{"id":"https://openalex.org/W4416798140","doi":"https://doi.org/10.1109/jiot.2025.3638718","title":"Lightweight and Trustworthy Authentication and Data Transmission Schemes in the Industrial IoT","display_name":"Lightweight and Trustworthy Authentication and Data Transmission Schemes in the Industrial IoT","publication_year":2025,"publication_date":"2025-11-28","ids":{"openalex":"https://openalex.org/W4416798140","doi":"https://doi.org/10.1109/jiot.2025.3638718"},"language":null,"primary_location":{"id":"doi:10.1109/jiot.2025.3638718","is_oa":false,"landing_page_url":"https://doi.org/10.1109/jiot.2025.3638718","pdf_url":null,"source":{"id":"https://openalex.org/S2480266640","display_name":"IEEE Internet of Things Journal","issn_l":"2327-4662","issn":["2327-4662","2372-2541"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Internet of Things Journal","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5012831842","display_name":"Yebo Gu","orcid":"https://orcid.org/0000-0002-4847-7567"},"institutions":[{"id":"https://openalex.org/I10660446","display_name":"Kunming University of Science and Technology","ror":"https://ror.org/00xyeez13","country_code":"CN","type":"education","lineage":["https://openalex.org/I10660446"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Yebo Gu","raw_affiliation_strings":["Faculty of Information Engineering and Automation, Kunming University of Science and Technology, Kunming, China","Faculty of Information Engineering and Automation, Kunming University of Science and Technology, China"],"affiliations":[{"raw_affiliation_string":"Faculty of Information Engineering and Automation, Kunming University of Science and Technology, Kunming, China","institution_ids":["https://openalex.org/I10660446"]},{"raw_affiliation_string":"Faculty of Information Engineering and Automation, Kunming University of Science and Technology, China","institution_ids":["https://openalex.org/I10660446"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Xiang Dai","orcid":"https://orcid.org/0009-0002-1619-3233"},"institutions":[{"id":"https://openalex.org/I10660446","display_name":"Kunming University of Science and Technology","ror":"https://ror.org/00xyeez13","country_code":"CN","type":"education","lineage":["https://openalex.org/I10660446"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xiang Dai","raw_affiliation_strings":["Faculty of Information Engineering and Automation, Kunming University of Science and Technology, Kunming, China","Faculty of Information Engineering and Automation, Kunming University of Science and Technology, China"],"affiliations":[{"raw_affiliation_string":"Faculty of Information Engineering and Automation, Kunming University of Science and Technology, Kunming, China","institution_ids":["https://openalex.org/I10660446"]},{"raw_affiliation_string":"Faculty of Information Engineering and Automation, Kunming University of Science and Technology, China","institution_ids":["https://openalex.org/I10660446"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5003333516","display_name":"Tao Shen","orcid":"https://orcid.org/0000-0003-1273-7950"},"institutions":[{"id":"https://openalex.org/I10660446","display_name":"Kunming University of Science and Technology","ror":"https://ror.org/00xyeez13","country_code":"CN","type":"education","lineage":["https://openalex.org/I10660446"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Tao Shen","raw_affiliation_strings":["Faculty of Information Engineering and Automation, Kunming University of Science and Technology, Kunming, China","Faculty of Information Engineering and Automation, Kunming University of Science and Technology, China"],"affiliations":[{"raw_affiliation_string":"Faculty of Information Engineering and Automation, Kunming University of Science and Technology, Kunming, China","institution_ids":["https://openalex.org/I10660446"]},{"raw_affiliation_string":"Faculty of Information Engineering and Automation, Kunming University of Science and Technology, China","institution_ids":["https://openalex.org/I10660446"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5114585166","display_name":"Hui Li","orcid":"https://orcid.org/0009-0005-1016-0790"},"institutions":[{"id":"https://openalex.org/I10660446","display_name":"Kunming University of Science and Technology","ror":"https://ror.org/00xyeez13","country_code":"CN","type":"education","lineage":["https://openalex.org/I10660446"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Hui Li","raw_affiliation_strings":["Faculty of Information Engineering and Automation, Kunming University of Science and Technology, Kunming, China","Faculty of Information Engineering and Automation, Kunming University of Science and Technology, China"],"affiliations":[{"raw_affiliation_string":"Faculty of Information Engineering and Automation, Kunming University of Science and Technology, Kunming, China","institution_ids":["https://openalex.org/I10660446"]},{"raw_affiliation_string":"Faculty of Information Engineering and Automation, Kunming University of Science and Technology, China","institution_ids":["https://openalex.org/I10660446"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5012831842"],"corresponding_institution_ids":["https://openalex.org/I10660446"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.36292911,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"13","issue":"4","first_page":"7288","last_page":"7304"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":0.5105000138282776,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":0.5105000138282776,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.13179999589920044,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.08619999885559082,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/artificial-noise","display_name":"Artificial noise","score":0.8867999911308289},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.6571000218391418},{"id":"https://openalex.org/keywords/robustness","display_name":"Robustness (evolution)","score":0.6259999871253967},{"id":"https://openalex.org/keywords/secrecy","display_name":"Secrecy","score":0.5238000154495239},{"id":"https://openalex.org/keywords/data-transmission","display_name":"Data transmission","score":0.4823000133037567},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.4569000005722046},{"id":"https://openalex.org/keywords/elliptic-curve-cryptography","display_name":"Elliptic curve cryptography","score":0.41350001096725464},{"id":"https://openalex.org/keywords/noise","display_name":"Noise (video)","score":0.4027999937534332},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.39469999074935913}],"concepts":[{"id":"https://openalex.org/C2780909371","wikidata":"https://www.wikidata.org/wiki/Q4801092","display_name":"Artificial noise","level":4,"score":0.8867999911308289},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8147000074386597},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.6571000218391418},{"id":"https://openalex.org/C63479239","wikidata":"https://www.wikidata.org/wiki/Q7353546","display_name":"Robustness (evolution)","level":3,"score":0.6259999871253967},{"id":"https://openalex.org/C2776452267","wikidata":"https://www.wikidata.org/wiki/Q1503443","display_name":"Secrecy","level":2,"score":0.5238000154495239},{"id":"https://openalex.org/C557945733","wikidata":"https://www.wikidata.org/wiki/Q389772","display_name":"Data transmission","level":2,"score":0.4823000133037567},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.4569000005722046},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.4449000060558319},{"id":"https://openalex.org/C167615521","wikidata":"https://www.wikidata.org/wiki/Q1048911","display_name":"Elliptic curve cryptography","level":4,"score":0.41350001096725464},{"id":"https://openalex.org/C99498987","wikidata":"https://www.wikidata.org/wiki/Q2210247","display_name":"Noise (video)","level":3,"score":0.4027999937534332},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.39469999074935913},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.39340001344680786},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.38449999690055847},{"id":"https://openalex.org/C153701036","wikidata":"https://www.wikidata.org/wiki/Q659974","display_name":"Trustworthiness","level":2,"score":0.37049999833106995},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.3671000003814697},{"id":"https://openalex.org/C761482","wikidata":"https://www.wikidata.org/wiki/Q118093","display_name":"Transmission (telecommunications)","level":2,"score":0.3508000075817108},{"id":"https://openalex.org/C81860439","wikidata":"https://www.wikidata.org/wiki/Q251212","display_name":"Internet of Things","level":2,"score":0.34439998865127563},{"id":"https://openalex.org/C141492731","wikidata":"https://www.wikidata.org/wiki/Q1052621","display_name":"Message authentication code","level":3,"score":0.3425999879837036},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.33329999446868896},{"id":"https://openalex.org/C148063708","wikidata":"https://www.wikidata.org/wiki/Q5072511","display_name":"Channel state information","level":3,"score":0.314300000667572},{"id":"https://openalex.org/C10511746","wikidata":"https://www.wikidata.org/wiki/Q899388","display_name":"Data security","level":3,"score":0.3043000102043152},{"id":"https://openalex.org/C47191418","wikidata":"https://www.wikidata.org/wiki/Q3510462","display_name":"Information-theoretic security","level":3,"score":0.29260000586509705},{"id":"https://openalex.org/C67186912","wikidata":"https://www.wikidata.org/wiki/Q367664","display_name":"Data modeling","level":2,"score":0.2892000079154968},{"id":"https://openalex.org/C152124472","wikidata":"https://www.wikidata.org/wiki/Q1204361","display_name":"Redundancy (engineering)","level":2,"score":0.2874999940395355},{"id":"https://openalex.org/C127162648","wikidata":"https://www.wikidata.org/wiki/Q16858953","display_name":"Channel (broadcasting)","level":2,"score":0.2720000147819519},{"id":"https://openalex.org/C2781221063","wikidata":"https://www.wikidata.org/wiki/Q6944186","display_name":"Mutual authentication","level":3,"score":0.26339998841285706},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.26249998807907104},{"id":"https://openalex.org/C24590314","wikidata":"https://www.wikidata.org/wiki/Q336038","display_name":"Wireless sensor network","level":2,"score":0.2502000033855438}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/jiot.2025.3638718","is_oa":false,"landing_page_url":"https://doi.org/10.1109/jiot.2025.3638718","pdf_url":null,"source":{"id":"https://openalex.org/S2480266640","display_name":"IEEE Internet of Things Journal","issn_l":"2327-4662","issn":["2327-4662","2372-2541"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Internet of Things Journal","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G4847981501","display_name":null,"funder_award_id":"62561033","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":52,"referenced_works":["https://openalex.org/W1548644355","https://openalex.org/W1995875735","https://openalex.org/W2007529001","https://openalex.org/W2029693536","https://openalex.org/W2619678842","https://openalex.org/W2805611890","https://openalex.org/W2921730081","https://openalex.org/W2945323297","https://openalex.org/W2963450321","https://openalex.org/W3039955005","https://openalex.org/W3098001053","https://openalex.org/W3103955455","https://openalex.org/W3114041368","https://openalex.org/W3129121776","https://openalex.org/W3196422707","https://openalex.org/W3217497121","https://openalex.org/W4206822447","https://openalex.org/W4210425650","https://openalex.org/W4280603975","https://openalex.org/W4285184689","https://openalex.org/W4288391433","https://openalex.org/W4327662949","https://openalex.org/W4362672268","https://openalex.org/W4365146848","https://openalex.org/W4379616861","https://openalex.org/W4384158405","https://openalex.org/W4390905877","https://openalex.org/W4390969538","https://openalex.org/W4391020042","https://openalex.org/W4391154653","https://openalex.org/W4391305810","https://openalex.org/W4391310790","https://openalex.org/W4392397324","https://openalex.org/W4392522359","https://openalex.org/W4392930496","https://openalex.org/W4393033180","https://openalex.org/W4395701645","https://openalex.org/W4396853161","https://openalex.org/W4400033179","https://openalex.org/W4400770731","https://openalex.org/W4400877774","https://openalex.org/W4401509683","https://openalex.org/W4402770501","https://openalex.org/W4403245182","https://openalex.org/W4403534888","https://openalex.org/W4404102514","https://openalex.org/W4405907305","https://openalex.org/W4406047564","https://openalex.org/W4407199541","https://openalex.org/W4409886417","https://openalex.org/W4412444855","https://openalex.org/W7124312247"],"related_works":[],"abstract_inverted_index":{"The":[0],"industrial":[1,162],"internet":[2,163],"of":[3,110,164],"things":[4,165],"tightly":[5],"integrates":[6],"heterogeneous":[7],"sensing":[8],"and":[9,87,102,108,132,139,167],"communication":[10],"devices,":[11],"but":[12],"it":[13],"remains":[14],"difficult":[15],"to":[16,54,57,92,98,135],"obtain":[17],"lightweight":[18],"authentication":[19,64,166],"while":[20,95],"simultaneously":[21],"protecting":[22],"the":[23,84,106],"post-authentication":[24],"data":[25],"plane.":[26],"This":[27],"paper":[28],"addresses":[29],"both":[30],"gaps":[31],"with":[32,65,151],"a":[33],"unified":[34],"<italic":[35,42,72],"xmlns:mml=\"http://www.w3.org/1998/Math/MathML\"":[36,43,73],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">dual-security</i>":[37],"framework.":[38],"First,":[39],"we":[40,69],"propose":[41],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">channel-assisted":[44],"hyperelliptic":[45,112,148],"curve":[46,113,149],"cryptography</i>":[47],",":[48],"which":[49],"binds":[50],"channel":[51],"state":[52],"information":[53],"hyperelliptic-curve":[55],"primitives":[56],"derive":[58],"one-time":[59],"key":[60],"(OTK)":[61],"for":[62,161],"mutual":[63],"low":[66],"overhead.":[67],"Second,":[68],"introduce":[70],"an":[71,115],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">OTK-based":[74],"non-orthogonal":[75,124,141,153],"artificial":[76,81,125,137,142,154],"noise</i>":[77],"mechanism":[78],"that":[79,122],"synthesizes":[80],"noise":[82,126,138],"from":[83],"negotiated":[85],"OTK":[86],"optimizes":[88],"its":[89],"power":[90],"allocation":[91],"jam":[93],"eavesdroppers":[94],"remaining":[96],"transparent":[97],"legitimate":[99],"receivers.":[100],"Security":[101],"cost":[103],"analyses":[104],"highlight":[105],"robustness":[107],"efficiency":[109],"channel-assisted":[111,147],"cryptography;":[114],"NS-3":[116],"implementation":[117],"confirms":[118],"practicality.":[119],"Simulations":[120],"show":[121],"OTK-based":[123,140,152],"increases":[127],"secrecy":[128],"capacity":[129],"by":[130],"61.11%":[131],"167.74%":[133],"relative":[134],"traditional":[136],"noise,":[143],"respectively.":[144],"We":[145],"integrate":[146],"cryptography":[150],"noise.":[155],"Together,":[156],"they":[157],"provide":[158],"end-to-end":[159],"protection":[160],"communication.":[168]},"counts_by_year":[],"updated_date":"2026-04-09T08:11:56.329763","created_date":"2025-11-28T00:00:00"}
