An Elliptic Curve Menezes–Qu–Vanston-Based Authentication and Encryption Protocol for IoT Article Swipe
YOU?
·
· 2024
· Open Access
·
· DOI: https://doi.org/10.1155/2024/5998163
The exponential growth of the Internet of Things (IoT) has led to a surge in data generation, critical for business decisions. Ensuring data authenticity and integrity over unsecured channels is vital, especially due to potential catastrophic consequences of tampered data. However, IoT’s resource constraints and heterogeneous ecosystem present unique security challenges. Traditional public key infrastructure offers strong security but is resource intensive, while existing cloud-based solutions lack comprehensive security and rise to latency and unwanted wastage of energy. In this paper, we propose a universal authentication scheme using edge computing, incorporating fully hashed Elliptic Curve Menezes–Qu–Vanstone (ECMQV) and PUF. This approach provides a scalable and reliable solution. It also provides security against active attacks, addressing man-in-the-middle and impersonation threats. Experimental validation on a Zybo board confirms its effectiveness, offering a robust security solution for the IoT landscape.
Related Topics
- Type
- article
- Language
- en
- Landing Page
- http://doi.org/10.1155/2024/5998163
- https://downloads.hindawi.com/journals/wcmc/2024/5998163.pdf
- OA Status
- hybrid
- Cited By
- 1
- References
- 46
- Related Works
- 10
- OpenAlex ID
- https://openalex.org/W4393064584
Raw OpenAlex JSON
- OpenAlex ID
-
https://openalex.org/W4393064584Canonical identifier for this work in OpenAlex
- DOI
-
https://doi.org/10.1155/2024/5998163Digital Object Identifier
- Title
-
An Elliptic Curve Menezes–Qu–Vanston-Based Authentication and Encryption Protocol for IoTWork title
- Type
-
articleOpenAlex work type
- Language
-
enPrimary language
- Publication year
-
2024Year of publication
- Publication date
-
2024-03-22Full publication date if available
- Authors
-
Susovan Chanda, Ashish Kr. Luhach, Sharmila Anand John Francis, Indranil Sengupta, Diptendu Sinha RoyList of authors in order
- Landing page
-
https://doi.org/10.1155/2024/5998163Publisher landing page
- PDF URL
-
https://downloads.hindawi.com/journals/wcmc/2024/5998163.pdfDirect link to full text PDF
- Open access
-
YesWhether a free full text is available
- OA status
-
hybridOpen access status per OpenAlex
- OA URL
-
https://downloads.hindawi.com/journals/wcmc/2024/5998163.pdfDirect OA link when available
- Concepts
-
Computer science, Elliptic curve, Protocol (science), Elliptic curve cryptography, Encryption, Authentication (law), Authentication protocol, Internet of Things, Computer security, Computer network, Public-key cryptography, Mathematics, Medicine, Pathology, Alternative medicine, Mathematical analysisTop concepts (fields/topics) attached by OpenAlex
- Cited by
-
1Total citation count in OpenAlex
- Citations by year (recent)
-
2024: 1Per-year citation counts (last 5 years)
- References (count)
-
46Number of works referenced by this work
- Related works (count)
-
10Other works algorithmically related by OpenAlex
Full payload
| id | https://openalex.org/W4393064584 |
|---|---|
| doi | https://doi.org/10.1155/2024/5998163 |
| ids.doi | https://doi.org/10.1155/2024/5998163 |
| ids.openalex | https://openalex.org/W4393064584 |
| fwci | 0.63877855 |
| type | article |
| title | An Elliptic Curve Menezes–Qu–Vanston-Based Authentication and Encryption Protocol for IoT |
| biblio.issue | |
| biblio.volume | 2024 |
| biblio.last_page | 14 |
| biblio.first_page | 1 |
| topics[0].id | https://openalex.org/T10237 |
| topics[0].field.id | https://openalex.org/fields/17 |
| topics[0].field.display_name | Computer Science |
| topics[0].score | 0.9995999932289124 |
| topics[0].domain.id | https://openalex.org/domains/3 |
| topics[0].domain.display_name | Physical Sciences |
| topics[0].subfield.id | https://openalex.org/subfields/1702 |
| topics[0].subfield.display_name | Artificial Intelligence |
| topics[0].display_name | Cryptography and Data Security |
| topics[1].id | https://openalex.org/T11504 |
| topics[1].field.id | https://openalex.org/fields/17 |
| topics[1].field.display_name | Computer Science |
| topics[1].score | 0.9984999895095825 |
| topics[1].domain.id | https://openalex.org/domains/3 |
| topics[1].domain.display_name | Physical Sciences |
| topics[1].subfield.id | https://openalex.org/subfields/1705 |
| topics[1].subfield.display_name | Computer Networks and Communications |
| topics[1].display_name | Advanced Authentication Protocols Security |
| topics[2].id | https://openalex.org/T10951 |
| topics[2].field.id | https://openalex.org/fields/17 |
| topics[2].field.display_name | Computer Science |
| topics[2].score | 0.9951000213623047 |
| topics[2].domain.id | https://openalex.org/domains/3 |
| topics[2].domain.display_name | Physical Sciences |
| topics[2].subfield.id | https://openalex.org/subfields/1702 |
| topics[2].subfield.display_name | Artificial Intelligence |
| topics[2].display_name | Cryptographic Implementations and Security |
| is_xpac | False |
| apc_list.value | 2300 |
| apc_list.currency | USD |
| apc_list.value_usd | 2300 |
| apc_paid.value | 2300 |
| apc_paid.currency | USD |
| apc_paid.value_usd | 2300 |
| concepts[0].id | https://openalex.org/C41008148 |
| concepts[0].level | 0 |
| concepts[0].score | 0.822365403175354 |
| concepts[0].wikidata | https://www.wikidata.org/wiki/Q21198 |
| concepts[0].display_name | Computer science |
| concepts[1].id | https://openalex.org/C179603306 |
| concepts[1].level | 2 |
| concepts[1].score | 0.6122360825538635 |
| concepts[1].wikidata | https://www.wikidata.org/wiki/Q268493 |
| concepts[1].display_name | Elliptic curve |
| concepts[2].id | https://openalex.org/C2780385302 |
| concepts[2].level | 3 |
| concepts[2].score | 0.6040563583374023 |
| concepts[2].wikidata | https://www.wikidata.org/wiki/Q367158 |
| concepts[2].display_name | Protocol (science) |
| concepts[3].id | https://openalex.org/C167615521 |
| concepts[3].level | 4 |
| concepts[3].score | 0.5974143147468567 |
| concepts[3].wikidata | https://www.wikidata.org/wiki/Q1048911 |
| concepts[3].display_name | Elliptic curve cryptography |
| concepts[4].id | https://openalex.org/C148730421 |
| concepts[4].level | 2 |
| concepts[4].score | 0.5744110941886902 |
| concepts[4].wikidata | https://www.wikidata.org/wiki/Q141090 |
| concepts[4].display_name | Encryption |
| concepts[5].id | https://openalex.org/C148417208 |
| concepts[5].level | 2 |
| concepts[5].score | 0.5676255822181702 |
| concepts[5].wikidata | https://www.wikidata.org/wiki/Q4825882 |
| concepts[5].display_name | Authentication (law) |
| concepts[6].id | https://openalex.org/C21564112 |
| concepts[6].level | 3 |
| concepts[6].score | 0.5110365152359009 |
| concepts[6].wikidata | https://www.wikidata.org/wiki/Q4825885 |
| concepts[6].display_name | Authentication protocol |
| concepts[7].id | https://openalex.org/C81860439 |
| concepts[7].level | 2 |
| concepts[7].score | 0.47586387395858765 |
| concepts[7].wikidata | https://www.wikidata.org/wiki/Q251212 |
| concepts[7].display_name | Internet of Things |
| concepts[8].id | https://openalex.org/C38652104 |
| concepts[8].level | 1 |
| concepts[8].score | 0.4408465325832367 |
| concepts[8].wikidata | https://www.wikidata.org/wiki/Q3510521 |
| concepts[8].display_name | Computer security |
| concepts[9].id | https://openalex.org/C31258907 |
| concepts[9].level | 1 |
| concepts[9].score | 0.41284245252609253 |
| concepts[9].wikidata | https://www.wikidata.org/wiki/Q1301371 |
| concepts[9].display_name | Computer network |
| concepts[10].id | https://openalex.org/C203062551 |
| concepts[10].level | 3 |
| concepts[10].score | 0.1894231140613556 |
| concepts[10].wikidata | https://www.wikidata.org/wiki/Q201339 |
| concepts[10].display_name | Public-key cryptography |
| concepts[11].id | https://openalex.org/C33923547 |
| concepts[11].level | 0 |
| concepts[11].score | 0.08896270394325256 |
| concepts[11].wikidata | https://www.wikidata.org/wiki/Q395 |
| concepts[11].display_name | Mathematics |
| concepts[12].id | https://openalex.org/C71924100 |
| concepts[12].level | 0 |
| concepts[12].score | 0.059575796127319336 |
| concepts[12].wikidata | https://www.wikidata.org/wiki/Q11190 |
| concepts[12].display_name | Medicine |
| concepts[13].id | https://openalex.org/C142724271 |
| concepts[13].level | 1 |
| concepts[13].score | 0.0 |
| concepts[13].wikidata | https://www.wikidata.org/wiki/Q7208 |
| concepts[13].display_name | Pathology |
| concepts[14].id | https://openalex.org/C204787440 |
| concepts[14].level | 2 |
| concepts[14].score | 0.0 |
| concepts[14].wikidata | https://www.wikidata.org/wiki/Q188504 |
| concepts[14].display_name | Alternative medicine |
| concepts[15].id | https://openalex.org/C134306372 |
| concepts[15].level | 1 |
| concepts[15].score | 0.0 |
| concepts[15].wikidata | https://www.wikidata.org/wiki/Q7754 |
| concepts[15].display_name | Mathematical analysis |
| keywords[0].id | https://openalex.org/keywords/computer-science |
| keywords[0].score | 0.822365403175354 |
| keywords[0].display_name | Computer science |
| keywords[1].id | https://openalex.org/keywords/elliptic-curve |
| keywords[1].score | 0.6122360825538635 |
| keywords[1].display_name | Elliptic curve |
| keywords[2].id | https://openalex.org/keywords/protocol |
| keywords[2].score | 0.6040563583374023 |
| keywords[2].display_name | Protocol (science) |
| keywords[3].id | https://openalex.org/keywords/elliptic-curve-cryptography |
| keywords[3].score | 0.5974143147468567 |
| keywords[3].display_name | Elliptic curve cryptography |
| keywords[4].id | https://openalex.org/keywords/encryption |
| keywords[4].score | 0.5744110941886902 |
| keywords[4].display_name | Encryption |
| keywords[5].id | https://openalex.org/keywords/authentication |
| keywords[5].score | 0.5676255822181702 |
| keywords[5].display_name | Authentication (law) |
| keywords[6].id | https://openalex.org/keywords/authentication-protocol |
| keywords[6].score | 0.5110365152359009 |
| keywords[6].display_name | Authentication protocol |
| keywords[7].id | https://openalex.org/keywords/internet-of-things |
| keywords[7].score | 0.47586387395858765 |
| keywords[7].display_name | Internet of Things |
| keywords[8].id | https://openalex.org/keywords/computer-security |
| keywords[8].score | 0.4408465325832367 |
| keywords[8].display_name | Computer security |
| keywords[9].id | https://openalex.org/keywords/computer-network |
| keywords[9].score | 0.41284245252609253 |
| keywords[9].display_name | Computer network |
| keywords[10].id | https://openalex.org/keywords/public-key-cryptography |
| keywords[10].score | 0.1894231140613556 |
| keywords[10].display_name | Public-key cryptography |
| keywords[11].id | https://openalex.org/keywords/mathematics |
| keywords[11].score | 0.08896270394325256 |
| keywords[11].display_name | Mathematics |
| keywords[12].id | https://openalex.org/keywords/medicine |
| keywords[12].score | 0.059575796127319336 |
| keywords[12].display_name | Medicine |
| language | en |
| locations[0].id | doi:10.1155/2024/5998163 |
| locations[0].is_oa | True |
| locations[0].source.id | https://openalex.org/S235346 |
| locations[0].source.issn | 1530-8669, 1530-8677 |
| locations[0].source.type | journal |
| locations[0].source.is_oa | False |
| locations[0].source.issn_l | 1530-8669 |
| locations[0].source.is_core | True |
| locations[0].source.is_in_doaj | False |
| locations[0].source.display_name | Wireless Communications and Mobile Computing |
| locations[0].source.host_organization | https://openalex.org/P4310320595 |
| locations[0].source.host_organization_name | Wiley |
| locations[0].source.host_organization_lineage | https://openalex.org/P4310320595 |
| locations[0].source.host_organization_lineage_names | Wiley |
| locations[0].license | cc-by |
| locations[0].pdf_url | https://downloads.hindawi.com/journals/wcmc/2024/5998163.pdf |
| locations[0].version | publishedVersion |
| locations[0].raw_type | journal-article |
| locations[0].license_id | https://openalex.org/licenses/cc-by |
| locations[0].is_accepted | True |
| locations[0].is_published | True |
| locations[0].raw_source_name | Wireless Communications and Mobile Computing |
| locations[0].landing_page_url | http://doi.org/10.1155/2024/5998163 |
| locations[1].id | pmh:oai:hindawi.com:10.1155/2024/5998163 |
| locations[1].is_oa | True |
| locations[1].source.id | https://openalex.org/S4306400340 |
| locations[1].source.issn | |
| locations[1].source.type | repository |
| locations[1].source.is_oa | False |
| locations[1].source.issn_l | |
| locations[1].source.is_core | False |
| locations[1].source.is_in_doaj | False |
| locations[1].source.display_name | Hindawi Journal of Chemistry (Hindawi) |
| locations[1].source.host_organization | https://openalex.org/I4210126990 |
| locations[1].source.host_organization_name | Hindawi (United Kingdom) |
| locations[1].source.host_organization_lineage | https://openalex.org/I4210126990 |
| locations[1].license | cc-by |
| locations[1].pdf_url | |
| locations[1].version | submittedVersion |
| locations[1].raw_type | Research Article |
| locations[1].license_id | https://openalex.org/licenses/cc-by |
| locations[1].is_accepted | False |
| locations[1].is_published | False |
| locations[1].raw_source_name | |
| locations[1].landing_page_url | https://doi.org/10.1155/2024/5998163 |
| indexed_in | crossref |
| authorships[0].author.id | https://openalex.org/A5064957643 |
| authorships[0].author.orcid | https://orcid.org/0000-0001-6849-1182 |
| authorships[0].author.display_name | Susovan Chanda |
| authorships[0].countries | IN |
| authorships[0].affiliations[0].institution_ids | https://openalex.org/I9523339 |
| authorships[0].affiliations[0].raw_affiliation_string | Department of Computer Science and Engineering, National Institute of Technology Meghalaya, Shillong, Meghalaya, India |
| authorships[0].institutions[0].id | https://openalex.org/I9523339 |
| authorships[0].institutions[0].ror | https://ror.org/020vd6n84 |
| authorships[0].institutions[0].type | education |
| authorships[0].institutions[0].lineage | https://openalex.org/I9523339 |
| authorships[0].institutions[0].country_code | IN |
| authorships[0].institutions[0].display_name | National Institute of Technology Meghalaya |
| authorships[0].author_position | first |
| authorships[0].raw_author_name | Susovan Chanda |
| authorships[0].is_corresponding | False |
| authorships[0].raw_affiliation_strings | Department of Computer Science and Engineering, National Institute of Technology Meghalaya, Shillong, Meghalaya, India |
| authorships[1].author.id | https://openalex.org/A5003949731 |
| authorships[1].author.orcid | https://orcid.org/0000-0001-8759-0290 |
| authorships[1].author.display_name | Ashish Kr. Luhach |
| authorships[1].countries | PG |
| authorships[1].affiliations[0].institution_ids | https://openalex.org/I119444370 |
| authorships[1].affiliations[0].raw_affiliation_string | Department of Electrical and Communication Engineering, The Papua New Guinea University of Technology, Lae, Papua New Guinea |
| authorships[1].institutions[0].id | https://openalex.org/I119444370 |
| authorships[1].institutions[0].ror | https://ror.org/012g45386 |
| authorships[1].institutions[0].type | education |
| authorships[1].institutions[0].lineage | https://openalex.org/I119444370 |
| authorships[1].institutions[0].country_code | PG |
| authorships[1].institutions[0].display_name | Papua New Guinea University of Technology |
| authorships[1].author_position | middle |
| authorships[1].raw_author_name | Ashish Kr. Luhach |
| authorships[1].is_corresponding | True |
| authorships[1].raw_affiliation_strings | Department of Electrical and Communication Engineering, The Papua New Guinea University of Technology, Lae, Papua New Guinea |
| authorships[2].author.id | https://openalex.org/A5021832703 |
| authorships[2].author.orcid | https://orcid.org/0000-0001-9154-7287 |
| authorships[2].author.display_name | Sharmila Anand John Francis |
| authorships[2].countries | SA |
| authorships[2].affiliations[0].institution_ids | https://openalex.org/I82952536 |
| authorships[2].affiliations[0].raw_affiliation_string | Department of Computer Science, Rejal Alma’a Campus, King Khalid University, Abha, Saudi Arabia |
| authorships[2].institutions[0].id | https://openalex.org/I82952536 |
| authorships[2].institutions[0].ror | https://ror.org/052kwzs30 |
| authorships[2].institutions[0].type | education |
| authorships[2].institutions[0].lineage | https://openalex.org/I82952536 |
| authorships[2].institutions[0].country_code | SA |
| authorships[2].institutions[0].display_name | King Khalid University |
| authorships[2].author_position | middle |
| authorships[2].raw_author_name | J. Sharmila Anand Francis |
| authorships[2].is_corresponding | False |
| authorships[2].raw_affiliation_strings | Department of Computer Science, Rejal Alma’a Campus, King Khalid University, Abha, Saudi Arabia |
| authorships[3].author.id | https://openalex.org/A5103023953 |
| authorships[3].author.orcid | https://orcid.org/0000-0002-5438-6653 |
| authorships[3].author.display_name | Indranil Sengupta |
| authorships[3].countries | IN |
| authorships[3].affiliations[0].institution_ids | https://openalex.org/I145894827 |
| authorships[3].affiliations[0].raw_affiliation_string | Department of Computer Science and Engineering, Indian Institute of Technology Kharagpur, Kharagpur, India |
| authorships[3].institutions[0].id | https://openalex.org/I145894827 |
| authorships[3].institutions[0].ror | https://ror.org/03w5sq511 |
| authorships[3].institutions[0].type | education |
| authorships[3].institutions[0].lineage | https://openalex.org/I145894827 |
| authorships[3].institutions[0].country_code | IN |
| authorships[3].institutions[0].display_name | Indian Institute of Technology Kharagpur |
| authorships[3].author_position | middle |
| authorships[3].raw_author_name | Indranil Sengupta |
| authorships[3].is_corresponding | False |
| authorships[3].raw_affiliation_strings | Department of Computer Science and Engineering, Indian Institute of Technology Kharagpur, Kharagpur, India |
| authorships[4].author.id | https://openalex.org/A5011943818 |
| authorships[4].author.orcid | https://orcid.org/0000-0001-9731-2534 |
| authorships[4].author.display_name | Diptendu Sinha Roy |
| authorships[4].countries | IN |
| authorships[4].affiliations[0].institution_ids | https://openalex.org/I9523339 |
| authorships[4].affiliations[0].raw_affiliation_string | Department of Computer Science and Engineering, National Institute of Technology Meghalaya, Shillong, Meghalaya, India |
| authorships[4].institutions[0].id | https://openalex.org/I9523339 |
| authorships[4].institutions[0].ror | https://ror.org/020vd6n84 |
| authorships[4].institutions[0].type | education |
| authorships[4].institutions[0].lineage | https://openalex.org/I9523339 |
| authorships[4].institutions[0].country_code | IN |
| authorships[4].institutions[0].display_name | National Institute of Technology Meghalaya |
| authorships[4].author_position | last |
| authorships[4].raw_author_name | Diptendu Sinha Roy |
| authorships[4].is_corresponding | False |
| authorships[4].raw_affiliation_strings | Department of Computer Science and Engineering, National Institute of Technology Meghalaya, Shillong, Meghalaya, India |
| has_content.pdf | True |
| has_content.grobid_xml | True |
| is_paratext | False |
| open_access.is_oa | True |
| open_access.oa_url | https://downloads.hindawi.com/journals/wcmc/2024/5998163.pdf |
| open_access.oa_status | hybrid |
| open_access.any_repository_has_fulltext | False |
| created_date | 2025-10-10T00:00:00 |
| display_name | An Elliptic Curve Menezes–Qu–Vanston-Based Authentication and Encryption Protocol for IoT |
| has_fulltext | True |
| is_retracted | False |
| updated_date | 2025-11-06T03:46:38.306776 |
| primary_topic.id | https://openalex.org/T10237 |
| primary_topic.field.id | https://openalex.org/fields/17 |
| primary_topic.field.display_name | Computer Science |
| primary_topic.score | 0.9995999932289124 |
| primary_topic.domain.id | https://openalex.org/domains/3 |
| primary_topic.domain.display_name | Physical Sciences |
| primary_topic.subfield.id | https://openalex.org/subfields/1702 |
| primary_topic.subfield.display_name | Artificial Intelligence |
| primary_topic.display_name | Cryptography and Data Security |
| related_works | https://openalex.org/W2034419863, https://openalex.org/W2296396257, https://openalex.org/W2971072696, https://openalex.org/W3007106793, https://openalex.org/W2031177322, https://openalex.org/W4226476440, https://openalex.org/W1577956677, https://openalex.org/W2132505069, https://openalex.org/W2009754599, https://openalex.org/W2584223401 |
| cited_by_count | 1 |
| counts_by_year[0].year | 2024 |
| counts_by_year[0].cited_by_count | 1 |
| locations_count | 2 |
| best_oa_location.id | doi:10.1155/2024/5998163 |
| best_oa_location.is_oa | True |
| best_oa_location.source.id | https://openalex.org/S235346 |
| best_oa_location.source.issn | 1530-8669, 1530-8677 |
| best_oa_location.source.type | journal |
| best_oa_location.source.is_oa | False |
| best_oa_location.source.issn_l | 1530-8669 |
| best_oa_location.source.is_core | True |
| best_oa_location.source.is_in_doaj | False |
| best_oa_location.source.display_name | Wireless Communications and Mobile Computing |
| best_oa_location.source.host_organization | https://openalex.org/P4310320595 |
| best_oa_location.source.host_organization_name | Wiley |
| best_oa_location.source.host_organization_lineage | https://openalex.org/P4310320595 |
| best_oa_location.source.host_organization_lineage_names | Wiley |
| best_oa_location.license | cc-by |
| best_oa_location.pdf_url | https://downloads.hindawi.com/journals/wcmc/2024/5998163.pdf |
| best_oa_location.version | publishedVersion |
| best_oa_location.raw_type | journal-article |
| best_oa_location.license_id | https://openalex.org/licenses/cc-by |
| best_oa_location.is_accepted | True |
| best_oa_location.is_published | True |
| best_oa_location.raw_source_name | Wireless Communications and Mobile Computing |
| best_oa_location.landing_page_url | http://doi.org/10.1155/2024/5998163 |
| primary_location.id | doi:10.1155/2024/5998163 |
| primary_location.is_oa | True |
| primary_location.source.id | https://openalex.org/S235346 |
| primary_location.source.issn | 1530-8669, 1530-8677 |
| primary_location.source.type | journal |
| primary_location.source.is_oa | False |
| primary_location.source.issn_l | 1530-8669 |
| primary_location.source.is_core | True |
| primary_location.source.is_in_doaj | False |
| primary_location.source.display_name | Wireless Communications and Mobile Computing |
| primary_location.source.host_organization | https://openalex.org/P4310320595 |
| primary_location.source.host_organization_name | Wiley |
| primary_location.source.host_organization_lineage | https://openalex.org/P4310320595 |
| primary_location.source.host_organization_lineage_names | Wiley |
| primary_location.license | cc-by |
| primary_location.pdf_url | https://downloads.hindawi.com/journals/wcmc/2024/5998163.pdf |
| primary_location.version | publishedVersion |
| primary_location.raw_type | journal-article |
| primary_location.license_id | https://openalex.org/licenses/cc-by |
| primary_location.is_accepted | True |
| primary_location.is_published | True |
| primary_location.raw_source_name | Wireless Communications and Mobile Computing |
| primary_location.landing_page_url | http://doi.org/10.1155/2024/5998163 |
| publication_date | 2024-03-22 |
| publication_year | 2024 |
| referenced_works | https://openalex.org/W2953790176, https://openalex.org/W1966836595, https://openalex.org/W2068201078, https://openalex.org/W2945217752, https://openalex.org/W3096982389, https://openalex.org/W3216142894, https://openalex.org/W2909168541, https://openalex.org/W2609830734, https://openalex.org/W2492337228, https://openalex.org/W4283825786, https://openalex.org/W4285278704, https://openalex.org/W2899912039, https://openalex.org/W3198859501, https://openalex.org/W4221009465, https://openalex.org/W2979126598, https://openalex.org/W4210923567, https://openalex.org/W1487952919, https://openalex.org/W2609047018, https://openalex.org/W2801237935, https://openalex.org/W2888413717, https://openalex.org/W2612872912, https://openalex.org/W2340560534, https://openalex.org/W4387122143, https://openalex.org/W2003736153, https://openalex.org/W2410379568, https://openalex.org/W2184721468, https://openalex.org/W2616750999, https://openalex.org/W2025140206, https://openalex.org/W2540435918, https://openalex.org/W2139291494, https://openalex.org/W4311080749, https://openalex.org/W2990530616, https://openalex.org/W3190306355, https://openalex.org/W3088323682, https://openalex.org/W2777447168, https://openalex.org/W2129830285, https://openalex.org/W1971361579, https://openalex.org/W2086042811, https://openalex.org/W2152924492, https://openalex.org/W4205439090, https://openalex.org/W2763988183, https://openalex.org/W2500740922, https://openalex.org/W2061474925, https://openalex.org/W2039432955, https://openalex.org/W2775405389, https://openalex.org/W2964638297 |
| referenced_works_count | 46 |
| abstract_inverted_index.a | 12, 83, 102, 122, 129 |
| abstract_inverted_index.In | 78 |
| abstract_inverted_index.It | 107 |
| abstract_inverted_index.in | 14 |
| abstract_inverted_index.is | 29, 59 |
| abstract_inverted_index.of | 3, 6, 37, 76 |
| abstract_inverted_index.on | 121 |
| abstract_inverted_index.to | 11, 33, 71 |
| abstract_inverted_index.we | 81 |
| abstract_inverted_index.IoT | 135 |
| abstract_inverted_index.The | 0 |
| abstract_inverted_index.and | 24, 44, 69, 73, 97, 104, 116 |
| abstract_inverted_index.but | 58 |
| abstract_inverted_index.due | 32 |
| abstract_inverted_index.for | 18, 133 |
| abstract_inverted_index.has | 9 |
| abstract_inverted_index.its | 126 |
| abstract_inverted_index.key | 53 |
| abstract_inverted_index.led | 10 |
| abstract_inverted_index.the | 4, 134 |
| abstract_inverted_index.PUF. | 98 |
| abstract_inverted_index.This | 99 |
| abstract_inverted_index.Zybo | 123 |
| abstract_inverted_index.also | 108 |
| abstract_inverted_index.data | 15, 22 |
| abstract_inverted_index.edge | 88 |
| abstract_inverted_index.lack | 66 |
| abstract_inverted_index.over | 26 |
| abstract_inverted_index.rise | 70 |
| abstract_inverted_index.this | 79 |
| abstract_inverted_index.(IoT) | 8 |
| abstract_inverted_index.Curve | 94 |
| abstract_inverted_index.board | 124 |
| abstract_inverted_index.data. | 39 |
| abstract_inverted_index.fully | 91 |
| abstract_inverted_index.surge | 13 |
| abstract_inverted_index.using | 87 |
| abstract_inverted_index.while | 62 |
| abstract_inverted_index.Things | 7 |
| abstract_inverted_index.active | 112 |
| abstract_inverted_index.growth | 2 |
| abstract_inverted_index.hashed | 92 |
| abstract_inverted_index.offers | 55 |
| abstract_inverted_index.paper, | 80 |
| abstract_inverted_index.public | 52 |
| abstract_inverted_index.robust | 130 |
| abstract_inverted_index.scheme | 86 |
| abstract_inverted_index.strong | 56 |
| abstract_inverted_index.unique | 48 |
| abstract_inverted_index.vital, | 30 |
| abstract_inverted_index.(ECMQV) | 96 |
| abstract_inverted_index.IoT’s | 41 |
| abstract_inverted_index.against | 111 |
| abstract_inverted_index.energy. | 77 |
| abstract_inverted_index.latency | 72 |
| abstract_inverted_index.present | 47 |
| abstract_inverted_index.propose | 82 |
| abstract_inverted_index.wastage | 75 |
| abstract_inverted_index.Elliptic | 93 |
| abstract_inverted_index.Ensuring | 21 |
| abstract_inverted_index.However, | 40 |
| abstract_inverted_index.Internet | 5 |
| abstract_inverted_index.approach | 100 |
| abstract_inverted_index.attacks, | 113 |
| abstract_inverted_index.business | 19 |
| abstract_inverted_index.channels | 28 |
| abstract_inverted_index.confirms | 125 |
| abstract_inverted_index.critical | 17 |
| abstract_inverted_index.existing | 63 |
| abstract_inverted_index.offering | 128 |
| abstract_inverted_index.provides | 101, 109 |
| abstract_inverted_index.reliable | 105 |
| abstract_inverted_index.resource | 42, 60 |
| abstract_inverted_index.scalable | 103 |
| abstract_inverted_index.security | 49, 57, 68, 110, 131 |
| abstract_inverted_index.solution | 132 |
| abstract_inverted_index.tampered | 38 |
| abstract_inverted_index.threats. | 118 |
| abstract_inverted_index.unwanted | 74 |
| abstract_inverted_index.ecosystem | 46 |
| abstract_inverted_index.integrity | 25 |
| abstract_inverted_index.potential | 34 |
| abstract_inverted_index.solution. | 106 |
| abstract_inverted_index.solutions | 65 |
| abstract_inverted_index.universal | 84 |
| abstract_inverted_index.unsecured | 27 |
| abstract_inverted_index.addressing | 114 |
| abstract_inverted_index.computing, | 89 |
| abstract_inverted_index.decisions. | 20 |
| abstract_inverted_index.especially | 31 |
| abstract_inverted_index.intensive, | 61 |
| abstract_inverted_index.landscape. | 136 |
| abstract_inverted_index.validation | 120 |
| abstract_inverted_index.Traditional | 51 |
| abstract_inverted_index.challenges. | 50 |
| abstract_inverted_index.cloud-based | 64 |
| abstract_inverted_index.constraints | 43 |
| abstract_inverted_index.exponential | 1 |
| abstract_inverted_index.generation, | 16 |
| abstract_inverted_index.Experimental | 119 |
| abstract_inverted_index.authenticity | 23 |
| abstract_inverted_index.catastrophic | 35 |
| abstract_inverted_index.consequences | 36 |
| abstract_inverted_index.comprehensive | 67 |
| abstract_inverted_index.heterogeneous | 45 |
| abstract_inverted_index.impersonation | 117 |
| abstract_inverted_index.incorporating | 90 |
| abstract_inverted_index.authentication | 85 |
| abstract_inverted_index.effectiveness, | 127 |
| abstract_inverted_index.infrastructure | 54 |
| abstract_inverted_index.man-in-the-middle | 115 |
| abstract_inverted_index.Menezes–Qu–Vanstone | 95 |
| cited_by_percentile_year.max | 94 |
| cited_by_percentile_year.min | 90 |
| corresponding_author_ids | https://openalex.org/A5003949731 |
| countries_distinct_count | 3 |
| institutions_distinct_count | 5 |
| corresponding_institution_ids | https://openalex.org/I119444370 |
| sustainable_development_goals[0].id | https://metadata.un.org/sdg/9 |
| sustainable_development_goals[0].score | 0.6299999952316284 |
| sustainable_development_goals[0].display_name | Industry, innovation and infrastructure |
| citation_normalized_percentile.value | 0.65561524 |
| citation_normalized_percentile.is_in_top_1_percent | False |
| citation_normalized_percentile.is_in_top_10_percent | False |