{"id":"https://openalex.org/W7125645346","doi":"https://doi.org/10.1186/s42400-025-00536-5","title":"Lightweight anonymous authentication and key agreement protocol resistant to desynchronization attacks","display_name":"Lightweight anonymous authentication and key agreement protocol resistant to desynchronization attacks","publication_year":2026,"publication_date":"2026-01-26","ids":{"openalex":"https://openalex.org/W7125645346","doi":"https://doi.org/10.1186/s42400-025-00536-5"},"language":"en","primary_location":{"id":"doi:10.1186/s42400-025-00536-5","is_oa":true,"landing_page_url":"https://doi.org/10.1186/s42400-025-00536-5","pdf_url":"https://link.springer.com/content/pdf/10.1186/s42400-025-00536-5.pdf","source":{"id":"https://openalex.org/S3035238565","display_name":"Cybersecurity","issn_l":"2523-3246","issn":["2523-3246"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cybersecurity","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"diamond","oa_url":"https://link.springer.com/content/pdf/10.1186/s42400-025-00536-5.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5123799260","display_name":"Shenjin Wang","orcid":null},"institutions":[{"id":"https://openalex.org/I145897649","display_name":"Minzu University of China","ror":"https://ror.org/0044e2g62","country_code":"CN","type":"education","lineage":["https://openalex.org/I145897649"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Shenjin Wang","raw_affiliation_strings":["Yunnan Minzu University, Kunming, China"],"affiliations":[{"raw_affiliation_string":"Yunnan Minzu University, Kunming, China","institution_ids":["https://openalex.org/I145897649"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5123788007","display_name":"Shunfang Hu","orcid":null},"institutions":[{"id":"https://openalex.org/I145897649","display_name":"Minzu University of China","ror":"https://ror.org/0044e2g62","country_code":"CN","type":"education","lineage":["https://openalex.org/I145897649"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Shunfang Hu","raw_affiliation_strings":["Yunnan Minzu University, Kunming, China"],"affiliations":[{"raw_affiliation_string":"Yunnan Minzu University, Kunming, China","institution_ids":["https://openalex.org/I145897649"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5123801390","display_name":"Junhua Chen","orcid":null},"institutions":[{"id":"https://openalex.org/I145897649","display_name":"Minzu University of China","ror":"https://ror.org/0044e2g62","country_code":"CN","type":"education","lineage":["https://openalex.org/I145897649"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Junhua Chen","raw_affiliation_strings":["Yunnan Minzu University, Kunming, China"],"affiliations":[{"raw_affiliation_string":"Yunnan Minzu University, Kunming, China","institution_ids":["https://openalex.org/I145897649"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5123803820","display_name":"Kaixuan Ma","orcid":null},"institutions":[{"id":"https://openalex.org/I145897649","display_name":"Minzu University of China","ror":"https://ror.org/0044e2g62","country_code":"CN","type":"education","lineage":["https://openalex.org/I145897649"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Kaixuan Ma","raw_affiliation_strings":["Yunnan Minzu University, Kunming, China"],"affiliations":[{"raw_affiliation_string":"Yunnan Minzu University, Kunming, China","institution_ids":["https://openalex.org/I145897649"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5123797667","display_name":"Wei Wang","orcid":null},"institutions":[{"id":"https://openalex.org/I145897649","display_name":"Minzu University of China","ror":"https://ror.org/0044e2g62","country_code":"CN","type":"education","lineage":["https://openalex.org/I145897649"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Wei Wang","raw_affiliation_strings":["Yunnan Minzu University, Kunming, China"],"affiliations":[{"raw_affiliation_string":"Yunnan Minzu University, Kunming, China","institution_ids":["https://openalex.org/I145897649"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5123811231","display_name":"Ya Zhang","orcid":null},"institutions":[{"id":"https://openalex.org/I145897649","display_name":"Minzu University of China","ror":"https://ror.org/0044e2g62","country_code":"CN","type":"education","lineage":["https://openalex.org/I145897649"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Ya Zhang","raw_affiliation_strings":["Yunnan Minzu University, Kunming, China"],"affiliations":[{"raw_affiliation_string":"Yunnan Minzu University, Kunming, China","institution_ids":["https://openalex.org/I145897649"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5123788007"],"corresponding_institution_ids":["https://openalex.org/I145897649"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":true,"cited_by_count":0,"citation_normalized_percentile":{"value":0.21730769,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"9","issue":"1","first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":0.8245999813079834,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":0.8245999813079834,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.11389999836683273,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.010200000368058681,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/session-key","display_name":"Session key","score":0.63919997215271},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.6294000148773193},{"id":"https://openalex.org/keywords/mutual-authentication","display_name":"Mutual authentication","score":0.6010000109672546},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.5673999786376953},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.5131000280380249},{"id":"https://openalex.org/keywords/authentication-protocol","display_name":"Authentication protocol","score":0.5097000002861023},{"id":"https://openalex.org/keywords/anonymity","display_name":"Anonymity","score":0.4715000092983246},{"id":"https://openalex.org/keywords/protocol","display_name":"Protocol (science)","score":0.46799999475479126},{"id":"https://openalex.org/keywords/cryptographic-protocol","display_name":"Cryptographic protocol","score":0.45980000495910645},{"id":"https://openalex.org/keywords/hash-function","display_name":"Hash function","score":0.43549999594688416}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7986000180244446},{"id":"https://openalex.org/C191197275","wikidata":"https://www.wikidata.org/wiki/Q1755775","display_name":"Session key","level":3,"score":0.63919997215271},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.6294000148773193},{"id":"https://openalex.org/C2781221063","wikidata":"https://www.wikidata.org/wiki/Q6944186","display_name":"Mutual authentication","level":3,"score":0.6010000109672546},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.5673999786376953},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.5131000280380249},{"id":"https://openalex.org/C21564112","wikidata":"https://www.wikidata.org/wiki/Q4825885","display_name":"Authentication protocol","level":3,"score":0.5097000002861023},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5024999976158142},{"id":"https://openalex.org/C178005623","wikidata":"https://www.wikidata.org/wiki/Q308859","display_name":"Anonymity","level":2,"score":0.4715000092983246},{"id":"https://openalex.org/C2780385302","wikidata":"https://www.wikidata.org/wiki/Q367158","display_name":"Protocol (science)","level":3,"score":0.46799999475479126},{"id":"https://openalex.org/C33884865","wikidata":"https://www.wikidata.org/wiki/Q1254335","display_name":"Cryptographic protocol","level":3,"score":0.45980000495910645},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.4507000148296356},{"id":"https://openalex.org/C99138194","wikidata":"https://www.wikidata.org/wiki/Q183427","display_name":"Hash function","level":2,"score":0.43549999594688416},{"id":"https://openalex.org/C2779960059","wikidata":"https://www.wikidata.org/wiki/Q7113681","display_name":"Overhead (engineering)","level":2,"score":0.4341000020503998},{"id":"https://openalex.org/C2779182362","wikidata":"https://www.wikidata.org/wiki/Q17126187","display_name":"Session (web analytics)","level":2,"score":0.4219000041484833},{"id":"https://openalex.org/C135530808","wikidata":"https://www.wikidata.org/wiki/Q3306713","display_name":"Key-agreement protocol","level":5,"score":0.41920000314712524},{"id":"https://openalex.org/C11560541","wikidata":"https://www.wikidata.org/wiki/Q1756025","display_name":"Replay attack","level":3,"score":0.39149999618530273},{"id":"https://openalex.org/C510870077","wikidata":"https://www.wikidata.org/wiki/Q7444868","display_name":"Secure communication","level":3,"score":0.3817000091075897},{"id":"https://openalex.org/C205009425","wikidata":"https://www.wikidata.org/wiki/Q935662","display_name":"Forward secrecy","level":4,"score":0.3725000023841858},{"id":"https://openalex.org/C141492731","wikidata":"https://www.wikidata.org/wiki/Q1052621","display_name":"Message authentication code","level":3,"score":0.3553999960422516},{"id":"https://openalex.org/C15927051","wikidata":"https://www.wikidata.org/wiki/Q246593","display_name":"Cryptographic primitive","level":4,"score":0.35440000891685486},{"id":"https://openalex.org/C2778562939","wikidata":"https://www.wikidata.org/wiki/Q1298791","display_name":"Synchronization (alternating current)","level":3,"score":0.31130000948905945},{"id":"https://openalex.org/C91069110","wikidata":"https://www.wikidata.org/wiki/Q1919060","display_name":"Reflection attack","level":5,"score":0.29170000553131104},{"id":"https://openalex.org/C135783594","wikidata":"https://www.wikidata.org/wiki/Q5678864","display_name":"Hash chain","level":3,"score":0.2849999964237213},{"id":"https://openalex.org/C38369872","wikidata":"https://www.wikidata.org/wiki/Q7445009","display_name":"Security analysis","level":2,"score":0.2793000042438507},{"id":"https://openalex.org/C100485629","wikidata":"https://www.wikidata.org/wiki/Q1669397","display_name":"Hash-based message authentication code","level":4,"score":0.2768999934196472},{"id":"https://openalex.org/C65302260","wikidata":"https://www.wikidata.org/wiki/Q327675","display_name":"Symmetric-key algorithm","level":4,"score":0.2734000086784363},{"id":"https://openalex.org/C35788789","wikidata":"https://www.wikidata.org/wiki/Q1320237","display_name":"Otway\u2013Rees protocol","level":5,"score":0.27320000529289246},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.2694999873638153},{"id":"https://openalex.org/C12269588","wikidata":"https://www.wikidata.org/wiki/Q132364","display_name":"Communications protocol","level":2,"score":0.2632000148296356},{"id":"https://openalex.org/C108710211","wikidata":"https://www.wikidata.org/wiki/Q11538","display_name":"Mathematical proof","level":2,"score":0.25949999690055847},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.25029999017715454}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1186/s42400-025-00536-5","is_oa":true,"landing_page_url":"https://doi.org/10.1186/s42400-025-00536-5","pdf_url":"https://link.springer.com/content/pdf/10.1186/s42400-025-00536-5.pdf","source":{"id":"https://openalex.org/S3035238565","display_name":"Cybersecurity","issn_l":"2523-3246","issn":["2523-3246"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cybersecurity","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:2c53e71bb57648e8b51babf5e6f659fd","is_oa":true,"landing_page_url":"https://doaj.org/article/2c53e71bb57648e8b51babf5e6f659fd","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Cybersecurity, Vol 9, Iss 1, Pp 1-21 (2026)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1186/s42400-025-00536-5","is_oa":true,"landing_page_url":"https://doi.org/10.1186/s42400-025-00536-5","pdf_url":"https://link.springer.com/content/pdf/10.1186/s42400-025-00536-5.pdf","source":{"id":"https://openalex.org/S3035238565","display_name":"Cybersecurity","issn_l":"2523-3246","issn":["2523-3246"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cybersecurity","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W7125645346.pdf","grobid_xml":"https://content.openalex.org/works/W7125645346.grobid-xml"},"referenced_works_count":27,"referenced_works":["https://openalex.org/W1047306120","https://openalex.org/W1526070463","https://openalex.org/W2029693536","https://openalex.org/W2066571890","https://openalex.org/W2092258731","https://openalex.org/W2279777762","https://openalex.org/W2412908136","https://openalex.org/W2521899819","https://openalex.org/W2600481982","https://openalex.org/W2611887307","https://openalex.org/W2734150319","https://openalex.org/W2749503685","https://openalex.org/W2753121224","https://openalex.org/W2769200374","https://openalex.org/W2779737695","https://openalex.org/W2890635977","https://openalex.org/W2997184002","https://openalex.org/W3009564320","https://openalex.org/W3110603219","https://openalex.org/W3132356282","https://openalex.org/W3198945347","https://openalex.org/W4368232621","https://openalex.org/W4385154266","https://openalex.org/W4387934885","https://openalex.org/W4391133711","https://openalex.org/W4393253086","https://openalex.org/W4398187452"],"related_works":[],"abstract_inverted_index":{"Abstract":[0],"Wireless":[1],"Medical":[2],"Sensor":[3],"Networks":[4],"(WMSNs)":[5],"are":[6,31],"crucial":[7],"for":[8,34,227],"remote":[9],"medical":[10],"monitoring,":[11],"yet":[12],"they":[13],"face":[14],"significant":[15],"challenges":[16],"in":[17,49,213,230],"terms":[18],"of":[19,52,57],"data":[20,126,228],"security":[21,173],"and":[22,26,64,85,95,103,109,116,122,134,153,164,181,202,208,224],"privacy":[23],"protection.":[24],"Authentication":[25],"Key":[27],"Agreement":[28],"(AKA)":[29],"protocols":[30],"effective":[32],"technologies":[33],"safeguarding":[35],"privacy;":[36],"however,":[37],"existing":[38,145],"solutions":[39],"often":[40],"struggle":[41],"to":[42,83],"resist":[43,92],"desynchronization":[44,93,141],"attacks":[45,94],"or":[46],"sacrifice":[47],"untraceability":[48,135],"the":[50,55,79,128,196],"pursuit":[51],"anonymity.":[53],"Additionally,":[54],"adoption":[56],"public-key":[58],"cryptography":[59],"substantially":[60],"increases":[61],"both":[62,151],"computational":[63,152,158],"communication":[65,154,166],"costs.":[66],"To":[67],"address":[68],"these":[69],"issues,":[70],"this":[71,147,219],"paper":[72],"proposes":[73],"a":[74],"lightweight":[75],"protocol":[76,148,197,220],"based":[77],"on":[78,185],"RD-UT":[80],"List":[81],"(Resistance":[82],"Desynchronization":[84],"Untraceability":[86],"List)":[87],"synchronization":[88],"mechanism,":[89],"which":[90],"can":[91],"ensure":[96],"untraceability.":[97],"This":[98],"mechanism":[99,129],"functions":[100],"by":[101,160,168],"generating":[102],"periodically":[104],"updating":[105],"temporary":[106],"identity":[107],"credentials":[108],"hash":[110],"chain":[111],"values,":[112],"ensuring":[113],"reliable":[114],"authentication":[115,201],"key":[117,204],"agreement":[118,205],"among":[119],"users,":[120],"servers,":[121],"sensor":[123,190],"nodes.":[124],"During":[125],"transmission,":[127],"not":[130],"only":[131],"achieves":[132,199],"anonymity":[133],"but":[136],"also":[137],"effectively":[138],"defends":[139],"against":[140],"attacks.":[142],"Compared":[143],"with":[144],"solutions,":[146],"significantly":[149],"improves":[150],"efficiency:":[155],"it":[156],"reduces":[157],"overhead":[159],"at":[161,169],"least":[162,170],"65.01%":[163],"cuts":[165],"costs":[167],"22.22%.":[171],"Its":[172],"has":[174],"been":[175],"fully":[176],"validated":[177],"through":[178],"formal":[179],"proofs":[180],"informal":[182],"analysis.":[183],"Furthermore,":[184],"an":[186,222],"experimental":[187],"platform":[188],"simulating":[189],"nodes":[191],"using":[192],"Raspberry":[193],"Pi":[194],"5,":[195],"successfully":[198],"mutual":[200],"session":[203],"between":[206],"users":[207],"sensors,":[209],"verifying":[210],"its":[211],"practicality":[212],"resource-constrained":[214],"WMSNs":[215,231],"environments.":[216,232],"In":[217],"summary,":[218],"provides":[221],"efficient":[223],"tailored":[225],"solution":[226],"protection":[229]},"counts_by_year":[],"updated_date":"2026-03-20T23:20:44.827607","created_date":"2026-01-26T00:00:00"}
