{"id":"https://openalex.org/W4381302747","doi":"https://doi.org/10.1109/jsyst.2023.3269046","title":"AP-CDE: Cost-Efficient Authentication Protocol for Cross-Domain Data Exchange in IIoT","display_name":"AP-CDE: Cost-Efficient Authentication Protocol for Cross-Domain Data Exchange in IIoT","publication_year":2023,"publication_date":"2023-05-30","ids":{"openalex":"https://openalex.org/W4381302747","doi":"https://doi.org/10.1109/jsyst.2023.3269046"},"language":"en","primary_location":{"id":"doi:10.1109/jsyst.2023.3269046","is_oa":false,"landing_page_url":"https://doi.org/10.1109/jsyst.2023.3269046","pdf_url":null,"source":{"id":"https://openalex.org/S95999327","display_name":"IEEE Systems Journal","issn_l":"1932-8184","issn":["1932-8184","1937-9234","2373-7816"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Systems Journal","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5101419409","display_name":"Kai Wang","orcid":"https://orcid.org/0009-0006-2150-9983"},"institutions":[{"id":"https://openalex.org/I41198531","display_name":"Nanjing University of Posts and Telecommunications","ror":"https://ror.org/043bpky34","country_code":"CN","type":"education","lineage":["https://openalex.org/I41198531"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Kai Wang","raw_affiliation_strings":["School of Computer Science, Nanjing University of Posts and Telecommunications, Nanjing, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science, Nanjing University of Posts and Telecommunications, Nanjing, China","institution_ids":["https://openalex.org/I41198531"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100308334","display_name":"Kaisheng Sun","orcid":null},"institutions":[{"id":"https://openalex.org/I41198531","display_name":"Nanjing University of Posts and Telecommunications","ror":"https://ror.org/043bpky34","country_code":"CN","type":"education","lineage":["https://openalex.org/I41198531"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Kaisheng Sun","raw_affiliation_strings":["School of Computer Science, Nanjing University of Posts and Telecommunications, Nanjing, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science, Nanjing University of Posts and Telecommunications, Nanjing, China","institution_ids":["https://openalex.org/I41198531"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5017411757","display_name":"Jiankuo Dong","orcid":"https://orcid.org/0000-0003-1693-3000"},"institutions":[{"id":"https://openalex.org/I41198531","display_name":"Nanjing University of Posts and Telecommunications","ror":"https://ror.org/043bpky34","country_code":"CN","type":"education","lineage":["https://openalex.org/I41198531"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jiankuo Dong","raw_affiliation_strings":["School of Computer Science, Nanjing University of Posts and Telecommunications, Nanjing, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science, Nanjing University of Posts and Telecommunications, Nanjing, China","institution_ids":["https://openalex.org/I41198531"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5072122717","display_name":"Letian Sha","orcid":"https://orcid.org/0009-0007-5547-3728"},"institutions":[{"id":"https://openalex.org/I41198531","display_name":"Nanjing University of Posts and Telecommunications","ror":"https://ror.org/043bpky34","country_code":"CN","type":"education","lineage":["https://openalex.org/I41198531"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Letian Sha","raw_affiliation_strings":["School of Computer Science, Nanjing University of Posts and Telecommunications, Nanjing, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science, Nanjing University of Posts and Telecommunications, Nanjing, China","institution_ids":["https://openalex.org/I41198531"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100602821","display_name":"Fu Xiao","orcid":"https://orcid.org/0000-0003-1815-2793"},"institutions":[{"id":"https://openalex.org/I41198531","display_name":"Nanjing University of Posts and Telecommunications","ror":"https://ror.org/043bpky34","country_code":"CN","type":"education","lineage":["https://openalex.org/I41198531"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Fu Xiao","raw_affiliation_strings":["School of Computer Science, Nanjing University of Posts and Telecommunications, Nanjing, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science, Nanjing University of Posts and Telecommunications, Nanjing, China","institution_ids":["https://openalex.org/I41198531"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5101419409"],"corresponding_institution_ids":["https://openalex.org/I41198531"],"apc_list":null,"apc_paid":null,"fwci":2.21,"has_fulltext":false,"cited_by_count":11,"citation_normalized_percentile":{"value":0.88320118,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":99},"biblio":{"volume":"17","issue":"3","first_page":"3882","last_page":"3893"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9990000128746033,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.9980000257492065,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7296085953712463},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.5605106353759766},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.5355655550956726},{"id":"https://openalex.org/keywords/hash-function","display_name":"Hash function","score":0.5137583017349243},{"id":"https://openalex.org/keywords/protocol","display_name":"Protocol (science)","score":0.5109983682632446},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.4215134382247925},{"id":"https://openalex.org/keywords/domain","display_name":"Domain (mathematical analysis)","score":0.41884827613830566},{"id":"https://openalex.org/keywords/communications-protocol","display_name":"Communications protocol","score":0.4132028818130493},{"id":"https://openalex.org/keywords/cryptographic-protocol","display_name":"Cryptographic protocol","score":0.4114604890346527},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4088706374168396},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.28152328729629517},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.1000724732875824}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7296085953712463},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.5605106353759766},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.5355655550956726},{"id":"https://openalex.org/C99138194","wikidata":"https://www.wikidata.org/wiki/Q183427","display_name":"Hash function","level":2,"score":0.5137583017349243},{"id":"https://openalex.org/C2780385302","wikidata":"https://www.wikidata.org/wiki/Q367158","display_name":"Protocol (science)","level":3,"score":0.5109983682632446},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.4215134382247925},{"id":"https://openalex.org/C36503486","wikidata":"https://www.wikidata.org/wiki/Q11235244","display_name":"Domain (mathematical analysis)","level":2,"score":0.41884827613830566},{"id":"https://openalex.org/C12269588","wikidata":"https://www.wikidata.org/wiki/Q132364","display_name":"Communications protocol","level":2,"score":0.4132028818130493},{"id":"https://openalex.org/C33884865","wikidata":"https://www.wikidata.org/wiki/Q1254335","display_name":"Cryptographic protocol","level":3,"score":0.4114604890346527},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4088706374168396},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.28152328729629517},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.1000724732875824},{"id":"https://openalex.org/C204787440","wikidata":"https://www.wikidata.org/wiki/Q188504","display_name":"Alternative medicine","level":2,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C142724271","wikidata":"https://www.wikidata.org/wiki/Q7208","display_name":"Pathology","level":1,"score":0.0},{"id":"https://openalex.org/C71924100","wikidata":"https://www.wikidata.org/wiki/Q11190","display_name":"Medicine","level":0,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/jsyst.2023.3269046","is_oa":false,"landing_page_url":"https://doi.org/10.1109/jsyst.2023.3269046","pdf_url":null,"source":{"id":"https://openalex.org/S95999327","display_name":"IEEE Systems Journal","issn_l":"1932-8184","issn":["1932-8184","1937-9234","2373-7816"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Systems Journal","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.4699999988079071,"display_name":"Industry, innovation and infrastructure","id":"https://metadata.un.org/sdg/9"}],"awards":[{"id":"https://openalex.org/G1264290562","display_name":null,"funder_award_id":"BE2022798","funder_id":"https://openalex.org/F4320327777","funder_display_name":"Jiangsu Provincial Key Research and Development Program"},{"id":"https://openalex.org/G3050237639","display_name":null,"funder_award_id":"2022M711689","funder_id":"https://openalex.org/F4320321543","funder_display_name":"China Postdoctoral Science Foundation"},{"id":"https://openalex.org/G4314279214","display_name":null,"funder_award_id":"BK20220388","funder_id":"https://openalex.org/F4320322769","funder_display_name":"Natural Science Foundation of Jiangsu Province"},{"id":"https://openalex.org/G698852458","display_name":null,"funder_award_id":"62293503","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G7747012976","display_name":null,"funder_award_id":"62272241","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320321543","display_name":"China Postdoctoral Science Foundation","ror":"https://ror.org/0426zh255"},{"id":"https://openalex.org/F4320322769","display_name":"Natural Science Foundation of Jiangsu Province","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320327777","display_name":"Jiangsu Provincial Key Research and Development Program","ror":null}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":38,"referenced_works":["https://openalex.org/W149420927","https://openalex.org/W601637684","https://openalex.org/W1526070463","https://openalex.org/W1561441787","https://openalex.org/W1585665690","https://openalex.org/W1982179579","https://openalex.org/W2028435862","https://openalex.org/W2029693536","https://openalex.org/W2038194220","https://openalex.org/W2088455835","https://openalex.org/W2105114022","https://openalex.org/W2105514582","https://openalex.org/W2131789459","https://openalex.org/W2243569459","https://openalex.org/W2301424859","https://openalex.org/W2340597701","https://openalex.org/W2497816424","https://openalex.org/W2568582261","https://openalex.org/W2749247755","https://openalex.org/W2790487176","https://openalex.org/W2800426337","https://openalex.org/W2810641345","https://openalex.org/W2964638297","https://openalex.org/W2974280033","https://openalex.org/W3006891966","https://openalex.org/W3009104744","https://openalex.org/W3010858269","https://openalex.org/W3108643162","https://openalex.org/W3126596163","https://openalex.org/W3132951757","https://openalex.org/W3162678397","https://openalex.org/W3163909197","https://openalex.org/W3202291135","https://openalex.org/W3210588268","https://openalex.org/W4243202529","https://openalex.org/W4285110155","https://openalex.org/W4323065970","https://openalex.org/W6704168218"],"related_works":["https://openalex.org/W2159180878","https://openalex.org/W2388330702","https://openalex.org/W2282990539","https://openalex.org/W2409714959","https://openalex.org/W4298212052","https://openalex.org/W2392986374","https://openalex.org/W2390164899","https://openalex.org/W2740821854","https://openalex.org/W4254015142","https://openalex.org/W4392877027"],"abstract_inverted_index":{"The":[0,122],"Industrial":[1],"Internet":[2,14],"of":[3,15,160],"Things":[4,16],"(IIoT)":[5],"is":[6,19,111,148],"a":[7,55,80,137],"new":[8],"network":[9],"paradigm":[10],"emerging":[11],"from":[12,38],"the":[13,47,127,142,153],"(IoT).":[17],"It":[18],"primarily":[20],"used":[21,105,149],"in":[22,71,89,106,158],"smart":[23,27,63],"factories":[24],"to":[25,61,150],"promote":[26],"manufacturing":[28],"and":[29,50,74,100,117,144,162,167],"increase":[30],"productivity.":[31],"Smart":[32],"industrial":[33,64],"devices":[34],"collect":[35],"real-time":[36],"data":[37,53,86],"other":[39,145,156],"domains":[40],"(i.e.,":[41],"intelligent":[42],"factories)":[43],"that":[44,126,152],"collaborate":[45],"on":[46],"same":[48],"transaction":[49],"transmit":[51],"crucial":[52],"via":[54],"public":[56],"internet":[57],"channel.":[58],"When":[59],"applied":[60],"resource-constrained":[62],"communication":[65,72,165],"devices,":[66],"this":[67,77,107],"process":[68],"causes":[69],"issues":[70],"security":[73,110,161],"privacy.":[75],"Consequently,":[76],"study":[78],"develops":[79],"cost-effective":[81],"authentication":[82],"protocol":[83,129],"for":[84],"cross-domain":[85],"exchange":[87],"(AP-CDE)":[88],"IIoT.":[90],"Anticollision":[91],"hash":[92],"functions,":[93],"bitwise":[94],"Exclusive-":[95],"<sc":[96],"xmlns:mml=\"http://www.w3.org/1998/Math/MathML\"":[97],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">or</small>":[98],"operations,":[99],"Chebyshev":[101],"polynomial":[102],"operations":[103],"are":[104],"protocol.":[108],"AP-CDE":[109,143,154],"achieved":[112],"by":[113],"using":[114],"precise":[115],"formal":[116],"nonmathematical":[118],"(informal)":[119],"analysis":[120,123,140],"methods.":[121],"results":[124],"show":[125],"developed":[128],"can":[130],"withstand":[131],"various":[132],"well-known":[133],"threatening":[134],"attacks.":[135],"Finally,":[136],"detailed":[138],"comparative":[139],"between":[141],"interrelated":[146],"protocols":[147,157],"verify":[151],"outperforms":[155],"terms":[159],"functional":[163],"characteristics,":[164],"overheads,":[166],"computational":[168],"costs.":[169]},"counts_by_year":[{"year":2025,"cited_by_count":6},{"year":2024,"cited_by_count":4},{"year":2023,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
