{"id":"https://openalex.org/W2145486326","doi":"https://doi.org/10.1109/vitae.2014.6934425","title":"Threshold Cryptography-based Group Authentication (TCGA) scheme for the Internet of Things (IoT)","display_name":"Threshold Cryptography-based Group Authentication (TCGA) scheme for the Internet of Things (IoT)","publication_year":2014,"publication_date":"2014-05-01","ids":{"openalex":"https://openalex.org/W2145486326","doi":"https://doi.org/10.1109/vitae.2014.6934425","mag":"2145486326"},"language":"en","primary_location":{"id":"doi:10.1109/vitae.2014.6934425","is_oa":false,"landing_page_url":"https://doi.org/10.1109/vitae.2014.6934425","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2014 4th International Conference on Wireless Communications, Vehicular Technology, Information Theory and Aerospace &amp; Electronic Systems (VITAE)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://vbn.aau.dk/files/107848036/D_TCGA_IEEE_ANTS_2013_PNM.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5082942970","display_name":"Parikshit N. Mahalle","orcid":"https://orcid.org/0000-0001-5474-6826"},"institutions":[{"id":"https://openalex.org/I4210157510","display_name":"Smt. Kashibai Navale Medical College and General hospital","ror":"https://ror.org/05kqjh845","country_code":"IN","type":"education","lineage":["https://openalex.org/I4210157510"]}],"countries":["IN"],"is_corresponding":true,"raw_author_name":"Parikshit N. Mahalle","raw_affiliation_strings":["Department of Computer Engineering, STES, Smt. Kashibai Navale College Engineering, Pune, India"],"affiliations":[{"raw_affiliation_string":"Department of Computer Engineering, STES, Smt. Kashibai Navale College Engineering, Pune, India","institution_ids":["https://openalex.org/I4210157510"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101563256","display_name":"Neeli R. Prasad","orcid":"https://orcid.org/0000-0002-0680-6748"},"institutions":[{"id":"https://openalex.org/I891191580","display_name":"Aalborg University","ror":"https://ror.org/04m5j1k67","country_code":"DK","type":"education","lineage":["https://openalex.org/I891191580"]}],"countries":["DK"],"is_corresponding":false,"raw_author_name":"Neeli Rashmi Prasad","raw_affiliation_strings":["Center for TeleInFrastruktur, Aalborg University, Aalborg, Denmark","Center for TeleInfrastruktur, Aalborg University, Aalborg, Denmark#TAB#"],"affiliations":[{"raw_affiliation_string":"Center for TeleInFrastruktur, Aalborg University, Aalborg, Denmark","institution_ids":["https://openalex.org/I891191580"]},{"raw_affiliation_string":"Center for TeleInfrastruktur, Aalborg University, Aalborg, Denmark#TAB#","institution_ids":["https://openalex.org/I891191580"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5045465417","display_name":"Ramjee Prasad","orcid":"https://orcid.org/0000-0001-7443-7641"},"institutions":[{"id":"https://openalex.org/I891191580","display_name":"Aalborg University","ror":"https://ror.org/04m5j1k67","country_code":"DK","type":"education","lineage":["https://openalex.org/I891191580"]}],"countries":["DK"],"is_corresponding":false,"raw_author_name":"Ramjee Prasad","raw_affiliation_strings":["Center for TeleInFrastruktur, Aalborg University, Aalborg, Denmark","Center for TeleInfrastruktur, Aalborg University, Aalborg, Denmark#TAB#"],"affiliations":[{"raw_affiliation_string":"Center for TeleInFrastruktur, Aalborg University, Aalborg, Denmark","institution_ids":["https://openalex.org/I891191580"]},{"raw_affiliation_string":"Center for TeleInfrastruktur, Aalborg University, Aalborg, Denmark#TAB#","institution_ids":["https://openalex.org/I891191580"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5082942970"],"corresponding_institution_ids":["https://openalex.org/I4210157510"],"apc_list":null,"apc_paid":null,"fwci":6.0929,"has_fulltext":true,"cited_by_count":78,"citation_normalized_percentile":{"value":0.96623668,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":94,"max":100},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"5"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":0.9991999864578247,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9986000061035156,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/internet-of-things","display_name":"Internet of Things","score":0.7950626611709595},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.778479814529419},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.5657727718353271},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.5562585592269897},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.5398871302604675},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.48129263520240784},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.46916326880455017},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.07033482193946838}],"concepts":[{"id":"https://openalex.org/C81860439","wikidata":"https://www.wikidata.org/wiki/Q251212","display_name":"Internet of Things","level":2,"score":0.7950626611709595},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.778479814529419},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.5657727718353271},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.5562585592269897},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.5398871302604675},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.48129263520240784},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.46916326880455017},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.07033482193946838},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/vitae.2014.6934425","is_oa":false,"landing_page_url":"https://doi.org/10.1109/vitae.2014.6934425","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2014 4th International Conference on Wireless Communications, Vehicular Technology, Information Theory and Aerospace &amp; Electronic Systems (VITAE)","raw_type":"proceedings-article"},{"id":"pmh:oai:pure.atira.dk:publications/7cc16e9d-93b2-41c6-992a-694b2af6aff0","is_oa":true,"landing_page_url":"https://vbn.aau.dk/da/publications/7cc16e9d-93b2-41c6-992a-694b2af6aff0","pdf_url":"https://vbn.aau.dk/files/107848036/D_TCGA_IEEE_ANTS_2013_PNM.pdf","source":{"id":"https://openalex.org/S4306401731","display_name":"VBN Forskningsportal (Aalborg Universitet)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I891191580","host_organization_name":"Aalborg University","host_organization_lineage":["https://openalex.org/I891191580"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Mahalle , P N , Prasad , N R &amp; Prasad , R 2014 , Threshold Cryptography-based Group Authentication (TCGA) Scheme for the Internet of Things (IoT) . in 4th International Conference on Wireless Communications, Vehicular Technology, Information Theory and Aerospace &amp; Electronic Systems (VITAE), 2014 . IEEE , pp. 1-5 , 4th International Conference on Wireless Communications, Aalborg , Denmark , 11/05/2014 . https://doi.org/10.1109/VITAE.2014.6934425","raw_type":"contributionToPeriodical"}],"best_oa_location":{"id":"pmh:oai:pure.atira.dk:publications/7cc16e9d-93b2-41c6-992a-694b2af6aff0","is_oa":true,"landing_page_url":"https://vbn.aau.dk/da/publications/7cc16e9d-93b2-41c6-992a-694b2af6aff0","pdf_url":"https://vbn.aau.dk/files/107848036/D_TCGA_IEEE_ANTS_2013_PNM.pdf","source":{"id":"https://openalex.org/S4306401731","display_name":"VBN Forskningsportal (Aalborg Universitet)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I891191580","host_organization_name":"Aalborg University","host_organization_lineage":["https://openalex.org/I891191580"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Mahalle , P N , Prasad , N R &amp; Prasad , R 2014 , Threshold Cryptography-based Group Authentication (TCGA) Scheme for the Internet of Things (IoT) . in 4th International Conference on Wireless Communications, Vehicular Technology, Information Theory and Aerospace &amp; Electronic Systems (VITAE), 2014 . IEEE , pp. 1-5 , 4th International Conference on Wireless Communications, Aalborg , Denmark , 11/05/2014 . https://doi.org/10.1109/VITAE.2014.6934425","raw_type":"contributionToPeriodical"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W2145486326.pdf","grobid_xml":"https://content.openalex.org/works/W2145486326.grobid-xml"},"referenced_works_count":19,"referenced_works":["https://openalex.org/W297585352","https://openalex.org/W1764335695","https://openalex.org/W1931581452","https://openalex.org/W1977204260","https://openalex.org/W2030130683","https://openalex.org/W2055817410","https://openalex.org/W2098657835","https://openalex.org/W2106237316","https://openalex.org/W2132172731","https://openalex.org/W2138528159","https://openalex.org/W2152475664","https://openalex.org/W2157223303","https://openalex.org/W2160390325","https://openalex.org/W2293895957","https://openalex.org/W2527488985","https://openalex.org/W6610566361","https://openalex.org/W6638015881","https://openalex.org/W6679763910","https://openalex.org/W6697006987"],"related_works":["https://openalex.org/W4245926026","https://openalex.org/W4311097251","https://openalex.org/W2586548817","https://openalex.org/W2625093826","https://openalex.org/W4410295802","https://openalex.org/W4200598720","https://openalex.org/W2921026492","https://openalex.org/W4247463117","https://openalex.org/W4361251261","https://openalex.org/W2242172122"],"abstract_inverted_index":{"Internet":[0],"of":[1,44,53,74,81,101,133,147],"things":[2],"(IoT)":[3],"is":[4,48,68,115,127,157,165],"an":[5],"emerging":[6],"paradigm":[7],"where":[8],"the":[9,29,37,58,79,96,103,108,121,131,153,160],"devices":[10,75,104],"around":[11],"us":[12],"(persistent":[13],"and":[14,25,63,120,129,143,164],"non-persistent)":[15],"are":[16],"connected":[17],"to":[18,21,41,50],"each":[19,31],"other":[20],"provide":[22],"seamless":[23],"communication,":[24],"contextual":[26],"services.":[27],"In":[28],"IoT,":[30],"device":[32],"cannot":[33],"be":[34],"authenticated":[35],"in":[36,78,107,167],"short":[38],"time":[39,141],"due":[40],"unbounded":[42],"number":[43],"devices.":[45],"Equally,":[46],"it":[47],"difficult":[49],"get":[51],"receipt":[52],"their":[54],"authentication":[55,66],"request":[56],"at":[57,76],"same":[59],"time.":[60],"Therefore,":[61],"secure,":[62],"efficient":[64],"group":[65,73,109],"scheme":[67,94,114,126,149,156],"required":[69],"that":[70,124,152],"authenticates":[71],"a":[72],"once":[77],"context":[80],"resource":[82],"constrained":[83],"IoT.":[84],"This":[85,137],"paper":[86,138],"presents":[87,140],"novel":[88],"Threshold":[89],"Cryptography-based":[90],"Group":[91],"Authentication":[92],"(TCGA)":[93],"for":[95,117],"IoT":[97],"which":[98,150],"verifies":[99],"authenticity":[100],"all":[102],"taking":[105],"part":[106],"communication.":[110],"The":[111],"proposed":[112,154],"TCGA":[113,125,148,155],"implemented":[116],"WIFI":[118],"environment,":[119],"result":[122],"shows":[123,151],"lightweight,":[128],"alleviates":[130],"effect":[132],"battery":[134],"exhaustion":[135],"attack.":[136],"also":[139],"analysis,":[142],"formal":[144],"security":[145],"analysis":[146],"safe":[158],"from":[159],"replay,":[161],"man-in-the-middle":[162],"attack,":[163],"scalable":[166],"nature.":[168]},"counts_by_year":[{"year":2026,"cited_by_count":3},{"year":2024,"cited_by_count":6},{"year":2023,"cited_by_count":5},{"year":2022,"cited_by_count":8},{"year":2021,"cited_by_count":9},{"year":2020,"cited_by_count":14},{"year":2019,"cited_by_count":10},{"year":2018,"cited_by_count":6},{"year":2017,"cited_by_count":6},{"year":2016,"cited_by_count":6},{"year":2015,"cited_by_count":3},{"year":2014,"cited_by_count":2}],"updated_date":"2026-04-04T16:13:02.066488","created_date":"2025-10-10T00:00:00"}
