{"id":"https://openalex.org/W4417470041","doi":"https://doi.org/10.1109/jiot.2025.3645889","title":"LCH-AKA: Identity Authentication and Key Agreement Scheme of Lightweight Cross-Domain Heterogeneous Network Based on PUF","display_name":"LCH-AKA: Identity Authentication and Key Agreement Scheme of Lightweight Cross-Domain Heterogeneous Network Based on PUF","publication_year":2025,"publication_date":"2025-12-18","ids":{"openalex":"https://openalex.org/W4417470041","doi":"https://doi.org/10.1109/jiot.2025.3645889"},"language":null,"primary_location":{"id":"doi:10.1109/jiot.2025.3645889","is_oa":false,"landing_page_url":"https://doi.org/10.1109/jiot.2025.3645889","pdf_url":null,"source":{"id":"https://openalex.org/S2480266640","display_name":"IEEE Internet of Things Journal","issn_l":"2327-4662","issn":["2327-4662","2372-2541"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Internet of Things Journal","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5003035311","display_name":"Xiaolan Zhou","orcid":"https://orcid.org/0000-0002-8875-2113"},"institutions":[{"id":"https://openalex.org/I121296143","display_name":"Hunan University of Science and Technology","ror":"https://ror.org/02m9vrb24","country_code":"CN","type":"education","lineage":["https://openalex.org/I121296143"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Xiaolan Zhou","raw_affiliation_strings":["School of Computer Science and Engineering, Hunan University of Science and Technology, Xiangtan, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Engineering, Hunan University of Science and Technology, Xiangtan, China","institution_ids":["https://openalex.org/I121296143"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100447206","display_name":"Kang Chen","orcid":"https://orcid.org/0000-0003-3148-8128"},"institutions":[{"id":"https://openalex.org/I121296143","display_name":"Hunan University of Science and Technology","ror":"https://ror.org/02m9vrb24","country_code":"CN","type":"education","lineage":["https://openalex.org/I121296143"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Kang Chen","raw_affiliation_strings":["School of Computer Science and Engineering, Hunan University of Science and Technology, Xiangtan, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Engineering, Hunan University of Science and Technology, Xiangtan, China","institution_ids":["https://openalex.org/I121296143"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5103326382","display_name":"Yuzhen Liu","orcid":"https://orcid.org/0000-0001-5519-9916"},"institutions":[{"id":"https://openalex.org/I121296143","display_name":"Hunan University of Science and Technology","ror":"https://ror.org/02m9vrb24","country_code":"CN","type":"education","lineage":["https://openalex.org/I121296143"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yuzhen Liu","raw_affiliation_strings":["School of Computer Science and Engineering, Hunan University of Science and Technology, Xiangtan, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Engineering, Hunan University of Science and Technology, Xiangtan, China","institution_ids":["https://openalex.org/I121296143"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100675287","display_name":"Biao Hu","orcid":"https://orcid.org/0009-0002-2830-8202"},"institutions":[{"id":"https://openalex.org/I121296143","display_name":"Hunan University of Science and Technology","ror":"https://ror.org/02m9vrb24","country_code":"CN","type":"education","lineage":["https://openalex.org/I121296143"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Biao Hu","raw_affiliation_strings":["School of Computer Science and Engineering, Hunan University of Science and Technology, Xiangtan, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Engineering, Hunan University of Science and Technology, Xiangtan, China","institution_ids":["https://openalex.org/I121296143"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100524095","display_name":"Jiasheng Yin","orcid":null},"institutions":[{"id":"https://openalex.org/I121296143","display_name":"Hunan University of Science and Technology","ror":"https://ror.org/02m9vrb24","country_code":"CN","type":"education","lineage":["https://openalex.org/I121296143"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jiasheng Yin","raw_affiliation_strings":["School of Computer Science and Engineering, Hunan University of Science and Technology, Xiangtan, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Engineering, Hunan University of Science and Technology, Xiangtan, China","institution_ids":["https://openalex.org/I121296143"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100369107","display_name":"Xiaoliang Wang","orcid":"https://orcid.org/0000-0001-5479-5994"},"institutions":[{"id":"https://openalex.org/I121296143","display_name":"Hunan University of Science and Technology","ror":"https://ror.org/02m9vrb24","country_code":"CN","type":"education","lineage":["https://openalex.org/I121296143"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xiaoliang Wang","raw_affiliation_strings":["School of Computer Science and Engineering, Hunan University of Science and Technology, Xiangtan, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Engineering, Hunan University of Science and Technology, Xiangtan, China","institution_ids":["https://openalex.org/I121296143"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5063188437","display_name":"Kuan\u2010Ching Li","orcid":"https://orcid.org/0000-0003-1381-4364"},"institutions":[{"id":"https://openalex.org/I121296143","display_name":"Hunan University of Science and Technology","ror":"https://ror.org/02m9vrb24","country_code":"CN","type":"education","lineage":["https://openalex.org/I121296143"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Kuanching Li","raw_affiliation_strings":["School of Computer Science and Engineering, Hunan University of Science and Technology, Xiangtan, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Engineering, Hunan University of Science and Technology, Xiangtan, China","institution_ids":["https://openalex.org/I121296143"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5091237917","display_name":"Zhengang Liang","orcid":"https://orcid.org/0009-0004-7526-5617"},"institutions":[{"id":"https://openalex.org/I4210146710","display_name":"Mayo Clinic in Florida","ror":"https://ror.org/03zzw1w08","country_code":"US","type":"healthcare","lineage":["https://openalex.org/I1330342723","https://openalex.org/I4210146710"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Zhewei Liang","raw_affiliation_strings":["Department of Quantitative Health Sciences, Rochester, MN, USA","Department of Quantitative Health Sciences, Mayo Clinic, Rochester, MN, USA"],"affiliations":[{"raw_affiliation_string":"Department of Quantitative Health Sciences, Rochester, MN, USA","institution_ids":[]},{"raw_affiliation_string":"Department of Quantitative Health Sciences, Mayo Clinic, Rochester, MN, USA","institution_ids":["https://openalex.org/I4210146710"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":8,"corresponding_author_ids":["https://openalex.org/A5003035311"],"corresponding_institution_ids":["https://openalex.org/I121296143"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.43790039,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"13","issue":"6","first_page":"11507","last_page":"11523"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.5788000226020813,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.5788000226020813,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.16140000522136688,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":0.03720000013709068,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.6406999826431274},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.49939998984336853},{"id":"https://openalex.org/keywords/heterogeneous-network","display_name":"Heterogeneous network","score":0.49390000104904175},{"id":"https://openalex.org/keywords/mutual-authentication","display_name":"Mutual authentication","score":0.38940000534057617},{"id":"https://openalex.org/keywords/edge-computing","display_name":"Edge computing","score":0.3549000024795532},{"id":"https://openalex.org/keywords/software-deployment","display_name":"Software deployment","score":0.3303999900817871},{"id":"https://openalex.org/keywords/certificate","display_name":"Certificate","score":0.32350000739097595},{"id":"https://openalex.org/keywords/vulnerability","display_name":"Vulnerability (computing)","score":0.319599986076355}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8256000280380249},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.6406999826431274},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.5218999981880188},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.49939998984336853},{"id":"https://openalex.org/C158207573","wikidata":"https://www.wikidata.org/wiki/Q5747224","display_name":"Heterogeneous network","level":4,"score":0.49390000104904175},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.4302000105381012},{"id":"https://openalex.org/C2781221063","wikidata":"https://www.wikidata.org/wiki/Q6944186","display_name":"Mutual authentication","level":3,"score":0.38940000534057617},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3605000078678131},{"id":"https://openalex.org/C2778456923","wikidata":"https://www.wikidata.org/wiki/Q5337692","display_name":"Edge computing","level":3,"score":0.3549000024795532},{"id":"https://openalex.org/C105339364","wikidata":"https://www.wikidata.org/wiki/Q2297740","display_name":"Software deployment","level":2,"score":0.3303999900817871},{"id":"https://openalex.org/C96865113","wikidata":"https://www.wikidata.org/wiki/Q2946816","display_name":"Certificate","level":2,"score":0.32350000739097595},{"id":"https://openalex.org/C95713431","wikidata":"https://www.wikidata.org/wiki/Q631425","display_name":"Vulnerability (computing)","level":2,"score":0.319599986076355},{"id":"https://openalex.org/C141492731","wikidata":"https://www.wikidata.org/wiki/Q1052621","display_name":"Message authentication code","level":3,"score":0.3107999861240387},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.30720001459121704},{"id":"https://openalex.org/C21564112","wikidata":"https://www.wikidata.org/wiki/Q4825885","display_name":"Authentication protocol","level":3,"score":0.29440000653266907},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.2806999981403351},{"id":"https://openalex.org/C81860439","wikidata":"https://www.wikidata.org/wiki/Q251212","display_name":"Internet of Things","level":2,"score":0.275299996137619},{"id":"https://openalex.org/C2780801425","wikidata":"https://www.wikidata.org/wiki/Q5164392","display_name":"Construct (python library)","level":2,"score":0.26080000400543213},{"id":"https://openalex.org/C2742236","wikidata":"https://www.wikidata.org/wiki/Q924713","display_name":"Efficient energy use","level":2,"score":0.25760000944137573},{"id":"https://openalex.org/C72648740","wikidata":"https://www.wikidata.org/wiki/Q658476","display_name":"Public key infrastructure","level":4,"score":0.2567000091075897},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.2565000057220459},{"id":"https://openalex.org/C46637626","wikidata":"https://www.wikidata.org/wiki/Q6693015","display_name":"Low latency (capital markets)","level":2,"score":0.25529998540878296}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/jiot.2025.3645889","is_oa":false,"landing_page_url":"https://doi.org/10.1109/jiot.2025.3645889","pdf_url":null,"source":{"id":"https://openalex.org/S2480266640","display_name":"IEEE Internet of Things Journal","issn_l":"2327-4662","issn":["2327-4662","2372-2541"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Internet of Things Journal","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G3200919547","display_name":null,"funder_award_id":"2023JJ30266","funder_id":"https://openalex.org/F4320322843","funder_display_name":"Natural Science Foundation of\u00a0Hunan Province"},{"id":"https://openalex.org/G5023413080","display_name":null,"funder_award_id":"2025JJ50399","funder_id":"https://openalex.org/F4320322843","funder_display_name":"Natural Science Foundation of\u00a0Hunan Province"},{"id":"https://openalex.org/G8418724628","display_name":null,"funder_award_id":"62372168","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G8431938312","display_name":null,"funder_award_id":"2022-44-8","funder_id":"https://openalex.org/F4320326692","funder_display_name":"Hunan University of Science and Technology"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320322843","display_name":"Natural Science Foundation of\u00a0Hunan Province","ror":null},{"id":"https://openalex.org/F4320326692","display_name":"Hunan University of Science and Technology","ror":"https://ror.org/02m9vrb24"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":38,"referenced_works":["https://openalex.org/W2117064875","https://openalex.org/W2153281696","https://openalex.org/W2910771712","https://openalex.org/W3010858269","https://openalex.org/W3011493986","https://openalex.org/W3015913521","https://openalex.org/W3082299207","https://openalex.org/W3084387290","https://openalex.org/W3132134440","https://openalex.org/W3132292262","https://openalex.org/W3168833844","https://openalex.org/W3174304286","https://openalex.org/W3195696782","https://openalex.org/W3200337798","https://openalex.org/W3201410046","https://openalex.org/W3210321638","https://openalex.org/W4206217604","https://openalex.org/W4220869444","https://openalex.org/W4285110155","https://openalex.org/W4285153536","https://openalex.org/W4308079027","https://openalex.org/W4309534440","https://openalex.org/W4312304622","https://openalex.org/W4312417810","https://openalex.org/W4313201990","https://openalex.org/W4317754097","https://openalex.org/W4323545840","https://openalex.org/W4362650847","https://openalex.org/W4372338168","https://openalex.org/W4382722037","https://openalex.org/W4384787626","https://openalex.org/W4384787880","https://openalex.org/W4387122143","https://openalex.org/W4390284839","https://openalex.org/W4392910408","https://openalex.org/W4394862690","https://openalex.org/W4401879012","https://openalex.org/W4407705461"],"related_works":[],"abstract_inverted_index":{"With":[0],"the":[1,119],"proliferation":[2],"of":[3,5,11],"Internet":[4],"Things":[6],"(IoT)":[7],"devices,":[8],"vast":[9],"amounts":[10],"sensitive":[12],"data":[13],"are":[14],"frequently":[15],"exchanged":[16],"across":[17],"networks,":[18],"making":[19,46,169],"identity":[20],"authentication":[21,28,84,113],"crucial":[22],"to":[23,40,107],"secure":[24],"communication.":[25],"However,":[26],"existing":[27,154],"schemes":[29],"generally":[30],"suffer":[31],"from":[32],"complex":[33],"certificate":[34],"management,":[35,127],"difficult":[36],"key":[37,86,126],"custody,":[38],"vulnerability":[39],"various":[41],"attacks,":[42],"and":[43,65,85,103,111,124,132,138,148,160,165],"high":[44,63],"overhead,":[45,162],"them":[47],"unsuitable":[48],"for":[49,92,121,172],"resource-constrained":[50],"IoT":[51,94,177],"devices.":[52],"Despite":[53],"blockchain":[54],"technology":[55],"showing":[56],"promise":[57],"in":[58,71,175],"decentralized":[59,110],"authentication,":[60],"consensus":[61],"mechanisms\u2019":[62],"computational":[64,159],"latency":[66],"costs":[67],"hinder":[68],"their":[69],"application":[70],"cross-domain":[72,83],"environments.":[73],"To":[74],"address":[75],"these":[76],"challenges,":[77],"this":[78],"paper":[79],"proposes":[80],"a":[81,109],"lightweight":[82],"agreement":[87],"protocol,":[88],"termed":[89],"LCH-AKA,":[90],"designed":[91],"heterogeneous":[93,176],"systems.":[95],"LCH-AKA":[96,143],"integrates":[97],"Physical":[98],"Unclonable":[99],"Function":[100],"(PUF),":[101],"blockchain,":[102],"edge":[104],"computing":[105],"technologies":[106],"construct":[108],"tamper-resistant":[112],"framework.":[114],"The":[115],"proposed":[116],"scheme":[117],"eliminates":[118],"need":[120],"traditional":[122],"certificates":[123],"centralized":[125],"while":[128],"enabling":[129],"efficient":[130],"device-to-device":[131],"device-to-server":[133],"mutual":[134],"authentication.":[135],"Formal":[136],"verification":[137],"experimental":[139],"evaluation":[140],"demonstrate":[141],"that":[142],"achieves":[144],"strong":[145],"security,":[146],"scalability,":[147],"low":[149],"resource":[150],"consumption.":[151],"Compared":[152],"with":[153],"approaches,":[155],"it":[156,170],"provides":[157],"lower":[158],"communication":[161],"reduced":[163],"latency,":[164],"improved":[166],"energy":[167],"efficiency,":[168],"suitable":[171],"large-scale":[173],"deployment":[174],"networks.":[178]},"counts_by_year":[],"updated_date":"2026-04-09T08:11:56.329763","created_date":"2025-12-18T00:00:00"}
