With the rapid advancement in exploring perceptual interactions and digital twins,metaverse technology has emerged to transcend the constraints of space-time and reality,facilitating remote AI-based collaboration.In t...With the rapid advancement in exploring perceptual interactions and digital twins,metaverse technology has emerged to transcend the constraints of space-time and reality,facilitating remote AI-based collaboration.In this dynamic metasystem environment,frequent information exchanges necessitate robust security measures,with Authentication and Key Agreement(AKA)serving as the primary line of defense to ensure communication security.However,traditional AKA protocols fall short in meeting the low-latency requirements essential for synchronous interactions within the metaverse.To address this challenge and enable nearly latency-free interactions,a novel low-latency AKA protocol based on chaotic maps is proposed.This protocol not only ensures mutual authentication of entities within the metasystem but also generates secure session keys.The security of these session keys is rigorously validated through formal proofs,formal verification,and informal proofs.When confronted with the Dolev-Yao(DY)threat model,the session keys are formally demonstrated to be secure under the Real-or-Random(ROR)model.The proposed protocol is further validated through simulations conducted using VMware workstation compiled in HLPSL language and C language.The simulation results affirm the protocol’s effectiveness in resisting well-known attacks while achieving the desired low latency for optimal metaverse interactions.展开更多
Background: When continuous scale measurements are available, agreements between two measuring devices are assessed both graphically and analytically. In clinical investigations, Bland and Altman proposed plotting sub...Background: When continuous scale measurements are available, agreements between two measuring devices are assessed both graphically and analytically. In clinical investigations, Bland and Altman proposed plotting subject-wise differences between raters against subject-wise averages. In order to scientifically assess agreement, Bartko recommended combining the graphical approach with the statistical analytic procedure suggested by Bradley and Blackwood. The advantage of using this approach is that it enables significance testing and sample size estimation. We noted that the direct use of the results of the regression is misleading and we provide a correction in this regard. Methods: Graphical and linear models are used to assess agreements for continuous scale measurements. We demonstrate that software linear regression results should not be readily used and we provided correct analytic procedures. The degrees of freedom of the F-statistics are incorrectly reported, and we propose methods to overcome this problem by introducing the correct analytic form of the F statistic. Methods for sample size estimation using R-functions are also given. Results: We believe that the tutorial and the R-codes are useful tools for testing and estimating agreement between two rating protocols for continuous scale measurements. The interested reader may use the codes and apply them to their available data when the issue of agreement between two raters is the subject of interest.展开更多
This article aims at giving a contribution to the issue of accounting electrical energy sale and purchase agreements in accordance with the faithful representation principle. To this end, it must be ascertained whethe...This article aims at giving a contribution to the issue of accounting electrical energy sale and purchase agreements in accordance with the faithful representation principle. To this end, it must be ascertained whether electrical energy is bought/sold for an industrial use exclusively, so that the relevant transaction will be accounted as a normal purchase/sale, or through the lease of the relevant production plant, which would require the supply contract to be accounted in compliance with International Accounting Standards (IAS) 17 "Leasing". Alternatively, it must also be ascertained whether the relevant party is implementing financial trading strategies, as in such hypothesis, the supply contract is to be accounted as a financial instrument according to International Financial Reporting Standards (IFRS) 9/IAS 39 "Financial Instruments". Finally, the modalities used by a number of companies listed on European regulated markets to account such kind of contracts will be analyzed.展开更多
Properly created and securely communicated,non-disclosure agreement(NDA)can resolve most of the common disputes related to outsourcing of offshore software maintenance(OSMO).Occasionally,these NDAs are in the form of ...Properly created and securely communicated,non-disclosure agreement(NDA)can resolve most of the common disputes related to outsourcing of offshore software maintenance(OSMO).Occasionally,these NDAs are in the form of images.Since the work is done offshore,these agreements or images must be shared through the Internet or stored over the cloud.The breach of privacy,on the other hand,is a potential threat for the image owners as both the Internet and cloud servers are not void of danger.This article proposes a novel algorithm for securing the NDAs in the form of images.As an agreement is signed between the two parties,it will be encrypted before sending to the cloud server or travelling through the public network,the Internet.As the image is input to the algorithm,its pixels would be scrambled through the set of randomly generated rectangles for an arbitrary amount of time.The confusion effects have been realized through an XOR operation between the confused image,and chaotic data.Besides,5D multi-wing hyperchaotic system has been employed to spawn the chaotic vectors due to good properties of chaoticity it has.The machine experimentation and the security analysis through a comprehensive set of validation metric vividly demonstrate the robustness,defiance to the multifarious threats and the prospects for some real-world application of the proposed encryption algorithm for the NDA images.展开更多
Why did the European Union (EU) conclude an Association Agreement (A.A), rather than a free-trade agreement with Central American (CA) countries in 2010? A CA-EU AA content analysis within the broader EU policy...Why did the European Union (EU) conclude an Association Agreement (A.A), rather than a free-trade agreement with Central American (CA) countries in 2010? A CA-EU AA content analysis within the broader EU policy approach towards Latin America suggests it to be (1) the only feasible option for each side at a time of increasing commercial flux; (2) mutually attractive against globalizing threats, thus converting an institutional innovation into a double-edged instrument; and (3) illustrative of the subtle but significant shift of farm-protection demands from endogenous dynamics to exogenous. They carry important implications: (1) empirically: weak CA-EU linkages further dilute West Europe's broader Latin ambitions; (2) theoretically: AA analyses better reflect trading realities than pure regional economic integration theories, suggesting the corrosive impact of globalizing forces on regional pursuits; and (3) historically: the continued role of the farm jinx in trade.展开更多
This study reassesses the macroeconomic and social impacts of Economic Partnership Agreements (EPAs) on Ivorian economy using Computable General Equilibrium (CGE) model with positive externalities of public invest...This study reassesses the macroeconomic and social impacts of Economic Partnership Agreements (EPAs) on Ivorian economy using Computable General Equilibrium (CGE) model with positive externalities of public investment in education, health, and economic infrastructure. Previous studies highlight negative effect of these agreements stressing particularly on losses in government revenues due to the removal of all tariffs on imports. This analysis aims to provide some insight into this question by refreshing the debate to show how this situation could be transformed into opportunities for Ivory Coast in order to promote growth and reduce poverty. To do so, this study postulates that government spending (investment) in economic infrastructure (roads, bridges, communication network, etc.), in education and health sectors produces positive externalities in each industry. This assumption has not been set anymore in previous studies. Simulation results reveal that, despite this decline in government revenues, if it invests in economic infrastructure, health and education sector, EPAs will generate more revenue for government due to the rise in income tax on firms and households, and tax on overall production. Furthermore, household income will increase which will in turn stimulate (final) consumption. There won't also be a decline in economic growth.展开更多
Mostly, cloud agreements are signed between the consumer and the provider using online click-through agreements. Several issues and conflicts exist in the negotiation of cloud agreement terms due to the legal and ambi...Mostly, cloud agreements are signed between the consumer and the provider using online click-through agreements. Several issues and conflicts exist in the negotiation of cloud agreement terms due to the legal and ambiguous terms in Service Level Agreements (SLA). Semantic knowledge applied during the formation and negotiation of SLA can overcome these issues. Cloud SLA negotiation consists of numerous activities such as formation of SLA templates, publishing it in registry, verification and validation of SLA, monitoring for violation, logging and reporting and termination. Though these activities are interleaved with each other, semantic synchronization is still lacking. To overcome this, a novel SLA life cycle using semantic knowledge to automate the cloud negotiation has been formulated. Semantic web platform using ontologies is designed, developed and evaluated. The resultant platform increases the task efficiency of the consumer and the provider during negotiation. Precision and recall scores for Software as a Service (SaaS), Platform as a Service (PaaS) and Infrastructure as a Service (IaaS) SLAs were calculated. And it reveals that applying semantic knowledge helps the extraction of meaningful answers from the cloud actors.展开更多
China and Philippines signed agreements on the construction of two power plants in the Philippines on Nov. 27, 1996. China Shanghai Electric Corp signed an export credit supply contract with Philippines Magellan Utili...China and Philippines signed agreements on the construction of two power plants in the Philippines on Nov. 27, 1996. China Shanghai Electric Corp signed an export credit supply contract with Philippines Magellan Utilities Development Corp for the huilding of a 300 MW展开更多
At present,the biggest obstacle that growing enterprises may encounter in their development process is insufficient funds.Private equity financing does not only solve the capital problem of enterprises,but also provid...At present,the biggest obstacle that growing enterprises may encounter in their development process is insufficient funds.Private equity financing does not only solve the capital problem of enterprises,but also provide enterprises with professional management concepts and even help growing enterprises to go public in advance.However,high returns must be accompanied by high risks.For example,private equity financing has information asymmetry risks,principal-agent risks,etc.,and these risks make it impossible to maximize the advantages of private equity financing.Therefore,in order to reduce the risks brought by financing,investment and financing parties should choose to sign gambling contracts to reduce the risk.In recent years,the use of VAM agreements has become more in China.However,according to incomplete statistics,less than 30%of VAM agreements are successful,and this result is mainly due to the insufficient depth and breadth of research on VAM agreements.Therefore,this article will comprehensively analyze the problems that need to be paid attention to when signing a gambling agreement by introducing the case of Anda Technology,and the issue of targeted risk prevention will also be discussed in this paper.展开更多
Successful and cost-effective construction relies upon appropriate communication of the participants of the construction project. Hence, it is important to define the rights and responsibilities of the parties, and re...Successful and cost-effective construction relies upon appropriate communication of the participants of the construction project. Hence, it is important to define the rights and responsibilities of the parties, and relationships among them. In this context, well-designed and complete agreement is essential and necessary for the successfully completion of a construction project within the desired time, quality and budget. In this paper, it is aimed to analyze and compare the owner-contractor agreements in the Turkish and the US construction industry. First, the importance of construction contracts and contractual elements of an agreement is determined, and then, the standard owner-contractor agreement which is used in the Turkish construction industry is analyzed and compared with the US standard owner-contractor agreement. Finally, the differences between these agreements are put forward, the lack and deficiencies of Turkish standard agreement form are determined, and appropriate suggestions are improved.展开更多
ZTE Corporation has signed strategic telecommunications software agreement with two leading providers in Europe and Latin America to optimize its offerings for target customers in
In order to make the quantum key agreement process immune to participant attacks, it is necessary to introduce the authentication in the communication process. A quantum key agreement protocol with identity authentica...In order to make the quantum key agreement process immune to participant attacks, it is necessary to introduce the authentication in the communication process. A quantum key agreement protocol with identity authentication that exploits the measurement correlation of six-particle entangled states is proposed. In contrast to some recently proposed quantum key agreement protocols with authentication, this protocol requires neither a semi-trusted third party nor additional private keys in the authentication process. The entire process of authentication and key agreement can be achieved using only n six-particle entangled states, which saves communication costs and reduces the complexity of the authentication process.Finally, security analysis shows that this scheme is resistant to some important attacks.展开更多
Internet of Medical Things(IoMT)plays an essential role in collecting and managing personal medical data.In recent years,blockchain technology has put power in traditional IoMT systems for data sharing between differe...Internet of Medical Things(IoMT)plays an essential role in collecting and managing personal medical data.In recent years,blockchain technology has put power in traditional IoMT systems for data sharing between different medical institutions and improved the utilization of medical data.However,some problems in the information transfer process between wireless medical devices and mobile medical apps,such as information leakage and privacy disclosure.This paper first designs a cross-device key agreement model for blockchain-enabled IoMT.This model can establish a key agreement mechanism for secure medical data sharing.Meanwhile,a certificateless authenticated key agreement(KA)protocol has been proposed to strengthen the information transfer security in the cross-device key agreement model.The proposed KA protocol only requires one exchange of messages between the two parties,which can improve the protocol execution efficiency.Then,any unauthorized tampering of the transmitted signed message sent by the sender can be detected by the receiver,so this can guarantee the success of the establishment of a session key between the strange entities.The blockchain ledger can ensure that the medical data cannot be tampered with,and the certificateless mechanism can weaken the key escrow problem.Moreover,the security proof and performance analysis are given,which show that the proposed model and KA protocol are more secure and efficient than other schemes in similar literature.展开更多
With the exponential growth of intelligent Internet of Things(IoT)applications,Cloud-Edge(CE)paradigm is emerging as a solution that facilitates resource-efficient and timely services.However,it remains an underlying ...With the exponential growth of intelligent Internet of Things(IoT)applications,Cloud-Edge(CE)paradigm is emerging as a solution that facilitates resource-efficient and timely services.However,it remains an underlying issue that frequent end-edgecloud communication is over a public or adversarycontrolled channel.Additionally,with the presence of resource-constrained devices,it’s imperative to conduct the secure communication mechanism,while still guaranteeing efficiency.Physical unclonable functions(PUF)emerge as promising lightweight security primitives.Thus,we first construct a PUF-based security mechanism for vulnerable IoT devices.Further,a provably secure and PUF-based authentication key agreement scheme is proposed for establishing the secure channel in end-edge-cloud empowered IoT,without requiring pre-loaded master keys.The security of our scheme is rigorously proven through formal security analysis under the random oracle model,and security verification using AVISPA tool.The comprehensive security features are also elaborated.Moreover,the numerical results demonstrate that the proposed scheme outperforms existing related schemes in terms of computational and communication efficiency.展开更多
基金This work has received funding from National Natural Science Foundation of China(No.42275157).
文摘With the rapid advancement in exploring perceptual interactions and digital twins,metaverse technology has emerged to transcend the constraints of space-time and reality,facilitating remote AI-based collaboration.In this dynamic metasystem environment,frequent information exchanges necessitate robust security measures,with Authentication and Key Agreement(AKA)serving as the primary line of defense to ensure communication security.However,traditional AKA protocols fall short in meeting the low-latency requirements essential for synchronous interactions within the metaverse.To address this challenge and enable nearly latency-free interactions,a novel low-latency AKA protocol based on chaotic maps is proposed.This protocol not only ensures mutual authentication of entities within the metasystem but also generates secure session keys.The security of these session keys is rigorously validated through formal proofs,formal verification,and informal proofs.When confronted with the Dolev-Yao(DY)threat model,the session keys are formally demonstrated to be secure under the Real-or-Random(ROR)model.The proposed protocol is further validated through simulations conducted using VMware workstation compiled in HLPSL language and C language.The simulation results affirm the protocol’s effectiveness in resisting well-known attacks while achieving the desired low latency for optimal metaverse interactions.
文摘Background: When continuous scale measurements are available, agreements between two measuring devices are assessed both graphically and analytically. In clinical investigations, Bland and Altman proposed plotting subject-wise differences between raters against subject-wise averages. In order to scientifically assess agreement, Bartko recommended combining the graphical approach with the statistical analytic procedure suggested by Bradley and Blackwood. The advantage of using this approach is that it enables significance testing and sample size estimation. We noted that the direct use of the results of the regression is misleading and we provide a correction in this regard. Methods: Graphical and linear models are used to assess agreements for continuous scale measurements. We demonstrate that software linear regression results should not be readily used and we provided correct analytic procedures. The degrees of freedom of the F-statistics are incorrectly reported, and we propose methods to overcome this problem by introducing the correct analytic form of the F statistic. Methods for sample size estimation using R-functions are also given. Results: We believe that the tutorial and the R-codes are useful tools for testing and estimating agreement between two rating protocols for continuous scale measurements. The interested reader may use the codes and apply them to their available data when the issue of agreement between two raters is the subject of interest.
文摘This article aims at giving a contribution to the issue of accounting electrical energy sale and purchase agreements in accordance with the faithful representation principle. To this end, it must be ascertained whether electrical energy is bought/sold for an industrial use exclusively, so that the relevant transaction will be accounted as a normal purchase/sale, or through the lease of the relevant production plant, which would require the supply contract to be accounted in compliance with International Accounting Standards (IAS) 17 "Leasing". Alternatively, it must also be ascertained whether the relevant party is implementing financial trading strategies, as in such hypothesis, the supply contract is to be accounted as a financial instrument according to International Financial Reporting Standards (IFRS) 9/IAS 39 "Financial Instruments". Finally, the modalities used by a number of companies listed on European regulated markets to account such kind of contracts will be analyzed.
基金This research is fully funded by Universiti Teknologi Malaysia under the UTM Fundamental Research Grant(UTMFR)with Cost Center No Q.K130000.2556.21H14.
文摘Properly created and securely communicated,non-disclosure agreement(NDA)can resolve most of the common disputes related to outsourcing of offshore software maintenance(OSMO).Occasionally,these NDAs are in the form of images.Since the work is done offshore,these agreements or images must be shared through the Internet or stored over the cloud.The breach of privacy,on the other hand,is a potential threat for the image owners as both the Internet and cloud servers are not void of danger.This article proposes a novel algorithm for securing the NDAs in the form of images.As an agreement is signed between the two parties,it will be encrypted before sending to the cloud server or travelling through the public network,the Internet.As the image is input to the algorithm,its pixels would be scrambled through the set of randomly generated rectangles for an arbitrary amount of time.The confusion effects have been realized through an XOR operation between the confused image,and chaotic data.Besides,5D multi-wing hyperchaotic system has been employed to spawn the chaotic vectors due to good properties of chaoticity it has.The machine experimentation and the security analysis through a comprehensive set of validation metric vividly demonstrate the robustness,defiance to the multifarious threats and the prospects for some real-world application of the proposed encryption algorithm for the NDA images.
文摘Why did the European Union (EU) conclude an Association Agreement (A.A), rather than a free-trade agreement with Central American (CA) countries in 2010? A CA-EU AA content analysis within the broader EU policy approach towards Latin America suggests it to be (1) the only feasible option for each side at a time of increasing commercial flux; (2) mutually attractive against globalizing threats, thus converting an institutional innovation into a double-edged instrument; and (3) illustrative of the subtle but significant shift of farm-protection demands from endogenous dynamics to exogenous. They carry important implications: (1) empirically: weak CA-EU linkages further dilute West Europe's broader Latin ambitions; (2) theoretically: AA analyses better reflect trading realities than pure regional economic integration theories, suggesting the corrosive impact of globalizing forces on regional pursuits; and (3) historically: the continued role of the farm jinx in trade.
文摘This study reassesses the macroeconomic and social impacts of Economic Partnership Agreements (EPAs) on Ivorian economy using Computable General Equilibrium (CGE) model with positive externalities of public investment in education, health, and economic infrastructure. Previous studies highlight negative effect of these agreements stressing particularly on losses in government revenues due to the removal of all tariffs on imports. This analysis aims to provide some insight into this question by refreshing the debate to show how this situation could be transformed into opportunities for Ivory Coast in order to promote growth and reduce poverty. To do so, this study postulates that government spending (investment) in economic infrastructure (roads, bridges, communication network, etc.), in education and health sectors produces positive externalities in each industry. This assumption has not been set anymore in previous studies. Simulation results reveal that, despite this decline in government revenues, if it invests in economic infrastructure, health and education sector, EPAs will generate more revenue for government due to the rise in income tax on firms and households, and tax on overall production. Furthermore, household income will increase which will in turn stimulate (final) consumption. There won't also be a decline in economic growth.
文摘Mostly, cloud agreements are signed between the consumer and the provider using online click-through agreements. Several issues and conflicts exist in the negotiation of cloud agreement terms due to the legal and ambiguous terms in Service Level Agreements (SLA). Semantic knowledge applied during the formation and negotiation of SLA can overcome these issues. Cloud SLA negotiation consists of numerous activities such as formation of SLA templates, publishing it in registry, verification and validation of SLA, monitoring for violation, logging and reporting and termination. Though these activities are interleaved with each other, semantic synchronization is still lacking. To overcome this, a novel SLA life cycle using semantic knowledge to automate the cloud negotiation has been formulated. Semantic web platform using ontologies is designed, developed and evaluated. The resultant platform increases the task efficiency of the consumer and the provider during negotiation. Precision and recall scores for Software as a Service (SaaS), Platform as a Service (PaaS) and Infrastructure as a Service (IaaS) SLAs were calculated. And it reveals that applying semantic knowledge helps the extraction of meaningful answers from the cloud actors.
文摘China and Philippines signed agreements on the construction of two power plants in the Philippines on Nov. 27, 1996. China Shanghai Electric Corp signed an export credit supply contract with Philippines Magellan Utilities Development Corp for the huilding of a 300 MW
文摘At present,the biggest obstacle that growing enterprises may encounter in their development process is insufficient funds.Private equity financing does not only solve the capital problem of enterprises,but also provide enterprises with professional management concepts and even help growing enterprises to go public in advance.However,high returns must be accompanied by high risks.For example,private equity financing has information asymmetry risks,principal-agent risks,etc.,and these risks make it impossible to maximize the advantages of private equity financing.Therefore,in order to reduce the risks brought by financing,investment and financing parties should choose to sign gambling contracts to reduce the risk.In recent years,the use of VAM agreements has become more in China.However,according to incomplete statistics,less than 30%of VAM agreements are successful,and this result is mainly due to the insufficient depth and breadth of research on VAM agreements.Therefore,this article will comprehensively analyze the problems that need to be paid attention to when signing a gambling agreement by introducing the case of Anda Technology,and the issue of targeted risk prevention will also be discussed in this paper.
文摘Successful and cost-effective construction relies upon appropriate communication of the participants of the construction project. Hence, it is important to define the rights and responsibilities of the parties, and relationships among them. In this context, well-designed and complete agreement is essential and necessary for the successfully completion of a construction project within the desired time, quality and budget. In this paper, it is aimed to analyze and compare the owner-contractor agreements in the Turkish and the US construction industry. First, the importance of construction contracts and contractual elements of an agreement is determined, and then, the standard owner-contractor agreement which is used in the Turkish construction industry is analyzed and compared with the US standard owner-contractor agreement. Finally, the differences between these agreements are put forward, the lack and deficiencies of Turkish standard agreement form are determined, and appropriate suggestions are improved.
文摘ZTE Corporation has signed strategic telecommunications software agreement with two leading providers in Europe and Latin America to optimize its offerings for target customers in
基金the National Science Foundation of Sichuan Province, China (Grant No. 2022NSFSC0534)Major Science, and Techonolgy Application Demonstration Project in Chengdu (Grant No. 2021-YF09-0116-GX)。
文摘In order to make the quantum key agreement process immune to participant attacks, it is necessary to introduce the authentication in the communication process. A quantum key agreement protocol with identity authentication that exploits the measurement correlation of six-particle entangled states is proposed. In contrast to some recently proposed quantum key agreement protocols with authentication, this protocol requires neither a semi-trusted third party nor additional private keys in the authentication process. The entire process of authentication and key agreement can be achieved using only n six-particle entangled states, which saves communication costs and reduces the complexity of the authentication process.Finally, security analysis shows that this scheme is resistant to some important attacks.
基金supported by the National Natural Science Foundation of China under Grant 92046001,61962009,the JSPS KAKENHI Grant Numbers JP19K20250,JP20H04174,JP22K11989Leading Initiative for Excellent Young Researchers (LEADER),MEXT,Japan,and JST,PRESTO Grant Number JPMJPR21P3+1 种基金Japan.Mianxiong Dong is the corresponding author,the Doctor Scientific Research Fund of Zhengzhou University of Light Industry under Grant 2021BSJJ033Key Scientific Research Project of Colleges and Universities in Henan Province (CN)under Grant No.22A413010.
文摘Internet of Medical Things(IoMT)plays an essential role in collecting and managing personal medical data.In recent years,blockchain technology has put power in traditional IoMT systems for data sharing between different medical institutions and improved the utilization of medical data.However,some problems in the information transfer process between wireless medical devices and mobile medical apps,such as information leakage and privacy disclosure.This paper first designs a cross-device key agreement model for blockchain-enabled IoMT.This model can establish a key agreement mechanism for secure medical data sharing.Meanwhile,a certificateless authenticated key agreement(KA)protocol has been proposed to strengthen the information transfer security in the cross-device key agreement model.The proposed KA protocol only requires one exchange of messages between the two parties,which can improve the protocol execution efficiency.Then,any unauthorized tampering of the transmitted signed message sent by the sender can be detected by the receiver,so this can guarantee the success of the establishment of a session key between the strange entities.The blockchain ledger can ensure that the medical data cannot be tampered with,and the certificateless mechanism can weaken the key escrow problem.Moreover,the security proof and performance analysis are given,which show that the proposed model and KA protocol are more secure and efficient than other schemes in similar literature.
基金supported by the National Key Research and Development Program of China,“Joint Research of IoT Security System and Key Technologies Based on Quantum Key,”under project number 2020YFE0200600.
文摘With the exponential growth of intelligent Internet of Things(IoT)applications,Cloud-Edge(CE)paradigm is emerging as a solution that facilitates resource-efficient and timely services.However,it remains an underlying issue that frequent end-edgecloud communication is over a public or adversarycontrolled channel.Additionally,with the presence of resource-constrained devices,it’s imperative to conduct the secure communication mechanism,while still guaranteeing efficiency.Physical unclonable functions(PUF)emerge as promising lightweight security primitives.Thus,we first construct a PUF-based security mechanism for vulnerable IoT devices.Further,a provably secure and PUF-based authentication key agreement scheme is proposed for establishing the secure channel in end-edge-cloud empowered IoT,without requiring pre-loaded master keys.The security of our scheme is rigorously proven through formal security analysis under the random oracle model,and security verification using AVISPA tool.The comprehensive security features are also elaborated.Moreover,the numerical results demonstrate that the proposed scheme outperforms existing related schemes in terms of computational and communication efficiency.