{"id":"https://openalex.org/W7130651427","doi":"https://doi.org/10.3390/fi18020111","title":"Lightweight Authentication and Dynamic Key Generation for IMU-Based Canine Motion Recognition IoT Systems","display_name":"Lightweight Authentication and Dynamic Key Generation for IMU-Based Canine Motion Recognition IoT Systems","publication_year":2026,"publication_date":"2026-02-20","ids":{"openalex":"https://openalex.org/W7130651427","doi":"https://doi.org/10.3390/fi18020111"},"language":"en","primary_location":{"id":"doi:10.3390/fi18020111","is_oa":true,"landing_page_url":"https://doi.org/10.3390/fi18020111","pdf_url":"https://www.mdpi.com/1999-5903/18/2/111/pdf?version=1771579862","source":{"id":"https://openalex.org/S34838331","display_name":"Future Internet","issn_l":"1999-5903","issn":["1999-5903"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Future Internet","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://www.mdpi.com/1999-5903/18/2/111/pdf?version=1771579862","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5126483993","display_name":"Guanyu Chen","orcid":null},"institutions":[{"id":"https://openalex.org/I84400586","display_name":"Future University Hakodate","ror":"https://ror.org/05szw2z23","country_code":"JP","type":"education","lineage":["https://openalex.org/I84400586"]}],"countries":["JP"],"is_corresponding":false,"raw_author_name":"Guanyu Chen","raw_affiliation_strings":["Graduate School of Systems Information Science, Future University Hakodate, 116-2 Kamedanakano-cho, Hakodate 041-8655, Hokkaido, Japan"],"affiliations":[{"raw_affiliation_string":"Graduate School of Systems Information Science, Future University Hakodate, 116-2 Kamedanakano-cho, Hakodate 041-8655, Hokkaido, Japan","institution_ids":["https://openalex.org/I84400586"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5121481280","display_name":"Hiroki Watanabe","orcid":null},"institutions":[{"id":"https://openalex.org/I84400586","display_name":"Future University Hakodate","ror":"https://ror.org/05szw2z23","country_code":"JP","type":"education","lineage":["https://openalex.org/I84400586"]}],"countries":["JP"],"is_corresponding":false,"raw_author_name":"Hiroki Watanabe","raw_affiliation_strings":["Graduate School of Systems Information Science, Future University Hakodate, 116-2 Kamedanakano-cho, Hakodate 041-8655, Hokkaido, Japan"],"affiliations":[{"raw_affiliation_string":"Graduate School of Systems Information Science, Future University Hakodate, 116-2 Kamedanakano-cho, Hakodate 041-8655, Hokkaido, Japan","institution_ids":["https://openalex.org/I84400586"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5015195261","display_name":"Kohei Matsumura","orcid":null},"institutions":[{"id":"https://openalex.org/I135768898","display_name":"Ritsumeikan University","ror":"https://ror.org/0197nmd03","country_code":"JP","type":"education","lineage":["https://openalex.org/I135768898","https://openalex.org/I4390039241"]}],"countries":["JP"],"is_corresponding":false,"raw_author_name":"Kohei Matsumura","raw_affiliation_strings":["College of Information Science and Engineering, Ritsumeikan University, 2-150 Iwakura-cho, Osaka 567-8570, Ibaraki, Japan"],"affiliations":[{"raw_affiliation_string":"College of Information Science and Engineering, Ritsumeikan University, 2-150 Iwakura-cho, Osaka 567-8570, Ibaraki, Japan","institution_ids":["https://openalex.org/I135768898"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5028490747","display_name":"Yoshinari Takegawa","orcid":"https://orcid.org/0000-0003-1947-0021"},"institutions":[{"id":"https://openalex.org/I84400586","display_name":"Future University Hakodate","ror":"https://ror.org/05szw2z23","country_code":"JP","type":"education","lineage":["https://openalex.org/I84400586"]}],"countries":["JP"],"is_corresponding":true,"raw_author_name":"Yoshinari Takegawa","raw_affiliation_strings":["Graduate School of Systems Information Science, Future University Hakodate, 116-2 Kamedanakano-cho, Hakodate 041-8655, Hokkaido, Japan"],"affiliations":[{"raw_affiliation_string":"Graduate School of Systems Information Science, Future University Hakodate, 116-2 Kamedanakano-cho, Hakodate 041-8655, Hokkaido, Japan","institution_ids":["https://openalex.org/I84400586"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5028490747"],"corresponding_institution_ids":["https://openalex.org/I84400586"],"apc_list":{"value":1400,"currency":"CHF","value_usd":1515},"apc_paid":{"value":1400,"currency":"CHF","value_usd":1515},"fwci":0.0,"has_fulltext":true,"cited_by_count":0,"citation_normalized_percentile":{"value":0.64667897,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"18","issue":"2","first_page":"111","last_page":"111"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12486","display_name":"Food Supply Chain Traceability","score":0.20090000331401825,"subfield":{"id":"https://openalex.org/subfields/1106","display_name":"Food Science"},"field":{"id":"https://openalex.org/fields/11","display_name":"Agricultural and Biological Sciences"},"domain":{"id":"https://openalex.org/domains/1","display_name":"Life Sciences"}},"topics":[{"id":"https://openalex.org/T12486","display_name":"Food Supply Chain Traceability","score":0.20090000331401825,"subfield":{"id":"https://openalex.org/subfields/1106","display_name":"Food Science"},"field":{"id":"https://openalex.org/fields/11","display_name":"Agricultural and Biological Sciences"},"domain":{"id":"https://openalex.org/domains/1","display_name":"Life Sciences"}},{"id":"https://openalex.org/T10986","display_name":"RFID technology advancements","score":0.11670000106096268,"subfield":{"id":"https://openalex.org/subfields/2214","display_name":"Media Technology"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11214","display_name":"Human-Animal Interaction Studies","score":0.06769999861717224,"subfield":{"id":"https://openalex.org/subfields/1311","display_name":"Genetics"},"field":{"id":"https://openalex.org/fields/13","display_name":"Biochemistry, Genetics and Molecular Biology"},"domain":{"id":"https://openalex.org/domains/1","display_name":"Life Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.5315999984741211},{"id":"https://openalex.org/keywords/testbed","display_name":"Testbed","score":0.4429999887943268},{"id":"https://openalex.org/keywords/message-queue","display_name":"Message queue","score":0.4410000145435333},{"id":"https://openalex.org/keywords/spoofing-attack","display_name":"Spoofing attack","score":0.4341999888420105},{"id":"https://openalex.org/keywords/wearable-computer","display_name":"Wearable computer","score":0.3700999915599823},{"id":"https://openalex.org/keywords/overhead","display_name":"Overhead (engineering)","score":0.3652999997138977},{"id":"https://openalex.org/keywords/message-authentication-code","display_name":"Message authentication code","score":0.3598000109195709},{"id":"https://openalex.org/keywords/wireless","display_name":"Wireless","score":0.35120001435279846},{"id":"https://openalex.org/keywords/wireless-sensor-network","display_name":"Wireless sensor network","score":0.3407999873161316},{"id":"https://openalex.org/keywords/network-packet","display_name":"Network packet","score":0.3334999978542328}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8996000289916992},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.5315999984741211},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.4611999988555908},{"id":"https://openalex.org/C31395832","wikidata":"https://www.wikidata.org/wiki/Q1318674","display_name":"Testbed","level":2,"score":0.4429999887943268},{"id":"https://openalex.org/C26324664","wikidata":"https://www.wikidata.org/wiki/Q1065525","display_name":"Message queue","level":2,"score":0.4410000145435333},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.44040000438690186},{"id":"https://openalex.org/C167900197","wikidata":"https://www.wikidata.org/wiki/Q11081100","display_name":"Spoofing attack","level":2,"score":0.4341999888420105},{"id":"https://openalex.org/C79403827","wikidata":"https://www.wikidata.org/wiki/Q3988","display_name":"Real-time computing","level":1,"score":0.373199999332428},{"id":"https://openalex.org/C150594956","wikidata":"https://www.wikidata.org/wiki/Q1334829","display_name":"Wearable computer","level":2,"score":0.3700999915599823},{"id":"https://openalex.org/C2779960059","wikidata":"https://www.wikidata.org/wiki/Q7113681","display_name":"Overhead (engineering)","level":2,"score":0.3652999997138977},{"id":"https://openalex.org/C141492731","wikidata":"https://www.wikidata.org/wiki/Q1052621","display_name":"Message authentication code","level":3,"score":0.3598000109195709},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.35120001435279846},{"id":"https://openalex.org/C24590314","wikidata":"https://www.wikidata.org/wiki/Q336038","display_name":"Wireless sensor network","level":2,"score":0.3407999873161316},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.3334999978542328},{"id":"https://openalex.org/C38822068","wikidata":"https://www.wikidata.org/wiki/Q131406","display_name":"Denial-of-service attack","level":3,"score":0.3312999904155731},{"id":"https://openalex.org/C190793597","wikidata":"https://www.wikidata.org/wiki/Q189768","display_name":"Application layer","level":3,"score":0.32820001244544983},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.3043999969959259},{"id":"https://openalex.org/C116834253","wikidata":"https://www.wikidata.org/wiki/Q2039217","display_name":"Identification (biology)","level":2,"score":0.2953999936580658},{"id":"https://openalex.org/C165696696","wikidata":"https://www.wikidata.org/wiki/Q11287","display_name":"Exploit","level":2,"score":0.29319998621940613},{"id":"https://openalex.org/C99138194","wikidata":"https://www.wikidata.org/wiki/Q183427","display_name":"Hash function","level":2,"score":0.29089999198913574},{"id":"https://openalex.org/C43214815","wikidata":"https://www.wikidata.org/wiki/Q7310987","display_name":"Reliability (semiconductor)","level":3,"score":0.2904999852180481},{"id":"https://openalex.org/C186594467","wikidata":"https://www.wikidata.org/wiki/Q1429176","display_name":"Flooding (psychology)","level":2,"score":0.29010000824928284},{"id":"https://openalex.org/C11560541","wikidata":"https://www.wikidata.org/wiki/Q1756025","display_name":"Replay attack","level":3,"score":0.2874999940395355},{"id":"https://openalex.org/C79061980","wikidata":"https://www.wikidata.org/wiki/Q941680","display_name":"Inertial measurement unit","level":2,"score":0.28690001368522644},{"id":"https://openalex.org/C2776760102","wikidata":"https://www.wikidata.org/wiki/Q5139990","display_name":"Code (set theory)","level":3,"score":0.28450000286102295},{"id":"https://openalex.org/C111065885","wikidata":"https://www.wikidata.org/wiki/Q1189053","display_name":"Fuzz testing","level":3,"score":0.28290000557899475},{"id":"https://openalex.org/C2779201187","wikidata":"https://www.wikidata.org/wiki/Q2775060","display_name":"Information leakage","level":2,"score":0.2818000018596649},{"id":"https://openalex.org/C132868160","wikidata":"https://www.wikidata.org/wiki/Q10322548","display_name":"MQTT","level":3,"score":0.27900001406669617},{"id":"https://openalex.org/C84555802","wikidata":"https://www.wikidata.org/wiki/Q2551624","display_name":"IPv6","level":3,"score":0.27559998631477356},{"id":"https://openalex.org/C95713431","wikidata":"https://www.wikidata.org/wiki/Q631425","display_name":"Vulnerability (computing)","level":2,"score":0.27459999918937683},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.2736000120639801},{"id":"https://openalex.org/C204222849","wikidata":"https://www.wikidata.org/wiki/Q104954","display_name":"Radio-frequency identification","level":2,"score":0.2709999978542328},{"id":"https://openalex.org/C63479239","wikidata":"https://www.wikidata.org/wiki/Q7353546","display_name":"Robustness (evolution)","level":3,"score":0.27070000767707825},{"id":"https://openalex.org/C186967261","wikidata":"https://www.wikidata.org/wiki/Q5082128","display_name":"Mobile device","level":2,"score":0.26989999413490295},{"id":"https://openalex.org/C33762810","wikidata":"https://www.wikidata.org/wiki/Q461671","display_name":"Data integrity","level":2,"score":0.26489999890327454},{"id":"https://openalex.org/C59201141","wikidata":"https://www.wikidata.org/wiki/Q46904","display_name":"GSM","level":2,"score":0.2612000107765198},{"id":"https://openalex.org/C99400001","wikidata":"https://www.wikidata.org/wiki/Q109775","display_name":"6LoWPAN","level":4,"score":0.2603999972343445},{"id":"https://openalex.org/C204142451","wikidata":"https://www.wikidata.org/wiki/Q11097","display_name":"IPv6 address","level":4,"score":0.26030001044273376},{"id":"https://openalex.org/C9390403","wikidata":"https://www.wikidata.org/wiki/Q3966","display_name":"Computer hardware","level":1,"score":0.25780001282691956},{"id":"https://openalex.org/C12269588","wikidata":"https://www.wikidata.org/wiki/Q132364","display_name":"Communications protocol","level":2,"score":0.25270000100135803}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.3390/fi18020111","is_oa":true,"landing_page_url":"https://doi.org/10.3390/fi18020111","pdf_url":"https://www.mdpi.com/1999-5903/18/2/111/pdf?version=1771579862","source":{"id":"https://openalex.org/S34838331","display_name":"Future Internet","issn_l":"1999-5903","issn":["1999-5903"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Future Internet","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:d3aa5f56c4e3428cb1a71249ae076176","is_oa":true,"landing_page_url":"https://doaj.org/article/d3aa5f56c4e3428cb1a71249ae076176","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Future Internet, Vol 18, Iss 2, p 111 (2026)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.3390/fi18020111","is_oa":true,"landing_page_url":"https://doi.org/10.3390/fi18020111","pdf_url":"https://www.mdpi.com/1999-5903/18/2/111/pdf?version=1771579862","source":{"id":"https://openalex.org/S34838331","display_name":"Future Internet","issn_l":"1999-5903","issn":["1999-5903"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Future Internet","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W7130651427.pdf","grobid_xml":"https://content.openalex.org/works/W7130651427.grobid-xml"},"referenced_works_count":0,"referenced_works":[],"related_works":[],"abstract_inverted_index":{"The":[0],"integration":[1],"of":[2,12,30],"wearable":[3],"inertial":[4],"measurement":[5],"units":[6],"(IMU)":[7],"in":[8],"animal":[9,21,50,54,102],"welfare":[10,25],"Internet":[11],"Things":[13],"(IoT)":[14],"systems":[15],"has":[16],"become":[17],"crucial":[18],"for":[19,118,272],"monitoring":[20,55],"behaviors":[22],"and":[23,35,45,77,89,142,163,195,201,208,232,257,268,279],"enhancing":[24],"management.":[26],"However,":[27],"the":[28,212,246],"vulnerability":[29],"IoT":[31,104],"devices":[32],"to":[33,79,100,138,275],"network":[34,112],"hardware":[36],"attacks":[37],"poses":[38],"significant":[39],"risks,":[40],"potentially":[41],"compromising":[42],"data":[43],"integrity":[44,88,210],"misleading":[46],"caregivers,":[47],"negatively":[48],"impacting":[49],"welfare.":[51],"Additionally,":[52],"current":[53],"solutions":[56],"often":[57],"rely":[58],"on":[59,156,224,237],"intrusive":[60],"tagging":[61],"methods,":[62],"such":[63],"as":[64,133],"Radio":[65],"Frequency":[66],"Identification":[67],"(RFID)":[68],"or":[69],"ear":[70],"tagging,":[71],"which":[72],"may":[73],"cause":[74],"unnecessary":[75],"stress":[76],"discomfort":[78],"animals.":[80],"In":[81,187],"this":[82,250],"study,":[83],"we":[84],"propose":[85],"a":[86,109,123,148,225,238,262,270],"lightweight":[87,124,264],"provenance-oriented":[90],"security":[91],"stack":[92,267],"that":[93],"complements":[94],"standard":[95],"transport":[96],"security,":[97],"specifically":[98],"tailored":[99],"IMU-based":[101],"motion":[103,120,161,253],"systems.":[105],"Our":[106],"system":[107],"utilizes":[108],"1D-convolutional":[110],"neural":[111],"(CNN)":[113],"model,":[114],"achieving":[115],"88%":[116],"accuracy":[117],"precise":[119],"recognition,":[121,254],"alongside":[122],"behavioral":[125,199,255],"fingerprinting":[126,200],"CNN":[127],"model":[128],"attaining":[129],"83%":[130],"accuracy,":[131],"serving":[132],"an":[134],"auxiliary":[135,205],"consistency":[136],"signal":[137],"support":[139],"collar\u2013animal":[140],"association":[141],"reduce":[143],"mis-attribution":[144],"risks.":[145],"We":[146],"introduce":[147],"dynamically":[149],"generated":[150],"pre-shared":[151],"key":[152,259],"(PSK)":[153],"mechanism":[154],"based":[155],"SHA-256":[157],"hashes":[158],"derived":[159],"from":[160],"features":[162],"timestamps,":[164],"further":[165],"securing":[166],"communication":[167],"channels":[168],"via":[169,220],"application-layer":[170],"Hash-based":[171],"Message":[172,178],"Authentication":[173],"Code":[174],"(HMAC)":[175],"combined":[176],"with":[177],"Queuing":[179],"Telemetry":[180],"Transport":[181],"(MQTT)/Transport":[182],"Layer":[183],"Security":[184],"(TLS)":[185],"protocols.":[186],"our":[188],"design,":[189],"MQTT/TLS":[190,247],"provides":[191,269],"primary":[192],"device":[193],"authentication":[194],"channel":[196],"protection,":[197],"while":[198],"per-window":[202],"dynamic\u2013HMAC":[203],"provide":[204],"provenance":[206],"cues":[207],"tamper-evident":[209],"at":[211],"application":[213],"layer.":[214],"Experimental":[215],"validation":[216],"is":[217],"conducted":[218],"primarily":[219],"offline,":[221],"dataset-driven":[222],"experiments":[223],"public":[226],"canine":[227],"IMU":[228],"dataset;":[229],"system-level":[230],"overhead":[231],"sensor-to-edge":[233],"latency":[234],"are":[235],"measured":[236],"Raspberry":[239],"Pi-based":[240],"testbed":[241],"by":[242],"replaying":[243],"windows":[244],"through":[245],"pipeline.":[248],"Overall,":[249],"work":[251],"integrates":[252],"fingerprinting,":[256],"dynamic":[258],"management":[260],"into":[261],"cohesive,":[263],"telemetry":[265],"integrity/provenance":[266],"foundation":[271],"future":[273],"extensions":[274],"multi-species":[276],"adaptive":[277],"scenarios":[278],"federated":[280],"learning":[281],"applications.":[282]},"counts_by_year":[],"updated_date":"2026-03-12T06:13:28.667946","created_date":"2026-02-20T00:00:00"}
