{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,27]],"date-time":"2026-03-27T16:11:28Z","timestamp":1774627888030,"version":"3.50.1"},"reference-count":56,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2025,12,1]],"date-time":"2025-12-01T00:00:00Z","timestamp":1764547200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2025,12,1]],"date-time":"2025-12-01T00:00:00Z","timestamp":1764547200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/legal\/tdmrep-license"},{"start":{"date-parts":[[2025,12,1]],"date-time":"2025-12-01T00:00:00Z","timestamp":1764547200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-017"},{"start":{"date-parts":[[2025,12,1]],"date-time":"2025-12-01T00:00:00Z","timestamp":1764547200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"},{"start":{"date-parts":[[2025,12,1]],"date-time":"2025-12-01T00:00:00Z","timestamp":1764547200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-012"},{"start":{"date-parts":[[2025,12,1]],"date-time":"2025-12-01T00:00:00Z","timestamp":1764547200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,12,1]],"date-time":"2025-12-01T00:00:00Z","timestamp":1764547200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-004"}],"funder":[{"DOI":"10.13039\/501100003482","name":"Hebei Province Department of Education","doi-asserted-by":"publisher","award":["QN2025014"],"award-info":[{"award-number":["QN2025014"]}],"id":[{"id":"10.13039\/501100003482","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Journal of Systems Architecture"],"published-print":{"date-parts":[[2025,12]]},"DOI":"10.1016\/j.sysarc.2025.103600","type":"journal-article","created":{"date-parts":[[2025,10,15]],"date-time":"2025-10-15T16:03:35Z","timestamp":1760544215000},"page":"103600","update-policy":"https:\/\/doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":1,"special_numbering":"C","title":["Edge-assisted lightweight message authentication for Industrial Internet of Things"],"prefix":"10.1016","volume":"169","author":[{"given":"Hongmei","family":"Ma","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0009-0005-7380-7993","authenticated-orcid":false,"given":"Yifan","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Wenlei","family":"Chai","sequence":"additional","affiliation":[]},{"given":"Yi","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Fan","family":"Feng","sequence":"additional","affiliation":[]},{"given":"Zhenpeng","family":"Liu","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/j.sysarc.2025.103600_b1","series-title":"2019 IEEE VTS Asia Pacific Wireless Commun. Symp.","first-page":"1","article-title":"A survey on IIoT security","author":"Yu","year":"2019"},{"issue":"5","key":"10.1016\/j.sysarc.2025.103600_b2","doi-asserted-by":"crossref","first-page":"2985","DOI":"10.1109\/TII.2020.3023507","article-title":"Challenges and opportunities in securing the industrial internet of things","volume":"17","author":"Serror","year":"2021","journal-title":"IEEE Trans. Ind. Informat."},{"key":"10.1016\/j.sysarc.2025.103600_b3","article-title":"The industrial internet of things as one of the main drivers of industry 4.0","volume":"vol. 862","author":"Magomadov","year":"2020"},{"key":"10.1016\/j.sysarc.2025.103600_b4","first-page":"3","article-title":"Industrial networks and IIoT: Now and future trends","author":"Sari","year":"2020","journal-title":"Ind. IoT: Challenges, Des. Princ. Appl. Secur."},{"key":"10.1016\/j.sysarc.2025.103600_b5","doi-asserted-by":"crossref","DOI":"10.1016\/j.jnca.2024.103884","article-title":"Exploring the integration of edge computing and blockchain IoT: Principles, architectures, security, and applications","volume":"226","author":"Nguyen","year":"2024","journal-title":"J. Netw. Comput. Appl."},{"issue":"8","key":"10.1016\/j.sysarc.2025.103600_b6","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3555308","article-title":"Edge-computing-driven internet of things: A survey","volume":"55","author":"Kong","year":"2022","journal-title":"ACM Comput. Surv."},{"issue":"5","key":"10.1016\/j.sysarc.2025.103600_b7","doi-asserted-by":"crossref","first-page":"68","DOI":"10.1109\/MNET.001.1800510","article-title":"AI-enhanced offloading in edge computing: When machine learning meets industrial IoT","volume":"33","author":"Sun","year":"2019","journal-title":"IEEE Netw."},{"issue":"4","key":"10.1016\/j.sysarc.2025.103600_b8","doi-asserted-by":"crossref","first-page":"2462","DOI":"10.1109\/COMST.2020.3009103","article-title":"Edge computing in industrial internet of things: Architecture, advances and challenges","volume":"22","author":"Qiu","year":"2020","journal-title":"IEEE Commun. Surv. Tutor."},{"issue":"1","key":"10.1016\/j.sysarc.2025.103600_b9","doi-asserted-by":"crossref","first-page":"357","DOI":"10.1109\/TNSM.2022.3206378","article-title":"Efficient batch authentication scheme based on edge computing in IIoT","volume":"20","author":"Cui","year":"2022","journal-title":"IEEE Trans. Netw. Serv. Manag."},{"issue":"1","key":"10.1016\/j.sysarc.2025.103600_b10","doi-asserted-by":"crossref","first-page":"310","DOI":"10.1109\/JSYST.2018.2890126","article-title":"Efficient and provably secure certificateless parallel key-insulated signature without pairing for IIoT environments","volume":"14","author":"Xiong","year":"2020","journal-title":"IEEE Syst. J."},{"issue":"13","key":"10.1016\/j.sysarc.2025.103600_b11","doi-asserted-by":"crossref","first-page":"23561","DOI":"10.1109\/JIOT.2024.3385095","article-title":"An identity-based authentication scheme with full anonymity and unlinkability for mobile edge computing","volume":"11","author":"Tian","year":"2024","journal-title":"IEEE Internet Things J."},{"issue":"3","key":"10.1016\/j.sysarc.2025.103600_b12","first-page":"1019","article-title":"FS-PEKS: Lattice-based forward secure public-key encryption with keyword search for cloud-assisted industrial internet of things","volume":"18","author":"Zhang","year":"2021","journal-title":"IEEE Trans. Dependable Secur. Comput."},{"key":"10.1016\/j.sysarc.2025.103600_b13","doi-asserted-by":"crossref","first-page":"233","DOI":"10.1109\/TIFS.2022.3218432","article-title":"Efficient anonymous authentication based on physically unclonable function in industrial internet of things","volume":"18","author":"Zhang","year":"2023","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"10.1016\/j.sysarc.2025.103600_b14","doi-asserted-by":"crossref","first-page":"3789","DOI":"10.1109\/TIFS.2022.3214733","article-title":"CCAP: A complete cross-domain authentication based on blockchain for internet of things","volume":"17","author":"Tong","year":"2022","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"4","key":"10.1016\/j.sysarc.2025.103600_b15","doi-asserted-by":"crossref","first-page":"1587","DOI":"10.1109\/TDSC.2023.3285800","article-title":"Blockchain-based lightweight message authentication for edge-assisted cross-domain industrial internet of things","volume":"21","author":"Wang","year":"2023","journal-title":"IEEE Trans. Dependable Secur. Comput."},{"key":"10.1016\/j.sysarc.2025.103600_b16","doi-asserted-by":"crossref","DOI":"10.1016\/j.iot.2023.100902","article-title":"CMAF-IIoT: chaotic map-based authentication framework for industrial internet of things","volume":"23","author":"Tanveer","year":"2023","journal-title":"Internet Things"},{"key":"10.1016\/j.sysarc.2025.103600_b17","doi-asserted-by":"crossref","DOI":"10.1016\/j.adhoc.2023.103137","article-title":"Conditional privacy-preserving message authentication scheme for cross-domain industrial internet of things","volume":"144","author":"Zhong","year":"2023","journal-title":"Ad Hoc Netw."},{"issue":"8","key":"10.1016\/j.sysarc.2025.103600_b18","doi-asserted-by":"crossref","first-page":"3669","DOI":"10.1109\/TII.2018.2791956","article-title":"Integrity for an event notification within the industrial internet of things by using group signatures","volume":"14","author":"Esposito","year":"2018","journal-title":"IEEE Trans. Ind. Informatics"},{"issue":"12","key":"10.1016\/j.sysarc.2025.103600_b19","doi-asserted-by":"crossref","first-page":"12921","DOI":"10.1109\/TIE.2020.3039227","article-title":"Anonymous message authentication scheme for semitrusted edge-enabled IIoT","volume":"68","author":"Cui","year":"2021","journal-title":"IEEE Trans. Ind. Electron."},{"key":"10.1016\/j.sysarc.2025.103600_b20","doi-asserted-by":"crossref","DOI":"10.1016\/j.sysarc.2023.102898","article-title":"Enabling blockchain-assisted certificateless public integrity checking for industrial cloud storage systems","volume":"140","author":"Liu","year":"2023","journal-title":"J. Syst. Archit."},{"key":"10.1016\/j.sysarc.2025.103600_b21","article-title":"BP-AKAA: Blockchain-enforced privacy-preserving authentication and key agreement and access control for IIoT","volume":"73","author":"Liu","year":"2023","journal-title":"J. Inf. Secur. Appl."},{"key":"10.1016\/j.sysarc.2025.103600_b22","doi-asserted-by":"crossref","DOI":"10.1016\/j.sysarc.2023.103033","article-title":"Flexible and secure access control for EHR sharing based on blockchain","volume":"146","author":"Li","year":"2024","journal-title":"J. Syst. Archit."},{"issue":"9","key":"10.1016\/j.sysarc.2025.103600_b23","doi-asserted-by":"crossref","first-page":"9080","DOI":"10.1109\/TMC.2025.3561084","article-title":"A lightweight and robust access control protocol for IoT-based e-healthcare network","volume":"24","author":"Ghaffar","year":"2025","journal-title":"IEEE Trans. Mob. Comput."},{"issue":"6","key":"10.1016\/j.sysarc.2025.103600_b24","doi-asserted-by":"crossref","first-page":"5290","DOI":"10.1109\/TSG.2021.3102156","article-title":"Signcryption based authenticated and key exchange protocol for EI-based V2G environment","volume":"12","author":"Ahmed","year":"2021","journal-title":"IEEE Trans. Smart Grid"},{"issue":"5","key":"10.1016\/j.sysarc.2025.103600_b25","doi-asserted-by":"crossref","first-page":"5185","DOI":"10.1109\/JIOT.2024.3486044","article-title":"A cost-effective key agreement encryption protocol for securing IIoT-enabled WSN communication","volume":"12","author":"Mahmood","year":"2025","journal-title":"IEEE Internet Things J."},{"issue":"1","key":"10.1016\/j.sysarc.2025.103600_b26","doi-asserted-by":"crossref","first-page":"103","DOI":"10.1109\/TNSE.2022.3205443","article-title":"A lightweight and efficient remote data authentication protocol over cloud storage environment","volume":"10","author":"Ghaffar","year":"2023","journal-title":"IEEE Trans. Netw. Sci. Eng."},{"key":"10.1016\/j.sysarc.2025.103600_b27","doi-asserted-by":"crossref","DOI":"10.1016\/j.compeleceng.2023.108721","article-title":"Secure authentication protocol for home area network in smart grid-based smart cities","volume":"108","author":"Badar","year":"2023","journal-title":"Comput. Electr. Eng."},{"key":"10.1016\/j.sysarc.2025.103600_b28","doi-asserted-by":"crossref","first-page":"142","DOI":"10.1016\/j.ins.2020.01.006","article-title":"An efficient and provable certificate-based proxy signature scheme for IIoT environment","volume":"518","author":"Verma","year":"2020","journal-title":"Inf. Sci."},{"issue":"3","key":"10.1016\/j.sysarc.2025.103600_b29","doi-asserted-by":"crossref","first-page":"3808","DOI":"10.1109\/JSYST.2020.3015424","article-title":"A secure and lightweight protocol for message authentication in wireless sensor networks","volume":"15","author":"Kar","year":"2021","journal-title":"IEEE Syst. J."},{"issue":"1","key":"10.1016\/j.sysarc.2025.103600_b30","doi-asserted-by":"crossref","first-page":"880","DOI":"10.1109\/TII.2022.3174718","article-title":"TRUTH: Trust and authentication scheme in 5G-IIoT","volume":"19","author":"Soleymani","year":"2023","journal-title":"IEEE Trans. Ind. Inf."},{"key":"10.1016\/j.sysarc.2025.103600_b31","doi-asserted-by":"crossref","DOI":"10.1016\/j.sysarc.2024.103245","article-title":"A privacy-preserving three-factor authentication system for IoT-enabled wireless sensor networks","volume":"154","author":"Thakur","year":"2024","journal-title":"J. Syst. Archit."},{"key":"10.1016\/j.sysarc.2025.103600_b32","doi-asserted-by":"crossref","DOI":"10.1016\/j.sysarc.2023.102860","article-title":"Lightweight certificateless privacy-preserving integrity verification with conditional anonymity for cloud-assisted medical cyber\u2013physical systems","volume":"138","author":"Zhao","year":"2023","journal-title":"J. Syst. Archit."},{"key":"10.1016\/j.sysarc.2025.103600_b33","doi-asserted-by":"crossref","first-page":"12","DOI":"10.1016\/j.comcom.2022.01.005","article-title":"A seamless anonymous authentication protocol for mobile edge computing infrastructure","volume":"186","author":"Mahmood","year":"2022","journal-title":"Comput. Commun."},{"issue":"14","key":"10.1016\/j.sysarc.2025.103600_b34","doi-asserted-by":"crossref","first-page":"26933","DOI":"10.1109\/JIOT.2025.3561892","article-title":"Provably secure authenticated key-management mechanism for e-healthcare environment","volume":"12","author":"Saleem","year":"2025","journal-title":"IEEE Internet Things J."},{"key":"10.1016\/j.sysarc.2025.103600_b35","doi-asserted-by":"crossref","first-page":"52","DOI":"10.1016\/j.aej.2024.05.036","article-title":"A secure and efficient authentication key agreement scheme for industrial internet of things based on edge computing","volume":"101","author":"Zhu","year":"2024","journal-title":"AlexandRia Eng. J."},{"issue":"8","key":"10.1016\/j.sysarc.2025.103600_b36","doi-asserted-by":"crossref","first-page":"8556","DOI":"10.1109\/TITS.2024.3402432","article-title":"A lightweight group authentication protocol for blockchain-based vehicular edge computing networks","volume":"25","author":"Meng","year":"2024","journal-title":"IEEE Trans. Intell. Transp. Syst."},{"key":"10.1016\/j.sysarc.2025.103600_b37","article-title":"An identity authentication and key agreement protocol for the internet of vehicles based on trusted cloud\u2013edge-terminal architecture","volume":"49","author":"Tian","year":"2024","journal-title":"Veh. Commun."},{"issue":"10","key":"10.1016\/j.sysarc.2025.103600_b38","doi-asserted-by":"crossref","first-page":"8387","DOI":"10.1109\/JIOT.2020.3045451","article-title":"Permissioned blockchain-based anonymous and traceable aggregate signature scheme for industrial internet of things","volume":"8","author":"Li","year":"2021","journal-title":"IEEE Internet Things J."},{"key":"10.1016\/j.sysarc.2025.103600_b39","article-title":"A high-security batch message authentication protocol assisted by edge servers in industrial internet of things","volume":"92","author":"Yu","year":"2025","journal-title":"J. Inf. Secur. Appl."},{"key":"10.1016\/j.sysarc.2025.103600_b40","doi-asserted-by":"crossref","first-page":"4640","DOI":"10.1109\/TIFS.2023.3297327","article-title":"Designated-verifier aggregate signature scheme with sensitive data privacy protection for permissioned blockchain-assisted IIoT","volume":"18","author":"Li","year":"2023","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"10.1016\/j.sysarc.2025.103600_b41","doi-asserted-by":"crossref","DOI":"10.1016\/j.sysarc.2025.103368","article-title":"Lightweight batch authentication and key agreement scheme for IIoT gateways","volume":"160","author":"Ding","year":"2025","journal-title":"J. Syst. Archit."},{"issue":"7","key":"10.1016\/j.sysarc.2025.103600_b42","doi-asserted-by":"crossref","DOI":"10.1371\/journal.pone.0268484","article-title":"An improved pairing-free certificateless aggregate signature scheme for healthcare wireless medical sensor networks","volume":"17","author":"Zhou","year":"2022","journal-title":"PLoS One"},{"issue":"6","key":"10.1016\/j.sysarc.2025.103600_b43","doi-asserted-by":"crossref","first-page":"10865","DOI":"10.1109\/JIOT.2023.3327505","article-title":"A security-enhanced certificateless designated verifier aggregate signature scheme for HWMSNs in the YOSO model","volume":"11","author":"Li","year":"2024","journal-title":"IEEE Internet Things J."},{"issue":"20","key":"10.1016\/j.sysarc.2025.103600_b44","doi-asserted-by":"crossref","first-page":"33788","DOI":"10.1109\/JIOT.2024.3432757","article-title":"An efficient aggregate signature scheme with designated verifier based on the schnorr signature in healthcare wireless sensor networks","volume":"11","author":"Yang","year":"2024","journal-title":"IEEE Internet Things J."},{"issue":"1","key":"10.1016\/j.sysarc.2025.103600_b45","doi-asserted-by":"crossref","first-page":"275","DOI":"10.1109\/TITS.2023.3310514","article-title":"Design of blockchain and ECC-based robust and efficient batch authentication protocol for vehicular Ad-Hoc networks","volume":"25","author":"Dwivedi","year":"2023","journal-title":"IEEE Trans. Intell. Transp. Syst."},{"key":"10.1016\/j.sysarc.2025.103600_b46","article-title":"A secure and efficient certificateless batch verification scheme with invalid signature identification for the internet of things","volume":"53","author":"Xiong","year":"2020","journal-title":"J. Inf. Secur. Appl."},{"issue":"1","key":"10.1016\/j.sysarc.2025.103600_b47","doi-asserted-by":"crossref","first-page":"1253","DOI":"10.1109\/TVT.2023.3305556","article-title":"Edge-assisted hierarchical batch authentication scheme for VANETs","volume":"73","author":"Yan","year":"2024","journal-title":"IEEE Trans. Veh. Technol."},{"issue":"9","key":"10.1016\/j.sysarc.2025.103600_b48","doi-asserted-by":"crossref","first-page":"9670","DOI":"10.1109\/TITS.2023.3271355","article-title":"Efficient anonymous batch authentication scheme with conditional privacy in the internet of vehicles (IoV) applications","volume":"24","author":"Maurya","year":"2023","journal-title":"IEEE Trans. Intell. Transp. Syst."},{"key":"10.1016\/j.sysarc.2025.103600_b49","doi-asserted-by":"crossref","DOI":"10.1016\/j.sysarc.2023.103030","article-title":"An efficient and secure certificateless aggregate signature scheme","volume":"147","author":"Xu","year":"2024","journal-title":"J. Syst. Archit."},{"key":"10.1016\/j.sysarc.2025.103600_b50","first-page":"452","article-title":"Certificateless public key cryptography","author":"Al-Riyami","year":"2003","journal-title":"Int. Conf. Theory Appl. Cryptol. Inf. Secur."},{"issue":"12","key":"10.1016\/j.sysarc.2025.103600_b51","doi-asserted-by":"crossref","first-page":"10108","DOI":"10.1109\/JIOT.2021.3119517","article-title":"A redesigned identity-based anonymous authentication scheme for mobile-edge computing","volume":"9","author":"Jia","year":"2021","journal-title":"IEEE Internet Things J."},{"issue":"1","key":"10.1016\/j.sysarc.2025.103600_b52","article-title":"Efficient certificateless aggregate signature scheme for performing secure routing in VANETs","volume":"2020","author":"Xu","year":"2020","journal-title":"Sec. Commun. Netw."},{"issue":"6","key":"10.1016\/j.sysarc.2025.103600_b53","doi-asserted-by":"crossref","first-page":"5256","DOI":"10.1109\/JIOT.2020.2979613","article-title":"Improved security of a pairing-free certificateless aggregate signature in healthcare wireless medical sensor networks","volume":"7","author":"Liu","year":"2020","journal-title":"IEEE Internet Things J."},{"issue":"4","key":"10.1016\/j.sysarc.2025.103600_b54","doi-asserted-by":"crossref","first-page":"5152","DOI":"10.1109\/TVT.2022.3225204","article-title":"DPB-MA: Low-latency message authentication scheme based on distributed verification and priority in vehicular Ad Hoc network","volume":"72","author":"Xu","year":"2023","journal-title":"IEEE Trans. Veh. Technol."},{"key":"10.1016\/j.sysarc.2025.103600_b55","series-title":"Operational Semantics and Verification of Security Protocols","author":"Cremers","year":"2012"},{"issue":"8","key":"10.1016\/j.sysarc.2025.103600_b56","doi-asserted-by":"crossref","DOI":"10.1002\/dac.5467","article-title":"DR-NAP: Data reduction strategy using neural adaptation phenomenon in wireless sensor networks","volume":"36","author":"Kavitha","year":"2023","journal-title":"Int. J. Commun. Syst."}],"container-title":["Journal of Systems Architecture"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1383762125002723?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1383762125002723?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2025,12,2]],"date-time":"2025-12-02T15:37:37Z","timestamp":1764689857000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S1383762125002723"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,12]]},"references-count":56,"alternative-id":["S1383762125002723"],"URL":"https:\/\/doi.org\/10.1016\/j.sysarc.2025.103600","relation":{},"ISSN":["1383-7621"],"issn-type":[{"value":"1383-7621","type":"print"}],"subject":[],"published":{"date-parts":[[2025,12]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"Edge-assisted lightweight message authentication for Industrial Internet of Things","name":"articletitle","label":"Article Title"},{"value":"Journal of Systems Architecture","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.sysarc.2025.103600","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2025 Elsevier B.V. All rights are reserved, including those for text and data mining, AI training, and similar technologies.","name":"copyright","label":"Copyright"}],"article-number":"103600"}}