{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,13]],"date-time":"2025-12-13T01:24:42Z","timestamp":1765589082327,"version":"3.48.0"},"reference-count":40,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2025,11,1]],"date-time":"2025-11-01T00:00:00Z","timestamp":1761955200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2025,11,1]],"date-time":"2025-11-01T00:00:00Z","timestamp":1761955200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/legal\/tdmrep-license"},{"start":{"date-parts":[[2025,11,1]],"date-time":"2025-11-01T00:00:00Z","timestamp":1761955200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-017"},{"start":{"date-parts":[[2025,11,1]],"date-time":"2025-11-01T00:00:00Z","timestamp":1761955200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"},{"start":{"date-parts":[[2025,11,1]],"date-time":"2025-11-01T00:00:00Z","timestamp":1761955200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-012"},{"start":{"date-parts":[[2025,11,1]],"date-time":"2025-11-01T00:00:00Z","timestamp":1761955200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,11,1]],"date-time":"2025-11-01T00:00:00Z","timestamp":1761955200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-004"}],"funder":[{"DOI":"10.13039\/501100003851","name":"Heilongjiang Province Department of Education","doi-asserted-by":"publisher","award":["YQJH2024095"],"award-info":[{"award-number":["YQJH2024095"]}],"id":[{"id":"10.13039\/501100003851","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100019081","name":"Science and Technology Program of Hunan Province","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100019081","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100002767","name":"China Hunan Provincial Science and Technology Department","doi-asserted-by":"publisher","award":["2025QK2008"],"award-info":[{"award-number":["2025QK2008"]}],"id":[{"id":"10.13039\/501100002767","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Journal of Industrial Information Integration"],"published-print":{"date-parts":[[2025,11]]},"DOI":"10.1016\/j.jii.2025.100946","type":"journal-article","created":{"date-parts":[[2025,9,4]],"date-time":"2025-09-04T06:59:57Z","timestamp":1756969197000},"page":"100946","update-policy":"https:\/\/doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":2,"special_numbering":"C","title":["HCDA: A hidden cross-domain authentication protocol for embodied intelligence in smart manufacturing"],"prefix":"10.1016","volume":"48","author":[{"ORCID":"https:\/\/orcid.org\/0009-0000-5549-6793","authenticated-orcid":false,"given":"Huaiyao","family":"Yang","sequence":"first","affiliation":[]},{"given":"Xiangwei","family":"Meng","sequence":"additional","affiliation":[]},{"given":"Jiale","family":"Liang","sequence":"additional","affiliation":[]},{"given":"Yanrong","family":"Zhang","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5224-4048","authenticated-orcid":false,"given":"Keqin","family":"Li","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"issue":"3","key":"10.1016\/j.jii.2025.100946_bib0001","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3526195","article-title":"Digital twin-enabled AI enhancement in smart critical infrastructures for 5G","volume":"18","author":"Gai","year":"2022","journal-title":"ACM Trans. Sens. Netw."},{"issue":"2","key":"10.1016\/j.jii.2025.100946_bib0002","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/2423636.2423642","article-title":"Thermal-aware task scheduling in 3D chip multiprocessor with real-time constrained workloads","volume":"12","author":"Li","year":"2013","journal-title":"ACM Trans. Embed. Comput. Syst."},{"key":"10.1016\/j.jii.2025.100946_bib0003","doi-asserted-by":"crossref","DOI":"10.1016\/j.adhoc.2023.103348","article-title":"A review of on-device machine learning for IoT: an energy perspective","volume":"153","author":"Tekin","year":"2024","journal-title":"Ad Hoc Netw"},{"issue":"4","key":"10.1016\/j.jii.2025.100946_bib0004","doi-asserted-by":"crossref","first-page":"785","DOI":"10.1109\/TSE.2024.3363611","article-title":"A systematic review of IoT systems testing: objectives, approaches, tools, and challenges","volume":"50","author":"Minani","year":"2024","journal-title":"IEEE Trans. Softw. Eng."},{"issue":"5","key":"10.1016\/j.jii.2025.100946_bib0005","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3635030","article-title":"Industrial internet of things ecosystems security and digital forensics: achievements, open challenges, and future directions","volume":"56","author":"Kebande","year":"2024","journal-title":"ACM Comput. Surv."},{"issue":"12","key":"10.1016\/j.jii.2025.100946_bib0006","doi-asserted-by":"crossref","first-page":"11553","DOI":"10.1109\/TII.2023.3246983","article-title":"Digital twins for anomaly detection in the industrial internet of things: conceptual architecture and proof-of-concept","volume":"19","author":"De Benedictis","year":"2023","journal-title":"IEEE Trans. Ind. Inform."},{"issue":"4","key":"10.1016\/j.jii.2025.100946_bib0007","doi-asserted-by":"crossref","first-page":"1622","DOI":"10.1109\/TSC.2023.3333806","article-title":"Lightpay: a lightweight and secure off-chain multi-path payment scheme based on adapter signatures","volume":"17","author":"Liu","year":"2023","journal-title":"IEEE Trans. Serv. Comput."},{"key":"10.1016\/j.jii.2025.100946_bib0008","article-title":"Machine learning enabled industrial IoT security: challenges, trends and solutions","volume":"38","author":"Ni","year":"2024","journal-title":"J. Ind. Inf. Integr."},{"issue":"8","key":"10.1016\/j.jii.2025.100946_bib0009","doi-asserted-by":"crossref","first-page":"8431","DOI":"10.1109\/TITS.2022.3156266","article-title":"Spatial-temporal aware inductive graph neural network for C-ITS data recovery","volume":"24","author":"Liang","year":"2022","journal-title":"IEEE Trans. Intell. Transp. Syst."},{"key":"10.1016\/j.jii.2025.100946_bib0010","series-title":"Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security","first-page":"303","article-title":"Cross-silo federated learning with record-level personalized differential privacy","author":"Liu","year":"2024"},{"issue":"4","key":"10.1016\/j.jii.2025.100946_bib0011","doi-asserted-by":"crossref","first-page":"5251","DOI":"10.1109\/TITS.2025.3527409","article-title":"A conditional privacy-preserving protocol for cross-domain communications in VANET","volume":"26","author":"Seifelnasr","year":"2025","journal-title":"IEEE Trans. Intell. Transp. Syst."},{"issue":"5","key":"10.1016\/j.jii.2025.100946_bib0012","first-page":"445","article-title":"Real-time dynamic voltage loop scheduling for multi-core embedded systems","volume":"54","author":"Shao","year":"2007","journal-title":"IEEE Trans. Circuits Syst. II-Express Briefs"},{"issue":"8","key":"10.1016\/j.jii.2025.100946_bib0013","doi-asserted-by":"crossref","first-page":"8556","DOI":"10.1109\/TITS.2024.3402432","article-title":"A lightweight group authentication protocol for blockchain-based vehicular edge computing networks","volume":"25","author":"Meng","year":"2024","journal-title":"IEEE Trans. Intell. Transp. Syst."},{"key":"10.1016\/j.jii.2025.100946_bib0014","article-title":"Lightweight certificate revocation for low-power IoT with end-to-end security","volume":"73","author":"H\u00f6glund","year":"2023","journal-title":"J. Inf. Secur. Appl."},{"issue":"4","key":"10.1016\/j.jii.2025.100946_bib0015","doi-asserted-by":"crossref","first-page":"2159","DOI":"10.1007\/s11276-023-03624-x","article-title":"OMIBC: optimal modified identity-based cryptography for signcryption and private key extraction using fuzzy model","volume":"30","author":"Alagarsamy","year":"2024","journal-title":"Wirel. Netw."},{"issue":"4","key":"10.1016\/j.jii.2025.100946_bib0016","first-page":"1","article-title":"Backdoor attacks and defenses targeting multi-domain AI models: a comprehensive review","volume":"57","author":"Zhang","year":"2024","journal-title":"ACM Comput. Surv."},{"issue":"10","key":"10.1016\/j.jii.2025.100946_bib0017","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3567582","article-title":"Connect API with blockchain: a survey on blockchain oracle implementation","volume":"55","author":"Pasdar","year":"2023","journal-title":"ACM Comput. Surv."},{"key":"10.1016\/j.jii.2025.100946_bib0018","doi-asserted-by":"crossref","first-page":"2169","DOI":"10.1109\/ACCESS.2025.3572778","article-title":"Embodied intelligence empowering customized manufacturing: architecture, opportunities, and challenges","volume":"13","author":"Tan","year":"2025","journal-title":"IEEE Access"},{"key":"10.1016\/j.jii.2025.100946_bib0019","doi-asserted-by":"crossref","DOI":"10.1016\/j.resourpol.2023.103366","article-title":"Exploring the hyperledger blockchain technology disruption and barriers of blockchain adoption in petroleum supply chain","volume":"81","author":"Kumar","year":"2023","journal-title":"Resour. Policy"},{"issue":"5","key":"10.1016\/j.jii.2025.100946_bib0020","doi-asserted-by":"crossref","first-page":"3801","DOI":"10.1109\/JIOT.2020.3024703","article-title":"Secure multifactor authenticated key agreement scheme for industrial IoT","volume":"8","author":"Vinoth","year":"2020","journal-title":"IEEE Internet Things J."},{"issue":"3","key":"10.1016\/j.jii.2025.100946_bib0021","doi-asserted-by":"crossref","first-page":"1548","DOI":"10.1007\/s12083-020-01063-5","article-title":"A robust provable-secure privacy-preserving authentication protocol for Industrial Internet of Things","volume":"14","author":"Rangwani","year":"2021","journal-title":"Peer Peer Netw. Appl."},{"key":"10.1016\/j.jii.2025.100946_bib0022","doi-asserted-by":"crossref","DOI":"10.1016\/j.iot.2021.100493","article-title":"A secure anonymous D2D mutual authentication and key agreement protocol for IoT","volume":"18","author":"Hajian","year":"2022","journal-title":"Internet Things"},{"issue":"11","key":"10.1016\/j.jii.2025.100946_bib0023","doi-asserted-by":"crossref","first-page":"8039","DOI":"10.1109\/TII.2022.3156629","article-title":"An efficient and provably secure certificateless protocol for Industrial Internet of Things","volume":"18","author":"Rafique","year":"2022","journal-title":"IEEE Trans. Ind. Inform."},{"issue":"23","key":"10.1016\/j.jii.2025.100946_bib0024","doi-asserted-by":"crossref","first-page":"24453","DOI":"10.1109\/JIOT.2022.3188711","article-title":"REAP-IIoT: resource-efficient authentication protocol for the Industrial Internet of Things","volume":"9","author":"Tanveer","year":"2022","journal-title":"IEEE Internet Things J"},{"issue":"4","key":"10.1016\/j.jii.2025.100946_bib0025","doi-asserted-by":"crossref","first-page":"3000","DOI":"10.1109\/TSC.2023.3257569","article-title":"Three-factor anonymous authentication and key agreement based on fuzzy biological extraction for Industrial Internet of Things","volume":"16","author":"Xu","year":"2023","journal-title":"IEEE Trans. Serv. Comput."},{"volume":"23","year":"2023","author":"Tanveer","key":"10.1016\/j.jii.2025.100946_bib0026"},{"issue":"1","key":"10.1016\/j.jii.2025.100946_bib0027","doi-asserted-by":"crossref","first-page":"243","DOI":"10.1109\/TII.2022.3159164","article-title":"TAB-SAPP: a trust-aware blockchain-based seamless authentication for massive IoT-enabled industrial applications","volume":"19","author":"Deebak","year":"2022","journal-title":"IEEE Trans. Ind. Inform."},{"key":"10.1016\/j.jii.2025.100946_bib0028","doi-asserted-by":"crossref","DOI":"10.1016\/j.iot.2023.101019","article-title":"Securing IoT devices: a novel approach using blockchain and quantum cryptography","volume":"25","author":"Dhar","year":"2024","journal-title":"Internet Things"},{"issue":"3","key":"10.1016\/j.jii.2025.100946_bib0029","doi-asserted-by":"crossref","first-page":"669","DOI":"10.1109\/TC.2021.3077738","article-title":"Qos prediction and adversarial attack protection for distributed services under dlaas","volume":"73","author":"Liang","year":"2023","journal-title":"IEEE Trans. Comput."},{"issue":"5","key":"10.1016\/j.jii.2025.100946_bib0030","doi-asserted-by":"crossref","first-page":"942","DOI":"10.1109\/JSAC.2020.2980916","article-title":"Blockchain-assisted secure device authentication for cross-domain industrial IoT","volume":"38","author":"Shen","year":"2020","journal-title":"IEEE J. Sel. Areas Commun."},{"key":"10.1016\/j.jii.2025.100946_bib0031","doi-asserted-by":"crossref","DOI":"10.1016\/j.sysarc.2021.102024","article-title":"Blockchain-assisted handover authentication for intelligent telehealth in multi-server edge computing environment","volume":"115","author":"Wang","year":"2021","journal-title":"J. Syst. Architect."},{"key":"10.1016\/j.jii.2025.100946_bib0032","doi-asserted-by":"crossref","first-page":"176","DOI":"10.1016\/j.jpdc.2021.05.007","article-title":"Cross-domain secure data sharing using blockchain for industrial IoT","volume":"156","author":"Singh","year":"2021","journal-title":"J. Parallel Distrib. Comput."},{"issue":"22","key":"10.1016\/j.jii.2025.100946_bib0033","doi-asserted-by":"crossref","first-page":"22501","DOI":"10.1109\/JIOT.2022.3176192","article-title":"Efficient and privacy-preserving blockchain-based multifactor device authentication protocol for cross-domain IIoT","volume":"9","author":"Zhang","year":"2022","journal-title":"IEEE Internet Things J."},{"key":"10.1016\/j.jii.2025.100946_bib0034","doi-asserted-by":"crossref","first-page":"3789","DOI":"10.1109\/TIFS.2022.3214733","article-title":"CCAP: a complete cross-domain authentication based on blockchain for Internet of Things","volume":"17","author":"Zhang","year":"2022","journal-title":"IEEE Trans. Inf. Forensic Secur."},{"issue":"2","key":"10.1016\/j.jii.2025.100946_bib0035","doi-asserted-by":"crossref","first-page":"899","DOI":"10.1109\/TNSE.2022.3224453","article-title":"Efficient and anonymous cross-domain authentication for IIoT based on blockchain","volume":"10","author":"Cui","year":"2022","journal-title":"IEEE Trans. Netw. Sci. Eng."},{"issue":"2","key":"10.1016\/j.jii.2025.100946_bib0036","doi-asserted-by":"crossref","first-page":"726","DOI":"10.1016\/j.jksuci.2023.01.011","article-title":"Efficient hybrid centralized and blockchain-based authentication architecture for heterogeneous IoT systems","volume":"35","author":"Khashan","year":"2023","journal-title":"J. King Saud Univ.-Comput. Inf. Sci."},{"issue":"1","key":"10.1016\/j.jii.2025.100946_bib0037","doi-asserted-by":"crossref","first-page":"819","DOI":"10.1007\/s11277-022-09579-0","article-title":"Secure and authentic anonymous roaming service","volume":"125","author":"Roy","year":"2022","journal-title":"Wirel. Pers. Commun."},{"key":"10.1016\/j.jii.2025.100946_bib0038","article-title":"EventMon: real-time event-based streaming network monitoring data recovery","author":"Li","year":"2024","journal-title":"IEEE Trans. Dependable Secur. Comput."},{"key":"10.1016\/j.jii.2025.100946_bib0039","doi-asserted-by":"crossref","first-page":"3525","DOI":"10.1109\/TIFS.2024.3364370","article-title":"MC-DSC: a dynamic secure resource configuration scheme based on medical consortium blockchain","volume":"19","author":"Liang","year":"2024","journal-title":"IEEE Trans. Inf. Forensic Secur."},{"issue":"7","key":"10.1016\/j.jii.2025.100946_bib0040","doi-asserted-by":"crossref","first-page":"5000","DOI":"10.1109\/TII.2021.3119685","article-title":"A privacy enhanced authentication scheme for securing smart grid infrastructure","volume":"18","author":"Chaudhry","year":"2021","journal-title":"IEEE Trans. Ind. Inform."}],"container-title":["Journal of Industrial Information Integration"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S2452414X25001694?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S2452414X25001694?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2025,12,13]],"date-time":"2025-12-13T01:22:46Z","timestamp":1765588966000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S2452414X25001694"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,11]]},"references-count":40,"alternative-id":["S2452414X25001694"],"URL":"https:\/\/doi.org\/10.1016\/j.jii.2025.100946","relation":{},"ISSN":["2452-414X"],"issn-type":[{"type":"print","value":"2452-414X"}],"subject":[],"published":{"date-parts":[[2025,11]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"HCDA: A hidden cross-domain authentication protocol for embodied intelligence in smart manufacturing","name":"articletitle","label":"Article Title"},{"value":"Journal of Industrial Information Integration","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.jii.2025.100946","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2025 Elsevier Inc. All rights are reserved, including those for text and data mining, AI training, and similar technologies.","name":"copyright","label":"Copyright"}],"article-number":"100946"}}