{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,29]],"date-time":"2025-11-29T07:38:44Z","timestamp":1764401924316,"version":"3.37.3"},"reference-count":35,"publisher":"Springer Science and Business Media LLC","issue":"22","license":[{"start":{"date-parts":[[2022,4,11]],"date-time":"2022-04-11T00:00:00Z","timestamp":1649635200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,4,11]],"date-time":"2022-04-11T00:00:00Z","timestamp":1649635200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2022,9]]},"DOI":"10.1007\/s11042-022-12131-8","type":"journal-article","created":{"date-parts":[[2022,4,11]],"date-time":"2022-04-11T08:19:45Z","timestamp":1649665185000},"page":"31977-32003","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":10,"title":["Mutual authentication framework using fog computing in healthcare"],"prefix":"10.1007","volume":"81","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-4424-2592","authenticated-orcid":false,"given":"Sunakshi","family":"Singh","sequence":"first","affiliation":[]},{"given":"Vijay Kumar","family":"Chaurasiya","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,4,11]]},"reference":[{"key":"12131_CR1","doi-asserted-by":"publisher","first-page":"410","DOI":"10.1016\/j.future.2019.02.020","volume":"96","author":"SF Aghili","year":"2019","unstructured":"Aghili SF, Mala H, Shojafar M, Peris-Lopez P (2019) LACO: lightweight three-factor authentication, access control and ownership transfer scheme for e-health systems in IoT. Futur Gener Comput Syst 96:410\u2013424","journal-title":"Futur Gener Comput Syst"},{"key":"12131_CR2","doi-asserted-by":"crossref","unstructured":"Akrivopoulos O, Chatzigiannakis I, Tselios C, Antoniou A (2017) On the deployment of healthcare applications over fog computing infrastructure. In: 2017 IEEE 41st Annual computer software and applications conference (COMPSAC), vol 2. IEEE, pp 288\u2013293","DOI":"10.1109\/COMPSAC.2017.178"},{"key":"12131_CR3","doi-asserted-by":"publisher","first-page":"102502","DOI":"10.1016\/j.jisa.2020.102502","volume":"52","author":"Z Ali","year":"2020","unstructured":"Ali Z, Ghani A, Khan I, Chaudhry SA, Islam SH, Giri D (2020) A robust authentication and access control protocol for securing wireless healthcare sensor networks. Journal of Information Security and Applications 52:102502","journal-title":"Journal of Information Security and Applications"},{"issue":"1","key":"12131_CR4","doi-asserted-by":"publisher","first-page":"47","DOI":"10.1007\/s11277-020-07237-x","volume":"117","author":"BA Alzahrani","year":"2021","unstructured":"Alzahrani BA, Irshad A, Albeshri A, Alsubhi K (2021) A provably secure and lightweight patient-healthcare authentication protocol in wireless body area networks. Wirel Pers Commun 117(1):47\u201369","journal-title":"Wirel Pers Commun"},{"key":"12131_CR5","doi-asserted-by":"publisher","first-page":"483","DOI":"10.1016\/j.future.2016.05.032","volume":"80","author":"R Amin","year":"2018","unstructured":"Amin R, Islam SH, Biswas GP, Khan MK, Kumar N (2018) A robust and anonymous patient monitoring system using wireless medical sensor networks. Futur Gener Comput Syst 80:483\u2013495","journal-title":"Futur Gener Comput Syst"},{"key":"12131_CR6","doi-asserted-by":"publisher","first-page":"42","DOI":"10.1016\/j.comnet.2016.01.006","volume":"101","author":"R Amin","year":"2016","unstructured":"Amin R, Islam SH, Biswas GP, Khan MK, Leng L, Kumar N (2016) Design of an anonymity-preserving three-factor authenticated key exchange protocol for wireless sensor networks. Comput Netw 101:42\u201362","journal-title":"Comput Netw"},{"key":"12131_CR7","doi-asserted-by":"crossref","unstructured":"Armando A, Basin D, Boichut Y, Chevalier Y, Compagna L, Cu\u00e9llar J, Vigneron L (2005) The AVISPA tool for the automated validation of internet security protocols and applications. In: International conference on computer-aided verification. Springer, Berlin, pp 281\u2013285","DOI":"10.1007\/11513988_27"},{"key":"12131_CR8","doi-asserted-by":"crossref","unstructured":"Armando A, Basin D, Cuellar J, Rusinowitch M, Vigan\u00f2 L (2006) Avispa: automated validation of internet security protocols and applications. ERCIM News 64(January). http:\/\/www.avispa-project.org\/","DOI":"10.1007\/11513988_27"},{"key":"12131_CR9","doi-asserted-by":"publisher","first-page":"71","DOI":"10.1016\/j.pmcj.2018.12.007","volume":"52","author":"P Bellavista","year":"2019","unstructured":"Bellavista P, Berrocal J, Corradi A, Das SK, Foschini L, Zanni A (2019) A survey on fog computing for the internet of things. Pervasive and Mobile Computing 52:71\u201399","journal-title":"Pervasive and Mobile Computing"},{"issue":"1871","key":"12131_CR10","first-page":"233","volume":"426","author":"M Burrows","year":"1989","unstructured":"Burrows M, Abadi M, Needham RM (1989) A logic of authentication. Proc R Soc Lond Math Phys Sci 426(1871):233\u2013271","journal-title":"Proc R Soc Lond Math Phys Sci"},{"issue":"3","key":"12131_CR11","doi-asserted-by":"publisher","first-page":"1899","DOI":"10.1007\/s11277-016-3718-6","volume":"94","author":"AK Das","year":"2017","unstructured":"Das AK, Sutrala AK, Odelu V, Goswami A (2017) A secure smartcard-based anonymous user authentication scheme for healthcare applications using wireless medical sensor networks. Wirel Pers Commun 94(3):1899\u20131933","journal-title":"Wirel Pers Commun"},{"issue":"1","key":"12131_CR12","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s10916-019-1471-6","volume":"44","author":"D Dharminder","year":"2020","unstructured":"Dharminder D, Mishra D, Li X (2020) Construction of RSA-based authentication scheme in authorized access to healthcare services. J Med Syst 44(1):1\u20139","journal-title":"J Med Syst"},{"issue":"3","key":"12131_CR13","doi-asserted-by":"publisher","first-page":"141","DOI":"10.1007\/s40860-018-0062-5","volume":"4","author":"PK Dhillon","year":"2018","unstructured":"Dhillon PK, Kalra S (2018) Multi-factor user authentication scheme for IoT-based healthcare services. Journal of Reliable Intelligent Environments 4 (3):141\u2013160","journal-title":"Journal of Reliable Intelligent Environments"},{"key":"12131_CR14","doi-asserted-by":"crossref","unstructured":"Dwivedi AD, Malina L, Dzurenda P, Srivastava G (2019) Optimized blockchain model for internet of things based healthcare applications. In: 2019 42nd International conference on telecommunications and signal processing (TSP). IEEE, pp 135\u2013139","DOI":"10.1109\/TSP.2019.8769060"},{"key":"12131_CR15","doi-asserted-by":"publisher","first-page":"434","DOI":"10.1016\/j.future.2018.09.024","volume":"91","author":"H Hamidi","year":"2019","unstructured":"Hamidi H (2019) An approach to develop the smart health using Internet of Things and authentication based on biometric technology. Futur Gener Comput Syst 91:434\u2013449","journal-title":"Futur Gener Comput Syst"},{"key":"12131_CR16","doi-asserted-by":"publisher","first-page":"27","DOI":"10.1016\/j.jnca.2017.09.002","volume":"98","author":"P Hu","year":"2017","unstructured":"Hu P, Dhelim S, Ning H, Qiu T (2017) Survey on fog computing: architecture, key technologies, applications, and open issues. J Netw Comput Appl 98:27\u201342","journal-title":"J Netw Comput Appl"},{"issue":"10","key":"12131_CR17","doi-asserted-by":"publisher","first-page":"3826","DOI":"10.1007\/s11227-015-1610-x","volume":"72","author":"Q Jiang","year":"2016","unstructured":"Jiang Q, Khan MK, Lu X, Ma J, He D (2016) A privacy-preserving three-factor authentication protocol for e-Health clouds. J Supercomput 72(10):3826\u20133849","journal-title":"J Supercomput"},{"key":"12131_CR18","doi-asserted-by":"publisher","first-page":"3376","DOI":"10.1109\/ACCESS.2017.2673239","volume":"5","author":"Q Jiang","year":"2017","unstructured":"Jiang Q, Zeadally S, Ma J, He D (2017) Lightweight three-factor authentication and key agreement protocol for internet-integrated wireless sensor networks. IEEE Access 5:3376\u20133392","journal-title":"IEEE Access"},{"issue":"177","key":"12131_CR19","doi-asserted-by":"publisher","first-page":"203","DOI":"10.1090\/S0025-5718-1987-0866109-5","volume":"48","author":"N Koblitz","year":"1987","unstructured":"Koblitz N (1987) Elliptic curve cryptosystems. Math Comput 48 (177):203\u2013209","journal-title":"Math Comput"},{"issue":"7","key":"12131_CR20","doi-asserted-by":"publisher","first-page":"1482","DOI":"10.3390\/s17071482","volume":"17","author":"CT Li","year":"2017","unstructured":"Li CT, Wu TY, Chen CL, Lee CC, Chen CM (2017) An efficient user authentication and user anonymity scheme with provably security for IoT-based medical care system. Sensors 17(7):1482","journal-title":"Sensors"},{"key":"12131_CR21","doi-asserted-by":"crossref","unstructured":"Miller VS (1985) Use of elliptic curves in cryptography. In: Conference on the theory and application of cryptographic techniques. Springer, Berlin, pp 417\u2013426","DOI":"10.1007\/3-540-39799-X_31"},{"issue":"9","key":"12131_CR22","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s10916-015-0265-8","volume":"39","author":"O Mir","year":"2015","unstructured":"Mir O, van der Weide T, Lee CC (2015) A secure user anonymity and authentication scheme using AVISPA for telecare medical information systems. J Med Syst 39(9):1\u201316","journal-title":"J Med Syst"},{"issue":"1","key":"12131_CR23","doi-asserted-by":"publisher","first-page":"416","DOI":"10.1109\/COMST.2017.2771153","volume":"20","author":"C Mouradian","year":"2017","unstructured":"Mouradian C, Naboulsi D, Yangui S, Glitho RH, Morrow MJ, Polakos PA (2017) A comprehensive survey on fog computing: State-of-the-art and research challenges. IEEE Communications Surveys & Tutorials 20(1):416\u2013464","journal-title":"IEEE Communications Surveys & Tutorials"},{"issue":"3","key":"12131_CR24","doi-asserted-by":"publisher","first-page":"1826","DOI":"10.1109\/COMST.2018.2814571","volume":"20","author":"M Mukherjee","year":"2018","unstructured":"Mukherjee M, Shu L, Wang D (2018) Survey of fog computing: Fundamental, network applications, and research challenges. IEEE Communications Surveys & Tutorials 20(3):1826\u20131857","journal-title":"IEEE Communications Surveys & Tutorials"},{"key":"12131_CR25","doi-asserted-by":"publisher","first-page":"100092","DOI":"10.1016\/j.imu.2018.02.003","volume":"16","author":"N Radhakrishnan","year":"2019","unstructured":"Radhakrishnan N, Karuppiah M (2019) An efficient and secure remote user mutual authentication scheme using smart cards for Telecare medical information systems. Informatics in Medicine Unlocked 16:100092","journal-title":"Informatics in Medicine Unlocked"},{"issue":"5","key":"12131_CR26","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s10916-019-1251-3","volume":"43","author":"K Renuka","year":"2019","unstructured":"Renuka K, Kumari S, Li X (2019) Design of a secure three-factor authentication scheme for smart healthcare. J Med Syst 43(5):1\u201312","journal-title":"J Med Syst"},{"issue":"1","key":"12131_CR27","doi-asserted-by":"publisher","first-page":"57","DOI":"10.1016\/j.jksuci.2017.07.001","volume":"32","author":"KA Shakil","year":"2020","unstructured":"Shakil KA, Zareen FJ, Alam M, Jabin S (2020) BAMHealthCloud: a biometric authentication and data management system for healthcare data in the cloud. Journal of King Saud University-Computer and Information Sciences 32 (1):57\u201364","journal-title":"Journal of King Saud University-Computer and Information Sciences"},{"key":"12131_CR28","doi-asserted-by":"publisher","first-page":"1643","DOI":"10.1007\/s10586-020-03211-1","volume":"24","author":"S Singh","year":"2021","unstructured":"Singh S, Chaurasiya VK (2021) Mutual authentication scheme of IoT devices in fog computing environment. Clust Comput 24:1643\u20131657. https:\/\/doi.org\/10.1007\/s10586-020-03211-1","journal-title":"Clust Comput"},{"issue":"2","key":"12131_CR29","doi-asserted-by":"publisher","first-page":"21","DOI":"10.4018\/IJHISI.20210401.oa2","volume":"16","author":"D Singh","year":"2021","unstructured":"Singh D, Kumar B, Singh S, Chand S (2021) A secure iot-based mutual authentication for healthcare applications in wireless sensor networks using ECC. International Journal of Healthcare Information Systems and Informatics (IJHISI) 16(2):21\u201348","journal-title":"International Journal of Healthcare Information Systems and Informatics (IJHISI)"},{"issue":"5","key":"12131_CR30","doi-asserted-by":"publisher","first-page":"942","DOI":"10.1109\/TDSC.2018.2828306","volume":"17","author":"J Srinivas","year":"2018","unstructured":"Srinivas J, Das AK, Kumar N, Rodrigues JJ (2018) Cloud centric authentication for wearable healthcare monitoring system. IEEE Transactions on Dependable and Secure Computing 17(5):942\u2013956","journal-title":"IEEE Transactions on Dependable and Secure Computing"},{"issue":"6","key":"12131_CR31","doi-asserted-by":"publisher","first-page":"1222","DOI":"10.1109\/JSAC.2019.2904349","volume":"37","author":"M Usman","year":"2019","unstructured":"Usman M, Jan MA, He X, Chen J (2019) P2DCA: a privacy-preserving-based data collection and analysis framework for IoMT applications. IEEE Journal on Selected Areas in Communications 37(6):1222\u20131230","journal-title":"IEEE Journal on Selected Areas in Communications"},{"key":"12131_CR32","doi-asserted-by":"publisher","first-page":"475","DOI":"10.1016\/j.future.2018.09.017","volume":"91","author":"M Wazid","year":"2019","unstructured":"Wazid M, Das AK, Kumar N, Vasilakos AV (2019) Design of secure key management and user authentication scheme for fog computing services. Futur Gener Comput Syst 91:475\u2013492","journal-title":"Futur Gener Comput Syst"},{"key":"12131_CR33","doi-asserted-by":"publisher","first-page":"727","DOI":"10.1016\/j.future.2017.08.042","volume":"82","author":"F Wu","year":"2018","unstructured":"Wu F, Li X, Sangaiah AK, Xu L, Kumari S, Wu L, Shen J (2018) A lightweight and robust two-factor authentication scheme for personalized healthcare systems using wireless medical sensor networks. Futur Gener Comput Syst 82:727\u2013737","journal-title":"Futur Gener Comput Syst"},{"issue":"14","key":"12131_CR34","doi-asserted-by":"publisher","first-page":"e5295","DOI":"10.1002\/cpe.5295","volume":"31","author":"Z Xu","year":"2019","unstructured":"Xu Z, Xu C, Chen H, Yang F (2019) A lightweight anonymous mutual authentication and key agreement scheme for WBAN. Concurrency and Computation: Practice and Experience 31(14):e5295","journal-title":"Concurrency and Computation: Practice and Experience"},{"key":"12131_CR35","doi-asserted-by":"publisher","first-page":"244","DOI":"10.1016\/j.future.2018.08.038","volume":"91","author":"L Zhou","year":"2019","unstructured":"Zhou L, Li X, Yeh KH, Su C, Chiu W (2019) Lightweight IoT-based authentication scheme in cloud computing circumstance. Futur Gener Comput Syst 91:244\u2013251","journal-title":"Futur Gener Comput Syst"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-022-12131-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11042-022-12131-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-022-12131-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,8,22]],"date-time":"2022-08-22T05:18:11Z","timestamp":1661145491000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11042-022-12131-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,4,11]]},"references-count":35,"journal-issue":{"issue":"22","published-print":{"date-parts":[[2022,9]]}},"alternative-id":["12131"],"URL":"https:\/\/doi.org\/10.1007\/s11042-022-12131-8","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"type":"print","value":"1380-7501"},{"type":"electronic","value":"1573-7721"}],"subject":[],"published":{"date-parts":[[2022,4,11]]},"assertion":[{"value":"14 May 2021","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"23 August 2021","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"3 January 2022","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"11 April 2022","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"\u2018The author(s) declare that there is no conflict of interest.\u2019","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"<!--Emphasis Type='Bold' removed-->Conflict of Interests"}}]}}