{"id":"https://openalex.org/W4380839239","doi":"https://doi.org/10.1109/tdsc.2023.3285800","title":"Blockchain-Based Lightweight Message Authentication for Edge-Assisted Cross-Domain Industrial Internet of Things","display_name":"Blockchain-Based Lightweight Message Authentication for Edge-Assisted Cross-Domain Industrial Internet of Things","publication_year":2023,"publication_date":"2023-06-15","ids":{"openalex":"https://openalex.org/W4380839239","doi":"https://doi.org/10.1109/tdsc.2023.3285800"},"language":"en","primary_location":{"id":"doi:10.1109/tdsc.2023.3285800","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tdsc.2023.3285800","pdf_url":null,"source":{"id":"https://openalex.org/S133795288","display_name":"IEEE Transactions on Dependable and Secure Computing","issn_l":"1545-5971","issn":["1545-5971","1941-0018","2160-9209"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320439","host_organization_name":"IEEE Computer Society","host_organization_lineage":["https://openalex.org/P4310320439","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Computer Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Dependable and Secure Computing","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5031717657","display_name":"Fengqun Wang","orcid":"https://orcid.org/0000-0003-2465-7982"},"institutions":[{"id":"https://openalex.org/I143868143","display_name":"Anhui University","ror":"https://ror.org/05th6yx34","country_code":"CN","type":"education","lineage":["https://openalex.org/I143868143"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Fengqun Wang","raw_affiliation_strings":["Key Laboratory of Intelligent Computing and Signal Processing of Ministry of Education, School of Computer Science and Technology, Anhui University, Hefei, China","Institute of Physical Science and Information Technology, Anhui University, Hefei, China","Anhui Engineering Laboratory of IoT Security Technologies, Anhui University, Hefei, China"],"affiliations":[{"raw_affiliation_string":"Key Laboratory of Intelligent Computing and Signal Processing of Ministry of Education, School of Computer Science and Technology, Anhui University, Hefei, China","institution_ids":["https://openalex.org/I143868143"]},{"raw_affiliation_string":"Institute of Physical Science and Information Technology, Anhui University, Hefei, China","institution_ids":["https://openalex.org/I143868143"]},{"raw_affiliation_string":"Anhui Engineering Laboratory of IoT Security Technologies, Anhui University, Hefei, China","institution_ids":["https://openalex.org/I143868143"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5081525426","display_name":"Jie Cui","orcid":"https://orcid.org/0000-0001-7258-3418"},"institutions":[{"id":"https://openalex.org/I143868143","display_name":"Anhui University","ror":"https://ror.org/05th6yx34","country_code":"CN","type":"education","lineage":["https://openalex.org/I143868143"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jie Cui","raw_affiliation_strings":["Key Laboratory of Intelligent Computing and Signal Processing of Ministry of Education, School of Computer Science and Technology, Anhui University, Hefei, China","Anhui Engineering Laboratory of IoT Security Technologies, Anhui University, Hefei, China","Institute of Physical Science and Information Technology, Anhui University, Hefei, China"],"affiliations":[{"raw_affiliation_string":"Key Laboratory of Intelligent Computing and Signal Processing of Ministry of Education, School of Computer Science and Technology, Anhui University, Hefei, China","institution_ids":["https://openalex.org/I143868143"]},{"raw_affiliation_string":"Anhui Engineering Laboratory of IoT Security Technologies, Anhui University, Hefei, China","institution_ids":["https://openalex.org/I143868143"]},{"raw_affiliation_string":"Institute of Physical Science and Information Technology, Anhui University, Hefei, China","institution_ids":["https://openalex.org/I143868143"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5015149253","display_name":"Qingyang Zhang","orcid":"https://orcid.org/0000-0002-2600-6748"},"institutions":[{"id":"https://openalex.org/I143868143","display_name":"Anhui University","ror":"https://ror.org/05th6yx34","country_code":"CN","type":"education","lineage":["https://openalex.org/I143868143"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Qingyang Zhang","raw_affiliation_strings":["Key Laboratory of Intelligent Computing and Signal Processing of Ministry of Education, School of Computer Science and Technology, Anhui University, Hefei, China","Anhui Engineering Laboratory of IoT Security Technologies, Anhui University, Hefei, China","Institute of Physical Science and Information Technology, Anhui University, Hefei, China"],"affiliations":[{"raw_affiliation_string":"Key Laboratory of Intelligent Computing and Signal Processing of Ministry of Education, School of Computer Science and Technology, Anhui University, Hefei, China","institution_ids":["https://openalex.org/I143868143"]},{"raw_affiliation_string":"Anhui Engineering Laboratory of IoT Security Technologies, Anhui University, Hefei, China","institution_ids":["https://openalex.org/I143868143"]},{"raw_affiliation_string":"Institute of Physical Science and Information Technology, Anhui University, Hefei, China","institution_ids":["https://openalex.org/I143868143"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5025668908","display_name":"Debiao He","orcid":"https://orcid.org/0000-0002-2446-7436"},"institutions":[{"id":"https://openalex.org/I37461747","display_name":"Wuhan University","ror":"https://ror.org/033vjfk17","country_code":"CN","type":"education","lineage":["https://openalex.org/I37461747"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Debiao He","raw_affiliation_strings":["School of Cyber Science and Engineering, Wuhan University, Wuhan, China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Science and Engineering, Wuhan University, Wuhan, China","institution_ids":["https://openalex.org/I37461747"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5077232320","display_name":"Chengjie Gu","orcid":"https://orcid.org/0009-0001-6597-168X"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Chengjie Gu","raw_affiliation_strings":["Security Research Institute, New H3C Group, Hefei, China"],"affiliations":[{"raw_affiliation_string":"Security Research Institute, New H3C Group, Hefei, China","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5016260066","display_name":"Hong Zhong","orcid":"https://orcid.org/0000-0002-0392-9734"},"institutions":[{"id":"https://openalex.org/I143868143","display_name":"Anhui University","ror":"https://ror.org/05th6yx34","country_code":"CN","type":"education","lineage":["https://openalex.org/I143868143"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Hong Zhong","raw_affiliation_strings":["Key Laboratory of Intelligent Computing and Signal Processing of Ministry of Education, School of Computer Science and Technology, Anhui University, Hefei, China","Institute of Physical Science and Information Technology, Anhui University, Hefei, China","Anhui Engineering Laboratory of IoT Security Technologies, Anhui University, Hefei, China"],"affiliations":[{"raw_affiliation_string":"Key Laboratory of Intelligent Computing and Signal Processing of Ministry of Education, School of Computer Science and Technology, Anhui University, Hefei, China","institution_ids":["https://openalex.org/I143868143"]},{"raw_affiliation_string":"Institute of Physical Science and Information Technology, Anhui University, Hefei, China","institution_ids":["https://openalex.org/I143868143"]},{"raw_affiliation_string":"Anhui Engineering Laboratory of IoT Security Technologies, Anhui University, Hefei, China","institution_ids":["https://openalex.org/I143868143"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5031717657"],"corresponding_institution_ids":["https://openalex.org/I143868143"],"apc_list":null,"apc_paid":null,"fwci":21.8642,"has_fulltext":false,"cited_by_count":48,"citation_normalized_percentile":{"value":0.99448283,"is_in_top_1_percent":true,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":97,"max":100},"biblio":{"volume":"21","issue":"4","first_page":"1587","last_page":"1604"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.9987000226974487,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.9987000226974487,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9656000137329102,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9599999785423279,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8571645021438599},{"id":"https://openalex.org/keywords/random-oracle","display_name":"Random oracle","score":0.7369407415390015},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.6144000887870789},{"id":"https://openalex.org/keywords/message-authentication-code","display_name":"Message authentication code","score":0.5767272710800171},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.5670592784881592},{"id":"https://openalex.org/keywords/overhead","display_name":"Overhead (engineering)","score":0.5217481851577759},{"id":"https://openalex.org/keywords/domain","display_name":"Domain (mathematical analysis)","score":0.4848714768886566},{"id":"https://openalex.org/keywords/authentication-server","display_name":"Authentication server","score":0.4837389290332794},{"id":"https://openalex.org/keywords/enhanced-data-rates-for-gsm-evolution","display_name":"Enhanced Data Rates for GSM Evolution","score":0.47583818435668945},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4723459482192993},{"id":"https://openalex.org/keywords/inter-domain","display_name":"Inter-domain","score":0.4616561830043793},{"id":"https://openalex.org/keywords/security-analysis","display_name":"Security analysis","score":0.44379109144210815},{"id":"https://openalex.org/keywords/server","display_name":"Server","score":0.42683786153793335},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.2736007273197174},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.2520090341567993},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.16819196939468384},{"id":"https://openalex.org/keywords/multicast","display_name":"Multicast","score":0.08346319198608398},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.07497933506965637},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.06794288754463196}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8571645021438599},{"id":"https://openalex.org/C94284585","wikidata":"https://www.wikidata.org/wiki/Q228184","display_name":"Random oracle","level":4,"score":0.7369407415390015},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.6144000887870789},{"id":"https://openalex.org/C141492731","wikidata":"https://www.wikidata.org/wiki/Q1052621","display_name":"Message authentication code","level":3,"score":0.5767272710800171},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.5670592784881592},{"id":"https://openalex.org/C2779960059","wikidata":"https://www.wikidata.org/wiki/Q7113681","display_name":"Overhead (engineering)","level":2,"score":0.5217481851577759},{"id":"https://openalex.org/C36503486","wikidata":"https://www.wikidata.org/wiki/Q11235244","display_name":"Domain (mathematical analysis)","level":2,"score":0.4848714768886566},{"id":"https://openalex.org/C2777331311","wikidata":"https://www.wikidata.org/wiki/Q784561","display_name":"Authentication server","level":3,"score":0.4837389290332794},{"id":"https://openalex.org/C162307627","wikidata":"https://www.wikidata.org/wiki/Q204833","display_name":"Enhanced Data Rates for GSM Evolution","level":2,"score":0.47583818435668945},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4723459482192993},{"id":"https://openalex.org/C5111613","wikidata":"https://www.wikidata.org/wiki/Q3799443","display_name":"Inter-domain","level":4,"score":0.4616561830043793},{"id":"https://openalex.org/C38369872","wikidata":"https://www.wikidata.org/wiki/Q7445009","display_name":"Security analysis","level":2,"score":0.44379109144210815},{"id":"https://openalex.org/C93996380","wikidata":"https://www.wikidata.org/wiki/Q44127","display_name":"Server","level":2,"score":0.42683786153793335},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.2736007273197174},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.2520090341567993},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.16819196939468384},{"id":"https://openalex.org/C32295351","wikidata":"https://www.wikidata.org/wiki/Q899288","display_name":"Multicast","level":2,"score":0.08346319198608398},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.07497933506965637},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.06794288754463196},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C18787934","wikidata":"https://www.wikidata.org/wiki/Q7565105","display_name":"Source-specific multicast","level":3,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tdsc.2023.3285800","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tdsc.2023.3285800","pdf_url":null,"source":{"id":"https://openalex.org/S133795288","display_name":"IEEE Transactions on Dependable and Secure Computing","issn_l":"1545-5971","issn":["1545-5971","1941-0018","2160-9209"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320439","host_organization_name":"IEEE Computer Society","host_organization_lineage":["https://openalex.org/P4310320439","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Computer Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Dependable and Secure Computing","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Industry, innovation and infrastructure","id":"https://metadata.un.org/sdg/9","score":0.46000000834465027}],"awards":[{"id":"https://openalex.org/G6687479257","display_name":null,"funder_award_id":"U1936220","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G827846473","display_name":null,"funder_award_id":"62202005","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G8497496367","display_name":null,"funder_award_id":"62272002","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":["https://openalex.org/W1534616950","https://openalex.org/W196374101","https://openalex.org/W2796227106","https://openalex.org/W2057152612","https://openalex.org/W3201685977","https://openalex.org/W1737843963","https://openalex.org/W2055101194","https://openalex.org/W4296339578","https://openalex.org/W2384350904","https://openalex.org/W4380839239"],"abstract_inverted_index":{"In":[0,36],"edge-assisted":[1,56],"cross-domain":[2,16,20,71,94,110],"Industrial":[3],"Internet":[4],"of":[5,32,146],"Things":[6],"(IIoT),":[7],"blockchain-based":[8,42],"authentication":[9,24,45,58,72,91],"is":[10,106,122,142],"an":[11],"effective":[12],"way":[13],"to":[14,48,65,81],"build":[15,53],"trust":[17],"and":[18,34,73,105,115,129,148],"secure":[19,123],"data.":[21],"However,":[22],"existing":[23],"schemes":[25],"still":[26],"have":[27],"serious":[28],"challenges":[29],"in":[30,69,144],"terms":[31,145],"efficiency":[33,50],"security.":[35],"this":[37],"paper,":[38],"we":[39,52,86],"propose":[40],"a":[41,54,88],"lightweight":[43,57,89],"message":[44,90,99],"scheme.":[46],"First,":[47],"address":[49],"challenges,":[51,85],"blockchain-enabled":[55],"framework.":[59],"This":[60],"framework":[61],"uses":[62],"edge":[63],"servers":[64],"assist":[66],"smart":[67],"devices":[68],"achieving":[70],"effectively":[74],"reduce":[75],"redundant":[76],"interactions":[77],"between":[78],"entities.":[79],"Second,":[80],"resolve":[82],"the":[83,119,125],"security":[84,100,113],"design":[87],"algorithm":[92,97],"for":[93,108],"IIoT.":[95,111],"The":[96,112,134],"guarantees":[98],"with":[101,153],"low":[102],"computational":[103],"overhead":[104,150],"suitable":[107],"multi-receiver":[109],"proof":[114],"analysis":[116],"demonstrate":[117],"that":[118,138],"proposed":[120,140],"scheme":[121,141],"under":[124],"random":[126],"oracle":[127],"model":[128],"can":[130],"resist":[131],"various":[132],"attacks.":[133],"performance":[135],"evaluation":[136],"shows":[137],"our":[139],"superior":[143],"computation":[147],"communication":[149],"when":[151],"compared":[152],"other":[154],"related":[155],"schemes.":[156]},"counts_by_year":[{"year":2026,"cited_by_count":4},{"year":2025,"cited_by_count":25},{"year":2024,"cited_by_count":15},{"year":2023,"cited_by_count":4}],"updated_date":"2026-04-02T15:55:50.835912","created_date":"2025-10-10T00:00:00"}
