{"id":"https://openalex.org/W4205298923","doi":"https://doi.org/10.1155/2022/1203691","title":"Lightweight and Anonymous Mutual Authentication Protocol for Edge IoT Nodes with Physical Unclonable Function","display_name":"Lightweight and Anonymous Mutual Authentication Protocol for Edge IoT Nodes with Physical Unclonable Function","publication_year":2022,"publication_date":"2022-01-04","ids":{"openalex":"https://openalex.org/W4205298923","doi":"https://doi.org/10.1155/2022/1203691"},"language":"en","primary_location":{"id":"doi:10.1155/2022/1203691","is_oa":true,"landing_page_url":"https://doi.org/10.1155/2022/1203691","pdf_url":"https://downloads.hindawi.com/journals/scn/2022/1203691.pdf","source":{"id":"https://openalex.org/S120683614","display_name":"Security and Communication Networks","issn_l":"1939-0114","issn":["1939-0114","1939-0122"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319869","host_organization_name":"Hindawi Publishing Corporation","host_organization_lineage":["https://openalex.org/P4310319869"],"host_organization_lineage_names":["Hindawi Publishing Corporation"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Security and Communication Networks","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"hybrid","oa_url":"https://downloads.hindawi.com/journals/scn/2022/1203691.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100747741","display_name":"Hongyuan Wang","orcid":"https://orcid.org/0000-0003-1236-6141"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Hongyuan Wang","raw_affiliation_strings":["Qinghai Province Yindajihuang Project Construction and Operation Bureau, Xining, China"],"affiliations":[{"raw_affiliation_string":"Qinghai Province Yindajihuang Project Construction and Operation Bureau, Xining, China","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101733545","display_name":"Jin Meng","orcid":"https://orcid.org/0000-0001-6039-6762"},"institutions":[{"id":"https://openalex.org/I116265982","display_name":"Qinghai University","ror":"https://ror.org/05h33bt13","country_code":"CN","type":"education","lineage":["https://openalex.org/I116265982"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jin Meng","raw_affiliation_strings":["Department of Computer Technology and Application, Qinghai University, Xining, China"],"affiliations":[{"raw_affiliation_string":"Department of Computer Technology and Application, Qinghai University, Xining, China","institution_ids":["https://openalex.org/I116265982"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5113977781","display_name":"Xilong Du","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Xilong Du","raw_affiliation_strings":["Qinghai Province Yindajihuang Project Construction and Operation Bureau, Xining, China"],"affiliations":[{"raw_affiliation_string":"Qinghai Province Yindajihuang Project Construction and Operation Bureau, Xining, China","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5079441540","display_name":"Tengfei Cao","orcid":"https://orcid.org/0000-0002-1271-4778"},"institutions":[{"id":"https://openalex.org/I116265982","display_name":"Qinghai University","ror":"https://ror.org/05h33bt13","country_code":"CN","type":"education","lineage":["https://openalex.org/I116265982"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Tengfei Cao","raw_affiliation_strings":["Department of Computer Technology and Application, Qinghai University, Xining, China"],"affiliations":[{"raw_affiliation_string":"Department of Computer Technology and Application, Qinghai University, Xining, China","institution_ids":["https://openalex.org/I116265982"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5018271450","display_name":"Yong Xie","orcid":"https://orcid.org/0000-0003-0472-5378"},"institutions":[{"id":"https://openalex.org/I116265982","display_name":"Qinghai University","ror":"https://ror.org/05h33bt13","country_code":"CN","type":"education","lineage":["https://openalex.org/I116265982"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Yong Xie","raw_affiliation_strings":["Department of Computer Technology and Application, Qinghai University, Xining, China"],"affiliations":[{"raw_affiliation_string":"Department of Computer Technology and Application, Qinghai University, Xining, China","institution_ids":["https://openalex.org/I116265982"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5018271450"],"corresponding_institution_ids":["https://openalex.org/I116265982"],"apc_list":{"value":2100,"currency":"USD","value_usd":2100},"apc_paid":{"value":2100,"currency":"USD","value_usd":2100},"fwci":4.2018,"has_fulltext":true,"cited_by_count":18,"citation_normalized_percentile":{"value":0.9459702,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":96,"max":98},"biblio":{"volume":"2022","issue":null,"first_page":"1","last_page":"11"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9991000294685364,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.9927999973297119,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8637933731079102},{"id":"https://openalex.org/keywords/mutual-authentication","display_name":"Mutual authentication","score":0.6223357915878296},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.6078170537948608},{"id":"https://openalex.org/keywords/hash-function","display_name":"Hash function","score":0.5548607707023621},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.5501853823661804},{"id":"https://openalex.org/keywords/authentication-protocol","display_name":"Authentication protocol","score":0.5226135849952698},{"id":"https://openalex.org/keywords/physical-unclonable-function","display_name":"Physical unclonable function","score":0.515540361404419},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5008242130279541},{"id":"https://openalex.org/keywords/enhanced-data-rates-for-gsm-evolution","display_name":"Enhanced Data Rates for GSM Evolution","score":0.5003094673156738},{"id":"https://openalex.org/keywords/protocol","display_name":"Protocol (science)","score":0.46176877617836},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.4513590931892395},{"id":"https://openalex.org/keywords/security-analysis","display_name":"Security analysis","score":0.4497249126434326},{"id":"https://openalex.org/keywords/cryptographic-protocol","display_name":"Cryptographic protocol","score":0.42891794443130493},{"id":"https://openalex.org/keywords/cryptographic-hash-function","display_name":"Cryptographic hash function","score":0.42143577337265015},{"id":"https://openalex.org/keywords/reflection-attack","display_name":"Reflection attack","score":0.41321930289268494},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.4122810363769531},{"id":"https://openalex.org/keywords/challenge\u2013response-authentication","display_name":"Challenge\u2013response authentication","score":0.3544788956642151},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.0794796347618103}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8637933731079102},{"id":"https://openalex.org/C2781221063","wikidata":"https://www.wikidata.org/wiki/Q6944186","display_name":"Mutual authentication","level":3,"score":0.6223357915878296},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.6078170537948608},{"id":"https://openalex.org/C99138194","wikidata":"https://www.wikidata.org/wiki/Q183427","display_name":"Hash function","level":2,"score":0.5548607707023621},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.5501853823661804},{"id":"https://openalex.org/C21564112","wikidata":"https://www.wikidata.org/wiki/Q4825885","display_name":"Authentication protocol","level":3,"score":0.5226135849952698},{"id":"https://openalex.org/C8643368","wikidata":"https://www.wikidata.org/wiki/Q4046262","display_name":"Physical unclonable function","level":3,"score":0.515540361404419},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5008242130279541},{"id":"https://openalex.org/C162307627","wikidata":"https://www.wikidata.org/wiki/Q204833","display_name":"Enhanced Data Rates for GSM Evolution","level":2,"score":0.5003094673156738},{"id":"https://openalex.org/C2780385302","wikidata":"https://www.wikidata.org/wiki/Q367158","display_name":"Protocol (science)","level":3,"score":0.46176877617836},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.4513590931892395},{"id":"https://openalex.org/C38369872","wikidata":"https://www.wikidata.org/wiki/Q7445009","display_name":"Security analysis","level":2,"score":0.4497249126434326},{"id":"https://openalex.org/C33884865","wikidata":"https://www.wikidata.org/wiki/Q1254335","display_name":"Cryptographic protocol","level":3,"score":0.42891794443130493},{"id":"https://openalex.org/C7608002","wikidata":"https://www.wikidata.org/wiki/Q477202","display_name":"Cryptographic hash function","level":3,"score":0.42143577337265015},{"id":"https://openalex.org/C91069110","wikidata":"https://www.wikidata.org/wiki/Q1919060","display_name":"Reflection attack","level":5,"score":0.41321930289268494},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.4122810363769531},{"id":"https://openalex.org/C131129157","wikidata":"https://www.wikidata.org/wiki/Q1059963","display_name":"Challenge\u2013response authentication","level":4,"score":0.3544788956642151},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.0794796347618103},{"id":"https://openalex.org/C204787440","wikidata":"https://www.wikidata.org/wiki/Q188504","display_name":"Alternative medicine","level":2,"score":0.0},{"id":"https://openalex.org/C71924100","wikidata":"https://www.wikidata.org/wiki/Q11190","display_name":"Medicine","level":0,"score":0.0},{"id":"https://openalex.org/C142724271","wikidata":"https://www.wikidata.org/wiki/Q7208","display_name":"Pathology","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1155/2022/1203691","is_oa":true,"landing_page_url":"https://doi.org/10.1155/2022/1203691","pdf_url":"https://downloads.hindawi.com/journals/scn/2022/1203691.pdf","source":{"id":"https://openalex.org/S120683614","display_name":"Security and Communication Networks","issn_l":"1939-0114","issn":["1939-0114","1939-0122"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319869","host_organization_name":"Hindawi Publishing Corporation","host_organization_lineage":["https://openalex.org/P4310319869"],"host_organization_lineage_names":["Hindawi Publishing Corporation"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Security and Communication Networks","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:f9d4008a21854059bc7179370fc9d9d8","is_oa":true,"landing_page_url":"https://doaj.org/article/f9d4008a21854059bc7179370fc9d9d8","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Security and Communication Networks, Vol 2022 (2022)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1155/2022/1203691","is_oa":true,"landing_page_url":"https://doi.org/10.1155/2022/1203691","pdf_url":"https://downloads.hindawi.com/journals/scn/2022/1203691.pdf","source":{"id":"https://openalex.org/S120683614","display_name":"Security and Communication Networks","issn_l":"1939-0114","issn":["1939-0114","1939-0122"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319869","host_organization_name":"Hindawi Publishing Corporation","host_organization_lineage":["https://openalex.org/P4310319869"],"host_organization_lineage_names":["Hindawi Publishing Corporation"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Security and Communication Networks","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G2087396116","display_name":null,"funder_award_id":"China","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G2507641293","display_name":null,"funder_award_id":"2020-ZJ-943Q","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G3317480652","display_name":null,"funder_award_id":"Science","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G5939423041","display_name":null,"funder_award_id":"Technology","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G5963371008","display_name":null,"funder_award_id":"61862052","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G5994120800","display_name":null,"funder_award_id":"Natural","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G7248793106","display_name":null,"funder_award_id":"2020-ZJ-943Q","funder_id":"https://openalex.org/F4320327085","funder_display_name":"Qinghai Provincial Department of Science and Technology"},{"id":"https://openalex.org/G8159415361","display_name":null,"funder_award_id":"61862052","funder_id":"https://openalex.org/F4320327085","funder_display_name":"Qinghai Provincial Department of Science and Technology"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320327085","display_name":"Qinghai Provincial Department of Science and Technology","ror":null}],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4205298923.pdf","grobid_xml":"https://content.openalex.org/works/W4205298923.grobid-xml"},"referenced_works_count":30,"referenced_works":["https://openalex.org/W104720657","https://openalex.org/W1803070374","https://openalex.org/W1978099398","https://openalex.org/W2029693536","https://openalex.org/W2076587863","https://openalex.org/W2086576140","https://openalex.org/W2106857693","https://openalex.org/W2114440979","https://openalex.org/W2167984898","https://openalex.org/W2175661655","https://openalex.org/W2289458927","https://openalex.org/W2529546255","https://openalex.org/W2570008916","https://openalex.org/W2613748018","https://openalex.org/W2746329303","https://openalex.org/W2770987547","https://openalex.org/W2789746206","https://openalex.org/W2801237935","https://openalex.org/W2801678809","https://openalex.org/W2808182497","https://openalex.org/W2911489589","https://openalex.org/W2919782006","https://openalex.org/W2978098707","https://openalex.org/W3041672482","https://openalex.org/W3048013644","https://openalex.org/W3094864271","https://openalex.org/W3107123545","https://openalex.org/W3151293064","https://openalex.org/W3197697311","https://openalex.org/W6676027265"],"related_works":["https://openalex.org/W2490834464","https://openalex.org/W2363600212","https://openalex.org/W167161564","https://openalex.org/W103173258","https://openalex.org/W2388928260","https://openalex.org/W2374344420","https://openalex.org/W1968418110","https://openalex.org/W2358016268","https://openalex.org/W2066762657","https://openalex.org/W1986957101"],"abstract_inverted_index":{"Internet":[0],"of":[1,24,29,34,87],"Things":[2],"(IoT)":[3],"has":[4,156],"been":[5],"widely":[6],"used":[7],"in":[8],"many":[9],"fields,":[10],"bringing":[11],"great":[12],"convenience":[13],"to":[14,52,66,83,98,100,109,112,138],"people\u2019s":[15],"traditional":[16],"work":[17],"and":[18,56,77,104,127,160,164],"life.":[19],"IoT":[20,44,61,88],"generates":[21],"tremendous":[22],"amounts":[23],"data":[25,35],"at":[26],"the":[27,32,85,94,101,106,113,153],"edge":[28,43,60],"network.":[30],"However,":[31],"security":[33,68,86,143],"transmission":[36],"is":[37,81,136],"facing":[38],"severe":[39],"challenges.":[40],"In":[41],"particular,":[42],"nodes":[45,62],"cannot":[46],"run":[47],"complex":[48],"encryption":[49],"operations":[50],"due":[51],"their":[53],"limited":[54],"computing":[55],"storage":[57],"resources.":[58],"Therefore,":[59],"are":[63],"more":[64,157],"susceptible":[65],"various":[67],"attacks.":[69],"To":[70],"this":[71],"end,":[72],"a":[73],"lightweight":[74,119],"mutual":[75],"authentication":[76],"key":[78],"agreement":[79],"protocol":[80,92,135,155],"proposed":[82,154],"achieve":[84],"nodes\u2019":[89],"communication.":[90],"The":[91,134],"uses":[93,117],"reverse":[95],"fuzzy":[96],"extractor":[97],"acclimatize":[99],"noisy":[102],"environment":[103],"introduces":[105],"supplementary":[107],"subprotocol":[108],"enhance":[110],"resistance":[111],"desynchronization":[114],"attack.":[115],"It":[116,129],"only":[118,130],"cryptographic":[120],"operations,":[121],"such":[122],"as":[123],"hash":[124],"function,":[125],"XORs,":[126],"PUF.":[128],"stores":[131],"one":[132],"pseudo-identity.":[133],"proven":[137],"be":[139],"secure":[140],"by":[141],"rigid":[142],"analysis":[144,151],"based":[145],"on":[146],"improved":[147],"BAN":[148],"logic.":[149],"Performance":[150],"shows":[152],"comprehensive":[158],"functions":[159],"incurs":[161],"lower":[162],"computation":[163],"communication":[165],"cost":[166],"when":[167],"compared":[168],"with":[169],"similar":[170],"protocols.":[171]},"counts_by_year":[{"year":2025,"cited_by_count":5},{"year":2024,"cited_by_count":3},{"year":2023,"cited_by_count":6},{"year":2022,"cited_by_count":4}],"updated_date":"2026-04-18T07:56:08.524223","created_date":"2025-10-10T00:00:00"}
