{"id":"https://openalex.org/W4414165774","doi":"https://doi.org/10.1109/ojcs.2025.3607984","title":"LightPUF-IIoT: A Lightweight PUF-Based Authentication Scheme With Real-Time Detection of Rogue Devices in Fog-Assisted IIoT Data Sharing","display_name":"LightPUF-IIoT: A Lightweight PUF-Based Authentication Scheme With Real-Time Detection of Rogue Devices in Fog-Assisted IIoT Data Sharing","publication_year":2025,"publication_date":"2025-01-01","ids":{"openalex":"https://openalex.org/W4414165774","doi":"https://doi.org/10.1109/ojcs.2025.3607984"},"language":"en","primary_location":{"id":"doi:10.1109/ojcs.2025.3607984","is_oa":true,"landing_page_url":"https://doi.org/10.1109/ojcs.2025.3607984","pdf_url":null,"source":{"id":"https://openalex.org/S4210176459","display_name":"IEEE Open Journal of the Computer Society","issn_l":"2644-1268","issn":["2644-1268"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Open Journal of the Computer Society","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://doi.org/10.1109/ojcs.2025.3607984","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5082587353","display_name":"Somchart Fugkeaw","orcid":"https://orcid.org/0000-0001-7156-184X"},"institutions":[{"id":"https://openalex.org/I108108428","display_name":"Thammasat University","ror":"https://ror.org/002yp7f20","country_code":"TH","type":"education","lineage":["https://openalex.org/I108108428"]}],"countries":["TH"],"is_corresponding":true,"raw_author_name":"Somchart Fugkeaw","raw_affiliation_strings":["School of ICT, Sirindhorn International Institute of Technology, Thammasat University, Pathum Thani, Thailand"],"affiliations":[{"raw_affiliation_string":"School of ICT, Sirindhorn International Institute of Technology, Thammasat University, Pathum Thani, Thailand","institution_ids":["https://openalex.org/I108108428"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5117613387","display_name":"Archawit Changtor","orcid":null},"institutions":[{"id":"https://openalex.org/I108108428","display_name":"Thammasat University","ror":"https://ror.org/002yp7f20","country_code":"TH","type":"education","lineage":["https://openalex.org/I108108428"]}],"countries":["TH"],"is_corresponding":false,"raw_author_name":"Archawit Changtor","raw_affiliation_strings":["School of ICT, Sirindhorn International Institute of Technology, Thammasat University, Pathum Thani, Thailand"],"affiliations":[{"raw_affiliation_string":"School of ICT, Sirindhorn International Institute of Technology, Thammasat University, Pathum Thani, Thailand","institution_ids":["https://openalex.org/I108108428"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5117613388","display_name":"Thanabordee Maneerat","orcid":null},"institutions":[{"id":"https://openalex.org/I108108428","display_name":"Thammasat University","ror":"https://ror.org/002yp7f20","country_code":"TH","type":"education","lineage":["https://openalex.org/I108108428"]}],"countries":["TH"],"is_corresponding":false,"raw_author_name":"Thanabordee Maneerat","raw_affiliation_strings":["School of ICT, Sirindhorn International Institute of Technology, Thammasat University, Pathum Thani, Thailand"],"affiliations":[{"raw_affiliation_string":"School of ICT, Sirindhorn International Institute of Technology, Thammasat University, Pathum Thani, Thailand","institution_ids":["https://openalex.org/I108108428"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5117613389","display_name":"Pakapon Rattanasrisuk","orcid":null},"institutions":[{"id":"https://openalex.org/I108108428","display_name":"Thammasat University","ror":"https://ror.org/002yp7f20","country_code":"TH","type":"education","lineage":["https://openalex.org/I108108428"]}],"countries":["TH"],"is_corresponding":false,"raw_author_name":"Pakapon Rattanasrisuk","raw_affiliation_strings":["School of ICT, Sirindhorn International Institute of Technology, Thammasat University, Pathum Thani, Thailand"],"affiliations":[{"raw_affiliation_string":"School of ICT, Sirindhorn International Institute of Technology, Thammasat University, Pathum Thani, Thailand","institution_ids":["https://openalex.org/I108108428"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5117613390","display_name":"Kittipat Tangtanawirut","orcid":null},"institutions":[{"id":"https://openalex.org/I108108428","display_name":"Thammasat University","ror":"https://ror.org/002yp7f20","country_code":"TH","type":"education","lineage":["https://openalex.org/I108108428"]}],"countries":["TH"],"is_corresponding":false,"raw_author_name":"Kittipat Tangtanawirut","raw_affiliation_strings":["School of ICT, Sirindhorn International Institute of Technology, Thammasat University, Pathum Thani, Thailand"],"affiliations":[{"raw_affiliation_string":"School of ICT, Sirindhorn International Institute of Technology, Thammasat University, Pathum Thani, Thailand","institution_ids":["https://openalex.org/I108108428"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5082587353"],"corresponding_institution_ids":["https://openalex.org/I108108428"],"apc_list":{"value":1750,"currency":"USD","value_usd":1750},"apc_paid":{"value":1750,"currency":"USD","value_usd":1750},"fwci":2.9744,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.92158586,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":91,"max":99},"biblio":{"volume":"6","issue":null,"first_page":"1438","last_page":"1450"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.982200026512146,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.982200026512146,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.6503999829292297},{"id":"https://openalex.org/keywords/scalability","display_name":"Scalability","score":0.6184999942779541},{"id":"https://openalex.org/keywords/revocation","display_name":"Revocation","score":0.5989000201225281},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.5250999927520752},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.5121999979019165},{"id":"https://openalex.org/keywords/security-token","display_name":"Security token","score":0.5105000138282776},{"id":"https://openalex.org/keywords/overhead","display_name":"Overhead (engineering)","score":0.505299985408783},{"id":"https://openalex.org/keywords/password","display_name":"Password","score":0.4814000129699707},{"id":"https://openalex.org/keywords/data-sharing","display_name":"Data sharing","score":0.45410001277923584},{"id":"https://openalex.org/keywords/secret-sharing","display_name":"Secret sharing","score":0.38040000200271606}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7900000214576721},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.6503999829292297},{"id":"https://openalex.org/C48044578","wikidata":"https://www.wikidata.org/wiki/Q727490","display_name":"Scalability","level":2,"score":0.6184999942779541},{"id":"https://openalex.org/C2775892892","wikidata":"https://www.wikidata.org/wiki/Q6509517","display_name":"Revocation","level":3,"score":0.5989000201225281},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5421000123023987},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.5315999984741211},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.5250999927520752},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.5121999979019165},{"id":"https://openalex.org/C48145219","wikidata":"https://www.wikidata.org/wiki/Q1335365","display_name":"Security token","level":2,"score":0.5105000138282776},{"id":"https://openalex.org/C2779960059","wikidata":"https://www.wikidata.org/wiki/Q7113681","display_name":"Overhead (engineering)","level":2,"score":0.505299985408783},{"id":"https://openalex.org/C109297577","wikidata":"https://www.wikidata.org/wiki/Q161157","display_name":"Password","level":2,"score":0.4814000129699707},{"id":"https://openalex.org/C2779965156","wikidata":"https://www.wikidata.org/wiki/Q5227350","display_name":"Data sharing","level":3,"score":0.45410001277923584},{"id":"https://openalex.org/C3087436","wikidata":"https://www.wikidata.org/wiki/Q1386603","display_name":"Secret sharing","level":3,"score":0.38040000200271606},{"id":"https://openalex.org/C71745522","wikidata":"https://www.wikidata.org/wiki/Q2476929","display_name":"Confidentiality","level":2,"score":0.37049999833106995},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.3634999990463257},{"id":"https://openalex.org/C33762810","wikidata":"https://www.wikidata.org/wiki/Q461671","display_name":"Data integrity","level":2,"score":0.3560999929904938},{"id":"https://openalex.org/C21564112","wikidata":"https://www.wikidata.org/wiki/Q4825885","display_name":"Authentication protocol","level":3,"score":0.35370001196861267},{"id":"https://openalex.org/C168970074","wikidata":"https://www.wikidata.org/wiki/Q5227146","display_name":"Data Authentication Algorithm","level":4,"score":0.3402999937534332},{"id":"https://openalex.org/C10511746","wikidata":"https://www.wikidata.org/wiki/Q899388","display_name":"Data security","level":3,"score":0.3215000033378601},{"id":"https://openalex.org/C38369872","wikidata":"https://www.wikidata.org/wiki/Q7445009","display_name":"Security analysis","level":2,"score":0.3181999921798706},{"id":"https://openalex.org/C15927051","wikidata":"https://www.wikidata.org/wiki/Q246593","display_name":"Cryptographic primitive","level":4,"score":0.31060001254081726},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.3001999855041504},{"id":"https://openalex.org/C108710211","wikidata":"https://www.wikidata.org/wiki/Q11538","display_name":"Mathematical proof","level":2,"score":0.29420000314712524},{"id":"https://openalex.org/C141492731","wikidata":"https://www.wikidata.org/wiki/Q1052621","display_name":"Message authentication code","level":3,"score":0.2906000018119812},{"id":"https://openalex.org/C178005623","wikidata":"https://www.wikidata.org/wiki/Q308859","display_name":"Anonymity","level":2,"score":0.2856999933719635},{"id":"https://openalex.org/C206345919","wikidata":"https://www.wikidata.org/wiki/Q20380951","display_name":"Resource (disambiguation)","level":2,"score":0.2815000116825104},{"id":"https://openalex.org/C2781221063","wikidata":"https://www.wikidata.org/wiki/Q6944186","display_name":"Mutual authentication","level":3,"score":0.2736000120639801},{"id":"https://openalex.org/C165136773","wikidata":"https://www.wikidata.org/wiki/Q1363179","display_name":"Single point of failure","level":2,"score":0.27140000462532043},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.2651999890804291},{"id":"https://openalex.org/C2777810591","wikidata":"https://www.wikidata.org/wiki/Q16861606","display_name":"Credential","level":2,"score":0.26010000705718994},{"id":"https://openalex.org/C17886624","wikidata":"https://www.wikidata.org/wiki/Q1320561","display_name":"Key management","level":3,"score":0.2574000060558319},{"id":"https://openalex.org/C93996380","wikidata":"https://www.wikidata.org/wiki/Q44127","display_name":"Server","level":2,"score":0.25450000166893005},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.25360000133514404},{"id":"https://openalex.org/C33884865","wikidata":"https://www.wikidata.org/wiki/Q1254335","display_name":"Cryptographic protocol","level":3,"score":0.2515000104904175}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/ojcs.2025.3607984","is_oa":true,"landing_page_url":"https://doi.org/10.1109/ojcs.2025.3607984","pdf_url":null,"source":{"id":"https://openalex.org/S4210176459","display_name":"IEEE Open Journal of the Computer Society","issn_l":"2644-1268","issn":["2644-1268"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Open Journal of the Computer Society","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:ae4d6e97d8e64136abce53a4fd56588c","is_oa":true,"landing_page_url":"https://doaj.org/article/ae4d6e97d8e64136abce53a4fd56588c","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"IEEE Open Journal of the Computer Society, Vol 6, Pp 1438-1450 (2025)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1109/ojcs.2025.3607984","is_oa":true,"landing_page_url":"https://doi.org/10.1109/ojcs.2025.3607984","pdf_url":null,"source":{"id":"https://openalex.org/S4210176459","display_name":"IEEE Open Journal of the Computer Society","issn_l":"2644-1268","issn":["2644-1268"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Open Journal of the Computer Society","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":30,"referenced_works":["https://openalex.org/W1803070374","https://openalex.org/W1885156594","https://openalex.org/W1966117405","https://openalex.org/W2016244202","https://openalex.org/W2079913403","https://openalex.org/W2739497507","https://openalex.org/W2920780305","https://openalex.org/W3023755596","https://openalex.org/W3045998670","https://openalex.org/W3109778209","https://openalex.org/W4213440432","https://openalex.org/W4226062437","https://openalex.org/W4285205494","https://openalex.org/W4287887716","https://openalex.org/W4313048788","https://openalex.org/W4315783030","https://openalex.org/W4320168924","https://openalex.org/W4367016887","https://openalex.org/W4377971367","https://openalex.org/W4378194578","https://openalex.org/W4380880135","https://openalex.org/W4385062315","https://openalex.org/W4386634454","https://openalex.org/W4391547675","https://openalex.org/W4392449621","https://openalex.org/W4399168768","https://openalex.org/W4399526745","https://openalex.org/W4399620415","https://openalex.org/W4401943068","https://openalex.org/W4410358615"],"related_works":[],"abstract_inverted_index":{"The":[0,67,114],"Industrial":[1],"Internet":[2],"of":[3,10,147],"Things":[4],"(IIoT)":[5],"generates":[6],"a":[7,55],"vast":[8],"volume":[9],"sensitive":[11],"data":[12,28,65,102,106],"that":[13,27,130],"demands":[14],"not":[15],"only":[16],"confidentiality":[17],"but":[18],"also":[19,116],"authenticity":[20,107],"and":[21,42,57,76,90,108,123,140,151],"integrity\u2014especially":[22],"in":[23,145],"large-scale":[24],"deployments.":[25],"Ensuring":[26],"originates":[29],"from":[30],"trusted":[31],"devices":[32,89],"is":[33],"critical;":[34],"however,":[35],"existing":[36,143],"authentication":[37,59,87,152],"mechanisms":[38,119],"often":[39],"lack":[40],"scalability":[41],"effective":[43],"revocation":[44,122],"support.":[45],"To":[46],"address":[47],"these":[48],"challenges,":[49],"we":[50],"propose":[51],"<bold":[52,70,77],"xmlns:mml=\"http://www.w3.org/1998/Math/MathML\"":[53,71,78],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">LightPUF-IIoT</b>,":[54],"secure":[56,124],"lightweight":[58],"scheme":[60,68,115],"designed":[61],"for":[62,88,120],"fog-assisted":[63],"IIoT":[64],"sharing.":[66],"leverages":[69],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">Physical":[72],"Unclonable":[73],"Functions":[74],"(PUFs)</b>":[75],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">Non-Interactive":[79],"Zero-Knowledge":[80],"Proofs":[81],"(NIZKPs)</b>":[82],"to":[83,97],"enable":[84],"scalable,":[85],"group-based":[86],"fog":[91],"nodes.":[92],"By":[93],"binding":[94],"authenticated":[95],"identities":[96],"cryptographic":[98],"tokens":[99],"used":[100],"during":[101],"transmission,":[103],"LightPUF-IIoT":[104,131],"ensures":[105],"supports":[109],"real-time":[110],"rogue":[111],"device":[112,121],"detection.":[113],"includes":[117],"efficient":[118],"token":[125],"regeneration.":[126],"Experimental":[127],"results":[128],"show":[129],"provides":[132],"strong":[133],"security":[134],"guarantees":[135],"with":[136],"minimal":[137],"resource":[138],"overhead":[139],"significantly":[141],"outperforms":[142],"approaches":[144],"terms":[146],"computational":[148],"cost,":[149],"scalability,":[150],"throughput.":[153]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":1}],"updated_date":"2026-03-27T05:58:40.876381","created_date":"2025-10-10T00:00:00"}
