{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,2]],"date-time":"2026-04-02T14:28:22Z","timestamp":1775140102078,"version":"3.50.1"},"reference-count":45,"publisher":"Springer Science and Business Media LLC","issue":"15","license":[{"start":{"date-parts":[[2021,6,30]],"date-time":"2021-06-30T00:00:00Z","timestamp":1625011200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,6,30]],"date-time":"2021-06-30T00:00:00Z","timestamp":1625011200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Soft Comput"],"published-print":{"date-parts":[[2021,8]]},"DOI":"10.1007\/s00500-021-05929-5","type":"journal-article","created":{"date-parts":[[2021,6,30]],"date-time":"2021-06-30T08:02:45Z","timestamp":1625040165000},"page":"10037-10051","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":29,"title":["A robust smart card and remote user password-based authentication protocol using extended chaotic maps under smart cities environment"],"prefix":"10.1007","volume":"25","author":[{"given":"Chandrashekhar","family":"Meshram","sequence":"first","affiliation":[]},{"given":"Rabha W.","family":"Ibrahim","sequence":"additional","affiliation":[]},{"given":"Lunzhi","family":"Deng","sequence":"additional","affiliation":[]},{"given":"Shailendra W.","family":"Shende","sequence":"additional","affiliation":[]},{"given":"Sarita Gajbhiye","family":"Meshram","sequence":"additional","affiliation":[]},{"given":"Sharad Kumar","family":"Barve","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,6,30]]},"reference":[{"key":"5929_CR1","first-page":"4670","volume":"374","author":"MB Algehawi","year":"2010","unstructured":"Algehawi MB, Samsudin A (2010) A new identity based encryption (IBE) scheme using extended Chebyshev polynomial over finite fields Zp. PhysLett A 374:4670\u20134674","journal-title":"PhysLett A"},{"issue":"7","key":"5929_CR2","doi-asserted-by":"publisher","first-page":"1382","DOI":"10.1109\/TCSI.2005.851701","volume":"52","author":"P Bergamo","year":"2005","unstructured":"Bergamo P, D\u2019Arco P, De Santis A, Kocarev L (2005) Security of public-key cryptosystems based on Chebyshev polynomials. IEEE Trans Circuits Syst-I 52(7):1382\u20131393","journal-title":"IEEE Trans Circuits Syst-I"},{"issue":"1","key":"5929_CR3","doi-asserted-by":"publisher","first-page":"18","DOI":"10.1145\/77648.77649","volume":"8","author":"M Burrows","year":"1990","unstructured":"Burrows M, Abadi M, Needham R (1990) A logic of authentication. ACM Trans Comput Syst 8(1):18\u201336","journal-title":"ACM Trans Comput Syst"},{"issue":"2","key":"5929_CR4","doi-asserted-by":"publisher","first-page":"290","DOI":"10.1002\/dac.2830","volume":"29","author":"CC Chang","year":"2016","unstructured":"Chang CC, Cheng TF, Hsueh WY (2016) A robust and efficient dynamic identity-based multi-server authentication scheme using smart cards. Int J Commun Syst 29(2):290\u2013306","journal-title":"Int J Commun Syst"},{"key":"5929_CR5","doi-asserted-by":"publisher","first-page":"377","DOI":"10.1002\/dac.2368","volume":"27","author":"BL Chen","year":"2014","unstructured":"Chen BL, Kuo WC, Wu LC (2014) Robust smartcard-based remote user password authentication scheme. Int J Commun Syst 27:377\u2013389","journal-title":"Int J Commun Syst"},{"issue":"3","key":"5929_CR6","doi-asserted-by":"publisher","first-page":"347","DOI":"10.1002\/dac.1158","volume":"24","author":"C Chen","year":"2011","unstructured":"Chen C, He DJ, Chan SM, Bu JJ, Gao Y, Fan R (2011) Lightweight and provably secure user authentication with anonymity for the global mobility network. Int J Commun Syst 24(3):347\u2013362","journal-title":"Int J Commun Syst"},{"key":"5929_CR7","doi-asserted-by":"publisher","first-page":"3848","DOI":"10.1016\/j.cnsns.2012.02.021","volume":"17","author":"F Chen","year":"2012","unstructured":"Chen F, Liao X, Wong KW, Han Q, Li Y (2012) Period distribution analysis of some linear maps. Commun Nonlinear Sci Numer Simul 17:3848\u20133856","journal-title":"Commun Nonlinear Sci Numer Simul"},{"key":"5929_CR8","doi-asserted-by":"publisher","unstructured":"Das AK, Odelu V, Goswami A (2014) A robust and effective smart-card-based remote user authentication mechanism using hash function. Sci World J. https:\/\/doi.org\/10.1155\/2014\/719470","DOI":"10.1155\/2014\/719470"},{"issue":"1","key":"5929_CR9","doi-asserted-by":"publisher","first-page":"e2879","DOI":"10.1002\/dac.2879","volume":"30","author":"MS Farash","year":"2017","unstructured":"Farash MS (2017) An improved password-based authentication scheme for session initiation protocol using smart cards without verification table. Int J Commun Syst 30(1):e2879","journal-title":"Int J Commun Syst"},{"key":"5929_CR10","doi-asserted-by":"crossref","unstructured":"Friese I, Heuer J, Kong N (2014) Challenges from the identities of things: introduction of the identities of things discussion group within Kantara initiative. In: Internet of things (WF-IoT), 2014 IEEE World Forum, pp 1\u20134","DOI":"10.1109\/WF-IoT.2014.6803106"},{"issue":"7","key":"5929_CR11","doi-asserted-by":"publisher","first-page":"1645","DOI":"10.1016\/j.future.2013.01.010","volume":"29","author":"J Gubbi","year":"2013","unstructured":"Gubbi J, Buyya R, Marusic S, Marimuthu Palaniswami M (2013) Internet of things (IoT): a vision, architectural elements, and future directions. Futur Gener Comput Syst 29(7):1645\u20131660","journal-title":"Futur Gener Comput Syst"},{"issue":"3","key":"5929_CR12","doi-asserted-by":"publisher","first-page":"1283","DOI":"10.1016\/j.chaos.2007.06.030","volume":"39","author":"S Han","year":"2009","unstructured":"Han S, Chang E (2009) Chaotic map based key agreement with\/out clock synchronization. Choas Soliton and Fract 39(3):1283\u20131289","journal-title":"Choas Soliton and Fract"},{"key":"5929_CR13","doi-asserted-by":"publisher","first-page":"37","DOI":"10.1016\/j.cmpb.2016.07.022","volume":"135","author":"MH Ibrahim","year":"2016","unstructured":"Ibrahim MH, Kumari S, Das AK, Wazid M, Odelu V (2016) Secure anonymous mutual authentication for star two-tier wireless body area networks. Comput Methods Progr Biomed 135:37\u201350","journal-title":"Comput Methods Progr Biomed"},{"issue":"11","key":"5929_CR14","doi-asserted-by":"publisher","first-page":"1708","DOI":"10.1002\/dac.2793","volume":"29","author":"SKH Islam","year":"2016","unstructured":"Islam SKH (2016) Design and analysis of an improved smartcard\u2013based remote user password authentication scheme. Int J Commun Syst 29(11):1708\u20131719","journal-title":"Int J Commun Syst"},{"key":"5929_CR15","first-page":"571","volume-title":"Side-channel analysis, encyclopedia of cryptography and security","author":"M Joye","year":"2010","unstructured":"Joye M, Olivier F (2010) Side-channel analysis, encyclopedia of cryptography and security. Kluwer Academic Publishers, Springer, USA, pp 571\u2013576"},{"key":"5929_CR16","doi-asserted-by":"publisher","first-page":"6","DOI":"10.1109\/7384.963463","volume":"1","author":"L Kocarev","year":"2001","unstructured":"Kocarev L (2001) Chaos-based cryptography: a brief overview. IEEE Circuits Syst Mag 1:6\u201321","journal-title":"IEEE Circuits Syst Mag"},{"key":"5929_CR17","doi-asserted-by":"crossref","unstructured":"Kocher P, Jaffe J, Jun B (1999) Differential power analysis. In: Proceedings of advances in cryptology (Crypto\u201999), LNCS. Springer, Berlin, Heidelberg, pp 388\u2013397","DOI":"10.1007\/3-540-48405-1_25"},{"issue":"12","key":"5929_CR18","doi-asserted-by":"publisher","first-page":"3939","DOI":"10.1002\/dac.2590","volume":"27","author":"S Kumari","year":"2014","unstructured":"Kumari S, Khan MK (2014) Cryptanalysis and improvement of \u2018a robust smart-card-based remote user password authentication scheme. Int J Commun Syst 27(12):3939\u20133955","journal-title":"Int J Commun Syst"},{"key":"5929_CR19","unstructured":"Lewis N (2016) IoT tutorial: Mitigating security risks in connected environments. http:\/\/searchitchannel.techtarget.com\/feature\/IoT-tutorial-Mitigating-security-risks-in-connected-environments"},{"key":"5929_CR20","unstructured":"Li S, Xu LD (2017) Book excerpt: \u2018securing the internet of things\u2019. http:\/\/internetofthingsagenda.techtarget.com\/feature\/Book-excerpt-Securing-the-Internet-of-Things"},{"key":"5929_CR21","doi-asserted-by":"publisher","first-page":"1365","DOI":"10.1016\/j.jnca.2013.02.034","volume":"36","author":"X Li","year":"2013","unstructured":"Li X, Niu J, Khan MK, Liao J (2013) An enhanced smartcard based remote user password authentication scheme. J Netw Comput Appl 36:1365\u20131371","journal-title":"J Netw Comput Appl"},{"issue":"2","key":"5929_CR22","doi-asserted-by":"publisher","first-page":"569","DOI":"10.1007\/s11277-016-3293-x","volume":"89","author":"X Li","year":"2016","unstructured":"Li X, Niu J, Kumari S, Islam SKH, Wu F, Khan MK, Das AK (2016) A novel chaotic maps-based user authentication and key agreement protocol for multi-server environments with provable security. Wireless Pers Commun 89(2):569\u2013597","journal-title":"Wireless Pers Commun"},{"issue":"14","key":"5929_CR23","doi-asserted-by":"publisher","first-page":"e3288","DOI":"10.1002\/dac.3288","volume":"30","author":"M Luo","year":"2017","unstructured":"Luo M, Zhang Y, Khan MK, He D (2017) An efficient chaos-based two-party key agreement protocol with provable security. Int J Commun Syst 30(14):e3288","journal-title":"Int J Commun Syst"},{"issue":"10","key":"5929_CR24","doi-asserted-by":"publisher","first-page":"2215","DOI":"10.1002\/dac.2468","volume":"27","author":"CG Ma","year":"2014","unstructured":"Ma CG, Wang D, Zhao SD (2014) Security flaws in two improved remote user authentication schemes using smart cards. Int J Commun Syst 27(10):2215\u20132227","journal-title":"Int J Commun Syst"},{"key":"5929_CR25","volume-title":"Chebyshev polynomials","author":"JC Mason","year":"2003","unstructured":"Mason JC, Handscomb DC (2003) Chebyshev polynomials. Chapman & Hall\/CRC, Boca Raton"},{"key":"5929_CR26","unstructured":"McDonald C (2014). Premium wearables to push sales growth, say juniper. http:\/\/www.computerweekly.com\/news\/2240230260\/Premium-wearables-topush-sales-growth-say-Juniper"},{"issue":"3","key":"5929_CR27","doi-asserted-by":"publisher","first-page":"747","DOI":"10.1007\/s00500-018-3112-2","volume":"23","author":"C Meshram","year":"2019","unstructured":"Meshram C, Li CT, Meshram SG (2019a) An efficient online\/offline id-based short signature procedure using extended chaotic maps. Soft Comput 23(3):747\u2013753","journal-title":"Soft Comput"},{"issue":"16","key":"5929_CR28","doi-asserted-by":"publisher","first-page":"6937","DOI":"10.1007\/s00500-018-3332-5","volume":"23","author":"C Meshram","year":"2019","unstructured":"Meshram C, Lee CC, Meshram SG, Li CT (2019b) An efficient id-based cryptographic transformation model for extended chaotic-map-based cryptosystem. Soft Comput 23(16):6937\u20136946","journal-title":"Soft Comput"},{"issue":"24","key":"5929_CR29","doi-asserted-by":"publisher","first-page":"13127","DOI":"10.1007\/s00500-019-03855-1","volume":"23","author":"C Meshram","year":"2019","unstructured":"Meshram C, Lee CC, Meshram SG, Khan MK (2019c) An Identity-based encryption technique using subtree for fuzzy user data sharing under cloud computing environment. Soft Comput 23(24):13127\u201313138","journal-title":"Soft Comput"},{"key":"5929_CR30","doi-asserted-by":"crossref","unstructured":"Meshram C, Lee CC, Meshram SG, Ramteke RJ, Meshram A (2020) An efficient mobile-healthcare emergency framework. J Med Syst 44:58","DOI":"10.1007\/s10916-019-1458-3"},{"issue":"5","key":"5929_CR31","doi-asserted-by":"publisher","first-page":"541","DOI":"10.1109\/TC.2002.1004593","volume":"51","author":"TS Messerges","year":"2002","unstructured":"Messerges TS, Dabbish EA, Sloan RH (2002) Examining smart card security under the threat of power analysis attacks. IEEE Trans Comput 51(5):541\u2013552","journal-title":"IEEE Trans Comput"},{"key":"5929_CR32","doi-asserted-by":"crossref","unstructured":"Mick T, Tourani R, Misra S (2017) Laser: lightweight authentication and secured routing for NDN IoT in smart cities. arXiv preprint arXiv:1703.08453","DOI":"10.1109\/JIOT.2017.2725238"},{"issue":"16","key":"5929_CR33","doi-asserted-by":"publisher","first-page":"e3341","DOI":"10.1002\/dac.3341","volume":"30","author":"M Qi","year":"2017","unstructured":"Qi M, Chen J (2017) An efficient two-party authentication key exchange protocol for mobile environment. Int J Commun Syst 30(16):e3341","journal-title":"Int J Commun Syst"},{"key":"5929_CR34","first-page":"878","volume":"41","author":"AG Reddy","year":"2018","unstructured":"Reddy AG, Suresh D, Phaneendra K, Ji SS, Odelu V (2018) Provably secure pseudo-identity based device authentication for smart cities environment. Sustain Urban Areas 41:878\u2013885","journal-title":"Sustain Urban Areas"},{"key":"5929_CR35","unstructured":"Rouse M, Shea S, Burns E (2016a) Smart city. http:\/\/internetofthingsagenda.techtarget.com\/definition\/smart-city"},{"key":"5929_CR36","unstructured":"Rouse M, Rosencrance L, Shea S, Wigmore I (2016b) Internet of things (IoT). http:\/\/internetofthingsagenda.techtarget.com\/definition\/Internet-of-Things-IoT"},{"key":"5929_CR37","unstructured":"Scroxton A (2015) Robust security and consumer buy-in needed for smart city success. http:\/\/www.computerweekly.com\/news\/2240240594\/Robustsecurity-and-consumer-buy-in-needed-for-smart-city-success"},{"issue":"5","key":"5929_CR38","doi-asserted-by":"publisher","first-page":"321","DOI":"10.1016\/j.csi.2010.03.008","volume":"32","author":"R Song","year":"2010","unstructured":"Song R (2010) Advanced smartcard based password authentication protocol. Comput Stand Interfaces 32(5):321\u2013325","journal-title":"Comput Stand Interfaces"},{"key":"5929_CR39","unstructured":"Song R, Korba L, Yee G (2007) Analysis of smart card-based remote user authentication schemes. In: Proceedings of the 2007 international conference on security and management, Las Vegas, pp 323\u2013329"},{"key":"5929_CR40","doi-asserted-by":"crossref","unstructured":"Sood SK, Sarje AK, Singh K (2010) An improvement of Xu et al.\u2019s authentication scheme using smartcards. In: Proceedings of the 3rd annual ACM Bangalore conference, Bangalore, Karnataka, India, pp 17\u201325","DOI":"10.1145\/1754288.1754303"},{"issue":"12","key":"5929_CR41","doi-asserted-by":"publisher","first-page":"1639","DOI":"10.1002\/dac.2428","volume":"25","author":"HB Tang","year":"2012","unstructured":"Tang HB, Liu XS (2012) Cryptanalysis of a dynamic ID-based remote user authentication with key agreement scheme. Int J Commun Syst 25(12):1639\u20131644","journal-title":"Int J Commun Syst"},{"key":"5929_CR42","unstructured":"Tech Target (2017) IoT security. http:\/\/searchcio.techtarget.com\/essentialguide\/An-IT-security-strategy-guide-for-CIOs#guideSection5"},{"key":"5929_CR43","unstructured":"Till A (2017) The smart way to build smart cities. http:\/\/internetofthingsagenda.techtarget.com\/blog\/IoT-Agenda\/The-smartway-to-build-smart-cities"},{"issue":"4","key":"5929_CR44","doi-asserted-by":"publisher","first-page":"723","DOI":"10.1016\/j.csi.2008.09.006","volume":"31","author":"J Xu","year":"2009","unstructured":"Xu J, Zhu WT, Feng DG (2009) An improved smartcard based password authentication scheme with provable security. Comput Stand Interfaces 31(4):723\u2013728","journal-title":"Comput Stand Interfaces"},{"issue":"3","key":"5929_CR45","doi-asserted-by":"publisher","first-page":"669","DOI":"10.1016\/j.chaos.2006.09.047","volume":"37","author":"L Zhang","year":"2008","unstructured":"Zhang L (2008) Cryptanalysis of the public key encryption based on multiple chaotic systems. Chaos Solitons Fractals 37(3):669\u2013674","journal-title":"Chaos Solitons Fractals"}],"container-title":["Soft Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00500-021-05929-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s00500-021-05929-5\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00500-021-05929-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,7,14]],"date-time":"2021-07-14T11:28:19Z","timestamp":1626262099000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s00500-021-05929-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,6,30]]},"references-count":45,"journal-issue":{"issue":"15","published-print":{"date-parts":[[2021,8]]}},"alternative-id":["5929"],"URL":"https:\/\/doi.org\/10.1007\/s00500-021-05929-5","relation":{},"ISSN":["1432-7643","1433-7479"],"issn-type":[{"value":"1432-7643","type":"print"},{"value":"1433-7479","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,6,30]]},"assertion":[{"value":"31 May 2021","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"30 June 2021","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"This article does not contain any studies with human participants or animals performed by any of the authors.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical approval"}}]}}