{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,10]],"date-time":"2026-04-10T02:31:10Z","timestamp":1775788270350,"version":"3.50.1"},"reference-count":44,"publisher":"Springer Science and Business Media LLC","issue":"6","license":[{"start":{"date-parts":[[2024,9,3]],"date-time":"2024-09-03T00:00:00Z","timestamp":1725321600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,9,3]],"date-time":"2024-09-03T00:00:00Z","timestamp":1725321600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Int. J. Inf. Secur."],"published-print":{"date-parts":[[2024,12]]},"DOI":"10.1007\/s10207-024-00906-z","type":"journal-article","created":{"date-parts":[[2024,9,3]],"date-time":"2024-09-03T03:45:23Z","timestamp":1725335123000},"page":"3691-3710","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["An enhanced and verifiable lightweight authentication protocol for securing the Internet of Medical Things (IoMT) based on CP-ABE encryption"],"prefix":"10.1007","volume":"23","author":[{"given":"Jihane","family":"Jebrane","sequence":"first","affiliation":[]},{"given":"Saiida","family":"Lazaar","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,9,3]]},"reference":[{"key":"906_CR1","doi-asserted-by":"publisher","first-page":"79","DOI":"10.1016\/j.jnca.2019.06.017","volume":"144","author":"S Ravidas","year":"2019","unstructured":"Ravidas, S., Lekidis, A., Paci, F., Zannone, N.: Access control in Internet-of-Things: a survey. J. Netw. Comput. Appl. 144, 79\u2013101 (2019)","journal-title":"J. Netw. Comput. Appl."},{"key":"906_CR2","doi-asserted-by":"publisher","DOI":"10.1016\/j.array.2022.100150","volume":"14","author":"B Annane","year":"2022","unstructured":"Annane, B., Alti, A., Lakehal, A.: Blockchain based context-aware CP-ABE schema for Internet of Medical Things security. Array 14, 100150 (2022)","journal-title":"Array"},{"issue":"6","key":"906_CR3","doi-asserted-by":"publisher","first-page":"3833","DOI":"10.1007\/s10916-012-9856-9","volume":"36","author":"Z Zhu","year":"2012","unstructured":"Zhu, Z.: An efficient authentication scheme for telecare medicine information systems. J. Med. Syst. 36(6), 3833\u20133838 (2012)","journal-title":"J. Med. Syst."},{"key":"906_CR4","doi-asserted-by":"publisher","unstructured":"Jebrane, J., Lazaar, S.: A performance comparison of lightweight cryptographic algorithms suitable for IoT transmissions. Gen. Lett. Math. 10(2), 46\u201353 (2021). https:\/\/doi.org\/10.31559\/glm2021.10.2.5","DOI":"10.31559\/glm2021.10.2.5"},{"issue":"15","key":"906_CR5","doi-asserted-by":"publisher","first-page":"7487","DOI":"10.3390\/app12157487","volume":"12","author":"N Alsaeed","year":"2022","unstructured":"Alsaeed, N., Nadeem, F.: Authentication in the Internet of Medical Things: taxonomy, review, and open issues. Appl. Sci. 12(15), 7487 (2022)","journal-title":"Appl. Sci."},{"key":"906_CR6","volume":"52","author":"Z Ali","year":"2020","unstructured":"Ali, Z., Ghani, A., Khan, I., Chaudhry, S.A., Islam, S.H., Giri, D.: A robust authentication and access control protocol for securing wireless healthcare sensor networks. J. Inf. Secur. Appl. 52, 102502 (2020)","journal-title":"J. Inf. Secur. Appl."},{"key":"906_CR7","doi-asserted-by":"publisher","unstructured":"Nyangaresi, V.O., Abduljabbar, Z.A., Mutlaq, K.AA., Hussain, M.A., Hussien, Z.A.: Forward and backward key secrecy preservation scheme for Medical Internet of Things. In: Bhattacharyya, S., Banerjee, J.S., K\u00f6ppen, M. (eds.) Human-Centric Smart Computing. Smart Innovation, Systems and Technologies, vol 316. Springer, Singapore (2023). https:\/\/doi.org\/10.1007\/978-981-19-5403-02","DOI":"10.1007\/978-981-19-5403-02"},{"key":"906_CR8","doi-asserted-by":"publisher","unstructured":"Nyangaresi, V.O., Khalefa, M.S., Abduljabbar, Z.A., Al Sibahee, M.A.: Low bandwidth and side-channeling resilient algorithm for pervasive computing systems. In: Kumar, S., Hiranwal, S., Purohit, S.D., Prasad, M. (eds.) Proceedings of International Conference on Communication and Computational Technologies. Algorithms for Intelligent Systems. Springer, Singapore (2023). https:\/\/doi.org\/10.1007\/978-981-19-3951-8-16","DOI":"10.1007\/978-981-19-3951-8-16"},{"key":"906_CR9","doi-asserted-by":"publisher","first-page":"5503","DOI":"10.1007\/s11042-017-4464-9","volume":"77","author":"SA Chaudhry","year":"2018","unstructured":"Chaudhry, S.A., Naqvi, H., Khan, M.K.: An enhanced lightweight anonymous biometric based authentication scheme for TMIS. Multimed. Tools Appl. 77, 5503\u20135524 (2018)","journal-title":"Multimed. Tools Appl."},{"key":"906_CR10","unstructured":"Odelu, V., Das, A.K., Goswami, A.: An efficient CP-ABE with constant size secret keys using ECC for lightweight devices. Cryptology ePrint Archive (2015)"},{"key":"906_CR11","doi-asserted-by":"crossref","unstructured":"Quist-Aphetsi, K., Xenya, M.C.: Securing medical IoT devices using Diffie-Hellman and DES cryptographic schemes. In: Proceedings of the 2019 International Conference on Cyber Security and Internet of Things (ICSIoT), pp. 105\u2013108. Accra, Ghana (2019)","DOI":"10.1109\/ICSIoT47925.2019.00025"},{"key":"906_CR12","doi-asserted-by":"crossref","unstructured":"Arunkumar, B., Kousalya, G.: Blockchain-based decentralized and secure lightweight e-health system for electronic health records. In: Intelligent Systems, Technologies and Applications, pp. 273\u2013289. Springer (2020)","DOI":"10.1007\/978-981-15-3914-5_21"},{"key":"906_CR13","doi-asserted-by":"publisher","first-page":"47962","DOI":"10.1109\/ACCESS.2019.2909556","volume":"7","author":"S Khatoon","year":"2019","unstructured":"Khatoon, S., Rahman, S.M.M., Alrubaian, M., Alamri, A.: Privacy-preserved, provable secure, mutually authenticated key agreement protocol for healthcare in a smart city environment. IEEE Access 7, 47962\u201347971 (2019)","journal-title":"IEEE Access"},{"key":"906_CR14","doi-asserted-by":"publisher","first-page":"151054","DOI":"10.1109\/ACCESS.2019.2947723","volume":"7","author":"T Nandy","year":"2019","unstructured":"Nandy, T., BinIdris, M.Y.I., Noor, R.M., Kiah, M.L.M., Lun, L.S., Juma\u2019At, N.B.A., Bhattacharyya, S.: Review on security of Internet of Things authentication mechanism. IEEE Access 7, 151054\u2013151089 (2019)","journal-title":"IEEE Access"},{"key":"906_CR15","doi-asserted-by":"crossref","unstructured":"Khemissa, H., Tandjaoui, D.: A lightweight authentication scheme for e-health applications in the context of Internet of Things. In: Proceedings of the 2015 9th International Conference on Next Generation Mobile Applications, Services and Technologies, pp. 90\u201395. Cambridge, UK (2015)","DOI":"10.1109\/NGMAST.2015.31"},{"issue":"1","key":"906_CR16","first-page":"1899","volume":"94","author":"AK Das","year":"2016","unstructured":"Das, A.K., Sutrala, A.K., Odelu, V., Goswami, A.: A secure smartcard-based anonymous user authentication scheme for healthcare applications using wireless medical sensor networks. Wirel. Pers. Commun. 94(1), 1899\u20131933 (2016)","journal-title":"Wirel. Pers. Commun."},{"key":"906_CR17","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2023.103117","volume":"142","author":"VO Nyangaresi","year":"2023","unstructured":"Nyangaresi, V.O.: Privacy preserving three-factor authentication protocol for secure message forwarding in wireless body area networks. Ad Hoc Netw. 142, 103117 (2023)","journal-title":"Ad Hoc Netw."},{"key":"906_CR18","doi-asserted-by":"publisher","first-page":"53408","DOI":"10.1109\/ACCESS.2021.3070641","volume":"9","author":"T-V Le","year":"2021","unstructured":"Le, T.-V., Hsu, C.-L.: An anonymous key distribution scheme for group healthcare services in 5G-enabled multi-server environments. IEEE Access 9, 53408\u201353422 (2021)","journal-title":"IEEE Access"},{"key":"906_CR19","doi-asserted-by":"publisher","first-page":"545","DOI":"10.1016\/j.comcom.2020.01.077","volume":"153","author":"RK Mahendran","year":"2020","unstructured":"Mahendran, R.K., Velusamy, P.: A secure fuzzy extractor based biometric key authentication scheme for body sensor network in Internet of Medical Things. Comput. Commun. 153, 545\u2013552 (2020)","journal-title":"Comput. Commun."},{"key":"906_CR20","doi-asserted-by":"crossref","unstructured":"Liu, T., Liu, X., Li, X., Amin, R., Liang, W., Hsieh, M.-Y.: Cloud enabled robust authenticated key agreement scheme for telecare medical information system. Connected Science, 33, I-XX. (RETRACTED ARTICLE) (2021)","DOI":"10.1080\/09540091.2021.1901072"},{"issue":"1","key":"906_CR21","doi-asserted-by":"publisher","first-page":"456","DOI":"10.1109\/JSYST.2018.2866067","volume":"13","author":"YK Ever","year":"2018","unstructured":"Ever, Y.K.: Secure-anonymous user authentication scheme for e-healthcare application using wireless medical sensor networks. IEEE Syst. J. 13(1), 456\u2013467 (2018)","journal-title":"IEEE Syst. J."},{"key":"906_CR22","doi-asserted-by":"publisher","first-page":"7452","DOI":"10.1109\/ACCESS.2017.2780124","volume":"6","author":"S Qiu","year":"2017","unstructured":"Qiu, S., et al.: A robust mutual authentication scheme based on elliptic curve cryptography for telecare medical information systems. IEEE Access 6, 7452\u20137463 (2017)","journal-title":"IEEE Access"},{"issue":"2","key":"906_CR23","doi-asserted-by":"publisher","first-page":"150","DOI":"10.1016\/j.dcan.2021.07.002","volume":"8","author":"S Shamshad","year":"2022","unstructured":"Shamshad, S., et al.: An enhanced scheme for mutual authentication for healthcare services. Digit. Commun. Netw. 8(2), 150\u2013161 (2022)","journal-title":"Digit. Commun. Netw."},{"key":"906_CR24","doi-asserted-by":"publisher","DOI":"10.2174\/0126662558274597231204114801","volume":"17","author":"J Jebrane","year":"2024","unstructured":"Jebrane, J., Lazaar, S.: ILAPU-Q: an improved lightweight authentication protocol for IoT based on U-Quark hash function. Recent Adv. Comput. Sci. Commun. 17, e121223224372 (2024). https:\/\/doi.org\/10.2174\/0126662558274597231204114801","journal-title":"Recent Adv. Comput. Sci. Commun."},{"key":"906_CR25","volume":"55","author":"S Shamshad","year":"2020","unstructured":"Shamshad, S., et al.: A secure blockchain-based e-health records storage and sharing scheme. J. Inf. Secur. Appl. 55, 102590 (2020)","journal-title":"J. Inf. Secur. Appl."},{"issue":"7","key":"906_CR26","doi-asserted-by":"publisher","first-page":"5142","DOI":"10.1109\/JIOT.2021.3108668","volume":"9","author":"S Shamshad","year":"2021","unstructured":"Shamshad, S., et al.: An efficient privacy-preserving authenticated key establishment protocol for health monitoring in industrial cyber-physical systems. IEEE Internet Things J. 9(7), 5142\u20135149 (2021)","journal-title":"IEEE Internet Things J."},{"issue":"3","key":"906_CR27","doi-asserted-by":"publisher","first-page":"4831","DOI":"10.1109\/JSYST.2021.3118014","volume":"16","author":"S Shamshad","year":"2021","unstructured":"Shamshad, S., et al.: An identity-based authentication protocol for the telecare medical information system (TMIS) using a physically unclonable function. IEEE Systems Journal 16(3), 4831\u20134838 (2021)","journal-title":"IEEE Systems Journal"},{"key":"906_CR28","doi-asserted-by":"publisher","first-page":"15","DOI":"10.1016\/j.pmcj.2017.09.004","volume":"42","author":"KH Wang","year":"2017","unstructured":"Wang, K.H., Chen, C.M., Fang, W., Wu, T.Y.: A secure authentication scheme for internet of things. Pervasive Mobile Comput. 42, 15\u201326 (2017)","journal-title":"Pervasive Mobile Comput."},{"key":"906_CR29","volume":"58","author":"K Owjanya","year":"2021","unstructured":"Owjanya, K., Dasgupta, M., Ray, S.: Elliptic curve cryptography-based authentication scheme for Internet of Medical Things. J. Inf. Secur. Appl. 58, 102761 (2021)","journal-title":"J. Inf. Secur. Appl."},{"key":"906_CR30","doi-asserted-by":"publisher","first-page":"8281","DOI":"10.1007\/s11227-020-03553-y","volume":"77","author":"VP Gaikwad","year":"2021","unstructured":"Gaikwad, V.P., Tembhurne, J.V., Meshram, C., Lee, C.C.: Provably secure lightweight client authentication scheme with anonymity for TMIS using chaotic hash function. J. Supercomput. 77, 8281\u20138304 (2021)","journal-title":"J. Supercomput."},{"issue":"2","key":"906_CR31","doi-asserted-by":"publisher","first-page":"346","DOI":"10.1109\/JSAC.2020.3020599","volume":"39","author":"BD Deebak","year":"2020","unstructured":"Deebak, B.D., Al-Turjman, F.: Smart mutual authentication protocol for cloud based medical healthcare systems using Internet of Medical Things. IEEE J. Sel. Areas Commun. 39(2), 346\u2013360 (2020)","journal-title":"IEEE J. Sel. Areas Commun."},{"key":"906_CR32","doi-asserted-by":"publisher","unstructured":"Jebrane, J., Lazaar, S.: Comparison study of lightweight hash functions for an authentication solution on IoT. In: Kacprzyk, J., Balas, V.E., Ezziyyani, M. (eds.) Advanced Intelligent Systems for Sustainable Development (AI2SD\u20192020), vol. 1418, p. 97. Springer (2022). https:\/\/doi.org\/10.1007\/978-3-030-90639-9-97","DOI":"10.1007\/978-3-030-90639-9-97"},{"key":"906_CR33","volume":"59","author":"TF Lee","year":"2021","unstructured":"Lee, T.F., Chen, W.Y.: Lightweight fog computing-based authentication protocols using physically unclonable functions for Internet of Medical Things. J. Inf. Secur. Appl. 59, 102817 (2021)","journal-title":"J. Inf. Secur. Appl."},{"key":"906_CR34","unstructured":"Li, P.: Novel lightweight ciphertext-policy attribute-based encryption for IoT applications: a thesis presented in partial fulfilment of the requirements for the degree of Master of Information Science at Massey University, Auckland, New Zealand. Doctoral dissertation, Massey University (2018)"},{"key":"906_CR35","doi-asserted-by":"crossref","unstructured":"Oualha, N., Nguyen, K. T.: Lightweight attribute-based encryption for the internet of things. In: 2016 25th International Conference on Computer Communication and Networks (ICCCN), pp. 1\u20136. IEEE (2016)","DOI":"10.1109\/ICCCN.2016.7568538"},{"key":"906_CR36","doi-asserted-by":"publisher","first-page":"104","DOI":"10.1016\/j.future.2014.10.010","volume":"49","author":"X Yao","year":"2015","unstructured":"Yao, X., Chen, Z., Tian, Y.: A lightweight attribute-based encryption scheme for the Internet of Things. Future Gen. Comput. Syst. 49, 104\u2013112 (2015)","journal-title":"Future Gen. Comput. Syst."},{"issue":"162","key":"906_CR37","first-page":"1","volume":"800","author":"VC Hu","year":"2013","unstructured":"Hu, V.C., Ferraiolo, D., Kuhn, R., Friedman, A.R., Lang, A.J., Cogdell, M.M., Scarfone, K.: Guide to attribute-based access control (ABAC) definition and considerations (draft). NIST Special publication 800(162), 1\u201354 (2013)","journal-title":"NIST Special publication"},{"key":"906_CR38","doi-asserted-by":"crossref","unstructured":"Bethencourt, J., Sahai, A., Waters, B.: Ciphertext-policy attribute-based encryption. In: 2007 IEEE symposium on security and privacy (SP\u201907), pp. 321\u2013334. IEEE (2007)","DOI":"10.1109\/SP.2007.11"},{"issue":"2","key":"906_CR39","doi-asserted-by":"publisher","first-page":"346","DOI":"10.1109\/JSAC.2020.3020599","volume":"39","author":"BD Deebak","year":"2020","unstructured":"Deebak, B.D., Al-Turjman, F.: Smart mutual authentication protocol for cloud-based medical healthcare systems using Internet of Medical Things. IEEE J. Sel. Areas Commun. 39(2), 346\u2013360 (2020)","journal-title":"IEEE J. Sel. Areas Commun."},{"key":"906_CR40","first-page":"1","volume":"11","author":"P Chandrakar","year":"2019","unstructured":"Chandrakar, P., Sinha, S., Ali, R.: Cloud-based authenticated protocol for healthcare monitoring system. J. Ambient Intell. Hum. Comput. 11, 1\u201317 (2019)","journal-title":"J. Ambient Intell. Hum. Comput."},{"key":"906_CR41","doi-asserted-by":"publisher","first-page":"191","DOI":"10.1016\/j.cmpb.2018.02.002","volume":"157","author":"C-T Li","year":"2018","unstructured":"Li, C.-T., Shih, D.-H., Wang, C.-C.: Cloud-assisted mutual authentication and privacy preservation protocol for telecare medical information systems. Comput. Methods Programs Biomed. 157, 191\u2013203 (2018)","journal-title":"Comput. Methods Programs Biomed."},{"issue":"12","key":"906_CR42","doi-asserted-by":"publisher","first-page":"2009","DOI":"10.3390\/sym12122009","volume":"12","author":"CC Lin","year":"2020","unstructured":"Lin, C.C., Chang, C.C., Zheng, Y.Z.: A ring signature-based anonymity authentication scheme for group medical consultation. Symmetry 12(12), 2009 (2020)","journal-title":"Symmetry"},{"issue":"14","key":"906_CR43","doi-asserted-by":"publisher","first-page":"16167","DOI":"10.1007\/s11227-022-04513-4","volume":"78","author":"V Kumar","year":"2022","unstructured":"Kumar, V., et al.: RAPCHI: robust authentication protocol for IoMT-based cloud-healthcare infrastructure. J. Supercomput. 78(14), 16167\u201316196 (2022)","journal-title":"J. Supercomput."},{"key":"906_CR44","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/s10916-014-0182-2","volume":"39","author":"D Guo","year":"2015","unstructured":"Guo, D., Wen, Q., Li, W., Zhang, H., Jin, Z.: A novel authentication scheme using self-certified public keys for telecare medical information systems. J. Med. Syst. 39, 1\u20138 (2015)","journal-title":"J. Med. Syst."}],"container-title":["International Journal of Information Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-024-00906-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10207-024-00906-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-024-00906-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,10,12]],"date-time":"2024-10-12T01:08:44Z","timestamp":1728695324000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10207-024-00906-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,9,3]]},"references-count":44,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2024,12]]}},"alternative-id":["906"],"URL":"https:\/\/doi.org\/10.1007\/s10207-024-00906-z","relation":{},"ISSN":["1615-5262","1615-5270"],"issn-type":[{"value":"1615-5262","type":"print"},{"value":"1615-5270","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,9,3]]},"assertion":[{"value":"3 September 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declaration"}},{"value":"The authors declare no conflict of interest, financial or otherwise.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}