{"id":"https://openalex.org/W4417337066","doi":"https://doi.org/10.1109/jiot.2025.3644599","title":"AI-Enhanced Zero-Knowledge Authentication for High-Mobility IoT Using Predictive Token Learning","display_name":"AI-Enhanced Zero-Knowledge Authentication for High-Mobility IoT Using Predictive Token Learning","publication_year":2025,"publication_date":"2025-12-15","ids":{"openalex":"https://openalex.org/W4417337066","doi":"https://doi.org/10.1109/jiot.2025.3644599"},"language":null,"primary_location":{"id":"doi:10.1109/jiot.2025.3644599","is_oa":false,"landing_page_url":"https://doi.org/10.1109/jiot.2025.3644599","pdf_url":null,"source":{"id":"https://openalex.org/S2480266640","display_name":"IEEE Internet of Things Journal","issn_l":"2327-4662","issn":["2327-4662","2372-2541"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Internet of Things Journal","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5079811333","display_name":"Shafiq Ahmed","orcid":"https://orcid.org/0000-0001-9599-1887"},"institutions":[{"id":"https://openalex.org/I110002522","display_name":"University of Essex","ror":"https://ror.org/02nkf1q06","country_code":"GB","type":"education","lineage":["https://openalex.org/I110002522"]}],"countries":["GB"],"is_corresponding":true,"raw_author_name":"Shafiq Ahmed","raw_affiliation_strings":["School of Computer Science and Electronic Engineering, University of Essex, Colchester, U.K","School of Computer Science and Electronic Engineering, University of Essex, Colchester, UK"],"raw_orcid":"https://orcid.org/0000-0001-9599-1887","affiliations":[{"raw_affiliation_string":"School of Computer Science and Electronic Engineering, University of Essex, Colchester, U.K","institution_ids":["https://openalex.org/I110002522"]},{"raw_affiliation_string":"School of Computer Science and Electronic Engineering, University of Essex, Colchester, UK","institution_ids":["https://openalex.org/I110002522"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5054251799","display_name":"Mohammad Hossein Anisi","orcid":"https://orcid.org/0000-0001-8414-2708"},"institutions":[{"id":"https://openalex.org/I110002522","display_name":"University of Essex","ror":"https://ror.org/02nkf1q06","country_code":"GB","type":"education","lineage":["https://openalex.org/I110002522"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Mohammad Hossein Anisi","raw_affiliation_strings":["School of Computer Science and Electronic Engineering, University of Essex, Colchester, U.K","School of Computer Science and Electronic Engineering, University of Essex, Colchester, UK"],"raw_orcid":"https://orcid.org/0000-0001-8414-2708","affiliations":[{"raw_affiliation_string":"School of Computer Science and Electronic Engineering, University of Essex, Colchester, U.K","institution_ids":["https://openalex.org/I110002522"]},{"raw_affiliation_string":"School of Computer Science and Electronic Engineering, University of Essex, Colchester, UK","institution_ids":["https://openalex.org/I110002522"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5079811333"],"corresponding_institution_ids":["https://openalex.org/I110002522"],"apc_list":null,"apc_paid":null,"fwci":0.6531,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.77403662,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":96,"max":98},"biblio":{"volume":"13","issue":"5","first_page":"9068","last_page":"9077"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10761","display_name":"Vehicular Ad Hoc Networks (VANETs)","score":0.49810001254081726,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10761","display_name":"Vehicular Ad Hoc Networks (VANETs)","score":0.49810001254081726,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.0544000007212162,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.05169999971985817,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/security-token","display_name":"Security token","score":0.6075999736785889},{"id":"https://openalex.org/keywords/authentication-protocol","display_name":"Authentication protocol","score":0.590399980545044},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.5576000213623047},{"id":"https://openalex.org/keywords/scalability","display_name":"Scalability","score":0.5568000078201294},{"id":"https://openalex.org/keywords/roaming","display_name":"Roaming","score":0.475600004196167},{"id":"https://openalex.org/keywords/latency","display_name":"Latency (audio)","score":0.4309999942779541},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.3953000009059906},{"id":"https://openalex.org/keywords/context","display_name":"Context (archaeology)","score":0.3880000114440918},{"id":"https://openalex.org/keywords/server","display_name":"Server","score":0.3804999887943268},{"id":"https://openalex.org/keywords/elliptic-curve-cryptography","display_name":"Elliptic curve cryptography","score":0.36419999599456787}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.86080002784729},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.6733999848365784},{"id":"https://openalex.org/C48145219","wikidata":"https://www.wikidata.org/wiki/Q1335365","display_name":"Security token","level":2,"score":0.6075999736785889},{"id":"https://openalex.org/C21564112","wikidata":"https://www.wikidata.org/wiki/Q4825885","display_name":"Authentication protocol","level":3,"score":0.590399980545044},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.5576000213623047},{"id":"https://openalex.org/C48044578","wikidata":"https://www.wikidata.org/wiki/Q727490","display_name":"Scalability","level":2,"score":0.5568000078201294},{"id":"https://openalex.org/C194498986","wikidata":"https://www.wikidata.org/wiki/Q680016","display_name":"Roaming","level":2,"score":0.475600004196167},{"id":"https://openalex.org/C82876162","wikidata":"https://www.wikidata.org/wiki/Q17096504","display_name":"Latency (audio)","level":2,"score":0.4309999942779541},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.3953000009059906},{"id":"https://openalex.org/C2779343474","wikidata":"https://www.wikidata.org/wiki/Q3109175","display_name":"Context (archaeology)","level":2,"score":0.3880000114440918},{"id":"https://openalex.org/C93996380","wikidata":"https://www.wikidata.org/wiki/Q44127","display_name":"Server","level":2,"score":0.3804999887943268},{"id":"https://openalex.org/C167615521","wikidata":"https://www.wikidata.org/wiki/Q1048911","display_name":"Elliptic curve cryptography","level":4,"score":0.36419999599456787},{"id":"https://openalex.org/C141492731","wikidata":"https://www.wikidata.org/wiki/Q1052621","display_name":"Message authentication code","level":3,"score":0.3384999930858612},{"id":"https://openalex.org/C194699767","wikidata":"https://www.wikidata.org/wiki/Q7878662","display_name":"Multi-factor authentication","level":4,"score":0.322299987077713},{"id":"https://openalex.org/C527821871","wikidata":"https://www.wikidata.org/wiki/Q228502","display_name":"Access control","level":2,"score":0.3151000142097473},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.3102000057697296},{"id":"https://openalex.org/C46637626","wikidata":"https://www.wikidata.org/wiki/Q6693015","display_name":"Low latency (capital markets)","level":2,"score":0.30959999561309814},{"id":"https://openalex.org/C38822068","wikidata":"https://www.wikidata.org/wiki/Q131406","display_name":"Denial-of-service attack","level":3,"score":0.3034999966621399},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3005000054836273},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.29490000009536743},{"id":"https://openalex.org/C168970074","wikidata":"https://www.wikidata.org/wiki/Q5227146","display_name":"Data Authentication Algorithm","level":4,"score":0.2930000126361847},{"id":"https://openalex.org/C33884865","wikidata":"https://www.wikidata.org/wiki/Q1254335","display_name":"Cryptographic protocol","level":3,"score":0.2854999899864197},{"id":"https://openalex.org/C2781221063","wikidata":"https://www.wikidata.org/wiki/Q6944186","display_name":"Mutual authentication","level":3,"score":0.27869999408721924},{"id":"https://openalex.org/C115537543","wikidata":"https://www.wikidata.org/wiki/Q165596","display_name":"Cache","level":2,"score":0.26759999990463257},{"id":"https://openalex.org/C177066171","wikidata":"https://www.wikidata.org/wiki/Q284935","display_name":"Universal Plug and Play","level":2,"score":0.2632000148296356},{"id":"https://openalex.org/C99138194","wikidata":"https://www.wikidata.org/wiki/Q183427","display_name":"Hash function","level":2,"score":0.2606000006198883},{"id":"https://openalex.org/C2778000800","wikidata":"https://www.wikidata.org/wiki/Q830043","display_name":"Handshake","level":3,"score":0.2574000060558319},{"id":"https://openalex.org/C167169670","wikidata":"https://www.wikidata.org/wiki/Q1824705","display_name":"Lightweight Extensible Authentication Protocol","level":4,"score":0.25690001249313354},{"id":"https://openalex.org/C45374587","wikidata":"https://www.wikidata.org/wiki/Q12525525","display_name":"Computation","level":2,"score":0.25270000100135803},{"id":"https://openalex.org/C94461902","wikidata":"https://www.wikidata.org/wiki/Q2762418","display_name":"Formal proof","level":3,"score":0.2524000108242035},{"id":"https://openalex.org/C108037233","wikidata":"https://www.wikidata.org/wiki/Q11375","display_name":"Wireless network","level":3,"score":0.2506999969482422}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/jiot.2025.3644599","is_oa":false,"landing_page_url":"https://doi.org/10.1109/jiot.2025.3644599","pdf_url":null,"source":{"id":"https://openalex.org/S2480266640","display_name":"IEEE Internet of Things Journal","issn_l":"2327-4662","issn":["2327-4662","2372-2541"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Internet of Things Journal","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":[],"abstract_inverted_index":{"High-mobility":[0],"Internet":[1],"of":[2],"Things":[3],"(IoT)":[4],"for":[5,82,181],"Vehicle-to-Grid":[6],"(V2G)":[7],"Demand":[8],"Response":[9],"(DR),":[10],"including":[11],"roaming":[12,183],"between":[13],"Charge":[14],"Point":[15],"Operators":[16],"(CPOs),":[17],"requires":[18],"privacy-preserving":[19],"authentication":[20,172,221,240],"with":[21,41,71,93,151,231],"sub-1":[22],"ms":[23],"responses":[24],"and":[25,49,61,69,89,130,160,193,225],"cross-domain":[26],"scalability":[27],"as":[28,46],"devices":[29],"exceed":[30],"200km/h.":[31],"Mechanisms":[32],"must":[33],"run":[34],"on":[35,158],"constrained":[36],"hardware":[37],"while":[38,229],"remaining":[39],"compatible":[40],"EV-charging":[42],"message":[43],"flows":[44],"such":[45],"ISO":[47],"15118\u201320":[48],"OCPP":[50],"2.0.1.":[51],"Many":[52],"deployed":[53],"schemes":[54],"re-authenticate":[55],"from":[56,134],"scratch,":[57],"which":[58],"inflates":[59],"computation":[60,218],"airtime;":[62],"static":[63],"credentials":[64],"also":[65],"ignore":[66],"trajectory":[67,119,194],"context":[68],"struggle":[70],"rapid":[72],"mobility.":[73],"We":[74,186],"present":[75],"a":[76,238],"Zero-Knowledge":[77],"Proof-based":[78],"Authentication":[79],"Scheme":[80],"(ZKPAS)":[81],"V2G/DR":[83,232],"that":[84],"proves":[85],"possession":[86],"without":[87,117],"disclosure":[88],"replaces":[90],"heavy":[91],"handshakes":[92],"compact,":[94],"mobility-aware":[95],"proofs,":[96],"targeting":[97],"latency":[98,222],"<italic":[99,135,141,144,177],"xmlns:mml=\"http://www.w3.org/1998/Math/MathML\"":[100,136,138,142,145,175,178,210],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">L</i>":[101],"<":[102],"1ms.":[103],"ZKPAS":[104,216],"integrates":[105],"four":[106],"elements.":[107],"(i)":[108],"Schnorr-style":[109],"zero-knowledge":[110],"proofs":[111],"over":[112],"elliptic":[113],"curves":[114],"validate":[115],"identity":[116],"exposing":[118],"or":[120],"long-term":[121],"identifiers.":[122],"(ii)":[123],"Sliding-window":[124],"tokens":[125],"bind":[126],"to":[127,140,189],"DR":[128],"windows":[129],"reduce":[131],"per-segment":[132],"communication":[133],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">O</i>(<italic":[137],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">n</i>)":[139],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">O</i>(log":[143],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">n</i>).":[146],"(iii)":[147],"Predictive":[148],"token":[149,166],"generation":[150],"Long":[152],"Short-Term":[153],"Memory":[154],"(LSTM)":[155],"models":[156],"trained":[157],"GeoLife":[159],"T-Drive":[161],"pre-computes":[162],"material,":[163],"yielding":[164],"84.7%":[165],"reuse":[167],"along":[168],"trajectories.":[169],"(iv)":[170],"Cross-domain":[171],"employs":[173],"(<italic":[174],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">t</i>,":[176],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">n</i>)-threshold":[179],"cryptography":[180],"Byzantine-tolerant":[182],"across":[184],"operators.":[185],"prove":[187],"resistance":[188],"impersonation,":[190],"replay,":[191],"man-in-the-middle,":[192],"inference;":[195],"under":[196],"the":[197,202],"Computational":[198],"Diffie\u2013Hellman":[199],"Problem":[200],"(CDHP),":[201],"adversary\u2019s":[203],"success":[204,241],"probability":[205],"satisfies":[206],"Pr[break]":[207],"\u2264":[208],"2<sup":[209],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">\u2212\u03bb</sup>.":[211],"On":[212],"real":[213],"transportation":[214],"topologies,":[215],"cuts":[217],"by":[219,223,227],"71.8%,":[220],"93.9%,":[224],"energy":[226],"69.5%,":[228],"interfacing":[230],"control":[233],"flows.":[234],"The":[235],"protocol":[236],"sustains":[237],"98.5%":[239],"rate":[242],"at":[243],"250km/h.":[244]},"counts_by_year":[{"year":2026,"cited_by_count":1}],"updated_date":"2026-02-21T06:11:54.161237","created_date":"2025-12-15T00:00:00"}
