{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T21:26:01Z","timestamp":1740173161856,"version":"3.37.3"},"reference-count":46,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"1","license":[{"start":{"date-parts":[[2019,2,1]],"date-time":"2019-02-01T00:00:00Z","timestamp":1548979200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2019,2,1]],"date-time":"2019-02-01T00:00:00Z","timestamp":1548979200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2019,2,1]],"date-time":"2019-02-01T00:00:00Z","timestamp":1548979200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"name":"Swedish Knowledge Foundation","award":["HYPERLINK \u201ctel:20150367\u201d 20150367"]},{"name":"European Regional Fund","award":["HYPERLINK \u201ctel:20201010\u201d 20201010"]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Internet Things J."],"published-print":{"date-parts":[[2019,2]]},"DOI":"10.1109\/jiot.2018.2865212","type":"journal-article","created":{"date-parts":[[2018,8,14]],"date-time":"2018-08-14T18:53:33Z","timestamp":1534272813000},"page":"906-917","source":"Crossref","is-referenced-by-count":28,"title":["Key Distribution Protocol for Industrial Internet of Things Without Implicit Certificates"],"prefix":"10.1109","volume":"6","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-6408-5152","authenticated-orcid":false,"given":"Mohamed H.","family":"Eldefrawy","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6370-9373","authenticated-orcid":false,"given":"Nuno","family":"Pereira","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0873-7827","authenticated-orcid":false,"given":"Mikael","family":"Gidlund","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/CSFW.1997.596782"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1098\/rspa.1989.0125"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2017.2703922"},{"key":"ref32","doi-asserted-by":"crossref","first-page":"172","DOI":"10.1007\/BFb0055481","article-title":"On certificate revocation and validation","author":"kocher","year":"1998","journal-title":"Proc Conf Financial Cryptography"},{"journal-title":"Recommendation for Pair-wise Key Establishment Schemes Using Discrete Logarithm Cryptography (Revised)","year":"2007","author":"barker","key":"ref31"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1145\/1027794.1027800"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-78967-3_7"},{"key":"ref36","first-page":"62","article-title":"Encryption-scheme security in the presence of key-dependent messages","author":"black","year":"2002","journal-title":"Proc Workshop Sel Areas Cryptography"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/CloudCom.2015.20"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.3390\/s100908683"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/CDC.2010.5717499"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1016\/j.tcs.2006.08.034"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1049\/iet-wss.2011.0064"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/1352533.1352568"},{"journal-title":"Semantics and Verification of Security Protocols","year":"2006","author":"cremers","key":"ref13"},{"journal-title":"Strategy of Things Industrial IoT Versus IoT Do You Know the Difference?","year":"2018","key":"ref14"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2014.2311791"},{"journal-title":"Scyther User Manual","year":"2014","author":"cremers","key":"ref16"},{"article-title":"On ends-to-ends encryption: Asynchronous group messaging with strong security guarantees","year":"2017","author":"cohn-gordon","key":"ref17"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/358790.358797"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.17487\/rfc1760"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/CNMT.2009.5374495"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2014.2300753"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-10-6898-0_7"},{"journal-title":"Value of IoT Estimated at $11 T Yearly in 2025","year":"2018","key":"ref3"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/LES.2016.2630729"},{"key":"ref29","first-page":"2","article-title":"The tesla broadcast authentication protocol","volume":"5","author":"perrig","year":"2005","journal-title":"Proc RSA CryptoBytes"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/2744769.2747942"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/3011077.3011108"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/2753476.2753477"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2013.74"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/WiMob.2008.16"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2005.849714"},{"key":"ref46","first-page":"1","author":"ford","year":"2015","journal-title":"The Machine-to-Machine (M2M) Public Key Certificate Format draft-ford-m2mcertificate-00 txt Internet Eng Task Force"},{"key":"ref20","doi-asserted-by":"crossref","first-page":"283","DOI":"10.1007\/978-1-4020-8737-0_51","article-title":"One-time password authentication with infinite hash chains","author":"chefranov","year":"2008","journal-title":"Novel Algorithms and Techniques In Telecommunications Automation and Industrial Electronics"},{"key":"ref45","first-page":"94","article-title":"Energy-efficient elliptic curve cryptography for MSP430-based wireless sensor nodes","author":"liu","year":"2016","journal-title":"Proc Australian Conf Inf Security Privacy"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-40084-1_18"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/ALLERTON.2009.5394956"},{"key":"ref42","first-page":"63","article-title":"The logic of authentication protocols","author":"syverson","year":"0","journal-title":"International School on Foundations of Security Analysis and Design"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/JSEN.2016.2625821"},{"key":"ref41","doi-asserted-by":"crossref","first-page":"53","DOI":"10.1007\/978-94-007-4516-2_6","article-title":"BAN logic-based security proof for mobile OTP authentication scheme","author":"alkatheiri","year":"2012","journal-title":"Future Information Technology Application and Service"},{"key":"ref23","article-title":"SEC 4: Elliptic curve qu-vanstone implicit certificate scheme (ECQV)","volume":"1 0","author":"campagna","year":"2013"},{"key":"ref44","first-page":"41","article-title":"MSPsim—An extensible simulator for msp430-equipped sensor boards","volume":"118","author":"eriksson","year":"2007","journal-title":"Proc Eur Conf Wireless Sensor Networks (EWSN) Poster\/Demo Session"},{"key":"ref26","first-page":"3","article-title":"Verifying group authentication protocols by Scyther","volume":"7","author":"yang","year":"2016","journal-title":"J Wireless Mobile Netw Ubiquitous Comput Dependable Appl"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/LCN.2004.38"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1155\/2014\/357430"}],"container-title":["IEEE Internet of Things Journal"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6488907\/8651406\/08435930.pdf?arnumber=8435930","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,13]],"date-time":"2022-07-13T21:09:41Z","timestamp":1657746581000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8435930\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,2]]},"references-count":46,"journal-issue":{"issue":"1"},"URL":"https:\/\/doi.org\/10.1109\/jiot.2018.2865212","relation":{},"ISSN":["2327-4662","2372-2541"],"issn-type":[{"type":"electronic","value":"2327-4662"},{"type":"electronic","value":"2372-2541"}],"subject":[],"published":{"date-parts":[[2019,2]]}}}