Lightweight and secure D2D group communication for wireless IoT Article Swipe
YOU?
·
· 2023
· Open Access
·
· DOI: https://doi.org/10.3389/fphy.2023.1210777
In recent years, wirless Internet of Things (IoT) technology has developed rapidly, and the reuse of spectrum resources, network efficiency, and the diversity of multi-communication scenarios have brought great challenges to the existing Internet of Things. And Device to Device (D2D) communication technology in 5th Generation Mobile Communication Technology (5G) has good application prospects in these aspects. Therefore, the combination with D2D can well solve the needs in the wirless Internet of things. However, safe and effective communication has become an urgent problem to be solved. In this paper, this paper proposes a D2D group communication protocol for wireless IoT in 5G. In this protocol, the Chinese remainder theorem is introduced into the protocol design, and a secure and efficient group authentication scheme is constructed based on secret sharing and Chebyshev Polynomials. The formal security proof using Burrows Abadi Needham (BAN) logic and informal security analysis show that our proposed protocol meets the security requirements. Through performance analysis, compared with other related schemes, this scheme not only provides better security, but also has obvious advantages in computation and communication efficiency.
Related Topics
- Type
- article
- Language
- en
- Landing Page
- https://doi.org/10.3389/fphy.2023.1210777
- https://www.frontiersin.org/articles/10.3389/fphy.2023.1210777/pdf
- OA Status
- gold
- Cited By
- 18
- References
- 39
- Related Works
- 10
- OpenAlex ID
- https://openalex.org/W4380536771
Raw OpenAlex JSON
- OpenAlex ID
-
https://openalex.org/W4380536771Canonical identifier for this work in OpenAlex
- DOI
-
https://doi.org/10.3389/fphy.2023.1210777Digital Object Identifier
- Title
-
Lightweight and secure D2D group communication for wireless IoTWork title
- Type
-
articleOpenAlex work type
- Language
-
enPrimary language
- Publication year
-
2023Year of publication
- Publication date
-
2023-06-14Full publication date if available
- Authors
-
Junfeng Miao, Zhaoshun Wang, Xingsi Xue, Mei Wang, Jianhui Lv, Min LiList of authors in order
- Landing page
-
https://doi.org/10.3389/fphy.2023.1210777Publisher landing page
- PDF URL
-
https://www.frontiersin.org/articles/10.3389/fphy.2023.1210777/pdfDirect link to full text PDF
- Open access
-
YesWhether a free full text is available
- OA status
-
goldOpen access status per OpenAlex
- OA URL
-
https://www.frontiersin.org/articles/10.3389/fphy.2023.1210777/pdfDirect OA link when available
- Concepts
-
Computer science, Computer network, Protocol (science), Communication in small groups, Authentication (law), Security analysis, Computer security, Secure communication, Wireless, Communications security, Chinese remainder theorem, Scheme (mathematics), The Internet, Telecommunications, Encryption, World Wide Web, Mathematics, Medicine, Algorithm, Pathology, Alternative medicine, Mathematical analysisTop concepts (fields/topics) attached by OpenAlex
- Cited by
-
18Total citation count in OpenAlex
- Citations by year (recent)
-
2025: 6, 2024: 11, 2023: 1Per-year citation counts (last 5 years)
- References (count)
-
39Number of works referenced by this work
- Related works (count)
-
10Other works algorithmically related by OpenAlex
Full payload
| id | https://openalex.org/W4380536771 |
|---|---|
| doi | https://doi.org/10.3389/fphy.2023.1210777 |
| ids.doi | https://doi.org/10.3389/fphy.2023.1210777 |
| ids.openalex | https://openalex.org/W4380536771 |
| fwci | 7.91194125 |
| type | article |
| title | Lightweight and secure D2D group communication for wireless IoT |
| biblio.issue | |
| biblio.volume | 11 |
| biblio.last_page | |
| biblio.first_page | |
| topics[0].id | https://openalex.org/T11504 |
| topics[0].field.id | https://openalex.org/fields/17 |
| topics[0].field.display_name | Computer Science |
| topics[0].score | 0.9973999857902527 |
| topics[0].domain.id | https://openalex.org/domains/3 |
| topics[0].domain.display_name | Physical Sciences |
| topics[0].subfield.id | https://openalex.org/subfields/1705 |
| topics[0].subfield.display_name | Computer Networks and Communications |
| topics[0].display_name | Advanced Authentication Protocols Security |
| topics[1].id | https://openalex.org/T11498 |
| topics[1].field.id | https://openalex.org/fields/17 |
| topics[1].field.display_name | Computer Science |
| topics[1].score | 0.9876000285148621 |
| topics[1].domain.id | https://openalex.org/domains/3 |
| topics[1].domain.display_name | Physical Sciences |
| topics[1].subfield.id | https://openalex.org/subfields/1705 |
| topics[1].subfield.display_name | Computer Networks and Communications |
| topics[1].display_name | Security in Wireless Sensor Networks |
| topics[2].id | https://openalex.org/T11800 |
| topics[2].field.id | https://openalex.org/fields/17 |
| topics[2].field.display_name | Computer Science |
| topics[2].score | 0.9835000038146973 |
| topics[2].domain.id | https://openalex.org/domains/3 |
| topics[2].domain.display_name | Physical Sciences |
| topics[2].subfield.id | https://openalex.org/subfields/1710 |
| topics[2].subfield.display_name | Information Systems |
| topics[2].display_name | User Authentication and Security Systems |
| is_xpac | False |
| apc_list.value | 2490 |
| apc_list.currency | USD |
| apc_list.value_usd | 2490 |
| apc_paid.value | 2490 |
| apc_paid.currency | USD |
| apc_paid.value_usd | 2490 |
| concepts[0].id | https://openalex.org/C41008148 |
| concepts[0].level | 0 |
| concepts[0].score | 0.7776521444320679 |
| concepts[0].wikidata | https://www.wikidata.org/wiki/Q21198 |
| concepts[0].display_name | Computer science |
| concepts[1].id | https://openalex.org/C31258907 |
| concepts[1].level | 1 |
| concepts[1].score | 0.5368958115577698 |
| concepts[1].wikidata | https://www.wikidata.org/wiki/Q1301371 |
| concepts[1].display_name | Computer network |
| concepts[2].id | https://openalex.org/C2780385302 |
| concepts[2].level | 3 |
| concepts[2].score | 0.5059470534324646 |
| concepts[2].wikidata | https://www.wikidata.org/wiki/Q367158 |
| concepts[2].display_name | Protocol (science) |
| concepts[3].id | https://openalex.org/C44871818 |
| concepts[3].level | 2 |
| concepts[3].score | 0.49480193853378296 |
| concepts[3].wikidata | https://www.wikidata.org/wiki/Q5154139 |
| concepts[3].display_name | Communication in small groups |
| concepts[4].id | https://openalex.org/C148417208 |
| concepts[4].level | 2 |
| concepts[4].score | 0.4841788113117218 |
| concepts[4].wikidata | https://www.wikidata.org/wiki/Q4825882 |
| concepts[4].display_name | Authentication (law) |
| concepts[5].id | https://openalex.org/C38369872 |
| concepts[5].level | 2 |
| concepts[5].score | 0.47022557258605957 |
| concepts[5].wikidata | https://www.wikidata.org/wiki/Q7445009 |
| concepts[5].display_name | Security analysis |
| concepts[6].id | https://openalex.org/C38652104 |
| concepts[6].level | 1 |
| concepts[6].score | 0.46608301997184753 |
| concepts[6].wikidata | https://www.wikidata.org/wiki/Q3510521 |
| concepts[6].display_name | Computer security |
| concepts[7].id | https://openalex.org/C510870077 |
| concepts[7].level | 3 |
| concepts[7].score | 0.44257158041000366 |
| concepts[7].wikidata | https://www.wikidata.org/wiki/Q7444868 |
| concepts[7].display_name | Secure communication |
| concepts[8].id | https://openalex.org/C555944384 |
| concepts[8].level | 2 |
| concepts[8].score | 0.4346696138381958 |
| concepts[8].wikidata | https://www.wikidata.org/wiki/Q249 |
| concepts[8].display_name | Wireless |
| concepts[9].id | https://openalex.org/C151423352 |
| concepts[9].level | 3 |
| concepts[9].score | 0.432463139295578 |
| concepts[9].wikidata | https://www.wikidata.org/wiki/Q5154228 |
| concepts[9].display_name | Communications security |
| concepts[10].id | https://openalex.org/C151635116 |
| concepts[10].level | 2 |
| concepts[10].score | 0.41981449723243713 |
| concepts[10].wikidata | https://www.wikidata.org/wiki/Q193878 |
| concepts[10].display_name | Chinese remainder theorem |
| concepts[11].id | https://openalex.org/C77618280 |
| concepts[11].level | 2 |
| concepts[11].score | 0.4158928394317627 |
| concepts[11].wikidata | https://www.wikidata.org/wiki/Q1155772 |
| concepts[11].display_name | Scheme (mathematics) |
| concepts[12].id | https://openalex.org/C110875604 |
| concepts[12].level | 2 |
| concepts[12].score | 0.41567718982696533 |
| concepts[12].wikidata | https://www.wikidata.org/wiki/Q75 |
| concepts[12].display_name | The Internet |
| concepts[13].id | https://openalex.org/C76155785 |
| concepts[13].level | 1 |
| concepts[13].score | 0.1905115842819214 |
| concepts[13].wikidata | https://www.wikidata.org/wiki/Q418 |
| concepts[13].display_name | Telecommunications |
| concepts[14].id | https://openalex.org/C148730421 |
| concepts[14].level | 2 |
| concepts[14].score | 0.12344413995742798 |
| concepts[14].wikidata | https://www.wikidata.org/wiki/Q141090 |
| concepts[14].display_name | Encryption |
| concepts[15].id | https://openalex.org/C136764020 |
| concepts[15].level | 1 |
| concepts[15].score | 0.10373237729072571 |
| concepts[15].wikidata | https://www.wikidata.org/wiki/Q466 |
| concepts[15].display_name | World Wide Web |
| concepts[16].id | https://openalex.org/C33923547 |
| concepts[16].level | 0 |
| concepts[16].score | 0.09296026825904846 |
| concepts[16].wikidata | https://www.wikidata.org/wiki/Q395 |
| concepts[16].display_name | Mathematics |
| concepts[17].id | https://openalex.org/C71924100 |
| concepts[17].level | 0 |
| concepts[17].score | 0.0 |
| concepts[17].wikidata | https://www.wikidata.org/wiki/Q11190 |
| concepts[17].display_name | Medicine |
| concepts[18].id | https://openalex.org/C11413529 |
| concepts[18].level | 1 |
| concepts[18].score | 0.0 |
| concepts[18].wikidata | https://www.wikidata.org/wiki/Q8366 |
| concepts[18].display_name | Algorithm |
| concepts[19].id | https://openalex.org/C142724271 |
| concepts[19].level | 1 |
| concepts[19].score | 0.0 |
| concepts[19].wikidata | https://www.wikidata.org/wiki/Q7208 |
| concepts[19].display_name | Pathology |
| concepts[20].id | https://openalex.org/C204787440 |
| concepts[20].level | 2 |
| concepts[20].score | 0.0 |
| concepts[20].wikidata | https://www.wikidata.org/wiki/Q188504 |
| concepts[20].display_name | Alternative medicine |
| concepts[21].id | https://openalex.org/C134306372 |
| concepts[21].level | 1 |
| concepts[21].score | 0.0 |
| concepts[21].wikidata | https://www.wikidata.org/wiki/Q7754 |
| concepts[21].display_name | Mathematical analysis |
| keywords[0].id | https://openalex.org/keywords/computer-science |
| keywords[0].score | 0.7776521444320679 |
| keywords[0].display_name | Computer science |
| keywords[1].id | https://openalex.org/keywords/computer-network |
| keywords[1].score | 0.5368958115577698 |
| keywords[1].display_name | Computer network |
| keywords[2].id | https://openalex.org/keywords/protocol |
| keywords[2].score | 0.5059470534324646 |
| keywords[2].display_name | Protocol (science) |
| keywords[3].id | https://openalex.org/keywords/communication-in-small-groups |
| keywords[3].score | 0.49480193853378296 |
| keywords[3].display_name | Communication in small groups |
| keywords[4].id | https://openalex.org/keywords/authentication |
| keywords[4].score | 0.4841788113117218 |
| keywords[4].display_name | Authentication (law) |
| keywords[5].id | https://openalex.org/keywords/security-analysis |
| keywords[5].score | 0.47022557258605957 |
| keywords[5].display_name | Security analysis |
| keywords[6].id | https://openalex.org/keywords/computer-security |
| keywords[6].score | 0.46608301997184753 |
| keywords[6].display_name | Computer security |
| keywords[7].id | https://openalex.org/keywords/secure-communication |
| keywords[7].score | 0.44257158041000366 |
| keywords[7].display_name | Secure communication |
| keywords[8].id | https://openalex.org/keywords/wireless |
| keywords[8].score | 0.4346696138381958 |
| keywords[8].display_name | Wireless |
| keywords[9].id | https://openalex.org/keywords/communications-security |
| keywords[9].score | 0.432463139295578 |
| keywords[9].display_name | Communications security |
| keywords[10].id | https://openalex.org/keywords/chinese-remainder-theorem |
| keywords[10].score | 0.41981449723243713 |
| keywords[10].display_name | Chinese remainder theorem |
| keywords[11].id | https://openalex.org/keywords/scheme |
| keywords[11].score | 0.4158928394317627 |
| keywords[11].display_name | Scheme (mathematics) |
| keywords[12].id | https://openalex.org/keywords/the-internet |
| keywords[12].score | 0.41567718982696533 |
| keywords[12].display_name | The Internet |
| keywords[13].id | https://openalex.org/keywords/telecommunications |
| keywords[13].score | 0.1905115842819214 |
| keywords[13].display_name | Telecommunications |
| keywords[14].id | https://openalex.org/keywords/encryption |
| keywords[14].score | 0.12344413995742798 |
| keywords[14].display_name | Encryption |
| keywords[15].id | https://openalex.org/keywords/world-wide-web |
| keywords[15].score | 0.10373237729072571 |
| keywords[15].display_name | World Wide Web |
| keywords[16].id | https://openalex.org/keywords/mathematics |
| keywords[16].score | 0.09296026825904846 |
| keywords[16].display_name | Mathematics |
| language | en |
| locations[0].id | doi:10.3389/fphy.2023.1210777 |
| locations[0].is_oa | True |
| locations[0].source.id | https://openalex.org/S2596760093 |
| locations[0].source.issn | 2296-424X |
| locations[0].source.type | journal |
| locations[0].source.is_oa | True |
| locations[0].source.issn_l | 2296-424X |
| locations[0].source.is_core | True |
| locations[0].source.is_in_doaj | True |
| locations[0].source.display_name | Frontiers in Physics |
| locations[0].source.host_organization | https://openalex.org/P4310320527 |
| locations[0].source.host_organization_name | Frontiers Media |
| locations[0].source.host_organization_lineage | https://openalex.org/P4310320527 |
| locations[0].source.host_organization_lineage_names | Frontiers Media |
| locations[0].license | cc-by |
| locations[0].pdf_url | https://www.frontiersin.org/articles/10.3389/fphy.2023.1210777/pdf |
| locations[0].version | publishedVersion |
| locations[0].raw_type | journal-article |
| locations[0].license_id | https://openalex.org/licenses/cc-by |
| locations[0].is_accepted | True |
| locations[0].is_published | True |
| locations[0].raw_source_name | Frontiers in Physics |
| locations[0].landing_page_url | https://doi.org/10.3389/fphy.2023.1210777 |
| locations[1].id | pmh:oai:doaj.org/article:958f5ee93d904c1eb00a1860d3d60a43 |
| locations[1].is_oa | False |
| locations[1].source.id | https://openalex.org/S4306401280 |
| locations[1].source.issn | |
| locations[1].source.type | repository |
| locations[1].source.is_oa | False |
| locations[1].source.issn_l | |
| locations[1].source.is_core | False |
| locations[1].source.is_in_doaj | False |
| locations[1].source.display_name | DOAJ (DOAJ: Directory of Open Access Journals) |
| locations[1].source.host_organization | |
| locations[1].source.host_organization_name | |
| locations[1].license | |
| locations[1].pdf_url | |
| locations[1].version | submittedVersion |
| locations[1].raw_type | article |
| locations[1].license_id | |
| locations[1].is_accepted | False |
| locations[1].is_published | False |
| locations[1].raw_source_name | Frontiers in Physics, Vol 11 (2023) |
| locations[1].landing_page_url | https://doaj.org/article/958f5ee93d904c1eb00a1860d3d60a43 |
| indexed_in | crossref, doaj |
| authorships[0].author.id | https://openalex.org/A5028763013 |
| authorships[0].author.orcid | https://orcid.org/0000-0001-5899-7737 |
| authorships[0].author.display_name | Junfeng Miao |
| authorships[0].countries | CN |
| authorships[0].affiliations[0].institution_ids | https://openalex.org/I92403157 |
| authorships[0].affiliations[0].raw_affiliation_string | School of Computer and Communication Engineering, University of Science and Technology Beijing, Beijing, China |
| authorships[0].institutions[0].id | https://openalex.org/I92403157 |
| authorships[0].institutions[0].ror | https://ror.org/02egmk993 |
| authorships[0].institutions[0].type | education |
| authorships[0].institutions[0].lineage | https://openalex.org/I92403157 |
| authorships[0].institutions[0].country_code | CN |
| authorships[0].institutions[0].display_name | University of Science and Technology Beijing |
| authorships[0].author_position | first |
| authorships[0].raw_author_name | Junfeng Miao |
| authorships[0].is_corresponding | False |
| authorships[0].raw_affiliation_strings | School of Computer and Communication Engineering, University of Science and Technology Beijing, Beijing, China |
| authorships[1].author.id | https://openalex.org/A5028877799 |
| authorships[1].author.orcid | https://orcid.org/0000-0002-2736-9970 |
| authorships[1].author.display_name | Zhaoshun Wang |
| authorships[1].countries | CN |
| authorships[1].affiliations[0].institution_ids | https://openalex.org/I92403157 |
| authorships[1].affiliations[0].raw_affiliation_string | School of Computer and Communication Engineering, University of Science and Technology Beijing, Beijing, China |
| authorships[1].institutions[0].id | https://openalex.org/I92403157 |
| authorships[1].institutions[0].ror | https://ror.org/02egmk993 |
| authorships[1].institutions[0].type | education |
| authorships[1].institutions[0].lineage | https://openalex.org/I92403157 |
| authorships[1].institutions[0].country_code | CN |
| authorships[1].institutions[0].display_name | University of Science and Technology Beijing |
| authorships[1].author_position | middle |
| authorships[1].raw_author_name | Zhaoshun Wang |
| authorships[1].is_corresponding | False |
| authorships[1].raw_affiliation_strings | School of Computer and Communication Engineering, University of Science and Technology Beijing, Beijing, China |
| authorships[2].author.id | https://openalex.org/A5053458745 |
| authorships[2].author.orcid | https://orcid.org/0000-0002-3008-8782 |
| authorships[2].author.display_name | Xingsi Xue |
| authorships[2].countries | CN |
| authorships[2].affiliations[0].institution_ids | https://openalex.org/I83791580 |
| authorships[2].affiliations[0].raw_affiliation_string | Fujian Provincial Key Laboratory of Big Data Mining and Applications, Fujian University of Technology, Fuzhou, China |
| authorships[2].institutions[0].id | https://openalex.org/I83791580 |
| authorships[2].institutions[0].ror | https://ror.org/03c8fdb16 |
| authorships[2].institutions[0].type | education |
| authorships[2].institutions[0].lineage | https://openalex.org/I83791580 |
| authorships[2].institutions[0].country_code | CN |
| authorships[2].institutions[0].display_name | Fujian University of Technology |
| authorships[2].author_position | middle |
| authorships[2].raw_author_name | Xingsi Xue |
| authorships[2].is_corresponding | False |
| authorships[2].raw_affiliation_strings | Fujian Provincial Key Laboratory of Big Data Mining and Applications, Fujian University of Technology, Fuzhou, China |
| authorships[3].author.id | https://openalex.org/A5109613846 |
| authorships[3].author.orcid | |
| authorships[3].author.display_name | Mei Wang |
| authorships[3].countries | CN |
| authorships[3].affiliations[0].institution_ids | https://openalex.org/I80143920 |
| authorships[3].affiliations[0].raw_affiliation_string | School of Cyber Science and Technology, Shandong University, Qingdao, China |
| authorships[3].institutions[0].id | https://openalex.org/I80143920 |
| authorships[3].institutions[0].ror | https://ror.org/04gtjhw98 |
| authorships[3].institutions[0].type | education |
| authorships[3].institutions[0].lineage | https://openalex.org/I80143920 |
| authorships[3].institutions[0].country_code | CN |
| authorships[3].institutions[0].display_name | Shandong University of Science and Technology |
| authorships[3].author_position | middle |
| authorships[3].raw_author_name | Mei Wang |
| authorships[3].is_corresponding | False |
| authorships[3].raw_affiliation_strings | School of Cyber Science and Technology, Shandong University, Qingdao, China |
| authorships[4].author.id | https://openalex.org/A5089781142 |
| authorships[4].author.orcid | https://orcid.org/0000-0003-0884-6601 |
| authorships[4].author.display_name | Jianhui Lv |
| authorships[4].countries | CN |
| authorships[4].affiliations[0].institution_ids | https://openalex.org/I4210136793 |
| authorships[4].affiliations[0].raw_affiliation_string | Pengcheng Lab, Shenzhen, China |
| authorships[4].institutions[0].id | https://openalex.org/I4210136793 |
| authorships[4].institutions[0].ror | https://ror.org/03qdqbt06 |
| authorships[4].institutions[0].type | facility |
| authorships[4].institutions[0].lineage | https://openalex.org/I4210136793 |
| authorships[4].institutions[0].country_code | CN |
| authorships[4].institutions[0].display_name | Peng Cheng Laboratory |
| authorships[4].author_position | middle |
| authorships[4].raw_author_name | Jianhui Lv |
| authorships[4].is_corresponding | False |
| authorships[4].raw_affiliation_strings | Pengcheng Lab, Shenzhen, China |
| authorships[5].author.id | https://openalex.org/A5100400762 |
| authorships[5].author.orcid | https://orcid.org/0000-0002-9366-2390 |
| authorships[5].author.display_name | Min Li |
| authorships[5].countries | CN |
| authorships[5].affiliations[0].institution_ids | https://openalex.org/I4210118281, https://openalex.org/I4387152112 |
| authorships[5].affiliations[0].raw_affiliation_string | China Industrial Control Systems Cyber Emergency Response Team, Beijing, China |
| authorships[5].institutions[0].id | https://openalex.org/I4387152112 |
| authorships[5].institutions[0].ror | https://ror.org/010gf3m33 |
| authorships[5].institutions[0].type | other |
| authorships[5].institutions[0].lineage | https://openalex.org/I4387152112 |
| authorships[5].institutions[0].country_code | |
| authorships[5].institutions[0].display_name | China Industrial Control Systems Cyber Emergency Response Team |
| authorships[5].institutions[1].id | https://openalex.org/I4210118281 |
| authorships[5].institutions[1].ror | https://ror.org/02gzvm828 |
| authorships[5].institutions[1].type | facility |
| authorships[5].institutions[1].lineage | https://openalex.org/I4210118281 |
| authorships[5].institutions[1].country_code | CN |
| authorships[5].institutions[1].display_name | National Earthquake Response Support Service |
| authorships[5].author_position | last |
| authorships[5].raw_author_name | Min Li |
| authorships[5].is_corresponding | True |
| authorships[5].raw_affiliation_strings | China Industrial Control Systems Cyber Emergency Response Team, Beijing, China |
| has_content.pdf | True |
| has_content.grobid_xml | True |
| is_paratext | False |
| open_access.is_oa | True |
| open_access.oa_url | https://www.frontiersin.org/articles/10.3389/fphy.2023.1210777/pdf |
| open_access.oa_status | gold |
| open_access.any_repository_has_fulltext | False |
| created_date | 2025-10-10T00:00:00 |
| display_name | Lightweight and secure D2D group communication for wireless IoT |
| has_fulltext | True |
| is_retracted | False |
| updated_date | 2025-11-06T03:46:38.306776 |
| primary_topic.id | https://openalex.org/T11504 |
| primary_topic.field.id | https://openalex.org/fields/17 |
| primary_topic.field.display_name | Computer Science |
| primary_topic.score | 0.9973999857902527 |
| primary_topic.domain.id | https://openalex.org/domains/3 |
| primary_topic.domain.display_name | Physical Sciences |
| primary_topic.subfield.id | https://openalex.org/subfields/1705 |
| primary_topic.subfield.display_name | Computer Networks and Communications |
| primary_topic.display_name | Advanced Authentication Protocols Security |
| related_works | https://openalex.org/W1775217556, https://openalex.org/W2371585676, https://openalex.org/W2275677298, https://openalex.org/W2475796444, https://openalex.org/W165094497, https://openalex.org/W2415854037, https://openalex.org/W25450045, https://openalex.org/W1868856446, https://openalex.org/W3010561238, https://openalex.org/W2383460098 |
| cited_by_count | 18 |
| counts_by_year[0].year | 2025 |
| counts_by_year[0].cited_by_count | 6 |
| counts_by_year[1].year | 2024 |
| counts_by_year[1].cited_by_count | 11 |
| counts_by_year[2].year | 2023 |
| counts_by_year[2].cited_by_count | 1 |
| locations_count | 2 |
| best_oa_location.id | doi:10.3389/fphy.2023.1210777 |
| best_oa_location.is_oa | True |
| best_oa_location.source.id | https://openalex.org/S2596760093 |
| best_oa_location.source.issn | 2296-424X |
| best_oa_location.source.type | journal |
| best_oa_location.source.is_oa | True |
| best_oa_location.source.issn_l | 2296-424X |
| best_oa_location.source.is_core | True |
| best_oa_location.source.is_in_doaj | True |
| best_oa_location.source.display_name | Frontiers in Physics |
| best_oa_location.source.host_organization | https://openalex.org/P4310320527 |
| best_oa_location.source.host_organization_name | Frontiers Media |
| best_oa_location.source.host_organization_lineage | https://openalex.org/P4310320527 |
| best_oa_location.source.host_organization_lineage_names | Frontiers Media |
| best_oa_location.license | cc-by |
| best_oa_location.pdf_url | https://www.frontiersin.org/articles/10.3389/fphy.2023.1210777/pdf |
| best_oa_location.version | publishedVersion |
| best_oa_location.raw_type | journal-article |
| best_oa_location.license_id | https://openalex.org/licenses/cc-by |
| best_oa_location.is_accepted | True |
| best_oa_location.is_published | True |
| best_oa_location.raw_source_name | Frontiers in Physics |
| best_oa_location.landing_page_url | https://doi.org/10.3389/fphy.2023.1210777 |
| primary_location.id | doi:10.3389/fphy.2023.1210777 |
| primary_location.is_oa | True |
| primary_location.source.id | https://openalex.org/S2596760093 |
| primary_location.source.issn | 2296-424X |
| primary_location.source.type | journal |
| primary_location.source.is_oa | True |
| primary_location.source.issn_l | 2296-424X |
| primary_location.source.is_core | True |
| primary_location.source.is_in_doaj | True |
| primary_location.source.display_name | Frontiers in Physics |
| primary_location.source.host_organization | https://openalex.org/P4310320527 |
| primary_location.source.host_organization_name | Frontiers Media |
| primary_location.source.host_organization_lineage | https://openalex.org/P4310320527 |
| primary_location.source.host_organization_lineage_names | Frontiers Media |
| primary_location.license | cc-by |
| primary_location.pdf_url | https://www.frontiersin.org/articles/10.3389/fphy.2023.1210777/pdf |
| primary_location.version | publishedVersion |
| primary_location.raw_type | journal-article |
| primary_location.license_id | https://openalex.org/licenses/cc-by |
| primary_location.is_accepted | True |
| primary_location.is_published | True |
| primary_location.raw_source_name | Frontiers in Physics |
| primary_location.landing_page_url | https://doi.org/10.3389/fphy.2023.1210777 |
| publication_date | 2023-06-14 |
| publication_year | 2023 |
| referenced_works | https://openalex.org/W2011225642, https://openalex.org/W1992942660, https://openalex.org/W2140656373, https://openalex.org/W2570516435, https://openalex.org/W2790284307, https://openalex.org/W2996869649, https://openalex.org/W3140564850, https://openalex.org/W3033203076, https://openalex.org/W1977749987, https://openalex.org/W2094326762, https://openalex.org/W2334737379, https://openalex.org/W6685734691, https://openalex.org/W2556834368, https://openalex.org/W3195652759, https://openalex.org/W2620348570, https://openalex.org/W3152708317, https://openalex.org/W3123475154, https://openalex.org/W2956118876, https://openalex.org/W2936612079, https://openalex.org/W3042482502, https://openalex.org/W2605078163, https://openalex.org/W2770497041, https://openalex.org/W2965372741, https://openalex.org/W3030794513, https://openalex.org/W3176038082, https://openalex.org/W3084749795, https://openalex.org/W2886478767, https://openalex.org/W2989766846, https://openalex.org/W3084879446, https://openalex.org/W1982179579, https://openalex.org/W2625958646, https://openalex.org/W2921960465, https://openalex.org/W1992187505, https://openalex.org/W6652956882, https://openalex.org/W2797443254, https://openalex.org/W3103037814, https://openalex.org/W3098915991, https://openalex.org/W2181378245, https://openalex.org/W2187957596 |
| referenced_works_count | 39 |
| abstract_inverted_index.a | 92, 116 |
| abstract_inverted_index.In | 0, 86, 102 |
| abstract_inverted_index.an | 80 |
| abstract_inverted_index.be | 84 |
| abstract_inverted_index.in | 43, 54, 67, 100, 175 |
| abstract_inverted_index.is | 109, 123 |
| abstract_inverted_index.of | 5, 15, 23, 34, 71 |
| abstract_inverted_index.on | 126 |
| abstract_inverted_index.to | 30, 38, 83 |
| abstract_inverted_index.5G. | 101 |
| abstract_inverted_index.5th | 44 |
| abstract_inverted_index.And | 36 |
| abstract_inverted_index.D2D | 61, 93 |
| abstract_inverted_index.IoT | 99 |
| abstract_inverted_index.The | 132 |
| abstract_inverted_index.and | 12, 20, 75, 115, 118, 129, 142, 177 |
| abstract_inverted_index.but | 170 |
| abstract_inverted_index.can | 62 |
| abstract_inverted_index.for | 97 |
| abstract_inverted_index.has | 9, 50, 78, 172 |
| abstract_inverted_index.not | 165 |
| abstract_inverted_index.our | 148 |
| abstract_inverted_index.the | 13, 21, 31, 58, 65, 68, 105, 112, 152 |
| abstract_inverted_index.(5G) | 49 |
| abstract_inverted_index.also | 171 |
| abstract_inverted_index.good | 51 |
| abstract_inverted_index.have | 26 |
| abstract_inverted_index.into | 111 |
| abstract_inverted_index.only | 166 |
| abstract_inverted_index.safe | 74 |
| abstract_inverted_index.show | 146 |
| abstract_inverted_index.that | 147 |
| abstract_inverted_index.this | 87, 89, 103, 163 |
| abstract_inverted_index.well | 63 |
| abstract_inverted_index.with | 60, 159 |
| abstract_inverted_index.(BAN) | 140 |
| abstract_inverted_index.(D2D) | 40 |
| abstract_inverted_index.(IoT) | 7 |
| abstract_inverted_index.Abadi | 138 |
| abstract_inverted_index.based | 125 |
| abstract_inverted_index.great | 28 |
| abstract_inverted_index.group | 94, 120 |
| abstract_inverted_index.logic | 141 |
| abstract_inverted_index.meets | 151 |
| abstract_inverted_index.needs | 66 |
| abstract_inverted_index.other | 160 |
| abstract_inverted_index.paper | 90 |
| abstract_inverted_index.proof | 135 |
| abstract_inverted_index.reuse | 14 |
| abstract_inverted_index.solve | 64 |
| abstract_inverted_index.these | 55 |
| abstract_inverted_index.using | 136 |
| abstract_inverted_index.Device | 37, 39 |
| abstract_inverted_index.Mobile | 46 |
| abstract_inverted_index.Things | 6 |
| abstract_inverted_index.become | 79 |
| abstract_inverted_index.better | 168 |
| abstract_inverted_index.formal | 133 |
| abstract_inverted_index.paper, | 88 |
| abstract_inverted_index.recent | 1 |
| abstract_inverted_index.scheme | 122, 164 |
| abstract_inverted_index.secret | 127 |
| abstract_inverted_index.secure | 117 |
| abstract_inverted_index.urgent | 81 |
| abstract_inverted_index.years, | 2 |
| abstract_inverted_index.Burrows | 137 |
| abstract_inverted_index.Chinese | 106 |
| abstract_inverted_index.Needham | 139 |
| abstract_inverted_index.Things. | 35 |
| abstract_inverted_index.Through | 155 |
| abstract_inverted_index.brought | 27 |
| abstract_inverted_index.design, | 114 |
| abstract_inverted_index.network | 18 |
| abstract_inverted_index.obvious | 173 |
| abstract_inverted_index.problem | 82 |
| abstract_inverted_index.related | 161 |
| abstract_inverted_index.sharing | 128 |
| abstract_inverted_index.solved. | 85 |
| abstract_inverted_index.theorem | 108 |
| abstract_inverted_index.things. | 72 |
| abstract_inverted_index.wirless | 3, 69 |
| abstract_inverted_index.However, | 73 |
| abstract_inverted_index.Internet | 4, 33, 70 |
| abstract_inverted_index.analysis | 145 |
| abstract_inverted_index.aspects. | 56 |
| abstract_inverted_index.compared | 158 |
| abstract_inverted_index.existing | 32 |
| abstract_inverted_index.informal | 143 |
| abstract_inverted_index.proposed | 149 |
| abstract_inverted_index.proposes | 91 |
| abstract_inverted_index.protocol | 96, 113, 150 |
| abstract_inverted_index.provides | 167 |
| abstract_inverted_index.rapidly, | 11 |
| abstract_inverted_index.schemes, | 162 |
| abstract_inverted_index.security | 134, 144, 153 |
| abstract_inverted_index.spectrum | 16 |
| abstract_inverted_index.wireless | 98 |
| abstract_inverted_index.Chebyshev | 130 |
| abstract_inverted_index.analysis, | 157 |
| abstract_inverted_index.developed | 10 |
| abstract_inverted_index.diversity | 22 |
| abstract_inverted_index.effective | 76 |
| abstract_inverted_index.efficient | 119 |
| abstract_inverted_index.prospects | 53 |
| abstract_inverted_index.protocol, | 104 |
| abstract_inverted_index.remainder | 107 |
| abstract_inverted_index.scenarios | 25 |
| abstract_inverted_index.security, | 169 |
| abstract_inverted_index.Generation | 45 |
| abstract_inverted_index.Technology | 48 |
| abstract_inverted_index.Therefore, | 57 |
| abstract_inverted_index.advantages | 174 |
| abstract_inverted_index.challenges | 29 |
| abstract_inverted_index.introduced | 110 |
| abstract_inverted_index.resources, | 17 |
| abstract_inverted_index.technology | 8, 42 |
| abstract_inverted_index.application | 52 |
| abstract_inverted_index.combination | 59 |
| abstract_inverted_index.computation | 176 |
| abstract_inverted_index.constructed | 124 |
| abstract_inverted_index.efficiency, | 19 |
| abstract_inverted_index.efficiency. | 179 |
| abstract_inverted_index.performance | 156 |
| abstract_inverted_index.Polynomials. | 131 |
| abstract_inverted_index.Communication | 47 |
| abstract_inverted_index.communication | 41, 77, 95, 178 |
| abstract_inverted_index.requirements. | 154 |
| abstract_inverted_index.authentication | 121 |
| abstract_inverted_index.multi-communication | 24 |
| cited_by_percentile_year.max | 99 |
| cited_by_percentile_year.min | 89 |
| corresponding_author_ids | https://openalex.org/A5100400762 |
| countries_distinct_count | 1 |
| institutions_distinct_count | 6 |
| corresponding_institution_ids | https://openalex.org/I4210118281, https://openalex.org/I4387152112 |
| sustainable_development_goals[0].id | https://metadata.un.org/sdg/9 |
| sustainable_development_goals[0].score | 0.6100000143051147 |
| sustainable_development_goals[0].display_name | Industry, innovation and infrastructure |
| citation_normalized_percentile.value | 0.9463678 |
| citation_normalized_percentile.is_in_top_1_percent | False |
| citation_normalized_percentile.is_in_top_10_percent | True |