{"id":"https://openalex.org/W4295832118","doi":"https://doi.org/10.1109/tnsm.2022.3206378","title":"Efficient Batch Authentication Scheme Based on Edge Computing in IIoT","display_name":"Efficient Batch Authentication Scheme Based on Edge Computing in IIoT","publication_year":2022,"publication_date":"2022-09-13","ids":{"openalex":"https://openalex.org/W4295832118","doi":"https://doi.org/10.1109/tnsm.2022.3206378"},"language":"en","primary_location":{"id":"doi:10.1109/tnsm.2022.3206378","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tnsm.2022.3206378","pdf_url":null,"source":{"id":"https://openalex.org/S173527311","display_name":"IEEE Transactions on Network and Service Management","issn_l":"1932-4537","issn":["1932-4537","2373-7379"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Network and Service Management","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5081525426","display_name":"Jie Cui","orcid":"https://orcid.org/0000-0001-7258-3418"},"institutions":[{"id":"https://openalex.org/I143868143","display_name":"Anhui University","ror":"https://ror.org/05th6yx34","country_code":"CN","type":"education","lineage":["https://openalex.org/I143868143"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Jie Cui","raw_affiliation_strings":["Key Laboratory of Intelligent Computing and Signal Processing of Ministry of Education, School of Computer Science and Technology, Institute of Physical Science and Information Technology, and the Anhui Engineering Laboratory of IoT Security Technologies, Anhui University, Hefei, China"],"affiliations":[{"raw_affiliation_string":"Key Laboratory of Intelligent Computing and Signal Processing of Ministry of Education, School of Computer Science and Technology, Institute of Physical Science and Information Technology, and the Anhui Engineering Laboratory of IoT Security Technologies, Anhui University, Hefei, China","institution_ids":["https://openalex.org/I143868143"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5031717657","display_name":"Fengqun Wang","orcid":"https://orcid.org/0000-0003-2465-7982"},"institutions":[{"id":"https://openalex.org/I143868143","display_name":"Anhui University","ror":"https://ror.org/05th6yx34","country_code":"CN","type":"education","lineage":["https://openalex.org/I143868143"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Fengqun Wang","raw_affiliation_strings":["Key Laboratory of Intelligent Computing and Signal Processing of Ministry of Education, School of Computer Science and Technology, Institute of Physical Science and Information Technology, and the Anhui Engineering Laboratory of IoT Security Technologies, Anhui University, Hefei, China"],"affiliations":[{"raw_affiliation_string":"Key Laboratory of Intelligent Computing and Signal Processing of Ministry of Education, School of Computer Science and Technology, Institute of Physical Science and Information Technology, and the Anhui Engineering Laboratory of IoT Security Technologies, Anhui University, Hefei, China","institution_ids":["https://openalex.org/I143868143"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5015149253","display_name":"Qingyang Zhang","orcid":"https://orcid.org/0000-0002-2600-6748"},"institutions":[{"id":"https://openalex.org/I143868143","display_name":"Anhui University","ror":"https://ror.org/05th6yx34","country_code":"CN","type":"education","lineage":["https://openalex.org/I143868143"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Qingyang Zhang","raw_affiliation_strings":["Key Laboratory of Intelligent Computing and Signal Processing of Ministry of Education, School of Computer Science and Technology, Institute of Physical Science and Information Technology, and the Anhui Engineering Laboratory of IoT Security Technologies, Anhui University, Hefei, China"],"affiliations":[{"raw_affiliation_string":"Key Laboratory of Intelligent Computing and Signal Processing of Ministry of Education, School of Computer Science and Technology, Institute of Physical Science and Information Technology, and the Anhui Engineering Laboratory of IoT Security Technologies, Anhui University, Hefei, China","institution_ids":["https://openalex.org/I143868143"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5077232320","display_name":"Chengjie Gu","orcid":"https://orcid.org/0009-0001-6597-168X"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Chengjie Gu","raw_affiliation_strings":["Security Research Institute, New H3C Group, Hefei, China"],"affiliations":[{"raw_affiliation_string":"Security Research Institute, New H3C Group, Hefei, China","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5016260066","display_name":"Hong Zhong","orcid":"https://orcid.org/0000-0002-0392-9734"},"institutions":[{"id":"https://openalex.org/I143868143","display_name":"Anhui University","ror":"https://ror.org/05th6yx34","country_code":"CN","type":"education","lineage":["https://openalex.org/I143868143"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Hong Zhong","raw_affiliation_strings":["Key Laboratory of Intelligent Computing and Signal Processing of Ministry of Education, School of Computer Science and Technology, Institute of Physical Science and Information Technology, and the Anhui Engineering Laboratory of IoT Security Technologies, Anhui University, Hefei, China"],"affiliations":[{"raw_affiliation_string":"Key Laboratory of Intelligent Computing and Signal Processing of Ministry of Education, School of Computer Science and Technology, Institute of Physical Science and Information Technology, and the Anhui Engineering Laboratory of IoT Security Technologies, Anhui University, Hefei, China","institution_ids":["https://openalex.org/I143868143"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5081525426"],"corresponding_institution_ids":["https://openalex.org/I143868143"],"apc_list":null,"apc_paid":null,"fwci":3.862,"has_fulltext":false,"cited_by_count":30,"citation_normalized_percentile":{"value":0.9420411,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":96,"max":100},"biblio":{"volume":"20","issue":"1","first_page":"357","last_page":"368"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9986000061035156,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9986000061035156,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10273","display_name":"IoT and Edge/Fog Computing","score":0.9983999729156494,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9976999759674072,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.844331681728363},{"id":"https://openalex.org/keywords/random-oracle","display_name":"Random oracle","score":0.6634564399719238},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.6053272485733032},{"id":"https://openalex.org/keywords/edge-computing","display_name":"Edge computing","score":0.5642691850662231},{"id":"https://openalex.org/keywords/overhead","display_name":"Overhead (engineering)","score":0.5119196176528931},{"id":"https://openalex.org/keywords/server","display_name":"Server","score":0.4915865361690521},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.47176769375801086},{"id":"https://openalex.org/keywords/enhanced-data-rates-for-gsm-evolution","display_name":"Enhanced Data Rates for GSM Evolution","score":0.4569428861141205},{"id":"https://openalex.org/keywords/message-authentication-code","display_name":"Message authentication code","score":0.45300212502479553},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.4199422597885132},{"id":"https://openalex.org/keywords/edge-device","display_name":"Edge device","score":0.41516464948654175},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.4006492793560028},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.36051303148269653},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.2965090274810791},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.23197424411773682},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.19980549812316895},{"id":"https://openalex.org/keywords/internet-of-things","display_name":"Internet of Things","score":0.16986975073814392},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.10668665170669556},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.09681746363639832}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.844331681728363},{"id":"https://openalex.org/C94284585","wikidata":"https://www.wikidata.org/wiki/Q228184","display_name":"Random oracle","level":4,"score":0.6634564399719238},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.6053272485733032},{"id":"https://openalex.org/C2778456923","wikidata":"https://www.wikidata.org/wiki/Q5337692","display_name":"Edge computing","level":3,"score":0.5642691850662231},{"id":"https://openalex.org/C2779960059","wikidata":"https://www.wikidata.org/wiki/Q7113681","display_name":"Overhead (engineering)","level":2,"score":0.5119196176528931},{"id":"https://openalex.org/C93996380","wikidata":"https://www.wikidata.org/wiki/Q44127","display_name":"Server","level":2,"score":0.4915865361690521},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.47176769375801086},{"id":"https://openalex.org/C162307627","wikidata":"https://www.wikidata.org/wiki/Q204833","display_name":"Enhanced Data Rates for GSM Evolution","level":2,"score":0.4569428861141205},{"id":"https://openalex.org/C141492731","wikidata":"https://www.wikidata.org/wiki/Q1052621","display_name":"Message authentication code","level":3,"score":0.45300212502479553},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.4199422597885132},{"id":"https://openalex.org/C138236772","wikidata":"https://www.wikidata.org/wiki/Q25098575","display_name":"Edge device","level":3,"score":0.41516464948654175},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.4006492793560028},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.36051303148269653},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.2965090274810791},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.23197424411773682},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.19980549812316895},{"id":"https://openalex.org/C81860439","wikidata":"https://www.wikidata.org/wiki/Q251212","display_name":"Internet of Things","level":2,"score":0.16986975073814392},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.10668665170669556},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.09681746363639832},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tnsm.2022.3206378","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tnsm.2022.3206378","pdf_url":null,"source":{"id":"https://openalex.org/S173527311","display_name":"IEEE Transactions on Network and Service Management","issn_l":"1932-4537","issn":["1932-4537","2373-7379"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Network and Service Management","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G6687479257","display_name":null,"funder_award_id":"U1936220","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G8497496367","display_name":null,"funder_award_id":"62272002","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":35,"referenced_works":["https://openalex.org/W2169194339","https://openalex.org/W2320588269","https://openalex.org/W2737889100","https://openalex.org/W2757052425","https://openalex.org/W2769200374","https://openalex.org/W2782590878","https://openalex.org/W2804658645","https://openalex.org/W2894688306","https://openalex.org/W2921008479","https://openalex.org/W2962756931","https://openalex.org/W2966623585","https://openalex.org/W2970049315","https://openalex.org/W2976100997","https://openalex.org/W2989540564","https://openalex.org/W2997603100","https://openalex.org/W2997638503","https://openalex.org/W2997858997","https://openalex.org/W3000492549","https://openalex.org/W3004823277","https://openalex.org/W3006456063","https://openalex.org/W3010858269","https://openalex.org/W3011099504","https://openalex.org/W3016827763","https://openalex.org/W3020396993","https://openalex.org/W3034158833","https://openalex.org/W3037964625","https://openalex.org/W3039416669","https://openalex.org/W3039758654","https://openalex.org/W3042667087","https://openalex.org/W3043320740","https://openalex.org/W3089096050","https://openalex.org/W3091946331","https://openalex.org/W3107123545","https://openalex.org/W3134720613","https://openalex.org/W3193479553"],"related_works":["https://openalex.org/W3154796165","https://openalex.org/W4322761281","https://openalex.org/W4238233472","https://openalex.org/W3111395152","https://openalex.org/W4313526662","https://openalex.org/W4313463218","https://openalex.org/W2796227106","https://openalex.org/W3106131444","https://openalex.org/W3216099748","https://openalex.org/W4205963435"],"abstract_inverted_index":{"In":[0,177],"the":[1,50,57,67,78,100,139,147,157,163,169,175,181,184],"industrial":[2],"Internet":[3],"of":[4,22,60,103,149,171,174,183],"Things":[5],"(IIoT)":[6],"environment":[7,80],"(e.g.,":[8],"a":[9,32,108,121],"smart":[10,12,96,132,143],"factory),":[11],"devices":[13,97,133,144],"with":[14,38],"limited":[15],"computing":[16,115],"power":[17],"can":[18],"bring":[19],"large":[20],"amounts":[21],"privacy-sensitive":[23],"data":[24,63,68,93,104],"into":[25],"insecure":[26],"networks":[27],"when":[28],"they":[29],"interact.":[30],"If":[31],"network":[33],"attacker":[34],"intercepts":[35],"and":[36,47,98,126,145,167],"tampers":[37],"this":[39],"data,":[40,136],"it":[41],"may":[42],"cause":[43],"chaos":[44],"in":[45,77,116,134,162],"production":[46],"even":[48],"paralyze":[49],"entire":[51],"IIoT":[52,79],"system.":[53],"Therefore,":[54],"to":[55,91,130],"ensure":[56,92],"regular":[58],"operation":[59],"intelligent":[61],"production,":[62],"receivers":[64],"must":[65],"authenticate":[66,81],"before":[69],"using":[70],"them.":[71],"However,":[72],"existing":[73],"message":[74,83,150],"authentication":[75,110,124],"schemes":[76],"each":[82],"individually,":[84],"which":[85],"creates":[86],"many":[87],"redundant":[88],"operations.":[89],"Hence,":[90],"security":[94,153,172],"among":[95],"reduce":[99],"computational":[101,140],"overhead":[102],"processing,":[105],"we":[106,119,179],"propose":[107],"batch":[109,123],"scheme":[111,159,185],"based":[112],"on":[113,142],"edge":[114,128],"IIoT.":[117,176],"Specifically,":[118],"design":[120],"lightweight":[122],"algorithm":[125],"use":[127],"servers":[129],"assist":[131],"authenticating":[135],"thus":[137],"reducing":[138],"burden":[141],"improving":[146],"efficiency":[148,182],"authentication.":[151],"The":[152],"analysis":[154],"shows":[155],"that":[156],"proposed":[158],"is":[160],"secure":[161],"random":[164],"oracle":[165],"model":[166],"meets":[168],"series":[170],"requirements":[173],"addition,":[178],"illustrate":[180],"through":[186],"experiments.":[187]},"counts_by_year":[{"year":2026,"cited_by_count":2},{"year":2025,"cited_by_count":10},{"year":2024,"cited_by_count":15},{"year":2023,"cited_by_count":3}],"updated_date":"2026-03-12T08:34:05.389933","created_date":"2025-10-10T00:00:00"}
