{"id":"https://openalex.org/W2475356132","doi":"https://doi.org/10.1002/sec.1497","title":"Security and privacy in Internet of things: methods, architectures, and solutions","display_name":"Security and privacy in Internet of things: methods, architectures, and solutions","publication_year":2016,"publication_date":"2016-06-27","ids":{"openalex":"https://openalex.org/W2475356132","doi":"https://doi.org/10.1002/sec.1497","mag":"2475356132"},"language":"en","primary_location":{"id":"doi:10.1002/sec.1497","is_oa":false,"landing_page_url":"https://doi.org/10.1002/sec.1497","pdf_url":null,"source":{"id":"https://openalex.org/S120683614","display_name":"Security and Communication Networks","issn_l":"1939-0114","issn":["1939-0114","1939-0122"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319869","host_organization_name":"Hindawi Publishing Corporation","host_organization_lineage":["https://openalex.org/P4310319869"],"host_organization_lineage_names":["Hindawi Publishing Corporation"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Security and Communication Networks","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5070719868","display_name":"Guangjie Han","orcid":"https://orcid.org/0000-0002-6921-7369"},"institutions":[{"id":"https://openalex.org/I163340411","display_name":"Hohai University","ror":"https://ror.org/01wd4xt90","country_code":"CN","type":"education","lineage":["https://openalex.org/I163340411"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Guangjie Han","raw_affiliation_strings":["Department of Information and Communication Systems Hohai University  Changzhou China","Department of Information and Communication Systems, Hohai University, Changzhou, China"],"affiliations":[{"raw_affiliation_string":"Department of Information and Communication Systems Hohai University  Changzhou China","institution_ids":["https://openalex.org/I163340411"]},{"raw_affiliation_string":"Department of Information and Communication Systems, Hohai University, Changzhou, China","institution_ids":["https://openalex.org/I163340411"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5007723627","display_name":"Lei Shu","orcid":"https://orcid.org/0000-0002-6700-9347"},"institutions":[{"id":"https://openalex.org/I4210128140","display_name":"Guangdong University of Petrochemical Technology","ror":"https://ror.org/030ffke25","country_code":"CN","type":"education","lineage":["https://openalex.org/I4210128140"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Lei Shu","raw_affiliation_strings":["Guangdong Petrochemical Equipment Fault Diagnosis Key Laboratory Guangdong University of Petrochemical Technology  Maoming China","Guangdong Petrochemical Equipment Fault Diagnosis Key Laboratory, Guangdong University of Petrochemical Technology, Maoming, China"],"affiliations":[{"raw_affiliation_string":"Guangdong Petrochemical Equipment Fault Diagnosis Key Laboratory Guangdong University of Petrochemical Technology  Maoming China","institution_ids":["https://openalex.org/I4210128140"]},{"raw_affiliation_string":"Guangdong Petrochemical Equipment Fault Diagnosis Key Laboratory, Guangdong University of Petrochemical Technology, Maoming, China","institution_ids":["https://openalex.org/I4210128140"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5091879207","display_name":"Sammy Chan","orcid":"https://orcid.org/0000-0002-8524-229X"},"institutions":[{"id":"https://openalex.org/I168719708","display_name":"City University of Hong Kong","ror":"https://ror.org/03q8dnn23","country_code":"HK","type":"education","lineage":["https://openalex.org/I168719708"]}],"countries":["HK"],"is_corresponding":false,"raw_author_name":"Sammy Chan","raw_affiliation_strings":["Department of Electronic Engineering City University of Hong Kong  Hong Kong China","Department of Electronic Engineering, City University of Hong Kong, Hong Kong, China"],"affiliations":[{"raw_affiliation_string":"Department of Electronic Engineering City University of Hong Kong  Hong Kong China","institution_ids":["https://openalex.org/I168719708"]},{"raw_affiliation_string":"Department of Electronic Engineering, City University of Hong Kong, Hong Kong, China","institution_ids":["https://openalex.org/I168719708"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5075234257","display_name":"Jiankun Hu","orcid":"https://orcid.org/0000-0003-0230-1432"},"institutions":[{"id":"https://openalex.org/I40053085","display_name":"Australian Defence Force Academy","ror":"https://ror.org/02j5s7g39","country_code":"AU","type":"education","lineage":["https://openalex.org/I31746571","https://openalex.org/I40053085","https://openalex.org/I4394709116"]},{"id":"https://openalex.org/I31746571","display_name":"UNSW Sydney","ror":"https://ror.org/03r8z3t63","country_code":"AU","type":"education","lineage":["https://openalex.org/I31746571"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Jiankun Hu","raw_affiliation_strings":["School of Engineering and Information Technology The University of New South Wales, Australian Defence Force Academy  Canberra Australia","School of Engineering and Information Technology, The University of New South Wales, Australian Defence Force Academy, Canberra, Australia"],"affiliations":[{"raw_affiliation_string":"School of Engineering and Information Technology The University of New South Wales, Australian Defence Force Academy  Canberra Australia","institution_ids":["https://openalex.org/I40053085"]},{"raw_affiliation_string":"School of Engineering and Information Technology, The University of New South Wales, Australian Defence Force Academy, Canberra, Australia","institution_ids":["https://openalex.org/I40053085","https://openalex.org/I31746571"]}]}],"institutions":[],"countries_distinct_count":3,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5070719868"],"corresponding_institution_ids":["https://openalex.org/I163340411"],"apc_list":{"value":2100,"currency":"USD","value_usd":2100},"apc_paid":null,"fwci":1.1656,"has_fulltext":false,"cited_by_count":9,"citation_normalized_percentile":{"value":0.81146458,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":97},"biblio":{"volume":"9","issue":"15","first_page":"2641","last_page":"2642"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10273","display_name":"IoT and Edge/Fog Computing","score":0.9965999722480774,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10273","display_name":"IoT and Edge/Fog Computing","score":0.9965999722480774,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9965999722480774,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9932000041007996,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8398890495300293},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6708905100822449},{"id":"https://openalex.org/keywords/scalability","display_name":"Scalability","score":0.5887669920921326},{"id":"https://openalex.org/keywords/interoperability","display_name":"Interoperability","score":0.5589548349380493},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.5335754752159119},{"id":"https://openalex.org/keywords/software-deployment","display_name":"Software deployment","score":0.47162342071533203},{"id":"https://openalex.org/keywords/smart-objects","display_name":"Smart objects","score":0.43406766653060913},{"id":"https://openalex.org/keywords/internet-of-things","display_name":"Internet of Things","score":0.3593924641609192},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.17667990922927856}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8398890495300293},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6708905100822449},{"id":"https://openalex.org/C48044578","wikidata":"https://www.wikidata.org/wiki/Q727490","display_name":"Scalability","level":2,"score":0.5887669920921326},{"id":"https://openalex.org/C20136886","wikidata":"https://www.wikidata.org/wiki/Q749647","display_name":"Interoperability","level":2,"score":0.5589548349380493},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.5335754752159119},{"id":"https://openalex.org/C105339364","wikidata":"https://www.wikidata.org/wiki/Q2297740","display_name":"Software deployment","level":2,"score":0.47162342071533203},{"id":"https://openalex.org/C2780202397","wikidata":"https://www.wikidata.org/wiki/Q2294986","display_name":"Smart objects","level":3,"score":0.43406766653060913},{"id":"https://openalex.org/C81860439","wikidata":"https://www.wikidata.org/wiki/Q251212","display_name":"Internet of Things","level":2,"score":0.3593924641609192},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.17667990922927856},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1002/sec.1497","is_oa":false,"landing_page_url":"https://doi.org/10.1002/sec.1497","pdf_url":null,"source":{"id":"https://openalex.org/S120683614","display_name":"Security and Communication Networks","issn_l":"1939-0114","issn":["1939-0114","1939-0122"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319869","host_organization_name":"Hindawi Publishing Corporation","host_organization_lineage":["https://openalex.org/P4310319869"],"host_organization_lineage_names":["Hindawi Publishing Corporation"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Security and Communication Networks","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Industry, innovation and infrastructure","score":0.41999998688697815,"id":"https://metadata.un.org/sdg/9"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":["https://openalex.org/W96612179","https://openalex.org/W2770234245","https://openalex.org/W2093262417","https://openalex.org/W2123131699","https://openalex.org/W2566006169","https://openalex.org/W2987774938","https://openalex.org/W4256492088","https://openalex.org/W650116260","https://openalex.org/W632915154","https://openalex.org/W2558872422"],"abstract_inverted_index":{"Internet":[0],"of":[1,33,54,99,106,139,153,176,191,206,220,234,246,285,297,308,332,438,523,543,570,679,687,873,960,990,1045,1054,1097,1109],"Things":[2],"(IoT)":[3],"is":[4,113,200,414,478,628,772,785,968,1038],"a":[5,114,197,283,313,384,409,513,629,664,824,834,847,883,889,964,1022,1043],"fast-growing":[6],"research":[7,303,310,318,1075,1092],"area":[8],"which":[9,125,627],"spans":[10],"various":[11],"technological":[12],"fields,":[13],"including":[14],"computer":[15],"science,":[16],"electronic":[17],"engineering,":[18],"mobile":[19,572,577,609,644],"and":[20,47,88,101,103,116,123,133,135,174,179,184,209,218,238,256,259,263,301,322,326,370,382,392,420,431,450,460,481,509,550,560,582,622,640,660,695,750,811,826,843,849,888,932,1015,1042,1073,1099,1112,1124,1131],"wireless":[21,39,353,740,766,794,921,965,1001,1028],"communications,":[22],"embedded":[23],"systems,":[24],"etc.":[25],"Many":[26],"technologies":[27],"serve":[28],"as":[29,38,60,62,76,82,377,774,833],"the":[30,57,97,104,109,137,150,154,172,189,192,214,235,243,295,316,338,342,375,378,394,406,424,435,458,475,486,528,533,538,544,551,567,592,600,635,647,675,684,702,727,775,802,813,820,863,913,958,970,984,988,991,1052,1055,1086,1094,1107,1110,1116,1121],"building":[31],"blocks":[32],"this":[34,275,1063,1135],"new":[35,94,207,255,346,385,535],"paradigm,":[36],"such":[37,81],"sensor":[40,355,922,966,1002,1029],"networks,":[41,742,801],"RFID,":[42],"cloud":[43,185],"services,":[44,657],"machine-to-machine":[45],"interfaces,":[46],"so":[48,75],"on.":[49],"IoT":[50,92,112,119,1077],"will":[51,292,1066,1089],"allow":[52],"billions":[53],"objects":[55],"in":[56,71,111,131,161,222,231,249,272,289,299,328,337,532,599,722,739,764,793,955,963,1040,1071,1076,1078,1093],"physical":[58],"world":[59],"well":[61,548,589],"virtual":[63],"environments":[64,80],"to":[65,77,143,212,267,281,294,388,416,455,520,673,759,787,860,951,1050,1068,1105,1120],"exchange":[66,165],"data":[67],"with":[68,167,269,357,402,468,527,908],"each":[69,168],"other":[70],"an":[72,201,754,877,936],"autonomous":[73],"way":[74],"create":[78],"smart":[79,499,524,571],"automotive,":[83],"healthcare,":[84],"logistics,":[85],"environmental":[86],"monitoring,":[87],"many":[89],"others.":[90],"However,":[91],"introduces":[93,251],"challenges":[95],"for":[96,204,304,349,397,434,607,655,831,920,1000,1027,1127],"security":[98,181,208,225,258,270,300,321,441,522,585,1072],"systems":[100],"processes":[102],"privacy":[105,193,210,260,302,323,396,1074],"individuals.":[107],"Protecting":[108],"information":[110,166,1098],"complex":[115],"difficult":[117],"task.":[118],"requires":[120],"global":[121],"connectivity":[122],"accessibility,":[124],"means":[126],"that":[127,136,466,714,862,899,1062,1085,1133],"anyone":[128],"can":[129,164,546,553,587,594,637,805,816,901,978],"access":[130,828,851,885,892,905,997],"anytime":[132,562],"anyway,":[134],"number":[138,245,541,558,959],"attack":[140,732,778,783,954],"vectors":[141],"available":[142],"malicious":[144,953,976,1046],"attackers":[145],"might":[146],"become":[147],"staggering.":[148],"Furthermore,":[149],"inherent":[151],"complexity":[152],"IoT,":[155,436],"where":[156],"multiple":[157],"heterogeneous":[158],"entities":[159],"located":[160],"different":[162,236,724,809],"contexts":[163],"other,":[169],"further":[170,1091],"complicates":[171],"design":[173],"deployment":[175],"efficient,":[177],"interoperable,":[178],"scalable":[180],"mechanisms.":[182],"Ubiquitous":[183],"computing":[186],"also":[187,1083,1103],"increase":[188],"urgency":[190],"leakage":[194],"problem.":[195],"As":[196],"result,":[198],"there":[199],"increasing":[202],"demand":[203],"development":[205],"approaches":[211],"guarantee":[213,389,674],"security,":[215],"privacy,":[216],"integrity,":[217],"availability":[219],"resources":[221,864],"IoTs.":[223,273,305,329,956],"Traditional":[224],"countermeasures":[226],"cannot":[227,865],"be":[228,547,588,595,638,788,806,817,866,979],"directly":[229],"used":[230],"IoTs":[232,250],"because":[233],"standards":[237],"communication":[239,391,421,432,459],"stacks":[240],"involved.":[241],"Moreover,":[242],"large":[244],"interconnected":[247],"devices":[248,578],"scalability":[252],"issues.":[253],"Therefore,":[254,598,975],"novel":[257,514,665],"methods,":[261,324],"architectures,":[262,325],"solutions":[264,327],"are":[265,279,335,579,704,717,973,1048],"needed":[266],"deal":[268],"threats":[271],"In":[274,341,405,423,485,646,726,819,912,987,1080],"special":[276,1064,1122,1136],"issue,":[277,1123],"we":[278,1060,1082],"delighted":[280],"present":[282,453],"selection":[284],"nine":[286],"papers,":[287,993],"which,":[288],"our":[290],"opinion,":[291],"contribute":[293,1067],"enhancement":[296],"knowledge":[298,1070],"The":[306,330,463,584,710,769,780,895,1036],"collection":[307],"high-quality":[309],"papers":[311,334],"provides":[312],"view":[314],"on":[315,320,498,683,719,925,948,983,1005,1032],"latest":[317],"advances":[319],"contributions":[331],"these":[333],"outlined":[336],"succeeding":[339],"text.":[340],"first":[343,692],"paper,":[344,426,488,602,649,729,822,915],"A":[345,489,994],"authentication":[347,380,386,496,517],"protocol":[348,387],"healthcare":[350,398],"applications":[351],"using":[352,400,474,706,735,798],"medical":[354],"networks":[356,1003,1030],"user":[358,395,403],"anonymity,":[359],"Xiong":[360],"Li,":[361,617,838,840],"Jianwei":[362],"Niu,":[363],"Saru":[364],"Kumari,":[365],"Junguo":[366],"Liao,":[367],"Wei":[368],"Liang,":[369],"Muhammad":[371,743],"Khurram":[372],"Khan":[373],"adopt":[374],"biometrics":[376],"third":[379,487],"factor":[381],"propose":[383,512,625,663,753,846,935,1021],"secure":[390,604,630,995,1023],"protect":[393,521],"application":[399],"WMSNs":[401],"anonymity.":[404],"proposed":[407,534,770,1056],"protocol,":[408],"wrong":[410],"password":[411],"detection":[412,733,918,939],"mechanism":[413,734],"designed":[415,786],"reduce":[417],"unnecessary":[418],"computation":[419],"costs.":[422],"second":[425],"Fusion:":[427],"coalesced":[428],"confidential":[429],"storage":[430,461],"framework":[433,830],"instead":[437],"developing":[439],"independent":[440],"solutions,":[442],"Ibrahim":[443],"Ethem":[444],"Bagci,":[445],"Shahid":[446],"Raza,":[447],"Utz":[448],"Roedig,":[449],"Thiemo":[451],"Voigt":[452],"Fusion":[454],"address":[456],"both":[457],"security.":[462,1101],"paper":[464],"demonstrates":[465],"compared":[467],"performing":[469],"traditional":[470,529],"cryptographic":[471],"operations":[472],"separately,":[473],"combined":[476],"solution":[477],"much":[479],"safer":[480],"more":[482],"energy":[483],"efficient.":[484],"changeable":[490],"personal":[491,539,556],"identification":[492,540,557],"number-based":[493],"keystroke":[494,515],"dynamics":[495],"system":[497,519],"phones,":[500],"Ting-Yi":[501],"Chang,":[502],"Cheng-Jung":[503],"Tsai,":[504,506],"Wang-Jui":[505],"Chun-Cheng":[507],"Peng,":[508],"Han-Sing":[510],"Wu":[511],"dynamics-based":[516],"(KDA)":[518],"phones.":[525],"Compared":[526],"KDA":[530,536],"system,":[531,537],"codes":[542,559],"subscribers":[545],"protected,":[549],"users":[552],"change":[554],"their":[555,1128],"passwords":[561],"without":[563],"extra":[564],"retraining.":[565],"With":[566],"wide":[568],"use":[569],"devices,":[573],"task":[574,605],"collaborations":[575],"among":[576,643],"becoming":[580],"ubiquitous":[581],"important.":[583],"issues":[586],"guaranteed":[590],"if":[591],"tasks":[593,636],"effectively":[596],"balanced.":[597],"fourth":[601],"SAFE-CROWD:":[603],"allocation":[606],"collaborative":[608],"social":[610],"network,":[611],"Xiaochen":[612],"Fan,":[613],"Panlong":[614],"Yang,":[615],"Qingyu":[616],"Dawei":[618],"Liu,":[619,842],"Chaocan":[620],"Xiang,":[621],"Yonggang":[623],"Zhao":[624],"\u201cSAFE-CROWD\u201d,":[626],"task-allocation":[631],"scheme.":[632],"Using":[633],"SAFE-CROWD,":[634],"securely":[639],"collaboratively":[641],"completed":[642],"devices.":[645],"fifth":[648],"ShoVAT:":[650],"Shodan-based":[651,668],"vulnerability":[652,669,677,699],"assessment":[653,670,678],"tool":[654,666,671],"Internet-facing":[656,680],"B\u00e9la":[658],"Genge":[659],"C\u01celin":[661],"En\u01cechescu":[662],"called":[667,941],"(ShoVAT)":[672],"automated":[676],"services.":[681],"Based":[682],"indexing":[685],"capabilities":[686],"Shodan":[688],"search":[689],"engine,":[690],"ShoVAT":[691],"finds":[693],"services":[694,721],"then":[696],"reconstructs":[697],"key":[698],"identifiers.":[700],"Finally,":[701],"vulnerabilities":[703,716],"obtained":[705],"National":[707],"Vulnerability":[708],"Database.":[709],"experiment":[711],"results":[712,897,1088],"show":[713,898],"3922":[715],"found":[718],"1501":[720],"12":[723],"institutions.":[725],"sixth":[728],"Distributed":[730],"flood":[731,777,782,814],"artificial":[736,755,799],"neural":[737,756,800],"network":[738,803,891,923,967,1100],"mesh":[741,767,791,795],"Altaf":[744],"Khan,":[745,747],"Shafiullah":[746],"Bilal":[748],"Shams,":[749],"Jaime":[751],"Lloret":[752],"network-based":[757],"technique":[758],"detect":[760,952],"distributed":[761,776,781],"flooding":[762],"attacks":[763,815,1047],"multi-hop":[765],"networks.":[768],"scheme":[771,999,1026],"named":[773,854],"detector.":[779],"detector":[784],"implemented":[789],"at":[790],"gateway":[792],"network.":[796],"By":[797],"traffic":[804],"divided":[807],"into":[808],"categories,":[810],"thus,":[812],"detected.":[818],"seventh":[821],"Toward":[823],"flexible":[825,848],"fine-grained":[827,850],"control":[829,852,886,893,906,998],"infrastructure":[832],"service":[835],"clouds,":[836],"Bo":[837],"Jianxin":[839],"Lu":[841],"Chao":[844],"Zhou":[845],"framework,":[853],"IaaS-oriented":[855,878],"Hybrid":[856,879],"Access":[857,880],"Control":[858,881],"(iHAC),":[859],"ensure":[861],"illegally":[867],"accessed":[868],"or":[869],"used.":[870],"iHAC":[871,900],"consists":[872],"three":[874],"main":[875],"parts:":[876],"model,":[882],"VM-centric":[884],"approach,":[887],"VMM-enabled":[890],"mechanism.":[894],"simulation":[896],"efficiently":[902,980],"make":[903],"correct":[904],"decisions":[907],"acceptable":[909],"performance":[910,1053],"overhead.":[911],"eighth":[914],"An":[916],"intrusion":[917,938],"method":[919,940,946],"based":[924,947,982,1004,1031],"mathematical":[926,949],"morphology,":[927],"Yanwen":[928],"Wang,":[929],"Xiaoling":[930],"Wu,":[931],"Hainan":[933],"Chen":[934],"innovative":[937],"granulometric":[942],"size":[943],"distribution":[944],"(GSD)":[945],"morphology":[950],"If":[957],"active":[961],"nodes":[962,977],"fixed,":[969],"GSD":[971],"curves":[972],"similar.":[974],"detected":[981],"abnormal":[985],"GSD.":[986],"last":[989],"presented":[992,1087],"energy-efficient":[996,1024],"elliptic":[1006,1033],"curve":[1007,1034],"cryptography,":[1008],"Yuanyuan":[1009],"Zhang,":[1010],"Neeraj":[1011],"Kumar,":[1012],"Jianhua":[1013],"Chen,":[1014],"Joel":[1016],"J.":[1017],"P.":[1018],"C.":[1019],"Rodrigues":[1020],"access-control":[1025],"cryptography.":[1035],"algorithm":[1037],"explained":[1039],"detail,":[1041],"variety":[1044],"simulated":[1049],"evaluate":[1051],"algorithm.":[1057],"To":[1058],"summarize,":[1059],"believe":[1061],"issue":[1065,1137],"enhancing":[1069],"particular.":[1079],"addition,":[1081],"hope":[1084],"stimulate":[1090],"important":[1095],"areas":[1096],"We":[1102],"want":[1104],"thank":[1106],"editor-in-chief":[1108],"Security":[1111],"Communication":[1113],"Networks":[1114],"journal,":[1115],"leading":[1117],"researchers":[1118],"contributing":[1119],"excellent":[1125],"reviewers":[1126],"great":[1129],"help":[1130],"support":[1132],"made":[1134],"possible.":[1138]},"counts_by_year":[{"year":2023,"cited_by_count":1},{"year":2022,"cited_by_count":1},{"year":2021,"cited_by_count":1},{"year":2020,"cited_by_count":2},{"year":2018,"cited_by_count":3},{"year":2016,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
