{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,30]],"date-time":"2025-12-30T03:33:47Z","timestamp":1767065627980},"reference-count":15,"publisher":"Springer Science and Business Media LLC","issue":"S5","license":[{"start":{"date-parts":[[2018,1,12]],"date-time":"2018-01-12T00:00:00Z","timestamp":1515715200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Cluster Comput"],"published-print":{"date-parts":[[2019,9]]},"DOI":"10.1007\/s10586-017-1669-7","type":"journal-article","created":{"date-parts":[[2018,1,12]],"date-time":"2018-01-12T04:18:05Z","timestamp":1515730685000},"page":"12495-12505","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":9,"title":["Augmented lightweight security scheme with access control model for wireless medical sensor networks"],"prefix":"10.1007","volume":"22","author":[{"given":"A.","family":"Vaniprabha","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"P.","family":"Poongodi","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2018,1,12]]},"reference":[{"issue":"1","key":"1669_CR1","doi-asserted-by":"publisher","first-page":"316","DOI":"10.1109\/JBHI.2013.2268897","volume":"18","author":"D He","year":"2014","unstructured":"He, D.: A novel and lightweight system to secure wireless medical sensor networks. IEEE J. Biomed. Health Inform. 18(1), 316\u2013326 (2014)","journal-title":"IEEE J. Biomed. Health Inform."},{"issue":"2","key":"1669_CR2","doi-asserted-by":"publisher","first-page":"158","DOI":"10.1109\/4233.767091","volume":"3","author":"RSH Istepanian","year":"1999","unstructured":"Istepanian, R.S.H.: Telemedicine in the United Kingdom: current status and future prospects. IEEE Trans. Inf. Tecnol. Biomed. 3(2), 158\u2013159 (1999)","journal-title":"IEEE Trans. Inf. Tecnol. Biomed."},{"issue":"12","key":"1669_CR3","doi-asserted-by":"publisher","first-page":"1431","DOI":"10.1109\/TBME.2002.805457","volume":"49","author":"S Guill\u00e9n","year":"2002","unstructured":"Guill\u00e9n, S., Arredondo, M.T., Traver, V., Garc\u00eda, J.M., Fern\u00e1ndez, C.: Multimedia telehomecare system using standard TV set. IEEE Trans. Biomed. Eng. 49(12), 1431\u20131437 (2002)","journal-title":"IEEE Trans. Biomed. Eng."},{"issue":"4","key":"1669_CR4","doi-asserted-by":"publisher","first-page":"16","DOI":"10.1109\/MPRV.2004.18","volume":"3","author":"K Lorincz","year":"2004","unstructured":"Lorincz, K., Malan, D., Fulford-Jones, T., Nawoj, A., Clavel, A., Shnayder, V., Mainland, G., Moulton, S., Welsh, M.: Sensor networks for emergency response: challenges and opportunities. IEEE Pervasive Comput. 3(4), 16\u201323 (2004)","journal-title":"IEEE Pervasive Comput."},{"key":"1669_CR5","doi-asserted-by":"crossref","unstructured":"Garcia-Morchon, O., Falck, T., Heer, T., Wehrle, K.: Mobile security for pervasive medical sensor networks. In: Mobile and Ubiquitous Systems: Networking and Services, MobiQuitous. (2009)","DOI":"10.4108\/ICST.MOBIQUITOUS2009.6832"},{"issue":"3","key":"1669_CR6","doi-asserted-by":"publisher","first-page":"662","DOI":"10.1109\/TIFS.2016.2631950","volume":"12","author":"A Zhang","year":"2016","unstructured":"Zhang, A., Wang, L., Ye, X., Lin, X.: Light-weight and robust security-aware D2D-assist data transmission protocol for mobile-health systems. IEEE Trans. Inf. Forensics Secur 12(3), 662\u2013675 (2016)","journal-title":"IEEE Trans. Inf. Forensics Secur"},{"key":"1669_CR7","doi-asserted-by":"crossref","unstructured":"Musale, V., Chaudhari, D.: Novel approach towards securing wireless sensor network systems for health care. In: International Conference on Global Trends in Signal Processing, Information Computing and Communication. (2016)","DOI":"10.1109\/ICGTSPICC.2016.7955290"},{"issue":"18","key":"1669_CR8","doi-asserted-by":"publisher","first-page":"3274","DOI":"10.1049\/iet-com.2011.0097","volume":"6","author":"J Pan","year":"2012","unstructured":"Pan, J., Li, S., Xu, Z.: Security mechanism for a wireless-sensor-network based healthcare monitoring system. IET Commun. 6(18), 3274\u20133280 (2012)","journal-title":"IET Commun."},{"issue":"4","key":"1669_CR9","doi-asserted-by":"publisher","first-page":"22","DOI":"10.1109\/MWC.2013.6590047","volume":"20","author":"D Trcek","year":"2013","unstructured":"Trcek, D., Brodnik, A.: Hard and soft security provisioning for computationally weak pervasive computing systems in E-health. IEEE Wirel. Commun. 20(4), 22\u201329 (2013)","journal-title":"IEEE Wirel. Commun."},{"issue":"3","key":"1669_CR10","doi-asserted-by":"publisher","first-page":"1227","DOI":"10.1109\/TII.2017.2687618","volume":"13","author":"H Huang","year":"2017","unstructured":"Huang, H., Gong, T., Ye, N., Wang, R., Dou, Y.: Private and secured medical data transmission and analysis for wireless sensing healthcare system. IEEE Trans. Inform. 13(3), 1227\u20131237 (2017)","journal-title":"IEEE Trans. Inform."},{"issue":"3","key":"1669_CR11","doi-asserted-by":"publisher","first-page":"763","DOI":"10.1109\/JBHI.2015.2510403","volume":"20","author":"HA Maw","year":"2016","unstructured":"Maw, H.A., Xiao, H., Christianson, B., Malcolm, J.A.: BTG-AC: break-the-glass access control model for medical data in wireless sensor networks. IEEE J. Biomed. Health Inform. 20(3), 763\u2013774 (2016)","journal-title":"IEEE J. Biomed. Health Inform."},{"issue":"1","key":"1669_CR12","doi-asserted-by":"publisher","first-page":"254","DOI":"10.1109\/JSEN.2015.2475298","volume":"16","author":"P Kumar","year":"2016","unstructured":"Kumar, P., Gurtov, A., Iinatti, J.: Lightweight and secure session-key establishment scheme in smart home environments. IEEE Sens. J. 16(1), 254\u2013264 (2016)","journal-title":"IEEE Sens. J."},{"issue":"13","key":"1669_CR13","doi-asserted-by":"publisher","first-page":"5389","DOI":"10.1109\/JSEN.2016.2554625","volume":"16","author":"F Li","year":"2016","unstructured":"Li, F., Hong, J.: Efficient certificateless access control for wireless body area networks. IEEE Sens. J. 16(13), 5389\u20135396 (2016)","journal-title":"IEEE Sens. J."},{"issue":"1","key":"1669_CR14","doi-asserted-by":"publisher","first-page":"422","DOI":"10.1109\/TMC.2016.2549008","volume":"16","author":"B Liu","year":"2017","unstructured":"Liu, B., Yan, Z., Chen, C.W.: Medium access control for wireless body area networks with QoS provisioning and energy efficient design. IEEE Trans. Mobile Comput. 16(1), 422\u2013434 (2017)","journal-title":"IEEE Trans. Mobile Comput."},{"issue":"2","key":"1669_CR15","doi-asserted-by":"publisher","first-page":"94","DOI":"10.1109\/TMSCS.2016.2525997","volume":"2","author":"C Hu","year":"2016","unstructured":"Hu, C., Li, H., Huo, Y.: Secure and efficient data communication protocol for wireless body area networks. IEEE Trans. Multi-Scale Comput. Syst. 2(2), 94\u2013107 (2016)","journal-title":"IEEE Trans. Multi-Scale Comput. Syst."}],"container-title":["Cluster Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10586-017-1669-7\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-017-1669-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-017-1669-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,11,21]],"date-time":"2019-11-21T18:03:16Z","timestamp":1574359396000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10586-017-1669-7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,1,12]]},"references-count":15,"journal-issue":{"issue":"S5","published-print":{"date-parts":[[2019,9]]}},"alternative-id":["1669"],"URL":"https:\/\/doi.org\/10.1007\/s10586-017-1669-7","relation":{},"ISSN":["1386-7857","1573-7543"],"issn-type":[{"value":"1386-7857","type":"print"},{"value":"1573-7543","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,1,12]]},"assertion":[{"value":"27 November 2017","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"26 December 2017","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"28 December 2017","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"12 January 2018","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}