{"id":"https://openalex.org/W2898274421","doi":"https://doi.org/10.1109/jiot.2018.2877690","title":"Biometrics-Based Privacy-Preserving User Authentication Scheme for Cloud-Based Industrial Internet of Things Deployment","display_name":"Biometrics-Based Privacy-Preserving User Authentication Scheme for Cloud-Based Industrial Internet of Things Deployment","publication_year":2018,"publication_date":"2018-10-24","ids":{"openalex":"https://openalex.org/W2898274421","doi":"https://doi.org/10.1109/jiot.2018.2877690","mag":"2898274421"},"language":"en","primary_location":{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/jiot.2018.2877690","pdf_url":null,"source":{"id":"https://openalex.org/S2480266640","display_name":"IEEE Internet of Things Journal","issn_l":"2327-4662","issn":["2327-4662","2372-2541"],"is_oa":false,"is_in_doaj":false,"is_indexed_in_scopus":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false},"type":"article","type_crossref":"journal-article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5011213078","display_name":"Ashok Kumar Das","orcid":"https://orcid.org/0000-0002-5196-9589"},"institutions":[{"id":"https://openalex.org/I64189192","display_name":"International Institute of Information Technology, Hyderabad","ror":"https://ror.org/05f11g639","country_code":"IN","type":"education","lineage":["https://openalex.org/I64189192"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Ashok Kumar Das","raw_affiliation_strings":["Center for Security, Theory and Algorithmic Research, International Institute of Information Technology, Hyderabad, India"],"affiliations":[{"raw_affiliation_string":"Center for Security, Theory and Algorithmic Research, International Institute of Information Technology, Hyderabad, India","institution_ids":["https://openalex.org/I64189192"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5004320904","display_name":"Mohammad Wazid","orcid":"https://orcid.org/0000-0001-9898-0921"},"institutions":[{"id":"https://openalex.org/I164861460","display_name":"Manipal Academy of Higher Education","ror":"https://ror.org/02xzytt36","country_code":"IN","type":"funder","lineage":["https://openalex.org/I164861460"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Mohammad Wazid","raw_affiliation_strings":["Department of Computer Science and Engineering, Manipal Institute of Technology, Manipal, India"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Engineering, Manipal Institute of Technology, Manipal, India","institution_ids":["https://openalex.org/I164861460"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100409306","display_name":"Neeraj Kumar","orcid":"https://orcid.org/0000-0002-3020-3947"},"institutions":[{"id":"https://openalex.org/I162030827","display_name":"Thapar Institute of Engineering & Technology","ror":"https://ror.org/00wdq3744","country_code":"IN","type":"funder","lineage":["https://openalex.org/I162030827"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Neeraj Kumar","raw_affiliation_strings":["Department of Computer Science and Engineering, Thapar University, Patiala, India"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Engineering, Thapar University, Patiala, India","institution_ids":["https://openalex.org/I162030827"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5074022699","display_name":"Athanasios V. Vasilakos","orcid":"https://orcid.org/0000-0003-1902-9877"},"institutions":[{"id":"https://openalex.org/I190632392","display_name":"Lule\u00e5 University of Technology","ror":"https://ror.org/016st3p78","country_code":"SE","type":"funder","lineage":["https://openalex.org/I190632392"]}],"countries":["SE"],"is_corresponding":false,"raw_author_name":"Athanasios V. Vasilakos","raw_affiliation_strings":["Department of Computer Science, Electrical and Space Engineering, Lule\u00e5 University of Technology, Lule\u00e5, Sweden"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, Electrical and Space Engineering, Lule\u00e5 University of Technology, Lule\u00e5, Sweden","institution_ids":["https://openalex.org/I190632392"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5076776322","display_name":"Joel J. P. C. Rodrigues","orcid":"https://orcid.org/0000-0001-8657-3800"},"institutions":[{"id":"https://openalex.org/I4210120471","display_name":"Instituto de Telecomunica\u00e7\u00f5es","ror":"https://ror.org/02ht4fk33","country_code":"PT","type":"nonprofit","lineage":["https://openalex.org/I4210120471"]}],"countries":["PT"],"is_corresponding":false,"raw_author_name":"Joel J. P. C. Rodrigues","raw_affiliation_strings":["Covilh\u00e3 Delegation, Instituto de Telecomunica\u00e7\u00f5es, Lisbon, Portugal"],"affiliations":[{"raw_affiliation_string":"Covilh\u00e3 Delegation, Instituto de Telecomunica\u00e7\u00f5es, Lisbon, Portugal","institution_ids":["https://openalex.org/I4210120471"]}]}],"institution_assertions":[],"countries_distinct_count":3,"institutions_distinct_count":5,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":46.62,"has_fulltext":true,"fulltext_origin":"ngrams","cited_by_count":203,"citation_normalized_percentile":{"value":0.99998,"is_in_top_1_percent":true,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":99,"max":100},"biblio":{"volume":"5","issue":"6","first_page":"4900","last_page":"4913"},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9998,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9998,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.9997,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10828","display_name":"Biometric Identification and Security","score":0.9926,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/session-key","display_name":"Session key","score":0.6015785},{"id":"https://openalex.org/keywords/security-analysis","display_name":"Security Analysis","score":0.48485553}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8559371},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.62863386},{"id":"https://openalex.org/C191197275","wikidata":"https://www.wikidata.org/wiki/Q1755775","display_name":"Session key","level":3,"score":0.6015785},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.5753415},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.48528358},{"id":"https://openalex.org/C38369872","wikidata":"https://www.wikidata.org/wiki/Q7445009","display_name":"Security analysis","level":2,"score":0.48485553},{"id":"https://openalex.org/C184297639","wikidata":"https://www.wikidata.org/wiki/Q177765","display_name":"Biometrics","level":2,"score":0.45942593},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.43896228},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.43111426},{"id":"https://openalex.org/C105339364","wikidata":"https://www.wikidata.org/wiki/Q2297740","display_name":"Software deployment","level":2,"score":0.4261075},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.41613126},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.14574897},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.104729295},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/jiot.2018.2877690","pdf_url":null,"source":{"id":"https://openalex.org/S2480266640","display_name":"IEEE Internet of Things Journal","issn_l":"2327-4662","issn":["2327-4662","2372-2541"],"is_oa":false,"is_in_doaj":false,"is_indexed_in_scopus":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/9","score":0.51,"display_name":"Industry, innovation and infrastructure"}],"grants":[{"funder":"https://openalex.org/F4320322025","funder_display_name":"Conselho Nacional de Desenvolvimento Cient\u00edfico e Tecnol\u00f3gico","award_id":"309335/2017-5"},{"funder":"https://openalex.org/F4320324266","funder_display_name":"Fundo para o Desenvolvimento Tecnol\u00f3gico das Telecomunica\u00e7\u00f5es","award_id":"01.14.0231.00"},{"funder":"https://openalex.org/F4320334779","funder_display_name":"Funda\u00e7\u00e3o para a Ci\u00eancia e a Tecnologia","award_id":"UID/EEA/50008/2013"}],"datasets":[],"versions":[],"referenced_works_count":39,"referenced_works":["https://openalex.org/W1498573661","https://openalex.org/W1514361308","https://openalex.org/W1525451859","https://openalex.org/W1526070463","https://openalex.org/W2029693536","https://openalex.org/W2034222716","https://openalex.org/W2038194220","https://openalex.org/W2059212242","https://openalex.org/W2069196751","https://openalex.org/W2095054754","https://openalex.org/W2105114022","https://openalex.org/W2126960670","https://openalex.org/W2154909745","https://openalex.org/W2243569459","https://openalex.org/W2282018707","https://openalex.org/W2314485382","https://openalex.org/W2433458552","https://openalex.org/W2531017060","https://openalex.org/W2548930603","https://openalex.org/W2562086057","https://openalex.org/W2570008916","https://openalex.org/W2584343393","https://openalex.org/W2592056285","https://openalex.org/W2592416275","https://openalex.org/W2610381456","https://openalex.org/W2613814461","https://openalex.org/W2615542681","https://openalex.org/W2617052993","https://openalex.org/W2625832062","https://openalex.org/W2625958646","https://openalex.org/W2728815635","https://openalex.org/W2729021829","https://openalex.org/W2738106847","https://openalex.org/W2739692078","https://openalex.org/W2789344178","https://openalex.org/W2801678809","https://openalex.org/W2809661872","https://openalex.org/W3208940722","https://openalex.org/W766082629"],"related_works":["https://openalex.org/W3151240493","https://openalex.org/W3127920551","https://openalex.org/W3106916313","https://openalex.org/W3104966193","https://openalex.org/W2953410103","https://openalex.org/W2517088709","https://openalex.org/W2410215724","https://openalex.org/W2183964146","https://openalex.org/W2076845124","https://openalex.org/W2018052023"],"abstract_inverted_index":{"Due":[0],"to":[1,64,77,138,154,173],"the":[2,20,24,40,52,122,132,174,185,189,198],"widespread":[3],"popularity":[4],"of":[5,10,39,80,106,129,149,161,169,178,192],"Internet-enabled":[6],"devices,":[7],"Industrial":[8],"Internet":[9],"Things":[11],"(IIoT)":[12],"becomes":[13],"popular":[14],"in":[15,51,59,82,86,171,184],"recent":[16],"years.":[17],"However,":[18,62],"as":[19],"smart":[21,112,119],"devices":[22,113,120],"share":[23],"information":[25,42],"with":[26],"each":[27],"other":[28,175],"using":[29,114,131,197],"an":[30,145],"open":[31],"channel,":[32],"i.e.,":[33],"Internet,":[34],"so":[35],"security":[36,56,127,147],"and":[37,57,68,111,121,166],"privacy":[38,58,94],"shared":[41],"remains":[43],"a":[44,91],"paramount":[45],"concern.":[46],"There":[47],"exist":[48],"some":[49],"solutions":[50,72],"literature":[53],"for":[54,100],"preserving":[55,95],"IIoT":[60,83,102,186],"environment.":[61,84,187],"due":[63],"their":[65],"heavy":[66],"computation":[67,165],"communication":[69,167],"overheads,":[70],"these":[71],"may":[73],"not":[74],"be":[75],"applicable":[76],"wide":[78],"category":[79,180],"applications":[81],"Hence,":[85],"this":[87],"paper,":[88],"we":[89],"propose":[90],"new":[92],"biometric-based":[93],"user":[96],"authentication":[97,108],"(BP2UA)":[98],"scheme":[99],"cloud-based":[101],"deployment.":[103],"BP2UA":[104,130,150,170,193],"consists":[105],"strong":[107],"between":[109,118],"users":[110],"preestablished":[115],"key":[116,142],"agreement":[117],"gateway":[123],"node.":[124],"The":[125,164],"formal":[126],"analysis":[128,148],"well-known":[133],"real-or-random":[134],"model":[135],"is":[136,151,194],"provided":[137],"prove":[139],"its":[140,156,179,182],"session":[141],"security.":[143],"Moreover,":[144],"informal":[146],"also":[152,195],"given":[153],"show":[155],"robustness":[157],"against":[158],"various":[159],"types":[160],"known":[162],"attacks.":[163],"costs":[168],"comparison":[172],"existing":[176],"schemes":[177],"demonstrate":[181],"effectiveness":[183],"Finally,":[188],"practical":[190],"demonstration":[191],"done":[196],"NS2":[199],"simulation.":[200]},"abstract_inverted_index_v3":null,"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W2898274421","counts_by_year":[{"year":2025,"cited_by_count":7},{"year":2024,"cited_by_count":25},{"year":2023,"cited_by_count":31},{"year":2022,"cited_by_count":34},{"year":2021,"cited_by_count":37},{"year":2020,"cited_by_count":51},{"year":2019,"cited_by_count":15},{"year":2018,"cited_by_count":3}],"updated_date":"2025-05-04T20:17:02.046085","created_date":"2018-11-02"}