{"id":"https://openalex.org/W3111369116","doi":"https://doi.org/10.1155/2020/6679022","title":"Research on Multidomain Authentication of IoT Based on Cross-Chain Technology","display_name":"Research on Multidomain Authentication of IoT Based on Cross-Chain Technology","publication_year":2020,"publication_date":"2020-12-09","ids":{"openalex":"https://openalex.org/W3111369116","doi":"https://doi.org/10.1155/2020/6679022","mag":"3111369116"},"language":"en","primary_location":{"id":"doi:10.1155/2020/6679022","is_oa":true,"landing_page_url":"https://doi.org/10.1155/2020/6679022","pdf_url":"https://downloads.hindawi.com/journals/scn/2020/6679022.pdf","source":{"id":"https://openalex.org/S120683614","display_name":"Security and Communication Networks","issn_l":"1939-0114","issn":["1939-0114","1939-0122"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319869","host_organization_name":"Hindawi Publishing Corporation","host_organization_lineage":["https://openalex.org/P4310319869"],"host_organization_lineage_names":["Hindawi Publishing Corporation"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Security and Communication Networks","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"hybrid","oa_url":"https://downloads.hindawi.com/journals/scn/2020/6679022.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5062873519","display_name":"Dawei Li","orcid":null},"institutions":[{"id":"https://openalex.org/I2799736854","display_name":"Nanjing Institute of Technology","ror":"https://ror.org/00n6txq60","country_code":"CN","type":"education","lineage":["https://openalex.org/I2799736854"]},{"id":"https://openalex.org/I4210094970","display_name":"Energy Research Institute","ror":"https://ror.org/00ndnb620","country_code":"CN","type":"facility","lineage":["https://openalex.org/I4210094970","https://openalex.org/I4210142748"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Dawei Li","raw_affiliation_strings":["Energy Research Institute, Nanjing Institute of Technology, Nanjing 211167, China","School of Computing Engineering, Nanjing Institute of Technology, Nanjing 211167, China"],"affiliations":[{"raw_affiliation_string":"Energy Research Institute, Nanjing Institute of Technology, Nanjing 211167, China","institution_ids":["https://openalex.org/I2799736854","https://openalex.org/I4210094970"]},{"raw_affiliation_string":"School of Computing Engineering, Nanjing Institute of Technology, Nanjing 211167, China","institution_ids":["https://openalex.org/I2799736854"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5103250926","display_name":"Jia Yu","orcid":"https://orcid.org/0009-0000-9999-5236"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Jia Yu","raw_affiliation_strings":["State Grid Electric Power Research Institute, Nanjing, China"],"affiliations":[{"raw_affiliation_string":"State Grid Electric Power Research Institute, Nanjing, China","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5070774328","display_name":"Xue Gao","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Xue Gao","raw_affiliation_strings":["State Grid Electric Power Research Institute, Nanjing, China"],"affiliations":[{"raw_affiliation_string":"State Grid Electric Power Research Institute, Nanjing, China","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5077894845","display_name":"Najla Al-Nabhan","orcid":null},"institutions":[{"id":"https://openalex.org/I28022161","display_name":"King Saud University","ror":"https://ror.org/02f81g417","country_code":"SA","type":"education","lineage":["https://openalex.org/I28022161"]}],"countries":["SA"],"is_corresponding":false,"raw_author_name":"Najla Al-Nabhan","raw_affiliation_strings":["Department of Computer Science, King Saud University, Riyadh, Saudi Arabia"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, King Saud University, Riyadh, Saudi Arabia","institution_ids":["https://openalex.org/I28022161"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5062873519"],"corresponding_institution_ids":["https://openalex.org/I2799736854","https://openalex.org/I4210094970"],"apc_list":{"value":2100,"currency":"USD","value_usd":2100},"apc_paid":{"value":2100,"currency":"USD","value_usd":2100},"fwci":3.6165,"has_fulltext":true,"cited_by_count":20,"citation_normalized_percentile":{"value":0.94225367,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":94,"max":98},"biblio":{"volume":"2020","issue":null,"first_page":"1","last_page":"12"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10273","display_name":"IoT and Edge/Fog Computing","score":0.9789000153541565,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T14347","display_name":"Big Data and Digital Economy","score":0.9383000135421753,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8450344800949097},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.7178439497947693},{"id":"https://openalex.org/keywords/blockchain","display_name":"Blockchain","score":0.5841789841651917},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4954725503921509},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.4845077395439148},{"id":"https://openalex.org/keywords/data-authentication-algorithm","display_name":"Data Authentication Algorithm","score":0.459381639957428},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.4555633068084717},{"id":"https://openalex.org/keywords/authentication-server","display_name":"Authentication server","score":0.452632337808609},{"id":"https://openalex.org/keywords/authentication-protocol","display_name":"Authentication protocol","score":0.4391995072364807},{"id":"https://openalex.org/keywords/domain","display_name":"Domain (mathematical analysis)","score":0.42285722494125366}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8450344800949097},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.7178439497947693},{"id":"https://openalex.org/C2779687700","wikidata":"https://www.wikidata.org/wiki/Q20514253","display_name":"Blockchain","level":2,"score":0.5841789841651917},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4954725503921509},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.4845077395439148},{"id":"https://openalex.org/C168970074","wikidata":"https://www.wikidata.org/wiki/Q5227146","display_name":"Data Authentication Algorithm","level":4,"score":0.459381639957428},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.4555633068084717},{"id":"https://openalex.org/C2777331311","wikidata":"https://www.wikidata.org/wiki/Q784561","display_name":"Authentication server","level":3,"score":0.452632337808609},{"id":"https://openalex.org/C21564112","wikidata":"https://www.wikidata.org/wiki/Q4825885","display_name":"Authentication protocol","level":3,"score":0.4391995072364807},{"id":"https://openalex.org/C36503486","wikidata":"https://www.wikidata.org/wiki/Q11235244","display_name":"Domain (mathematical analysis)","level":2,"score":0.42285722494125366},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1155/2020/6679022","is_oa":true,"landing_page_url":"https://doi.org/10.1155/2020/6679022","pdf_url":"https://downloads.hindawi.com/journals/scn/2020/6679022.pdf","source":{"id":"https://openalex.org/S120683614","display_name":"Security and Communication Networks","issn_l":"1939-0114","issn":["1939-0114","1939-0122"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319869","host_organization_name":"Hindawi Publishing Corporation","host_organization_lineage":["https://openalex.org/P4310319869"],"host_organization_lineage_names":["Hindawi Publishing Corporation"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Security and Communication Networks","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:70d36a7a9ee34d249f2b7d053ee41fd7","is_oa":true,"landing_page_url":"https://doaj.org/article/70d36a7a9ee34d249f2b7d053ee41fd7","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Security and Communication Networks, Vol 2020 (2020)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1155/2020/6679022","is_oa":true,"landing_page_url":"https://doi.org/10.1155/2020/6679022","pdf_url":"https://downloads.hindawi.com/journals/scn/2020/6679022.pdf","source":{"id":"https://openalex.org/S120683614","display_name":"Security and Communication Networks","issn_l":"1939-0114","issn":["1939-0114","1939-0122"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319869","host_organization_name":"Hindawi Publishing Corporation","host_organization_lineage":["https://openalex.org/P4310319869"],"host_organization_lineage_names":["Hindawi Publishing Corporation"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Security and Communication Networks","raw_type":"journal-article"},"sustainable_development_goals":[{"score":0.5600000023841858,"id":"https://metadata.un.org/sdg/9","display_name":"Industry, innovation and infrastructure"}],"awards":[{"id":"https://openalex.org/G1346898804","display_name":null,"funder_award_id":"YKJ201721","funder_id":"https://openalex.org/F4320335726","funder_display_name":"Deanship of Scientific Research, King Saud University"},{"id":"https://openalex.org/G2037263743","display_name":null,"funder_award_id":"YKJ201721","funder_id":"https://openalex.org/F4320324885","funder_display_name":"Nanjing Institute of Technology"},{"id":"https://openalex.org/G3473423927","display_name":null,"funder_award_id":"RG-1441-331","funder_id":"https://openalex.org/F4320335726","funder_display_name":"Deanship of Scientific Research, King Saud University"},{"id":"https://openalex.org/G37714793","display_name":null,"funder_award_id":"RG-1441-331","funder_id":"https://openalex.org/F4320321145","funder_display_name":"King Saud University"},{"id":"https://openalex.org/G4227127181","display_name":null,"funder_award_id":"RG-1441-331","funder_id":"https://openalex.org/F4320324885","funder_display_name":"Nanjing Institute of Technology"},{"id":"https://openalex.org/G5926995133","display_name":null,"funder_award_id":"19KJB520036","funder_id":"https://openalex.org/F4320324885","funder_display_name":"Nanjing Institute of Technology"},{"id":"https://openalex.org/G8228641769","display_name":null,"funder_award_id":"19KJB520036","funder_id":"https://openalex.org/F4320335726","funder_display_name":"Deanship of Scientific Research, King Saud University"}],"funders":[{"id":"https://openalex.org/F4320321145","display_name":"King Saud University","ror":"https://ror.org/02f81g417"},{"id":"https://openalex.org/F4320321605","display_name":"Government of Jiangsu Province","ror":"https://ror.org/004svx814"},{"id":"https://openalex.org/F4320324885","display_name":"Nanjing Institute of Technology","ror":"https://ror.org/00n6txq60"},{"id":"https://openalex.org/F4320335726","display_name":"Deanship of Scientific Research, King Saud University","ror":null}],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W3111369116.pdf","grobid_xml":"https://content.openalex.org/works/W3111369116.grobid-xml"},"referenced_works_count":29,"referenced_works":["https://openalex.org/W1998902045","https://openalex.org/W2005629807","https://openalex.org/W2182035090","https://openalex.org/W2274217660","https://openalex.org/W2352795499","https://openalex.org/W2370155217","https://openalex.org/W2519293460","https://openalex.org/W2588585573","https://openalex.org/W2611565958","https://openalex.org/W2622349292","https://openalex.org/W2774006113","https://openalex.org/W2798465692","https://openalex.org/W2886871703","https://openalex.org/W2894027578","https://openalex.org/W2897993795","https://openalex.org/W2904351506","https://openalex.org/W2906338851","https://openalex.org/W2915361359","https://openalex.org/W2952260178","https://openalex.org/W2965263145","https://openalex.org/W2971282859","https://openalex.org/W2977697741","https://openalex.org/W3002513842","https://openalex.org/W3010211825","https://openalex.org/W3042791509","https://openalex.org/W3049420118","https://openalex.org/W3049630772","https://openalex.org/W4288362259","https://openalex.org/W6694638295"],"related_works":["https://openalex.org/W2034419863","https://openalex.org/W2017959161","https://openalex.org/W2132505069","https://openalex.org/W2129970007","https://openalex.org/W2061637199","https://openalex.org/W2116285675","https://openalex.org/W4220710588","https://openalex.org/W1968284308","https://openalex.org/W4386450650","https://openalex.org/W2054202867"],"abstract_inverted_index":{"Blockchain":[0],"is":[1,47,108,115,130,138],"an":[2,87,102],"innovated":[3],"and":[4,14,26,51,85,140,166],"revolutionized":[5],"technology,":[6],"which":[7],"has":[8,19,161],"attracted":[9],"wide":[10],"attention":[11],"from":[12],"academia":[13],"industry.":[15],"At":[16],"present,":[17],"blockchain":[18,74],"been":[20],"widely":[21],"used":[22],"in":[23,29,117,164],"certificate":[24],"management":[25],"credential":[27],"delivery":[28],"network":[30],"access":[31,124],"authentication.":[32,125],"In":[33,58],"a":[34,143],"large-scale":[35],"multidomain":[36,64],"Internet":[37],"of":[38,43,67,82,92,104,123,151],"Things":[39],"(IoT)":[40],"environment,":[41],"one":[42],"the":[44,63,68,73,78,83,93,97,111,121,127,149,158],"important":[45],"issues":[46],"cross-domain":[48,79,89,106],"key":[49,144],"sharing":[50,145],"secure":[52],"data":[53,113],"exchange":[54],"between":[55],"different":[56],"IoT.":[57],"this":[59,70],"paper,":[60],"aiming":[61],"at":[62],"authentication":[65,80,90,107,128,136,152],"requirements":[66],"IoT,":[69],"paper":[71],"introduces":[72],"cross-chain":[75],"technology":[76],"into":[77],"process":[81,129],"IoT":[84,94],"proposes":[86],"effective":[88],"scheme":[91,160],"based":[95],"on":[96],"improved":[98],"PBFT":[99],"algorithm.":[100],"First,":[101],"architecture":[103],"blockchain-based":[105],"proposed.":[109],"Then,":[110],"block":[112],"structure":[114],"designed":[116],"order":[118],"to":[119,147],"enhance":[120],"function":[122],"Third,":[126],"realized":[131],"by":[132,142],"intelligent":[133],"contract.":[134],"The":[135],"information":[137],"encrypted":[139],"distributed":[141],"method":[146],"ensure":[148],"security":[150,165],"data.":[153],"Simulation":[154],"results":[155],"show":[156],"that":[157],"proposed":[159],"significant":[162],"advantages":[163],"availability.":[167]},"counts_by_year":[{"year":2025,"cited_by_count":5},{"year":2024,"cited_by_count":2},{"year":2023,"cited_by_count":4},{"year":2022,"cited_by_count":5},{"year":2021,"cited_by_count":4}],"updated_date":"2026-04-10T15:06:20.359241","created_date":"2025-10-10T00:00:00"}
