{"id":"https://openalex.org/W4411055276","doi":"https://doi.org/10.1109/tnse.2025.3575780","title":"E-PMM: An Efficient Authentication Scheme Based on Binary T-Degree Symmetric Polynomial and ECC for Producer Mobility Management in NDN","display_name":"E-PMM: An Efficient Authentication Scheme Based on Binary T-Degree Symmetric Polynomial and ECC for Producer Mobility Management in NDN","publication_year":2025,"publication_date":"2025-06-05","ids":{"openalex":"https://openalex.org/W4411055276","doi":"https://doi.org/10.1109/tnse.2025.3575780"},"language":"en","primary_location":{"id":"doi:10.1109/tnse.2025.3575780","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tnse.2025.3575780","pdf_url":null,"source":{"id":"https://openalex.org/S2484352698","display_name":"IEEE Transactions on Network Science and Engineering","issn_l":"2327-4697","issn":["2327-4697","2334-329X"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Network Science and Engineering","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5101777618","display_name":"Tong Zhou","orcid":"https://orcid.org/0000-0002-8645-5246"},"institutions":[{"id":"https://openalex.org/I37461747","display_name":"Wuhan University","ror":"https://ror.org/033vjfk17","country_code":"CN","type":"education","lineage":["https://openalex.org/I37461747"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Tong Zhou","raw_affiliation_strings":["The Key Laboratory of Aerospace Information Security and Trusted Computing, Ministry of Education, School of Cyber Science and Engineering, Wuhan University, Wuhan, China"],"affiliations":[{"raw_affiliation_string":"The Key Laboratory of Aerospace Information Security and Trusted Computing, Ministry of Education, School of Cyber Science and Engineering, Wuhan University, Wuhan, China","institution_ids":["https://openalex.org/I37461747"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5070653957","display_name":"Cong Wang","orcid":"https://orcid.org/0000-0001-6429-8799"},"institutions":[{"id":"https://openalex.org/I194450716","display_name":"Jilin University","ror":"https://ror.org/00js3aw79","country_code":"CN","type":"education","lineage":["https://openalex.org/I194450716"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Cong Wang","raw_affiliation_strings":["Key Laboratory of Symbolic Computation and Knowledge Engineering of Ministry of Education, Jilin University, Jilin, China"],"affiliations":[{"raw_affiliation_string":"Key Laboratory of Symbolic Computation and Knowledge Engineering of Ministry of Education, Jilin University, Jilin, China","institution_ids":["https://openalex.org/I194450716"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5020536498","display_name":"Hongpeng Bai","orcid":"https://orcid.org/0000-0002-6298-3327"},"institutions":[{"id":"https://openalex.org/I162868743","display_name":"Tianjin University","ror":"https://ror.org/012tb2g32","country_code":"CN","type":"education","lineage":["https://openalex.org/I162868743"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Hongpeng Bai","raw_affiliation_strings":["College of Intelligence and Computing, Tianjin University, Tianjin, China"],"affiliations":[{"raw_affiliation_string":"College of Intelligence and Computing, Tianjin University, Tianjin, China","institution_ids":["https://openalex.org/I162868743"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5040791046","display_name":"Guangquan Xu","orcid":"https://orcid.org/0000-0001-8701-3944"},"institutions":[{"id":"https://openalex.org/I162868743","display_name":"Tianjin University","ror":"https://ror.org/012tb2g32","country_code":"CN","type":"education","lineage":["https://openalex.org/I162868743"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Guangquan Xu","raw_affiliation_strings":["College of Intelligence and Computing, Tianjin University, Tianjin, China"],"affiliations":[{"raw_affiliation_string":"College of Intelligence and Computing, Tianjin University, Tianjin, China","institution_ids":["https://openalex.org/I162868743"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5072659343","display_name":"Hong\u2010Ning Dai","orcid":"https://orcid.org/0000-0001-6165-4196"},"institutions":[{"id":"https://openalex.org/I141568987","display_name":"Hong Kong Baptist University","ror":"https://ror.org/0145fw131","country_code":"HK","type":"education","lineage":["https://openalex.org/I141568987"]}],"countries":["HK"],"is_corresponding":false,"raw_author_name":"Hong-Ning Dai","raw_affiliation_strings":["Department of Computer Science, Hong Kong Baptist University, Hong Kang, China"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, Hong Kong Baptist University, Hong Kang, China","institution_ids":["https://openalex.org/I141568987"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5101777618"],"corresponding_institution_ids":["https://openalex.org/I37461747"],"apc_list":null,"apc_paid":null,"fwci":0.7964,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.74205489,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":91,"max":95},"biblio":{"volume":"12","issue":"6","first_page":"4772","last_page":"4786"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10651","display_name":"IPv6, Mobility, Handover, Networks, Security","score":0.9789000153541565,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10651","display_name":"IPv6, Mobility, Handover, Networks, Security","score":0.9789000153541565,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12326","display_name":"Network Packet Processing and Optimization","score":0.9477999806404114,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.9243000149726868,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/degree","display_name":"Degree (music)","score":0.6610120534896851},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.531798779964447},{"id":"https://openalex.org/keywords/polynomial","display_name":"Polynomial","score":0.5157423615455627},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.4897058308124542},{"id":"https://openalex.org/keywords/binary-number","display_name":"Binary number","score":0.4802961051464081},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.44090625643730164},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.40238156914711},{"id":"https://openalex.org/keywords/discrete-mathematics","display_name":"Discrete mathematics","score":0.3419446647167206},{"id":"https://openalex.org/keywords/physics","display_name":"Physics","score":0.1923045814037323},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.13876470923423767},{"id":"https://openalex.org/keywords/arithmetic","display_name":"Arithmetic","score":0.13097131252288818},{"id":"https://openalex.org/keywords/mathematical-analysis","display_name":"Mathematical analysis","score":0.08295094966888428}],"concepts":[{"id":"https://openalex.org/C2775997480","wikidata":"https://www.wikidata.org/wiki/Q586277","display_name":"Degree (music)","level":2,"score":0.6610120534896851},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.531798779964447},{"id":"https://openalex.org/C90119067","wikidata":"https://www.wikidata.org/wiki/Q43260","display_name":"Polynomial","level":2,"score":0.5157423615455627},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.4897058308124542},{"id":"https://openalex.org/C48372109","wikidata":"https://www.wikidata.org/wiki/Q3913","display_name":"Binary number","level":2,"score":0.4802961051464081},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.44090625643730164},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.40238156914711},{"id":"https://openalex.org/C118615104","wikidata":"https://www.wikidata.org/wiki/Q121416","display_name":"Discrete mathematics","level":1,"score":0.3419446647167206},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.1923045814037323},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.13876470923423767},{"id":"https://openalex.org/C94375191","wikidata":"https://www.wikidata.org/wiki/Q11205","display_name":"Arithmetic","level":1,"score":0.13097131252288818},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.08295094966888428},{"id":"https://openalex.org/C24890656","wikidata":"https://www.wikidata.org/wiki/Q82811","display_name":"Acoustics","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tnse.2025.3575780","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tnse.2025.3575780","pdf_url":null,"source":{"id":"https://openalex.org/S2484352698","display_name":"IEEE Transactions on Network Science and Engineering","issn_l":"2327-4697","issn":["2327-4697","2334-329X"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Network Science and Engineering","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":32,"referenced_works":["https://openalex.org/W2102178031","https://openalex.org/W2155903900","https://openalex.org/W2935717983","https://openalex.org/W2946555830","https://openalex.org/W2971293579","https://openalex.org/W3010349142","https://openalex.org/W3042232279","https://openalex.org/W3080197205","https://openalex.org/W3148448529","https://openalex.org/W3159760028","https://openalex.org/W3161427599","https://openalex.org/W3195638444","https://openalex.org/W3201541548","https://openalex.org/W4205105496","https://openalex.org/W4211217688","https://openalex.org/W4213061865","https://openalex.org/W4281678246","https://openalex.org/W4281776086","https://openalex.org/W4295789129","https://openalex.org/W4309183973","https://openalex.org/W4309930099","https://openalex.org/W4320038884","https://openalex.org/W4322618479","https://openalex.org/W4327920781","https://openalex.org/W4360995450","https://openalex.org/W4366957204","https://openalex.org/W4367397126","https://openalex.org/W4377101716","https://openalex.org/W4382119348","https://openalex.org/W4385462834","https://openalex.org/W4386142802","https://openalex.org/W4386759009"],"related_works":["https://openalex.org/W2399035783","https://openalex.org/W3161230432","https://openalex.org/W4367190712","https://openalex.org/W2168900540","https://openalex.org/W1487201914","https://openalex.org/W4301429470","https://openalex.org/W280458463","https://openalex.org/W1170131723","https://openalex.org/W2125310826","https://openalex.org/W2242172122"],"abstract_inverted_index":{"The":[0],"Named":[1],"Data":[2],"Network":[3],"(NDN)":[4],"is":[5,119,157],"an":[6,83],"innovative":[7],"architecture":[8],"focusing":[9],"on":[10],"content-based":[11],"networking,":[12],"but":[13],"it":[14],"currently":[15],"lacks":[16],"a":[17,48,114,136,170],"feasible":[18],"solution":[19],"for":[20,38,110,188],"identity":[21,89,164],"authentication":[22,90,109,138,187],"of":[23,76,101,172],"mobile":[24,111,192],"producers.":[25,77,112],"Authentication":[26],"schemes":[27],"in":[28,55,191],"existing":[29],"networks":[30],"often":[31],"fail":[32],"to":[33,44,103,121,134,159],"meet":[34],"NDN's":[35,64],"dual":[36],"demands":[37],"security":[39,152],"and":[40,59,88,98,107,132,145,166,175,184],"operational":[41],"efficiency,":[42],"due":[43],"inherent":[45],"flaws":[46],"such":[47,162],"weaknesses":[49],"like":[50],"interest":[51,117,123],"flooding":[52,124],"attacks,":[53],"challenges":[54],"cross-domain":[56],"trust":[57],"establishment":[58],"prolonged":[60],"handover":[61,180],"delays.":[62],"Additionally,":[63],"initial":[65],"design":[66],"did":[67],"not":[68],"adequately":[69],"take":[70],"into":[71,150],"account":[72],"the":[73,96,143,151],"dynamic":[74],"mobility":[75,86,105,190],"In":[78],"this":[79],"paper,":[80],"we":[81,141],"propose":[82],"efficient":[84],"producer":[85,189],"management":[87,106],"scheme,":[91],"called":[92],"E-PMM,":[93],"which":[94],"revises":[95],"packet":[97],"router":[99],"structures":[100],"NDN":[102,193],"support":[104],"secure":[108],"Meanwhile,":[113],"producer-based":[115],"control":[116],"package":[118],"designed":[120],"mitigate":[122],"attacks.":[125,168],"E-PMM":[126,156,177],"utilizes":[127],"Binary":[128],"T-degree":[129],"symmetric":[130],"polynomials":[131],"ECC":[133],"create":[135],"robust":[137],"process.":[139],"Furthermore,":[140],"incorporate":[142],"Canetti":[144],"Krawczyk":[146],"(CK)":[147],"adversary":[148],"model":[149],"analysis,":[153],"proving":[154],"that":[155],"resistant":[158],"critical":[160],"attacks":[161],"as":[163],"forgery":[165],"man-in-the-middle":[167],"Through":[169],"combination":[171],"theoretical":[173],"analysis":[174],"simulations,":[176],"significantly":[178],"reduces":[179],"delays,":[181],"improves":[182],"security,":[183],"efficiently":[185],"manages":[186],"environments.":[194]},"counts_by_year":[{"year":2025,"cited_by_count":1}],"updated_date":"2026-03-12T08:34:05.389933","created_date":"2025-10-10T00:00:00"}
