{"id":"https://openalex.org/W4413212653","doi":"https://doi.org/10.1109/tnsm.2025.3597417","title":"Privacy-Preserving Authentication With Service Analytics for Forensic-Aware Cyber-Physical Systems","display_name":"Privacy-Preserving Authentication With Service Analytics for Forensic-Aware Cyber-Physical Systems","publication_year":2025,"publication_date":"2025-08-11","ids":{"openalex":"https://openalex.org/W4413212653","doi":"https://doi.org/10.1109/tnsm.2025.3597417"},"language":"en","primary_location":{"id":"doi:10.1109/tnsm.2025.3597417","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tnsm.2025.3597417","pdf_url":null,"source":{"id":"https://openalex.org/S173527311","display_name":"IEEE Transactions on Network and Service Management","issn_l":"1932-4537","issn":["1932-4537","2373-7379"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Network and Service Management","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5035735165","display_name":"B. D. Deebak","orcid":"https://orcid.org/0000-0002-4008-6350"},"institutions":[{"id":"https://openalex.org/I12832649","display_name":"Gachon University","ror":"https://ror.org/03ryywt80","country_code":"KR","type":"education","lineage":["https://openalex.org/I12832649"]},{"id":"https://openalex.org/I39555362","display_name":"University of Warwick","ror":"https://ror.org/01a77tt86","country_code":"GB","type":"education","lineage":["https://openalex.org/I39555362"]}],"countries":["GB","KR"],"is_corresponding":true,"raw_author_name":"B. D. Deebak","raw_affiliation_strings":["Secure Cyber Systems Research Group, WMG, University of Warwick, Coventry, U.K","Department of Computer Engineering, Gachon Univesity, Gachon University, Seongnam, South Korea"],"affiliations":[{"raw_affiliation_string":"Secure Cyber Systems Research Group, WMG, University of Warwick, Coventry, U.K","institution_ids":["https://openalex.org/I39555362"]},{"raw_affiliation_string":"Department of Computer Engineering, Gachon Univesity, Gachon University, Seongnam, South Korea","institution_ids":["https://openalex.org/I12832649"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5086844518","display_name":"Seong Oun Hwang","orcid":"https://orcid.org/0000-0003-4240-6255"},"institutions":[{"id":"https://openalex.org/I12832649","display_name":"Gachon University","ror":"https://ror.org/03ryywt80","country_code":"KR","type":"education","lineage":["https://openalex.org/I12832649"]}],"countries":["KR"],"is_corresponding":false,"raw_author_name":"Seong Oun Hwang","raw_affiliation_strings":["Department of Computer Engineering, Gachon Univesity, Seongnam, South Korea","Department of Computer Engineering, Gachon Univesity, Gachon University, Seongnam, South Korea"],"affiliations":[{"raw_affiliation_string":"Department of Computer Engineering, Gachon Univesity, Seongnam, South Korea","institution_ids":["https://openalex.org/I12832649"]},{"raw_affiliation_string":"Department of Computer Engineering, Gachon Univesity, Gachon University, Seongnam, South Korea","institution_ids":["https://openalex.org/I12832649"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5035735165"],"corresponding_institution_ids":["https://openalex.org/I12832649","https://openalex.org/I39555362"],"apc_list":null,"apc_paid":null,"fwci":3.1665,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.92888442,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":96,"max":99},"biblio":{"volume":"22","issue":"6","first_page":"6001","last_page":"6020"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9873999953269958,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9873999953269958,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.973800003528595,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12034","display_name":"Digital and Cyber Forensics","score":0.9591000080108643,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7841646075248718},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.6099970936775208},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.56620192527771},{"id":"https://openalex.org/keywords/analytics","display_name":"Analytics","score":0.5429787635803223},{"id":"https://openalex.org/keywords/cyber-physical-system","display_name":"Cyber-physical system","score":0.4475562572479248},{"id":"https://openalex.org/keywords/privacy-protection","display_name":"Privacy protection","score":0.4346614181995392},{"id":"https://openalex.org/keywords/service","display_name":"Service (business)","score":0.42934828996658325},{"id":"https://openalex.org/keywords/computer-forensics","display_name":"Computer forensics","score":0.41671040654182434},{"id":"https://openalex.org/keywords/digital-forensics","display_name":"Digital forensics","score":0.37610605359077454},{"id":"https://openalex.org/keywords/data-science","display_name":"Data science","score":0.2657278776168823}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7841646075248718},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.6099970936775208},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.56620192527771},{"id":"https://openalex.org/C79158427","wikidata":"https://www.wikidata.org/wiki/Q485396","display_name":"Analytics","level":2,"score":0.5429787635803223},{"id":"https://openalex.org/C179768478","wikidata":"https://www.wikidata.org/wiki/Q1120057","display_name":"Cyber-physical system","level":2,"score":0.4475562572479248},{"id":"https://openalex.org/C3017597292","wikidata":"https://www.wikidata.org/wiki/Q25052250","display_name":"Privacy protection","level":2,"score":0.4346614181995392},{"id":"https://openalex.org/C2780378061","wikidata":"https://www.wikidata.org/wiki/Q25351891","display_name":"Service (business)","level":2,"score":0.42934828996658325},{"id":"https://openalex.org/C556601545","wikidata":"https://www.wikidata.org/wiki/Q878553","display_name":"Computer forensics","level":3,"score":0.41671040654182434},{"id":"https://openalex.org/C84418412","wikidata":"https://www.wikidata.org/wiki/Q3246940","display_name":"Digital forensics","level":2,"score":0.37610605359077454},{"id":"https://openalex.org/C2522767166","wikidata":"https://www.wikidata.org/wiki/Q2374463","display_name":"Data science","level":1,"score":0.2657278776168823},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C136264566","wikidata":"https://www.wikidata.org/wiki/Q159810","display_name":"Economy","level":1,"score":0.0},{"id":"https://openalex.org/C162324750","wikidata":"https://www.wikidata.org/wiki/Q8134","display_name":"Economics","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tnsm.2025.3597417","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tnsm.2025.3597417","pdf_url":null,"source":{"id":"https://openalex.org/S173527311","display_name":"IEEE Transactions on Network and Service Management","issn_l":"1932-4537","issn":["1932-4537","2373-7379"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Network and Service Management","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","score":0.6200000047683716,"id":"https://metadata.un.org/sdg/16"}],"awards":[{"id":"https://openalex.org/G7917239216","display_name":null,"funder_award_id":"RS-2024-00340882","funder_id":"https://openalex.org/F4320322120","funder_display_name":"National Research Foundation of Korea"}],"funders":[{"id":"https://openalex.org/F4320322120","display_name":"National Research Foundation of Korea","ror":"https://ror.org/013aysd81"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":39,"referenced_works":["https://openalex.org/W1834771425","https://openalex.org/W2086687976","https://openalex.org/W2394534978","https://openalex.org/W2729021829","https://openalex.org/W2765739766","https://openalex.org/W2774107733","https://openalex.org/W2884070533","https://openalex.org/W2887143404","https://openalex.org/W2891220590","https://openalex.org/W2966395954","https://openalex.org/W2992059036","https://openalex.org/W3000065748","https://openalex.org/W3004132216","https://openalex.org/W3026701738","https://openalex.org/W3045149779","https://openalex.org/W3084272429","https://openalex.org/W3097442626","https://openalex.org/W3110128686","https://openalex.org/W3115801181","https://openalex.org/W3183482569","https://openalex.org/W3206102117","https://openalex.org/W4214586835","https://openalex.org/W4225270244","https://openalex.org/W4226398874","https://openalex.org/W4283210430","https://openalex.org/W4323315184","https://openalex.org/W4366378550","https://openalex.org/W4387042391","https://openalex.org/W4389459156","https://openalex.org/W4389495243","https://openalex.org/W4389959972","https://openalex.org/W4390577968","https://openalex.org/W4393253086","https://openalex.org/W4399110526","https://openalex.org/W4404563510","https://openalex.org/W4405487666","https://openalex.org/W4407346421","https://openalex.org/W4408049644","https://openalex.org/W4408841535"],"related_works":["https://openalex.org/W2181728705","https://openalex.org/W2167366752","https://openalex.org/W2489557937","https://openalex.org/W4247205791","https://openalex.org/W4238452393","https://openalex.org/W3002268218","https://openalex.org/W2385667210","https://openalex.org/W3001565613","https://openalex.org/W1506329045","https://openalex.org/W72026768"],"abstract_inverted_index":{"Forensic":[0],"Aware":[1],"Cyber-Physical":[2],"System":[3],"(FA-CPS)":[4],"is":[5],"an":[6,81,139,175],"evolving":[7,87],"core":[8,36],"of":[9,17,66,76,99,242],"digital":[10],"forensic":[11,22],"systems":[12,57],"that":[13,58,217],"discovers":[14],"the":[15,55,64,74,97,115,183,186,194,198,240],"integrity":[16],"biometric":[18],"service":[19],"platforms.":[20],"Most":[21,102],"agencies":[23],"use":[24],"emerging":[25],"technologies":[26,125],"such":[27,145],"as":[28,146],"IoT,":[29],"Cloud,":[30],"etc.,":[31],"to":[32,43,54,62,79,95,104,126,173,200],"integrate":[33],"a":[34,135,168,228,234,247],"few":[35],"elements":[37],"(networking,":[38],"communication,":[39],"and":[40,83,92,108,123,128,152,157,167,191,205,214,233],"distributed":[41],"computing)":[42],"achieve":[44],"sustainable":[45],"memory":[46],"forensics.":[47],"This":[48],"systematic":[49],"process":[50],"brings":[51],"additional":[52],"capabilities":[53],"physical":[56,169],"capture":[59],"device":[60],"memories":[61],"discover":[63],"evidence":[65],"malicious":[67],"tools.":[68],"Therefore,":[69],"this":[70,160],"paper":[71],"deals":[72],"with":[73,86],"Internet":[75],"Things":[77],"(IoT)":[78],"form":[80],"effective":[82],"economical":[84],"interaction":[85],"technologies,":[88],"including":[89],"B5G/6G,":[90],"edge,":[91],"cloud":[93],"computing,":[94],"uncover":[96],"context":[98],"security":[100,143,210,221],"implications.":[101],"precisely,":[103],"sense,":[105],"collect,":[106],"share,":[107],"analyze":[109,129],"numerical":[110],"data":[111,131],"from":[112,132],"information":[113,147],"systems,":[114],"application":[116],"domain,":[117],"like":[118],"healthcare,":[119],"utilizes":[120],"computing":[121],"methods":[122],"communications":[124],"collect":[127],"physiological":[130],"patients":[133],"in":[134,155,245],"haphazard":[136],"way.":[137],"Since":[138],"insecure":[140],"network":[141],"has":[142,219],"issues":[144],"leakage,":[148],"secret":[149],"key":[150,178,189,203],"loss,":[151],"fraudulent":[153],"authentication":[154,179,250],"Telehealth":[156],"remote":[158],"monitoring,":[159],"work":[161],"applies":[162],"elliptic":[163],"curve":[164],"cryptography":[165],"(ECC)":[166],"unclonable":[170],"function":[171],"(PUF)":[172],"construct":[174],"AI-driven":[176],"privacy-preserving":[177],"framework":[180],"(AID-PPKAF).":[181],"In":[182],"proposed":[184],"AID-PPKAF,":[185],"PUF":[187],"generates":[188],"information,":[190],"ECC":[192],"encrypts":[193],"parameters":[195],"generated":[196],"by":[197],"system":[199],"establish":[201],"session":[202],"agreement":[204],"proper":[206],"mutual":[207],"authentication.":[208],"The":[209],"analyses":[211],"(both":[212],"formal":[213],"informal)":[215],"prove":[216],"AID-PPKAF":[218],"greater":[220],"efficiency":[222],"than":[223],"other":[224],"state-of-the-art":[225],"approaches.":[226],"Lastly,":[227],"performance":[229],"analysis":[230],"using":[231,237],"NS3":[232],"pragmatic":[235],"study":[236],"SVM":[238],"demonstrate":[239],"significance":[241],"identity":[243],"protection":[244],"designing":[246],"more":[248],"reliable":[249],"model.":[251]},"counts_by_year":[{"year":2026,"cited_by_count":1}],"updated_date":"2026-04-02T15:55:50.835912","created_date":"2025-10-10T00:00:00"}
