Robust Key Exchange and Tamper-Resistant Protocol for HAN and NAN Networks in Smart Grids","display_name":"A Robust Key Exchange and Tamper-Resistant Protocol for HAN and NAN Networks in Smart Grids","publication_year":2025,"publication_date":"2025-03-11","ids":{"openalex":"https://openalex.org/W4408323753","doi":"https://doi.org/10.1109/jiot.2025.3549979"},"language":"en","primary_location":{"id":"doi:10.1109/jiot.2025.3549979","is_oa":false,"landing_page_url":"https://doi.org/10.1109/jiot.2025.3549979","pdf_url":null,"source":{"id":"https://openalex.org/S2480266640","display_name":"IEEE Internet of Things Journal","issn_l":"2327-4662","issn":["2327-4662","2372-2541"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Internet of Things Journal","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5041994467","display_name":"Muhammad Faizan Ayub","orcid":"https://orcid.org/0000-0001-7616-0420"},"institutions":[{"id":"https://openalex.org/I150229711","display_name":"University of Electronic Science and Technology of China","ror":"https://ror.org/04qr3zq92","country_code":"CN","type":"education","lineage":["https://openalex.org/I150229711"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Muhammad Faizan Ayub","raw_affiliation_strings":["School of Computer Science and Engineering, University of Electronic Science and Technology of China, Chengdu, Sichuan, China"],"raw_orcid":"https://orcid.org/0000-0001-7616-0420","affiliations":[{"raw_affiliation_string":"School of Computer Science and Engineering, University of Electronic Science and Technology of China, Chengdu, Sichuan, China","institution_ids":["https://openalex.org/I150229711"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100335132","display_name":"Xiong Li","orcid":"https://orcid.org/0000-0001-6619-554X"},"institutions":[{"id":"https://openalex.org/I150229711","display_name":"University of Electronic Science and Technology of China","ror":"https://ror.org/04qr3zq92","country_code":"CN","type":"education","lineage":["https://openalex.org/I150229711"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xiong Li","raw_affiliation_strings":["School of Computer Science and Engineering, University of Electronic Science and Technology of China, Chengdu, Sichuan, China"],"raw_orcid":"https://orcid.org/0000-0001-6619-554X","affiliations":[{"raw_affiliation_string":"School of Computer Science and Engineering, University of Electronic Science and Technology of China, Chengdu, Sichuan, China","institution_ids":["https://openalex.org/I150229711"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5023371922","display_name":"Khalid Mahmood","orcid":"https://orcid.org/0000-0001-5046-7766"},"institutions":[{"id":"https://openalex.org/I75357094","display_name":"National Yunlin University of Science and Technology","ror":"https://ror.org/04qkq2m54","country_code":"TW","type":"education","lineage":["https://openalex.org/I75357094"]}],"countries":["TW"],"is_corresponding":false,"raw_author_name":"Khalid Mahmood","raw_affiliation_strings":["Graduate School of Intelligent Data Science, National Yunlin University of Science and Technology, Douliu, Yunlin, Taiwan"],"raw_orcid":"https://orcid.org/0000-0001-5046-7766","affiliations":[{"raw_affiliation_string":"Graduate School of Intelligent Data Science, National Yunlin University of Science and Technology, Douliu, Yunlin, Taiwan","institution_ids":["https://openalex.org/I75357094"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5017367371","display_name":"Salman Shamshad","orcid":"https://orcid.org/0000-0002-8984-3199"},"institutions":[{"id":"https://openalex.org/I142204992","display_name":"University of Lahore","ror":"https://ror.org/051jrjw38","country_code":"PK","type":"education","lineage":["https://openalex.org/I142204992"]}],"countries":["PK"],"is_corresponding":false,"raw_author_name":"Salman Shamshad","raw_affiliation_strings":["Department of Software Engineering, The University of Lahore, Lahore, Pakistan"],"raw_orcid":"https://orcid.org/0000-0002-8984-3199","affiliations":[{"raw_affiliation_string":"Department of Software Engineering, The University of Lahore, Lahore, Pakistan","institution_ids":["https://openalex.org/I142204992"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5011213078","display_name":"Ashok Kumar Das","orcid":"https://orcid.org/0000-0002-5196-9589"},"institutions":[{"id":"https://openalex.org/I64189192","display_name":"International Institute of Information Technology, Hyderabad","ror":"https://ror.org/05f11g639","country_code":"IN","type":"education","lineage":["https://openalex.org/I64189192"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Ashok Kumar Das","raw_affiliation_strings":["Center for Security, Theory and Algorithmic Research, International Institute of Information Technology Hyderabad, Hyderabad, India","Center for Security, Theory and Algorithmic Research, International Institute of Information Technology, Hyderabad, India"],"raw_orcid":"https://orcid.org/0000-0002-5196-9589","affiliations":[{"raw_affiliation_string":"Center for Security, Theory and Algorithmic Research, International Institute of Information Technology Hyderabad, Hyderabad, India","institution_ids":["https://openalex.org/I64189192"]},{"raw_affiliation_string":"Center for Security, Theory and Algorithmic Research, International Institute of Information Technology, Hyderabad, India","institution_ids":["https://openalex.org/I64189192"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5003735433","display_name":"Guijuan Wang","orcid":"https://orcid.org/0000-0002-5930-9809"},"institutions":[{"id":"https://openalex.org/I152269853","display_name":"Qilu University of Technology","ror":"https://ror.org/04hyzq608","country_code":"CN","type":"education","lineage":["https://openalex.org/I152269853"]},{"id":"https://openalex.org/I4210142748","display_name":"Shandong Academy of Sciences","ror":"https://ror.org/04y8d6y55","country_code":"CN","type":"education","lineage":["https://openalex.org/I4210142748"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Guijuan Wang","raw_affiliation_strings":["Key Laboratory of Computing Power Network and Information Security, Ministry of Education, Shandong Computer Science Center, Qilu University of Technology (Shandong Academy of Sciences), Jinan, China","Ministry of Education Shandong Computer Science Center, Key Laboratory of Computing Power Network and Information Security, Qilu University of Technology (Shandong Academy of Sciences), Jinan, China"],"raw_orcid":"https://orcid.org/0000-0002-5930-9809","affiliations":[{"raw_affiliation_string":"Key Laboratory of Computing Power Network and Information Security, Ministry of Education, Shandong Computer Science Center, Qilu University of Technology (Shandong Academy of Sciences), Jinan, China","institution_ids":["https://openalex.org/I152269853","https://openalex.org/I4210142748"]},{"raw_affiliation_string":"Ministry of Education Shandong Computer Science Center, Key Laboratory of Computing Power Network and Information Security, Qilu University of Technology (Shandong Academy of Sciences), Jinan, China","institution_ids":["https://openalex.org/I152269853","https://openalex.org/I4210142748"]}]}],"institutions":[],"countries_distinct_count":4,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5041994467"],"corresponding_institution_ids":["https://openalex.org/I150229711"],"apc_list":null,"apc_paid":null,"fwci":8.11,"has_fulltext":false,"cited_by_count":6,"citation_normalized_percentile":{"value":0.97155635,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":96,"max":98},"biblio":{"volume":"12","issue":"12","first_page":"21394","last_page":"21403"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":0.9187999963760376,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":0.9187999963760376,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":0.9176999926567078,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.9122999906539917,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7304340600967407},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.6502835750579834},{"id":"https://openalex.org/keywords/key-exchange","display_name":"Key exchange","score":0.6328927874565125},{"id":"https://openalex.org/keywords/protocol","display_name":"Protocol (science)","score":0.5255725979804993},{"id":"https://openalex.org/keywords/smart-grid","display_name":"Smart grid","score":0.5190492272377014},{"id":"https://openalex.org/keywords/robustness","display_name":"Robustness (evolution)","score":0.4896395802497864},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.48657071590423584},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.39526617527008057},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.37128356099128723},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.36776530742645264},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.16220563650131226},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.08520683646202087},{"id":"https://openalex.org/keywords/electrical-engineering","display_name":"Electrical engineering","score":0.0747155249118805},{"id":"https://openalex.org/keywords/medicine","display_name":"Medicine","score":0.06757566332817078}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7304340600967407},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.6502835750579834},{"id":"https://openalex.org/C99674996","wikidata":"https://www.wikidata.org/wiki/Q1414155","display_name":"Key exchange","level":4,"score":0.6328927874565125},{"id":"https://openalex.org/C2780385302","wikidata":"https://www.wikidata.org/wiki/Q367158","display_name":"Protocol (science)","level":3,"score":0.5255725979804993},{"id":"https://openalex.org/C10558101","wikidata":"https://www.wikidata.org/wiki/Q689855","display_name":"Smart grid","level":2,"score":0.5190492272377014},{"id":"https://openalex.org/C63479239","wikidata":"https://www.wikidata.org/wiki/Q7353546","display_name":"Robustness (evolution)","level":3,"score":0.4896395802497864},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.48657071590423584},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.39526617527008057},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.37128356099128723},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.36776530742645264},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.16220563650131226},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.08520683646202087},{"id":"https://openalex.org/C119599485","wikidata":"https://www.wikidata.org/wiki/Q43035","display_name":"Electrical engineering","level":1,"score":0.0747155249118805},{"id":"https://openalex.org/C71924100","wikidata":"https://www.wikidata.org/wiki/Q11190","display_name":"Medicine","level":0,"score":0.06757566332817078},{"id":"https://openalex.org/C185592680","wikidata":"https://www.wikidata.org/wiki/Q2329","display_name":"Chemistry","level":0,"score":0.0},{"id":"https://openalex.org/C142724271","wikidata":"https://www.wikidata.org/wiki/Q7208","display_name":"Pathology","level":1,"score":0.0},{"id":"https://openalex.org/C104317684","wikidata":"https://www.wikidata.org/wiki/Q7187","display_name":"Gene","level":2,"score":0.0},{"id":"https://openalex.org/C55493867","wikidata":"https://www.wikidata.org/wiki/Q7094","display_name":"Biochemistry","level":1,"score":0.0},{"id":"https://openalex.org/C204787440","wikidata":"https://www.wikidata.org/wiki/Q188504","display_name":"Alternative medicine","level":2,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/jiot.2025.3549979","is_oa":false,"landing_page_url":"https://doi.org/10.1109/jiot.2025.3549979","pdf_url":null,"source":{"id":"https://openalex.org/S2480266640","display_name":"IEEE Internet of Things Journal","issn_l":"2327-4662","issn":["2327-4662","2372-2541"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Internet of Things Journal","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G3431386612","display_name":null,"funder_award_id":"62332018","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G5763297898","display_name":null,"funder_award_id":"2025ZNSFSC0497","funder_id":"https://openalex.org/F4320317778","funder_display_name":"Sichuan\u00a0Provincial\u00a0Postdoctoral\u00a0Science Foundation"}],"funders":[{"id":"https://openalex.org/F4320317778","display_name":"Sichuan\u00a0Provincial\u00a0Postdoctoral\u00a0Science Foundation","ror":null},{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":26,"referenced_works":["https://openalex.org/W2029693536","https://openalex.org/W2114440979","https://openalex.org/W2153281696","https://openalex.org/W2613554997","https://openalex.org/W2797008633","https://openalex.org/W2806199268","https://openalex.org/W2901126201","https://openalex.org/W2961729905","https://openalex.org/W2969883781","https://openalex.org/W2979126598","https://openalex.org/W3107032964","https://openalex.org/W3132134440","https://openalex.org/W3206377360","https://openalex.org/W4225654141","https://openalex.org/W4286359159","https://openalex.org/W4313591700","https://openalex.org/W4365459999","https://openalex.org/W4382242981","https://openalex.org/W4388980202","https://openalex.org/W4390113671","https://openalex.org/W4390774716","https://openalex.org/W4391877019","https://openalex.org/W4393140444","https://openalex.org/W4394674274","https://openalex.org/W4394994448","https://openalex.org/W4401022651"],"related_works":["https://openalex.org/W2770593030","https://openalex.org/W3000282663","https://openalex.org/W2751256511","https://openalex.org/W3154990682","https://openalex.org/W2560201613","https://openalex.org/W2123811836","https://openalex.org/W2888183313","https://openalex.org/W3009555975","https://openalex.org/W2096713635","https://openalex.org/W2183361456"],"abstract_inverted_index":{"Smart":[0],"grids":[1],"(SGs)":[2],"rely":[3],"on":[4],"home":[5],"area":[6,11],"networks":[7,12,40,122],"(HANs)":[8],"and":[9,21,38,51,63,87,98,115,120,179,193,208,215,230],"neighborhood":[10],"(NANs)":[13],"to":[14,47,72,81,93,123,137,142,196,220],"ensure":[15],"efficient":[16],"power":[17],"distribution,":[18],"real-time":[19],"monitoring,":[20],"seamless":[22],"communication":[23,34],"between":[24],"smart":[25,143],"devices.":[26],"Despite":[27],"these":[28,75,125],"advantages,":[29],"the":[30,60,95,131,151,168,181,184,200,226],"use":[31],"of":[32,65,84,183],"public":[33],"channels":[35],"in":[36,54,78,212],"HAN":[37,119],"NAN":[39,121],"introduces":[41],"critical":[42],"challenges,":[43,76],"such":[44],"as":[45],"vulnerability":[46],"impersonation,":[48,172],"physical":[49,82,132,139,173],"tampering,":[50],"scalability":[52],"issues":[53,58],"resource-constrained":[55,105,233],"environments.":[56,67,235],"These":[57,223],"compromise":[59],"stability,":[61],"reliability,":[62],"security":[64,160,165,194,229],"SG":[66,106,234],"Existing":[68],"protocols":[69],"often":[70],"fail":[71],"adequately":[73],"address":[74,124],"particularly":[77],"ensuring":[79],"resistance":[80,141],"tampering":[83,140,174],"supply":[85],"lines":[86],"impersonation":[88],"attacks.":[89],"Additionally,":[90,162],"they":[91],"struggle":[92],"minimize":[94],"computation,":[96],"communication,":[97],"energy":[99,216],"costs":[100],"associated":[101],"with":[102,206],"securing":[103],"a":[104,111],"environment.":[107],"Therefore,":[108],"we":[109],"propose":[110],"robust":[112],"key":[113],"exchange":[114],"tamper-resistant":[116],"protocol":[117,129,148,202],"for":[118,232],"limitations.":[126],"The":[127],"proposed":[128,185,201],"leverages":[130],"unclonable":[133],"function":[134],"(PUF)":[135],"mechanism":[136],"offer":[138],"meters.":[144],"We":[145,177],"validate":[146],"our":[147,163,190],"formally":[149],"using":[150],"Random":[152],"or":[153],"Real":[154],"(RoR)":[155],"model,":[156],"which":[157,187],"confirms":[158],"its":[159],"robustness.":[161],"informal":[164],"analysis":[166],"highlights":[167],"protocol\u2019s":[169,191,227],"resilience":[170],"against":[171],"attacks,":[175],"etc.":[176],"analyze":[178],"compare":[180],"performance":[182],"protocol,":[186],"further":[188],"demonstrates":[189],"effectiveness":[192],"compared":[195,219],"competing":[197,221],"protocols.":[198,222],"Moreover,":[199],"achieves":[203],"resource":[204],"efficiency":[205],"45.99%":[207],"58.85%":[209],"substantial":[210],"reductions":[211],"computation":[213],"overhead":[214],"overhead,":[217],"respectively,":[218],"results":[224],"showcase":[225],"enhanced":[228],"practicality":[231]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":5}],"updated_date":"2026-03-27T05:58:40.876381","created_date":"2025-10-10T00:00:00"}
