{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,27]],"date-time":"2026-01-27T23:36:27Z","timestamp":1769556987425,"version":"3.49.0"},"reference-count":36,"publisher":"Springer Science and Business Media LLC","issue":"6","license":[{"start":{"date-parts":[[2022,2,6]],"date-time":"2022-02-06T00:00:00Z","timestamp":1644105600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,2,6]],"date-time":"2022-02-06T00:00:00Z","timestamp":1644105600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Computing"],"published-print":{"date-parts":[[2022,6]]},"DOI":"10.1007\/s00607-022-01055-8","type":"journal-article","created":{"date-parts":[[2022,2,6]],"date-time":"2022-02-06T10:02:10Z","timestamp":1644141730000},"page":"1359-1395","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":32,"title":["An ECC-based lightweight remote user authentication and key management scheme for IoT communication in context of fog computing"],"prefix":"10.1007","volume":"104","author":[{"given":"Uddalak","family":"Chatterjee","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1920-4172","authenticated-orcid":false,"given":"Sangram","family":"Ray","sequence":"additional","affiliation":[]},{"given":"Muhammad Khurram","family":"Khan","sequence":"additional","affiliation":[]},{"given":"Mou","family":"Dasgupta","sequence":"additional","affiliation":[]},{"given":"Chien-Ming","family":"Chen","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,2,6]]},"reference":[{"key":"1055_CR1","doi-asserted-by":"publisher","first-page":"475","DOI":"10.1016\/j.future.2018.09.017","volume":"91","author":"M Wazid","year":"2019","unstructured":"Wazid M, Das AK, Kumar N, Vasilakos AV (2019) Design of secure key management and user authentication scheme for fog computing services. Future Gener Comput Syst 91:475\u2013492","journal-title":"Future Gener Comput Syst"},{"issue":"2","key":"1055_CR2","doi-asserted-by":"publisher","first-page":"71","DOI":"10.1016\/j.diin.2012.07.001","volume":"9","author":"B Martini","year":"2012","unstructured":"Martini B, Choo KKR (2012) An integrated conceptual digital forensic framework for cloud computing. Digit Investig 9(2):71\u201380","journal-title":"Digit Investig"},{"issue":"5","key":"1055_CR3","doi-asserted-by":"publisher","first-page":"1143","DOI":"10.1109\/JIOT.2017.2659783","volume":"4","author":"P Hu","year":"2017","unstructured":"Hu P, Ning H, Qiu T, Song H, Wang Y, Yao X (2017) Security and privacy preservation scheme of face identification and resolution framework using fog computing in internet of things. IEEE Internet Things J 4(5):1143\u20131155","journal-title":"IEEE Internet Things J"},{"key":"1055_CR4","doi-asserted-by":"publisher","first-page":"5531","DOI":"10.1109\/ACCESS.2017.2693438","volume":"5","author":"W Abdul","year":"2017","unstructured":"Abdul W, Ali Z, Ghouzali S, Alfawaz B, Muhammad G, Hossain MS (2017) Biometric security through visual encryption for fog edge computing. IEEE Access 5:5531\u20135538","journal-title":"IEEE Access"},{"key":"1055_CR5","doi-asserted-by":"publisher","first-page":"739","DOI":"10.1016\/j.future.2017.01.024","volume":"78","author":"D Koo","year":"2018","unstructured":"Koo D, Hur J (2018) Privacy-preserving deduplication of encrypted data with dynamic ownership management in fog computing. Future Gener Comput Syst 78:739\u2013752","journal-title":"Future Gener Comput Syst"},{"key":"1055_CR6","doi-asserted-by":"publisher","first-page":"712","DOI":"10.1016\/j.future.2017.02.032","volume":"78","author":"H Wang","year":"2018","unstructured":"Wang H, Wang Z, Domingo-Ferrer J (2018) Anonymous and secure aggregation scheme in fog-based public cloud computing. Future Gener Comput Syst 78:712\u2013719","journal-title":"Future Gener Comput Syst"},{"issue":"8","key":"1055_CR7","doi-asserted-by":"publisher","first-page":"4737","DOI":"10.1007\/s11276-018-1759-3","volume":"25","author":"X Jia","year":"2019","unstructured":"Jia X, He D, Kumar N, Choo KKR (2019) Authenticated key agreement scheme for fog-driven IoT healthcare system. Wirel Netw 25(8):4737\u20134750","journal-title":"Wirel Netw"},{"key":"1055_CR8","doi-asserted-by":"publisher","first-page":"101194","DOI":"10.1016\/j.pmcj.2020.101194","volume":"67","author":"S Rostampour","year":"2020","unstructured":"Rostampour S, Safkhani M, Bendavid Y, Bagheri N (2020) ECCbAP: a secure ECC-based authentication protocol for IoT edge devices. Pervasive Mob Comput 67:101194","journal-title":"Pervasive Mob Comput"},{"key":"1055_CR9","first-page":"1","volume":"2021","author":"TY Wu","year":"2021","unstructured":"Wu TY, Wang T, Lee YQ, Zheng W, Kumari S, Kumar S (2021) Improved authenticated key agreement scheme for fog-driven IoT healthcare system. Secur Commun Netw 2021:1\u201316","journal-title":"Secur Commun Netw"},{"key":"1055_CR10","doi-asserted-by":"crossref","unstructured":"Wu TY, Lee Z, Yang L, Luo JN, Tso R (2021) Provably secure authentication key exchange scheme using fog nodes in vehicular ad hoc networks. J Supercomput 77:1\u201329","DOI":"10.1155\/2021\/9944460"},{"key":"1055_CR11","doi-asserted-by":"publisher","first-page":"69287","DOI":"10.1109\/ACCESS.2021.3076692","volume":"9","author":"SU Jan","year":"2021","unstructured":"Jan SU, Qayum F, Khan HU (2021) Design and analysis of lightweight authentication protocol for securing IoD. IEEE Access 9:69287\u201369306","journal-title":"IEEE Access"},{"issue":"12","key":"1055_CR12","doi-asserted-by":"publisher","first-page":"1417","DOI":"10.3390\/electronics10121417","volume":"10","author":"S Banerjee","year":"2021","unstructured":"Banerjee S, Das AK, Chattopadhyay S, Jamal SS, Rodrigues JJ, Park Y (2021) Lightweight failover authentication mechanism for IoT-based fog computing environment. Electronics 10(12):1417","journal-title":"Electronics"},{"issue":"4","key":"1055_CR13","doi-asserted-by":"publisher","first-page":"3865","DOI":"10.1007\/s13369-020-05276-x","volume":"46","author":"D Rangwani","year":"2021","unstructured":"Rangwani D, Om H (2021) A secure user authentication protocol based on ECC for cloud computing environment. Arab J Sci Eng 46(4):3865\u20133888","journal-title":"Arab J Sci Eng"},{"key":"1055_CR14","doi-asserted-by":"publisher","first-page":"187","DOI":"10.1016\/j.comcom.2020.04.024","volume":"157","author":"S Adhikari","year":"2020","unstructured":"Adhikari S, Ray S, Obaidat MS, Biswas GP (2020) Efficient and secure content dissemination architecture for content centric network using ECC-based public key infrastructure. Comput Commun 157:187\u2013203","journal-title":"Comput Commun"},{"issue":"2","key":"1055_CR15","doi-asserted-by":"publisher","first-page":"1114","DOI":"10.1007\/s11227-020-03318-7","volume":"77","author":"D Sadhukhan","year":"2021","unstructured":"Sadhukhan D, Ray S, Biswas GP, Khan MK, Dasgupta M (2021) A lightweight remote user authentication scheme for IoT communication using elliptic curve cryptography. J Supercomput 77(2):1114\u20131151","journal-title":"J Supercomput"},{"issue":"3","key":"1055_CR16","first-page":"1","volume":"32","author":"D Rangwani","year":"2021","unstructured":"Rangwani D, Sadhukhan D, Ray S, Khan MK, Dasgupta M (2021) An improved privacy preserving remote user authentication scheme for agricultural wireless sensor network. Trans Emerg Telecommun Technol 32(3):1\u201331","journal-title":"Trans Emerg Telecommun Technol"},{"issue":"5","key":"1055_CR17","doi-asserted-by":"publisher","first-page":"772","DOI":"10.1109\/TSC.2018.2823309","volume":"12","author":"Y Miao","year":"2018","unstructured":"Miao Y, Ma J, Liu X, Weng J, Li H, Li H (2018) Lightweight fine-grained search over encrypted data in fog computing. IEEE Trans Serv Comput 12(5):772\u2013785","journal-title":"IEEE Trans Serv Comput"},{"issue":"2","key":"1055_CR18","doi-asserted-by":"publisher","first-page":"2154","DOI":"10.1109\/JSYST.2019.2944240","volume":"14","author":"K Sowjanya","year":"2019","unstructured":"Sowjanya K, Dasgupta M, Ray S, Obaidat MS (2019) An efficient elliptic curve cryptography-based without pairing KPABE for Internet of Things. IEEE Syst J 14(2):2154\u20132163","journal-title":"IEEE Syst J"},{"issue":"1","key":"1055_CR19","doi-asserted-by":"publisher","first-page":"39","DOI":"10.1109\/JSYST.2019.2899580","volume":"14","author":"X Li","year":"2019","unstructured":"Li X, Peng J, Obaidat MS, Wu F, Khan MK, Chen C (2019) A secure three-factor user authentication protocol with forward secrecy for wireless medical sensor network systems. IEEE Syst J 14(1):39\u201350","journal-title":"IEEE Syst J"},{"key":"1055_CR20","doi-asserted-by":"publisher","first-page":"101948","DOI":"10.1016\/j.adhoc.2019.101948","volume":"94","author":"Y Harbi","year":"2019","unstructured":"Harbi Y, Aliouat Z, Refoufi A, Harous S, Bentaleb A (2019) Enhanced authentication and key management scheme for securing data transmission in the internet of things. Ad Hoc Netw 94:101948","journal-title":"Ad Hoc Netw"},{"key":"1055_CR21","doi-asserted-by":"publisher","first-page":"107731","DOI":"10.1016\/j.comnet.2020.107731","volume":"185","author":"Z Ali","year":"2021","unstructured":"Ali Z, Chaudhry SA, Mahmood K, Garg S, Lv Z, Zikria YB (2021) A clogging resistant secure authentication scheme for fog computing services. Comput Netw 185:107731","journal-title":"Comput Netw"},{"issue":"3","key":"1055_CR22","doi-asserted-by":"publisher","first-page":"1331","DOI":"10.1007\/s11277-016-3393-7","volume":"90","author":"S Ray","year":"2016","unstructured":"Ray S, Biswas GP, Dasgupta M (2016) Secure multi-purpose mobile-banking using elliptic curve cryptography. Wirel Pers Commun 90(3):1331\u20131354","journal-title":"Wirel Pers Commun"},{"key":"1055_CR23","unstructured":"Ray S, Biswas GP (2012) Establishment of ECC-based initial secrecy usable for IKE implementation. In: Proceedings of the world congress on engineering, vol 1, pp 530\u2013535"},{"key":"1055_CR24","doi-asserted-by":"crossref","unstructured":"Ray S, Biswas GP (2012) An ECC based public key infrastructure usable for mobile applications. In: Proceedings of the second international conference on computational science, engineering and information technology, pp 562\u2013568","DOI":"10.1145\/2393216.2393310"},{"key":"1055_CR25","doi-asserted-by":"crossref","unstructured":"Chatterjee U, Sadhukhan D, Ray S (2020) An improved authentication and key agreement protocol for smart healthcare system in the context of Internet of Things using elliptic curve cryptography. In: Proceedings of international conference on IoT inclusive life (ICIIL 2019), NITTTR Chandigarh, India. Springer, Singapore, pp 11\u201322","DOI":"10.1007\/978-981-15-3020-3_2"},{"issue":"3","key":"1055_CR26","doi-asserted-by":"publisher","first-page":"311","DOI":"10.1016\/j.jksus.2017.01.003","volume":"29","author":"SH Islam","year":"2017","unstructured":"Islam SH, Amin R, Biswas GP, Farash MS, Li X, Kumari S (2017) An improved three party authenticated key exchange protocol using hash function and elliptic curve cryptography for mobile-commerce environments. J King Saud Univ Comput Inf Sci 29(3):311\u2013324","journal-title":"J King Saud Univ Comput Inf Sci"},{"key":"1055_CR27","unstructured":"Stallings W (2006) Cryptography and network security, 4\/E. Pearson Education India"},{"key":"1055_CR28","doi-asserted-by":"publisher","first-page":"557","DOI":"10.1016\/j.future.2017.05.002","volume":"81","author":"K Mahmood","year":"2018","unstructured":"Mahmood K, Chaudhry SA, Naqvi H, Kumari S, Li X, Sangaiah AK (2018) An elliptic curve cryptography based lightweight authentication scheme for smart grid communication. Futur Gener Comput Syst 81:557\u2013565","journal-title":"Futur Gener Comput Syst"},{"issue":"1","key":"1055_CR29","doi-asserted-by":"publisher","first-page":"129","DOI":"10.1007\/s10207-019-00464-9","volume":"19","author":"K Sowjanya","year":"2020","unstructured":"Sowjanya K, Dasgupta M, Ray S (2020) An elliptic curve cryptography based enhanced anonymous authentication protocol for wearable health monitoring systems. Int J Inf Secur 19(1):129\u2013146","journal-title":"Int J Inf Secur"},{"key":"1055_CR30","doi-asserted-by":"crossref","unstructured":"Adhikari S, Ray S (2019) A Lightweight and secure IoT communication framework in content-centric network using elliptic curve cryptography. In: Recent trends in communication, computing, and electronics. Springer, Singapore, pp 207\u2013216","DOI":"10.1007\/978-981-13-2685-1_21"},{"issue":"1","key":"1055_CR31","first-page":"285","volume":"21","author":"A Shafiq","year":"2020","unstructured":"Shafiq A, Altaf I, Mahmood K, Kumari S, Chen CM (2020) An ECC based remote user authentication protocol. J Internet Technol 21(1):285\u2013294","journal-title":"J Internet Technol"},{"key":"1055_CR32","doi-asserted-by":"crossref","unstructured":"Chen CM, Huang Y, Wang KH, Kumari S, Wu ME (2020) A secure authenticated and key exchange scheme for fog computing. Enterp Inf Syst 15(9):1200\u20131215","DOI":"10.1080\/17517575.2020.1712746"},{"key":"1055_CR33","doi-asserted-by":"publisher","first-page":"52","DOI":"10.1016\/j.jpdc.2020.02.005","volume":"140","author":"R Amin","year":"2020","unstructured":"Amin R, Kunal S, Saha A, Das D, Alamri A (2020) CFSec: Password based secure communication protocol in cloud-fog environment. J Parallel Distrib Comput 140:52\u201362","journal-title":"J Parallel Distrib Comput"},{"issue":"12","key":"1055_CR34","doi-asserted-by":"publisher","first-page":"2803","DOI":"10.1016\/j.comcom.2007.12.005","volume":"31","author":"CT Li","year":"2008","unstructured":"Li CT, Hwang MS, Chu YP (2008) A secure and efficient communication scheme with authenticated key establishment and privacy preserving for vehicular ad hoc networks. Comput Commun 31(12):2803\u20132814","journal-title":"Comput Commun"},{"issue":"2","key":"1055_CR35","doi-asserted-by":"publisher","first-page":"188","DOI":"10.1016\/j.comcom.2011.09.003","volume":"35","author":"W Li","year":"2012","unstructured":"Li W, Wen Q, Su Q, Jin Z (2012) An efficient and secure mobile payment protocol for restricted connectivity scenarios in vehicular ad hoc network. Comput Commun 35(2):188\u2013195","journal-title":"Comput Commun"},{"issue":"1","key":"1055_CR36","doi-asserted-by":"publisher","first-page":"30","DOI":"10.1109\/TCE.2014.6780922","volume":"60","author":"D He","year":"2014","unstructured":"He D, Kumar N, Lee JH, Sherratt RS (2014) Enhanced three-factor security protocol for consumer USB mass storage devices. IEEE Trans Consum Electron 60(1):30\u201337","journal-title":"IEEE Trans Consum Electron"}],"container-title":["Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00607-022-01055-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s00607-022-01055-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00607-022-01055-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,1]],"date-time":"2022-06-01T19:04:16Z","timestamp":1654110256000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s00607-022-01055-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,2,6]]},"references-count":36,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2022,6]]}},"alternative-id":["1055"],"URL":"https:\/\/doi.org\/10.1007\/s00607-022-01055-8","relation":{},"ISSN":["0010-485X","1436-5057"],"issn-type":[{"value":"0010-485X","type":"print"},{"value":"1436-5057","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,2,6]]},"assertion":[{"value":"25 June 2021","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"21 January 2022","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"6 February 2022","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}