{"id":"https://openalex.org/W7117566853","doi":"https://doi.org/10.1109/tce.2025.3649626","title":"Lightweight Post-Quantum Authentication and Key Agreement Protocol for Secure Smart Home IoT Control","display_name":"Lightweight Post-Quantum Authentication and Key Agreement Protocol for Secure Smart Home IoT Control","publication_year":2025,"publication_date":"2025-12-30","ids":{"openalex":"https://openalex.org/W7117566853","doi":"https://doi.org/10.1109/tce.2025.3649626"},"language":null,"primary_location":{"id":"doi:10.1109/tce.2025.3649626","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tce.2025.3649626","pdf_url":null,"source":{"id":"https://openalex.org/S126824455","display_name":"IEEE Transactions on Consumer Electronics","issn_l":"0098-3063","issn":["0098-3063","1558-4127"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Consumer Electronics","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5064298385","display_name":"Wad Ghaban","orcid":"https://orcid.org/0000-0003-0564-4377"},"institutions":[{"id":"https://openalex.org/I72264486","display_name":"University of Tabuk","ror":"https://ror.org/04yej8x59","country_code":"SA","type":"education","lineage":["https://openalex.org/I72264486"]}],"countries":["SA"],"is_corresponding":true,"raw_author_name":"Wad Ghaban","raw_affiliation_strings":["Department of Computer Science, Applied College, University of Tabuk, Tabuk, Saudi Arabia"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, Applied College, University of Tabuk, Tabuk, Saudi Arabia","institution_ids":["https://openalex.org/I72264486"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5064298385"],"corresponding_institution_ids":["https://openalex.org/I72264486"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.67307368,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"72","issue":"1","first_page":"1890","last_page":"1903"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.45910000801086426,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.45910000801086426,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.13120000064373016,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.07079999893903732,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/mutual-authentication","display_name":"Mutual authentication","score":0.6705999970436096},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.5547999739646912},{"id":"https://openalex.org/keywords/cryptographic-protocol","display_name":"Cryptographic protocol","score":0.5315999984741211},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.5234000086784363},{"id":"https://openalex.org/keywords/key-agreement-protocol","display_name":"Key-agreement protocol","score":0.4864000082015991},{"id":"https://openalex.org/keywords/access-control","display_name":"Access control","score":0.4544999897480011},{"id":"https://openalex.org/keywords/protocol","display_name":"Protocol (science)","score":0.4494999945163727},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.43149998784065247},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.42899999022483826},{"id":"https://openalex.org/keywords/authentication-protocol","display_name":"Authentication protocol","score":0.3865000009536743}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7623999714851379},{"id":"https://openalex.org/C2781221063","wikidata":"https://www.wikidata.org/wiki/Q6944186","display_name":"Mutual authentication","level":3,"score":0.6705999970436096},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.5547999739646912},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5485000014305115},{"id":"https://openalex.org/C33884865","wikidata":"https://www.wikidata.org/wiki/Q1254335","display_name":"Cryptographic protocol","level":3,"score":0.5315999984741211},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.5234000086784363},{"id":"https://openalex.org/C135530808","wikidata":"https://www.wikidata.org/wiki/Q3306713","display_name":"Key-agreement protocol","level":5,"score":0.4864000082015991},{"id":"https://openalex.org/C527821871","wikidata":"https://www.wikidata.org/wiki/Q228502","display_name":"Access control","level":2,"score":0.4544999897480011},{"id":"https://openalex.org/C2780385302","wikidata":"https://www.wikidata.org/wiki/Q367158","display_name":"Protocol (science)","level":3,"score":0.4494999945163727},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.43149998784065247},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.42899999022483826},{"id":"https://openalex.org/C21564112","wikidata":"https://www.wikidata.org/wiki/Q4825885","display_name":"Authentication protocol","level":3,"score":0.3865000009536743},{"id":"https://openalex.org/C2779960059","wikidata":"https://www.wikidata.org/wiki/Q7113681","display_name":"Overhead (engineering)","level":2,"score":0.366100013256073},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.36410000920295715},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.351500004529953},{"id":"https://openalex.org/C507571656","wikidata":"https://www.wikidata.org/wiki/Q848436","display_name":"Home automation","level":2,"score":0.34150001406669617},{"id":"https://openalex.org/C110406131","wikidata":"https://www.wikidata.org/wiki/Q41349","display_name":"Smart card","level":2,"score":0.335999995470047},{"id":"https://openalex.org/C15927051","wikidata":"https://www.wikidata.org/wiki/Q246593","display_name":"Cryptographic primitive","level":4,"score":0.32829999923706055},{"id":"https://openalex.org/C173801870","wikidata":"https://www.wikidata.org/wiki/Q201413","display_name":"Heuristic","level":2,"score":0.3131999969482422},{"id":"https://openalex.org/C99138194","wikidata":"https://www.wikidata.org/wiki/Q183427","display_name":"Hash function","level":2,"score":0.3109000027179718},{"id":"https://openalex.org/C29983905","wikidata":"https://www.wikidata.org/wiki/Q7445066","display_name":"Security service","level":3,"score":0.31040000915527344},{"id":"https://openalex.org/C141492731","wikidata":"https://www.wikidata.org/wiki/Q1052621","display_name":"Message authentication code","level":3,"score":0.30869999527931213},{"id":"https://openalex.org/C38369872","wikidata":"https://www.wikidata.org/wiki/Q7445009","display_name":"Security analysis","level":2,"score":0.30410000681877136},{"id":"https://openalex.org/C165751822","wikidata":"https://www.wikidata.org/wiki/Q7894118","display_name":"Universal composability","level":4,"score":0.3028999865055084},{"id":"https://openalex.org/C121822524","wikidata":"https://www.wikidata.org/wiki/Q5157582","display_name":"Computer security model","level":2,"score":0.3027999997138977},{"id":"https://openalex.org/C65302260","wikidata":"https://www.wikidata.org/wiki/Q327675","display_name":"Symmetric-key algorithm","level":4,"score":0.2953999936580658},{"id":"https://openalex.org/C184842701","wikidata":"https://www.wikidata.org/wiki/Q370563","display_name":"Cloud computing security","level":3,"score":0.28870001435279846},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.27230000495910645},{"id":"https://openalex.org/C17886624","wikidata":"https://www.wikidata.org/wiki/Q1320561","display_name":"Key management","level":3,"score":0.26759999990463257},{"id":"https://openalex.org/C205009425","wikidata":"https://www.wikidata.org/wiki/Q935662","display_name":"Forward secrecy","level":4,"score":0.2632000148296356},{"id":"https://openalex.org/C510870077","wikidata":"https://www.wikidata.org/wiki/Q7444868","display_name":"Secure communication","level":3,"score":0.25529998540878296},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.2547000050544739},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.25450000166893005}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tce.2025.3649626","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tce.2025.3649626","pdf_url":null,"source":{"id":"https://openalex.org/S126824455","display_name":"IEEE Transactions on Consumer Electronics","issn_l":"0098-3063","issn":["0098-3063","1558-4127"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Consumer Electronics","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":[],"abstract_inverted_index":{"As":[0],"smart":[1,31,165,248],"home":[2,32,166],"devices":[3,62],"become":[4,120],"more":[5],"widely":[6],"available,":[7],"their":[8],"limited":[9],"resources":[10],"and":[11,41,67,101,146,168,185,202,234],"potential":[12],"exposure":[13],"to":[14,27,37,155,182,218],"various":[15],"types":[16,80],"of":[17,51,81,91,99,104,111,128,211,220,246],"cyber-attacks":[18],"make":[19],"it":[20,227],"difficult":[21],"for":[22,125,141],"the":[23,48,92,97,102,109,123,161,169,180,199,208,212,244],"traditional":[24],"security":[25,74,105,130,209,230],"protocols":[26],"remain":[28],"effective.":[29],"Cloud-enabled":[30],"IoT":[33],"platforms":[34],"have":[35,215],"helped":[36],"improve":[38],"device":[39],"intelligence":[40],"overall":[42],"efficiency":[43,98],"when":[44],"controlling":[45,60],"them,":[46],"but":[47],"additional":[49,57,93],"use":[50],"cloud":[52,163],"computing":[53],"has":[54,191],"also":[55,173],"created":[56],"complexity":[58],"in":[59],"these":[61,79,134],"through":[63,195],"user-defined":[64],"automated":[65],"rules":[66],"remote":[68,175],"access":[69],"via":[70],"vendor":[71],"apps.":[72],"Conventional":[73],"schemes":[75],"do":[76,85],"not":[77],"consider":[78],"control":[82],"models,":[83],"nor":[84],"they":[86],"provide":[87],"a":[88,139,142,157,239],"reasonable":[89],"balance":[90],"computational":[94],"overhead":[95],"introduced,":[96],"communications,":[100],"level":[103],"provided.":[106],"Additionally,":[107,207],"with":[108,243],"introduction":[110],"quantum":[112,186,235],"computing,":[113],"current":[114],"public":[115],"key":[116,147],"cryptography":[117,153],"primitives":[118,154],"will":[119],"obsolete,":[121],"necessitating":[122],"requirement":[124],"an":[126],"adoption":[127],"post-quantum":[129,152],"measures.":[131],"To":[132],"overcome":[133],"issues,":[135],"this":[136],"paper":[137],"presents":[138],"proposal":[140],"lightweight":[143,240],"mutual":[144],"authentication":[145],"agreement":[148],"scheme":[149],"that":[150,226],"employs":[151],"facilitate":[156],"secure":[158,176],"interaction":[159],"between":[160],"user\u2019s":[162],"platforms,":[164],"devices,":[167],"user.":[170],"The":[171,188],"protocol":[172,190,214],"supports":[174],"control,":[177],"while":[178,237],"providing":[179,224],"resistance":[181,236],"both":[183],"classical":[184],"attacks.":[187],"proposed":[189,213],"been":[192,216],"thoroughly":[193],"evaluated":[194],"formal":[196],"verification":[197],"using":[198],"ProVerif":[200],"tool":[201],"multiple":[203],"heuristic":[204],"evaluation":[205],"techniques.":[206],"features":[210],"compared":[217],"those":[219],"several":[221],"existing":[222],"methods,":[223],"evidence":[225],"offers":[228],"improved":[229],"features,":[231],"forward":[232],"secrecy,":[233],"maintaining":[238],"profile":[241],"compatible":[242],"limitations":[245],"modern":[247],"homes.":[249]},"counts_by_year":[],"updated_date":"2026-03-26T06:05:38.182114","created_date":"2025-12-30T00:00:00"}
