{"id":"https://openalex.org/W4312328866","doi":"https://doi.org/10.1109/tnse.2022.3224453","title":"Efficient and Anonymous Cross-Domain Authentication for IIoT Based on Blockchain","display_name":"Efficient and Anonymous Cross-Domain Authentication for IIoT Based on Blockchain","publication_year":2022,"publication_date":"2022-11-24","ids":{"openalex":"https://openalex.org/W4312328866","doi":"https://doi.org/10.1109/tnse.2022.3224453"},"language":"en","primary_location":{"id":"doi:10.1109/tnse.2022.3224453","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tnse.2022.3224453","pdf_url":null,"source":{"id":"https://openalex.org/S2484352698","display_name":"IEEE Transactions on Network Science and Engineering","issn_l":"2327-4697","issn":["2327-4697","2334-329X"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Network Science and Engineering","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5081525426","display_name":"Jie Cui","orcid":"https://orcid.org/0000-0001-7258-3418"},"institutions":[{"id":"https://openalex.org/I143868143","display_name":"Anhui University","ror":"https://ror.org/05th6yx34","country_code":"CN","type":"education","lineage":["https://openalex.org/I143868143"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Jie Cui","raw_affiliation_strings":["Key Laboratory of Intelligent Computing and Signal Processing of Ministry of Education, School of Computer Science and Technology, Anhui University, Hefei, China","Anhui Engineering Laboratory of IoT Security Technologies, Anhui University, Hefei, China"],"affiliations":[{"raw_affiliation_string":"Key Laboratory of Intelligent Computing and Signal Processing of Ministry of Education, School of Computer Science and Technology, Anhui University, Hefei, China","institution_ids":["https://openalex.org/I143868143"]},{"raw_affiliation_string":"Anhui Engineering Laboratory of IoT Security Technologies, Anhui University, Hefei, China","institution_ids":["https://openalex.org/I143868143"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100622088","display_name":"Nan Liu","orcid":"https://orcid.org/0000-0003-4155-0685"},"institutions":[{"id":"https://openalex.org/I143868143","display_name":"Anhui University","ror":"https://ror.org/05th6yx34","country_code":"CN","type":"education","lineage":["https://openalex.org/I143868143"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Nan Liu","raw_affiliation_strings":["Key Laboratory of Intelligent Computing and Signal Processing of Ministry of Education, School of Computer Science and Technology, Anhui University, Hefei, China","Anhui Engineering Laboratory of IoT Security Technologies, Anhui University, Hefei, China"],"affiliations":[{"raw_affiliation_string":"Key Laboratory of Intelligent Computing and Signal Processing of Ministry of Education, School of Computer Science and Technology, Anhui University, Hefei, China","institution_ids":["https://openalex.org/I143868143"]},{"raw_affiliation_string":"Anhui Engineering Laboratory of IoT Security Technologies, Anhui University, Hefei, China","institution_ids":["https://openalex.org/I143868143"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5015149253","display_name":"Qingyang Zhang","orcid":"https://orcid.org/0000-0002-2600-6748"},"institutions":[{"id":"https://openalex.org/I143868143","display_name":"Anhui University","ror":"https://ror.org/05th6yx34","country_code":"CN","type":"education","lineage":["https://openalex.org/I143868143"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Qingyang Zhang","raw_affiliation_strings":["Key Laboratory of Intelligent Computing and Signal Processing of Ministry of Education, School of Computer Science and Technology, Anhui University, Hefei, China","Anhui Engineering Laboratory of IoT Security Technologies, Anhui University, Hefei, China"],"affiliations":[{"raw_affiliation_string":"Key Laboratory of Intelligent Computing and Signal Processing of Ministry of Education, School of Computer Science and Technology, Anhui University, Hefei, China","institution_ids":["https://openalex.org/I143868143"]},{"raw_affiliation_string":"Anhui Engineering Laboratory of IoT Security Technologies, Anhui University, Hefei, China","institution_ids":["https://openalex.org/I143868143"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5025668908","display_name":"Debiao He","orcid":"https://orcid.org/0000-0002-2446-7436"},"institutions":[{"id":"https://openalex.org/I37461747","display_name":"Wuhan University","ror":"https://ror.org/033vjfk17","country_code":"CN","type":"education","lineage":["https://openalex.org/I37461747"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Debiao He","raw_affiliation_strings":["School of Cyber Science and Engineering, Wuhan University, Wuhan, China","Shanghai Key Laboratory of Privacy-Preserving Computation, MatrixElements Technologies, Shanghai, China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Science and Engineering, Wuhan University, Wuhan, China","institution_ids":["https://openalex.org/I37461747"]},{"raw_affiliation_string":"Shanghai Key Laboratory of Privacy-Preserving Computation, MatrixElements Technologies, Shanghai, China","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5077232320","display_name":"Chengjie Gu","orcid":"https://orcid.org/0009-0001-6597-168X"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Chengjie Gu","raw_affiliation_strings":["Security Research Institute, New H3C Group, Hefei, China"],"affiliations":[{"raw_affiliation_string":"Security Research Institute, New H3C Group, Hefei, China","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5016260066","display_name":"Hong Zhong","orcid":"https://orcid.org/0000-0002-0392-9734"},"institutions":[{"id":"https://openalex.org/I143868143","display_name":"Anhui University","ror":"https://ror.org/05th6yx34","country_code":"CN","type":"education","lineage":["https://openalex.org/I143868143"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Hong Zhong","raw_affiliation_strings":["Key Laboratory of Intelligent Computing and Signal Processing of Ministry of Education, School of Computer Science and Technology, Anhui University, Hefei, China","Anhui Engineering Laboratory of IoT Security Technologies, Anhui University, Hefei, China"],"affiliations":[{"raw_affiliation_string":"Key Laboratory of Intelligent Computing and Signal Processing of Ministry of Education, School of Computer Science and Technology, Anhui University, Hefei, China","institution_ids":["https://openalex.org/I143868143"]},{"raw_affiliation_string":"Anhui Engineering Laboratory of IoT Security Technologies, Anhui University, Hefei, China","institution_ids":["https://openalex.org/I143868143"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5081525426"],"corresponding_institution_ids":["https://openalex.org/I143868143"],"apc_list":null,"apc_paid":null,"fwci":16.3625,"has_fulltext":false,"cited_by_count":55,"citation_normalized_percentile":{"value":0.99171486,"is_in_top_1_percent":true,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":97,"max":100},"biblio":{"volume":"10","issue":"2","first_page":"899","last_page":"910"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9983999729156494,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10273","display_name":"IoT and Edge/Fog Computing","score":0.9887999892234802,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7548267245292664},{"id":"https://openalex.org/keywords/single-point-of-failure","display_name":"Single point of failure","score":0.7354657649993896},{"id":"https://openalex.org/keywords/blockchain","display_name":"Blockchain","score":0.6524648070335388},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6391934156417847},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.5705024003982544},{"id":"https://openalex.org/keywords/anonymity","display_name":"Anonymity","score":0.521985650062561},{"id":"https://openalex.org/keywords/inter-domain","display_name":"Inter-domain","score":0.48807990550994873},{"id":"https://openalex.org/keywords/information-leakage","display_name":"Information leakage","score":0.45697176456451416},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.3982263505458832},{"id":"https://openalex.org/keywords/multicast","display_name":"Multicast","score":0.16408801078796387}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7548267245292664},{"id":"https://openalex.org/C165136773","wikidata":"https://www.wikidata.org/wiki/Q1363179","display_name":"Single point of failure","level":2,"score":0.7354657649993896},{"id":"https://openalex.org/C2779687700","wikidata":"https://www.wikidata.org/wiki/Q20514253","display_name":"Blockchain","level":2,"score":0.6524648070335388},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6391934156417847},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.5705024003982544},{"id":"https://openalex.org/C178005623","wikidata":"https://www.wikidata.org/wiki/Q308859","display_name":"Anonymity","level":2,"score":0.521985650062561},{"id":"https://openalex.org/C5111613","wikidata":"https://www.wikidata.org/wiki/Q3799443","display_name":"Inter-domain","level":4,"score":0.48807990550994873},{"id":"https://openalex.org/C2779201187","wikidata":"https://www.wikidata.org/wiki/Q2775060","display_name":"Information leakage","level":2,"score":0.45697176456451416},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.3982263505458832},{"id":"https://openalex.org/C32295351","wikidata":"https://www.wikidata.org/wiki/Q899288","display_name":"Multicast","level":2,"score":0.16408801078796387},{"id":"https://openalex.org/C18787934","wikidata":"https://www.wikidata.org/wiki/Q7565105","display_name":"Source-specific multicast","level":3,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tnse.2022.3224453","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tnse.2022.3224453","pdf_url":null,"source":{"id":"https://openalex.org/S2484352698","display_name":"IEEE Transactions on Network Science and Engineering","issn_l":"2327-4697","issn":["2327-4697","2334-329X"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Network Science and Engineering","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/9","display_name":"Industry, innovation and infrastructure","score":0.550000011920929}],"awards":[{"id":"https://openalex.org/G1101349560","display_name":null,"funder_award_id":"2208085QF198","funder_id":"https://openalex.org/F4320334897","funder_display_name":"Natural Science Foundation of Anhui Province"},{"id":"https://openalex.org/G1765855239","display_name":null,"funder_award_id":"62202008","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G6687479257","display_name":null,"funder_award_id":"U1936220","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G827846473","display_name":null,"funder_award_id":"62202005","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G8497496367","display_name":null,"funder_award_id":"62272002","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G8841839404","display_name":null,"funder_award_id":"2208085QF196","funder_id":"https://openalex.org/F4320334897","funder_display_name":"Natural Science Foundation of Anhui Province"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320334897","display_name":"Natural Science Foundation of Anhui Province","ror":null}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":41,"referenced_works":["https://openalex.org/W2121262523","https://openalex.org/W2582312183","https://openalex.org/W2591245705","https://openalex.org/W2747564141","https://openalex.org/W2771783069","https://openalex.org/W2777447168","https://openalex.org/W2811266402","https://openalex.org/W2884189562","https://openalex.org/W2893109375","https://openalex.org/W2906368130","https://openalex.org/W2907164519","https://openalex.org/W2909485178","https://openalex.org/W2922985695","https://openalex.org/W2963501858","https://openalex.org/W2969883781","https://openalex.org/W2977247807","https://openalex.org/W2979779867","https://openalex.org/W2980990088","https://openalex.org/W2998452777","https://openalex.org/W3010858269","https://openalex.org/W3017170021","https://openalex.org/W3082337779","https://openalex.org/W3084387290","https://openalex.org/W3092122324","https://openalex.org/W3104953546","https://openalex.org/W3107123545","https://openalex.org/W3111142426","https://openalex.org/W3135801859","https://openalex.org/W3139318142","https://openalex.org/W3150062880","https://openalex.org/W3154832033","https://openalex.org/W3157394202","https://openalex.org/W3168833844","https://openalex.org/W3173907290","https://openalex.org/W3183673024","https://openalex.org/W3187997040","https://openalex.org/W3201410046","https://openalex.org/W3201703097","https://openalex.org/W4205283914","https://openalex.org/W4210421291","https://openalex.org/W4214564192"],"related_works":["https://openalex.org/W4210406818","https://openalex.org/W4306779889","https://openalex.org/W3048554917","https://openalex.org/W3211706803","https://openalex.org/W4382775358","https://openalex.org/W4246942721","https://openalex.org/W3209862047","https://openalex.org/W4386732777","https://openalex.org/W4304136894","https://openalex.org/W3195581271"],"abstract_inverted_index":{"The":[0,53],"rapid":[1],"development":[2],"of":[3,7,14,55,61,65,72,96],"the":[4,12,59],"Industrial":[5],"Internet":[6],"Things":[8],"(IIoT)":[9],"has":[10],"realized":[11],"intelligence":[13],"industrial":[15],"manufacturing":[16],"and":[17,38,45,79,90,103,136,139,157,164],"improved":[18,22],"production":[19],"efficiency.":[20,82,165],"For":[21],"collaboration,":[23],"devices":[24],"from":[25],"different":[26],"management":[27,77],"domains":[28],"(e.g.,":[29],"factories)":[30],"connected":[31],"through":[32],"various":[33],"communication":[34,50,114],"technologies":[35],"exchange":[36],"information":[37],"share":[39],"resources.":[40],"However,":[41],"they":[42],"face":[43],"security":[44],"privacy":[46],"issues":[47],"when":[48],"cross-domain":[49,105,116],"requires":[51],"authentication.":[52,146],"limitations":[54],"existing":[56],"schemes":[57],"include":[58],"risk":[60],"a":[62,68,158],"single":[63],"point":[64],"failure":[66],"in":[67],"trusted":[69],"center,":[70],"leakage":[71],"device":[73,127],"privacy,":[74],"high":[75],"certificate":[76],"costs,":[78],"low":[80],"authentication":[81,106,123],"Because":[83],"blockchain":[84,110,138],"with":[85],"features":[86],"such":[87],"as":[88],"decentralization":[89],"tamper-proof":[91],"can":[92,153],"effectively":[93],"solve":[94],"some":[95],"these":[97],"problems,":[98],"we":[99],"design":[100],"an":[101],"efficient":[102],"anonymous":[104],"scheme":[107,121,152],"based":[108],"on":[109],"to":[111,129,143],"achieve":[112,144],"reliable":[113],"between":[115],"IIoT":[117],"devices.":[118],"Specifically,":[119],"our":[120,151],"improves":[122],"efficiency":[124],"while":[125],"enabling":[126],"anonymity":[128],"ensure":[130],"that":[131,150],"identities":[132],"are":[133],"not":[134],"linkable,":[135],"combines":[137],"dynamic":[140],"accumulator":[141],"technology":[142],"fast":[145],"Security":[147],"analysis":[148],"demonstrates":[149],"resist":[154],"common":[155],"attacks,":[156],"performance":[159],"evaluation":[160],"proves":[161],"its":[162],"feasibility":[163]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":27},{"year":2024,"cited_by_count":22},{"year":2023,"cited_by_count":5}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
