{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,3]],"date-time":"2026-02-03T21:51:58Z","timestamp":1770155518955,"version":"3.49.0"},"publisher-location":"Singapore","reference-count":20,"publisher":"Springer Nature Singapore","isbn-type":[{"value":"9789819564187","type":"print"},{"value":"9789819564194","type":"electronic"}],"license":[{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2026]]},"DOI":"10.1007\/978-981-95-6419-4_8","type":"book-chapter","created":{"date-parts":[[2026,2,3]],"date-time":"2026-02-03T08:58:10Z","timestamp":1770109090000},"page":"133-145","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["A Lightweight Mutual Authentication and\u00a0Key Exchange Protocol for\u00a0Resource-Constrained IoMT Devices"],"prefix":"10.1007","author":[{"given":"Zexu","family":"Li","sequence":"first","affiliation":[]},{"given":"Kun","family":"Li","sequence":"additional","affiliation":[]},{"given":"Jiakai","family":"Dou","sequence":"additional","affiliation":[]},{"given":"Dazhong","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Shanshan","family":"Tu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2026,2,4]]},"reference":[{"key":"8_CR1","doi-asserted-by":"crossref","unstructured":"Aminian Modarres, A.M., Anzabi-Nezhad, N.S., Zare, M.: A new PUF-based protocol for mutual authentication and key agreement between three layers of entities in cloud-based IoMT networks. IEEE Access 12, 21807\u201321824 (2024)","DOI":"10.1109\/ACCESS.2024.3361921"},{"key":"8_CR2","doi-asserted-by":"crossref","unstructured":"Salem, O., Mehaoua, A.: A secure framework for remote healthcare monitoring using the internet of medical things. In: ICC 2022 - IEEE International Conference on Communications, pp. 1233\u20131238 (2022)","DOI":"10.1109\/ICC45855.2022.9839025"},{"issue":"16","key":"8_CR3","doi-asserted-by":"publisher","first-page":"15336","DOI":"10.1109\/JIOT.2022.3149117","volume":"9","author":"T-F Lee","year":"2022","unstructured":"Lee, T.-F., Ye, X., Lin, S.-H.: Anonymous dynamic group authenticated key agreements using physical unclonable functions for internet of medical things. IEEE Internet Things J. 9(16), 15336\u201315348 (2022)","journal-title":"IEEE Internet Things J."},{"key":"8_CR4","doi-asserted-by":"publisher","first-page":"93032","DOI":"10.1109\/ACCESS.2023.3310264","volume":"11","author":"S Thapliyal","year":"2023","unstructured":"Thapliyal, S., Wazid, M., Singh, D.P., Das, A.K., Shetty, S., Alqahtani, A.: Design of robust blockchain-envisioned authenticated key management mechanism for smart healthcare applications. IEEE Access 11, 93032\u201393047 (2023)","journal-title":"IEEE Access"},{"key":"8_CR5","first-page":"1130","volume":"2023","author":"D Singh","year":"2023","unstructured":"Singh, D., Wazid, M., Singh, D.P., Das, A.K., Rodrigues, J.J.P.C.: Embattle the security of e-health system through a secure authentication and key agreement protocol. Int. Wirel. Commun. Mob. Comput. (IWCMC) 2023, 1130\u20131135 (2023)","journal-title":"Int. Wirel. Commun. Mob. Comput. (IWCMC)"},{"key":"8_CR6","doi-asserted-by":"crossref","unstructured":"Rajasekhar, J., Nath, N. and Sowjanya, N.S.S.: E-medicine: health care monitoring system based on IoMT. In: 2023 International Conference on Innovative Data Communication Technologies and Application (ICIDCA), pp. 852\u2013857 (2023)","DOI":"10.1109\/ICIDCA56705.2023.10099997"},{"key":"8_CR7","doi-asserted-by":"crossref","unstructured":"Mitra, S., Sarker, Z., Patel, P., Mehra, P.S.: Multi-factor Assymetric key encryption (MAKE) for mutual authentication in IoMT. In: Third International Conference on Secure Cyber Computing and Communication (ICSCCC), vol. 2023, pp. 379\u2013384 (2023)","DOI":"10.1109\/ICSCCC58608.2023.10176485"},{"key":"8_CR8","doi-asserted-by":"crossref","unstructured":"Kaur, K., Yadav, A.: Physically unclonable function for authentication of IoMT systems using hybrid cryptography. In: International Conference on Futuristic Technologies (INCOFT), vol. 2022, pp. 1\u20136 (2022)","DOI":"10.1109\/INCOFT55651.2022.10094498"},{"key":"8_CR9","doi-asserted-by":"crossref","unstructured":"Gautam, D., Thakur, G., Obaidat, M.S., Hsiao, K.F., Kumar, P.: Security analysis and improvement of authenticated key agreement protocol for remote patient monitoring IoMT. In: 2024 International Conference on Communications, Computing, Cybersecurity, and Informatics (CCCI), pp. 1\u20138 (2024)","DOI":"10.1109\/CCCI61916.2024.10736457"},{"issue":"4","key":"8_CR10","first-page":"5543","volume":"17","author":"BD Deebak","year":"2023","unstructured":"Deebak, B.D., Hwang, S.O.: A cloud-assisted medical cyber-physical system using a privacy-preserving key agreement framework and a Chebyshev chaotic map. IEEE Syst. J. 17(4), 5543\u20135554 (2023)","journal-title":"IEEE Syst. J."},{"key":"8_CR11","doi-asserted-by":"crossref","unstructured":"Kumar, V., Das, S.K.: A light weight mutual authentication and key generation scheme for RFID systems used in Medical IoT. In: 2024 IEEE 3rd International Conference on Control, Instrumentation, Energy & Communication (CIEC), pp. 49\u201354 (2024)","DOI":"10.1109\/CIEC59440.2024.10468237"},{"issue":"17","key":"8_CR12","doi-asserted-by":"publisher","first-page":"29174","DOI":"10.1109\/JIOT.2024.3406561","volume":"11","author":"S Zou","year":"2024","unstructured":"Zou, S., et al.: A physician\u2019s privacy-preserving authentication and key agreement protocol based on decentralized identity for medical data sharing in IoMT. IEEE Internet Things J. 11(17), 29174\u201329189 (2024)","journal-title":"IEEE Internet Things J."},{"key":"8_CR13","doi-asserted-by":"crossref","unstructured":"Wang, W., Wen, F.: A robust two-factor medical sensor authentication protocol based on PUF. In: International Seminar on Artificial Intelligence. Computer Technology and Control Engineering (ACTCE), vol. 2024, pp. 462\u2013466 (2024)","DOI":"10.1109\/ACTCE65085.2024.00100"},{"issue":"1","key":"8_CR14","doi-asserted-by":"publisher","first-page":"200","DOI":"10.1109\/JSYST.2024.3519516","volume":"19","author":"L Zhang","year":"2025","unstructured":"Zhang, L., Wu, T., Liu, J., Guan, Z., Yin, X.: An adaptive synchronous lightweight AKA protocol with authority management for wireless medical sensor networks. IEEE Syst. J. 19(1), 200\u2013211 (2025)","journal-title":"IEEE Syst. J."},{"issue":"14","key":"8_CR15","doi-asserted-by":"publisher","first-page":"25394","DOI":"10.1109\/JIOT.2024.3396488","volume":"11","author":"C-M Chen","year":"2024","unstructured":"Chen, C.-M., Chen, Z., Kumari, S., Obaidat, M.S., Rodrigues, J.J.P.C., Khan, M.K.: Blockchain-based mutual authentication protocol for IoT-enabled decentralized healthcare environment. IEEE Internet Things J. 11(14), 25394\u201325412 (2024)","journal-title":"IEEE Internet Things J."},{"key":"8_CR16","doi-asserted-by":"crossref","unstructured":"Shabaz, M., et al.: Leveraging consumer technology for healthcare systems using blockchain based bio-sensor devices. IEEE Trans. Consum. Electron. 1\u20131 2024","DOI":"10.1109\/TCE.2024.3423754"},{"key":"8_CR17","doi-asserted-by":"crossref","unstructured":"Nikooghadam, M., Amintoosi, H., Bagheri, N.: Lightweight authentication for remote healthcare systems in cloud-IoT. In: 2020 10th International Conference on Computer and Knowledge Engineering (ICCKE), pp. 636\u2013643 (2020)","DOI":"10.1109\/ICCKE50421.2020.9303671"},{"key":"8_CR18","doi-asserted-by":"publisher","first-page":"108233","DOI":"10.1109\/ACCESS.2024.3422038","volume":"12","author":"A Alzahrani","year":"2024","unstructured":"Alzahrani, A.: RLKS-TMS: a robust and lightweight key agreement scheme for telemedicine system. IEEE Access 12, 108233\u2013108247 (2024)","journal-title":"IEEE Access"},{"key":"8_CR19","doi-asserted-by":"crossref","unstructured":"Moni, S.S., Gupta, D.: Secure and efficient privacy-preserving authentication scheme using cuckoo filter in remote patient monitoring network. In: 2022 IEEE 4th International Conference on Trust, Privacy and Security in Intelligent Systems, and Applications (TPS-ISA), pp. 208\u2013216 (2022)","DOI":"10.1109\/TPS-ISA56441.2022.00034"},{"key":"8_CR20","doi-asserted-by":"crossref","unstructured":"Garg, N., Obaidat, M.S., Wazid, M., Das, A.K., Singh, D.P.: SPCS-IoTEH: secure privacy-preserving communication scheme for ioT-enabled e-health applications. In: ICC 2021 - IEEE International Conference on Communications, pp. 1\u20136 (2021)","DOI":"10.1109\/ICC42927.2021.9500388"}],"container-title":["Lecture Notes in Computer Science","Network and System Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-95-6419-4_8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,2,3]],"date-time":"2026-02-03T08:58:13Z","timestamp":1770109093000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-95-6419-4_8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026]]},"ISBN":["9789819564187","9789819564194"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-981-95-6419-4_8","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026]]},"assertion":[{"value":"4 February 2026","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"NSS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Network and System Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Wuhan","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"5 December 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"7 December 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"nss2025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/nsclab.org\/nss-socialsec2025\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}