{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,31]],"date-time":"2025-12-31T00:54:24Z","timestamp":1767142464000,"version":"build-2238731810"},"reference-count":46,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2021,10,7]],"date-time":"2021-10-07T00:00:00Z","timestamp":1633564800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,10,7]],"date-time":"2021-10-07T00:00:00Z","timestamp":1633564800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Supercomput"],"published-print":{"date-parts":[[2022,3]]},"DOI":"10.1007\/s11227-021-04114-7","type":"journal-article","created":{"date-parts":[[2021,10,7]],"date-time":"2021-10-07T05:46:42Z","timestamp":1633585602000},"page":"5903-5930","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["A group key-based lightweight Mutual Authentication and Key Agreement (MAKA) protocol for multi-server environment"],"prefix":"10.1007","volume":"78","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-1267-5967","authenticated-orcid":false,"given":"Prasanta Kumar","family":"Roy","sequence":"first","affiliation":[]},{"given":"Ansuman","family":"Bhattacharya","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,10,7]]},"reference":[{"key":"4114_CR1","unstructured":"Ramson SJ, Moni DJ (2017) Applications of wireless sensor networks-a survey. In: 2017 International Conference on Innovations in Electrical, Electronics, Instrumentation and Media Technology (ICEEIMT), IEEE, pp 325\u2013329"},{"key":"4114_CR2","doi-asserted-by":"crossref","unstructured":"Shen X, Wang Z, Sun Y (2004) Wireless sensor networks for industrial applications. In: Fifth World Congress on Intelligent Control and Automation (IEEE Cat. No. 04EX788), IEEE, vol\u00a04, pp 3636\u20133640","DOI":"10.1109\/WCICA.2004.1343273"},{"key":"4114_CR3","doi-asserted-by":"publisher","first-page":"622","DOI":"10.1109\/ACCESS.2015.2435000","volume":"3","author":"Z Sheng","year":"2015","unstructured":"Sheng Z, Mahapatra C, Zhu C, Leung VC (2015) Recent advances in industrial wireless sensor networks toward efficient management in iot. IEEE Access 3:622\u2013637","journal-title":"IEEE Access"},{"issue":"10","key":"4114_CR4","doi-asserted-by":"publisher","first-page":"4258","DOI":"10.1109\/TIE.2009.2015754","volume":"56","author":"VC Gungor","year":"2009","unstructured":"Gungor VC, Hancke GP (2009) Industrial wireless sensor networks: Challenges, design principles, and technical approaches. IEEE Trans Ind Electron 56(10):4258\u20134265","journal-title":"IEEE Trans Ind Electron"},{"key":"4114_CR5","doi-asserted-by":"publisher","first-page":"534","DOI":"10.1016\/j.compeleceng.2017.08.003","volume":"69","author":"S Challa","year":"2018","unstructured":"Challa S, Das AK, Odelu V, Kumar N, Kumari S, Khan MK, Vasilakos AV (2018) An efficient ecc-based provably secure three-factor user authentication and key agreement protocol for wireless healthcare sensor networks. Comput Elect Eng 69:534\u2013554","journal-title":"Comput Elect Eng"},{"key":"4114_CR6","doi-asserted-by":"publisher","first-page":"53922","DOI":"10.1109\/ACCESS.2019.2912870","volume":"7","author":"Z Xu","year":"2019","unstructured":"Xu Z, Xu C, Liang W, Xu J, Chen H (2019) A lightweight mutual authentication and key agreement scheme for medical internet of things. IEEE Access 7:53922\u201353931","journal-title":"IEEE Access"},{"key":"4114_CR7","unstructured":"Inc G (2018) Gartner identifies top 10 strategic iot technologies and trends. [online] available:https:\/\/www.gartner.com\/en\/newsroom\/press-releases\/2018-11-07-gartner-identifies-top-10-strategic-iot-technologies-and-trends"},{"issue":"9","key":"4114_CR8","doi-asserted-by":"publisher","first-page":"2052","DOI":"10.1109\/TIFS.2016.2573746","volume":"11","author":"D He","year":"2016","unstructured":"He D, Zeadally S, Kumar N, Wu W (2016) Efficient and anonymous mobile user authentication protocol using self-certified public key cryptography for multi-server architectures. IEEE Trans Inf Forensics Secur 11(9):2052\u20132064","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"4114_CR9","doi-asserted-by":"crossref","unstructured":"Limbasiya T, Sahay SK, Sridharan B (2021) Privacy-preserving mutual authentication and key agreement scheme for multi-server healthcare system. Information Systems Frontiers pp 1\u201314","DOI":"10.1007\/s10796-021-10115-x"},{"key":"4114_CR10","doi-asserted-by":"publisher","first-page":"102660","DOI":"10.1016\/j.jnca.2020.102660","volume":"161","author":"I ul Haq","year":"2020","unstructured":"ul Haq I, Wang J, Zhu Y et al (2020b) Secure two-factor lightweight authentication protocol using self-certified public key cryptography for multi-server 5g networks. J Netw Comput Appl 161:102660","journal-title":"J Netw Comput Appl"},{"key":"4114_CR11","doi-asserted-by":"publisher","first-page":"28096","DOI":"10.1109\/ACCESS.2020.2969986","volume":"8","author":"TY Wu","year":"2020","unstructured":"Wu TY, Lee Z, Obaidat MS, Kumari S, Kumar S, Chen CM (2020) An authenticated key exchange protocol for multi-server architecture in 5g networks. IEEE Access 8:28096\u201328108","journal-title":"IEEE Access"},{"key":"4114_CR12","doi-asserted-by":"publisher","first-page":"66","DOI":"10.1016\/j.jnca.2019.01.017","volume":"131","author":"B Ying","year":"2019","unstructured":"Ying B, Nayak A (2019) Lightweight remote user authentication protocol for multi-server 5g networks using self-certified public key cryptography. J Netw Comput Appl 131:66\u201374","journal-title":"J Netw Comput Appl"},{"key":"4114_CR13","doi-asserted-by":"crossref","unstructured":"Ng B, Si A, Lau RW, Li FW (2002) A multi-server architecture for distributed virtual walkthrough. In: Proceedings of the ACM symposium on Virtual reality software and technology, pp 163\u2013170","DOI":"10.1145\/585740.585768"},{"issue":"2","key":"4114_CR14","doi-asserted-by":"publisher","first-page":"213","DOI":"10.1023\/A:1019968506856","volume":"22","author":"MG Rahman","year":"2002","unstructured":"Rahman MG, Imai H (2002) Security in wireless communication. Wirel Pers Commun 22(2):213\u2013228","journal-title":"Wirel Pers Commun"},{"key":"4114_CR15","doi-asserted-by":"crossref","unstructured":"Samfat D, Molva R, Asokan N (1995) Untraceability in mobile networks. In: Proceedings of the 1st Annual International Conference on Mobile Computing and Networking, pp 26\u201336","DOI":"10.1145\/215530.215548"},{"key":"4114_CR16","doi-asserted-by":"crossref","unstructured":"Steinbrecher S, K\u00f6psell S (2003) Modelling unlinkability. In: International Workshop on Privacy Enhancing Technologies, Springer, pp 32\u201347","DOI":"10.1007\/978-3-540-40956-4_3"},{"issue":"1","key":"4114_CR17","doi-asserted-by":"publisher","first-page":"81","DOI":"10.1109\/MSP.2010.49","volume":"8","author":"H Khurana","year":"2010","unstructured":"Khurana H, Hadley M, Lu N, Frincke DA (2010) Smart-grid security issues. IEEE Secur Priv 8(1):81\u201385","journal-title":"IEEE Secur Priv"},{"key":"4114_CR18","doi-asserted-by":"crossref","unstructured":"Mont MC, Bramhall P, Harrison K (2003) A flexible role-based secure messaging service: Exploiting ibe technology for privacy in health care. In: 14th International Workshop on Database and Expert Systems Applications, 2003. Proceedings., IEEE, pp 432\u2013437","DOI":"10.1109\/DEXA.2003.1232060"},{"key":"4114_CR19","doi-asserted-by":"crossref","unstructured":"Eldewahi AE, Sharfi TM, Mansor AA, Mohamed NA, Alwahbani SM (2015) Ssl\/tls attacks: analysis and evaluation. 2015 International Conference on Computing. Control, Networking, Electronics and Embedded Systems Engineering (ICCNEEE), IEEE, pp 203\u2013208","DOI":"10.1109\/ICCNEEE.2015.7381362"},{"key":"4114_CR20","doi-asserted-by":"crossref","unstructured":"Sirohi P, Agarwal A, Tyagi S (2016) A comprehensive study on security attacks on ssl\/tls protocol. In: 2016 2nd International Conference on Next Generation Computing Technologies (NGCT), IEEE, pp 893\u2013898","DOI":"10.1109\/NGCT.2016.7877537"},{"key":"4114_CR21","doi-asserted-by":"publisher","first-page":"102639","DOI":"10.1016\/j.jisa.2020.102639","volume":"55","author":"I ul Haq","year":"2020","unstructured":"ul Haq I, Wang J, Zhu Y, Maqbool S (2020a) A survey of authenticated key agreement protocols for multi-server architecture. Journal of Information Security and Applications 55:102639","journal-title":"Journal of Information Security and Applications"},{"key":"4114_CR22","doi-asserted-by":"publisher","first-page":"101619","DOI":"10.1016\/j.cose.2019.101619","volume":"88","author":"D Wang","year":"2020","unstructured":"Wang D, Zhang X, Zhang Z, Wang P (2020) Understanding security failures of multi-factor authentication schemes for multi-server environments. Comput Secur 88:101619","journal-title":"Comput Secur"},{"issue":"1","key":"4114_CR23","doi-asserted-by":"publisher","first-page":"27","DOI":"10.1016\/j.dcan.2017.09.004","volume":"4","author":"A Kumar","year":"2018","unstructured":"Kumar A, Om H (2018) An improved and secure multiserver authentication scheme based on biometrics and smartcard. Digit Commun Netw 4(1):27\u201338","journal-title":"Digit Commun Netw"},{"issue":"1","key":"4114_CR24","doi-asserted-by":"publisher","first-page":"140","DOI":"10.1016\/j.dcan.2020.05.001","volume":"7","author":"I ul Haq","year":"2021","unstructured":"ul Haq I, Wang J, Zhu Y, Maqbool S et al (2021) An efficient hash-based authenticated key agreement scheme for multi-server architecture resilient to key compromise impersonation. Digit Commun Netw 7(1):140\u2013150","journal-title":"Digit Commun Netw"},{"key":"4114_CR25","doi-asserted-by":"crossref","unstructured":"Kocher P, Jaffe J, Jun B (1999) Differential power analysis. In: Annual International Cryptology Conference, Springer, pp 388\u2013397","DOI":"10.1007\/3-540-48405-1_25"},{"issue":"5","key":"4114_CR26","doi-asserted-by":"publisher","first-page":"541","DOI":"10.1109\/TC.2002.1004593","volume":"51","author":"TS Messerges","year":"2002","unstructured":"Messerges TS, Dabbish EA, Sloan RH (2002) Examining smart-card security under the threat of power analysis attacks. IEEE Trans Comput 51(5):541\u2013552","journal-title":"IEEE Trans Comput"},{"issue":"2","key":"4114_CR27","doi-asserted-by":"publisher","first-page":"855","DOI":"10.1007\/s11276-018-1828-7","volume":"26","author":"S Zhou","year":"2018","unstructured":"Zhou S, Gan Q, Wang X (2018) Authentication scheme based on smart card in multi-server environment. Wirel Netw 26(2):855\u2013863","journal-title":"Wirel Netw"},{"issue":"6","key":"4114_CR28","doi-asserted-by":"publisher","first-page":"38","DOI":"10.1109\/MCE.2018.2851744","volume":"7","author":"F Wu","year":"2018","unstructured":"Wu F, Li X, Xu L, Sangaiah AK, Rodrigues JJ (2018) Authentication protocol for distributed cloud computing: an explanation of the security situations for internet-of-things-enabled devices. IEEE Consum Electron Mag 7(6):38\u201344","journal-title":"IEEE Consum Electron Mag"},{"issue":"1","key":"4114_CR29","doi-asserted-by":"publisher","first-page":"74","DOI":"10.1109\/MPRV.2008.6","volume":"7","author":"DR Raymond","year":"2008","unstructured":"Raymond DR, Midkiff SF (2008) Denial-of-service in wireless sensor networks: Attacks and defenses. IEEE Pervasive Comput 7(1):74\u201381","journal-title":"IEEE Pervasive Comput"},{"issue":"10","key":"4114_CR30","doi-asserted-by":"publisher","first-page":"54","DOI":"10.1109\/MC.2002.1039518","volume":"35","author":"AD Wood","year":"2002","unstructured":"Wood AD, Stankovic JA (2002) Denial of service in sensor networks. Computer 35(10):54\u201362","journal-title":"Computer"},{"key":"4114_CR31","doi-asserted-by":"publisher","unstructured":"Roy PK, Bhattacharya A (2021) Desynchronization resistant privacy preserving user authentication protocol for location based services. Peer-to-Peer Networking and Applications pp 1\u201315. https:\/\/doi.org\/10.1007\/s12083-021-01194-3","DOI":"10.1007\/s12083-021-01194-3"},{"issue":"2","key":"4114_CR32","doi-asserted-by":"publisher","first-page":"1275","DOI":"10.1109\/TNSM.2021.3071087","volume":"18","author":"LD Tsobdjou","year":"2021","unstructured":"Tsobdjou LD, Pierre S, Quintero A (2021) A new mutual authentication and key agreement protocol for mobile client-server environment. IEEE Trans Netw Serv Manag 18(2):1275\u20131286","journal-title":"IEEE Trans Netw Serv Manag"},{"issue":"2","key":"4114_CR33","doi-asserted-by":"publisher","first-page":"198","DOI":"10.1109\/TIT.1983.1056650","volume":"29","author":"D Dolev","year":"1983","unstructured":"Dolev D, Yao A (1983) On the security of public key protocols. IEEE Trans Inf Theory 29(2):198\u2013208","journal-title":"IEEE Trans Inf Theory"},{"key":"4114_CR34","first-page":"129","volume":"2005","author":"Z Cheng","year":"2005","unstructured":"Cheng Z, Nistazakis M, Comley R, Vasiu L (2005) On the indistinguishability-based security model of key agreement protocols-simple cases. IACR Cryptol ePrint Arch 2005:129","journal-title":"IACR Cryptol ePrint Arch"},{"issue":"11","key":"4114_CR35","first-page":"13863","volume":"38","author":"CC Lee","year":"2011","unstructured":"Lee CC, Lin TH, Chang RX (2011) A secure dynamic id based remote user authentication scheme for multi-server environment using smart cards. Expert Syst Appl 38(11):13863\u201313870","journal-title":"Expert Syst Appl"},{"issue":"1","key":"4114_CR36","doi-asserted-by":"publisher","first-page":"24","DOI":"10.1016\/j.csi.2007.10.007","volume":"31","author":"YP Liao","year":"2009","unstructured":"Liao YP, Wang SS (2009) A secure dynamic id based remote user authentication scheme for multi-server environment. Comput Stand Interf 31(1):24\u201329","journal-title":"Comput Stand Interf"},{"key":"4114_CR37","doi-asserted-by":"publisher","DOI":"10.1201\/9780429466335","volume-title":"Handbook of applied cryptography","author":"AJ Menezes","year":"2018","unstructured":"Menezes AJ, Van Oorschot PC, Vanstone SA (2018) Handbook of applied cryptography. CRC Press, Boca Raton"},{"issue":"2","key":"4114_CR38","doi-asserted-by":"publisher","first-page":"431","DOI":"10.1109\/TWC.2010.120610.101018","volume":"10","author":"D He","year":"2010","unstructured":"He D, Bu J, Chan S, Chen C, Yin M (2010) Privacy-preserving universal authentication protocol for wireless communications. IEEE Trans Wirel Commun 10(2):431\u2013436","journal-title":"IEEE Trans Wirel Commun"},{"issue":"1","key":"4114_CR39","doi-asserted-by":"publisher","first-page":"357","DOI":"10.1109\/TWC.2015.2473165","volume":"15","author":"CC Chang","year":"2015","unstructured":"Chang CC, Le HD (2015) A provably secure, efficient, and flexible authentication scheme for ad hoc wireless sensor networks. IEEE Trans Wirel Commun 15(1):357\u2013366","journal-title":"IEEE Trans Wirel Commun"},{"key":"4114_CR40","doi-asserted-by":"crossref","unstructured":"Rogaway P, Shrimpton T (2004) Cryptographic hash-function basics: Definitions, implications, and separations for preimage resistance, second-preimage resistance, and collision resistance. In: International workshop on fast software encryption, Springer, pp 371\u2013388","DOI":"10.1007\/978-3-540-25937-4_24"},{"issue":"6","key":"4114_CR41","doi-asserted-by":"publisher","first-page":"1943","DOI":"10.1007\/s12083-020-00929-y","volume":"13","author":"R Shashidhara","year":"2020","unstructured":"Shashidhara R, Bojjagani S, Maurya AK, Kumari S, Xiong H (2020) A robust user authentication protocol with privacy-preserving for roaming service in mobility environments. Peer-to-Peer Netw Appl 13(6):1943\u20131966","journal-title":"Peer-to-Peer Netw Appl"},{"issue":"3","key":"4114_CR42","doi-asserted-by":"publisher","first-page":"993","DOI":"10.1007\/s11277-013-1243-4","volume":"73","author":"F Wen","year":"2013","unstructured":"Wen F, Susilo W, Yang G (2013) A secure and effective anonymous user authentication scheme for roaming service in global mobility networks. Wirel Person Commun 73(3):993\u20131004","journal-title":"Wirel Person Commun"},{"key":"4114_CR43","doi-asserted-by":"crossref","unstructured":"Armando A, Basin D, Boichut Y, Chevalier Y, Compagna L, Cu\u00e9llar J, Drielsma PH, H\u00e9am PC, Kouchnarenko O, Mantovani J et\u00a0al (2005) The avispa tool for the automated validation of internet security protocols and applications. In: International Conference on Computer Aided Verification, pp 281\u2013285","DOI":"10.1007\/11513988_27"},{"key":"4114_CR44","unstructured":"Von\u00a0Oheimb D (2005) The high-level protocol specification language hlpsl developed in the eu project avispa. In: Proceedings of APPSEM 2005 workshop, pp 1\u201317"},{"key":"4114_CR45","unstructured":"Team T et\u00a0al (2006) Avispa v1. 1 user manual. Information society technologies programme (2006). http:\/\/avispa-project.org"},{"key":"4114_CR46","doi-asserted-by":"crossref","unstructured":"Su\u00e1rez-Albela M, Fern\u00e1ndez-Caram\u00e9s TM, Fraga-Lamas P, Castedo L (2018) A practical performance comparison of ecc and rsa for resource-constrained iot devices. In: 2018 Global Internet of Things Summit (GIoTS), IEEE, pp 1\u20136","DOI":"10.1109\/GIOTS.2018.8534575"}],"updated-by":[{"DOI":"10.1007\/s11227-021-04144-1","type":"correction","label":"Correction","source":"publisher","updated":{"date-parts":[[2021,10,22]],"date-time":"2021-10-22T00:00:00Z","timestamp":1634860800000}}],"container-title":["The Journal of Supercomputing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11227-021-04114-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11227-021-04114-7\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11227-021-04114-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,3,15]],"date-time":"2022-03-15T11:37:36Z","timestamp":1647344256000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11227-021-04114-7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,10,7]]},"references-count":46,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2022,3]]}},"alternative-id":["4114"],"URL":"https:\/\/doi.org\/10.1007\/s11227-021-04114-7","relation":{},"ISSN":["0920-8542","1573-0484"],"issn-type":[{"value":"0920-8542","type":"print"},{"value":"1573-0484","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,10,7]]},"assertion":[{"value":"27 September 2021","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"7 October 2021","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"22 October 2021","order":3,"name":"change_date","label":"Change Date","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"Correction","order":4,"name":"change_type","label":"Change Type","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"A Correction to this paper has been published:","order":5,"name":"change_details","label":"Change Details","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"https:\/\/doi.org\/10.1007\/s11227-021-04144-1","URL":"https:\/\/doi.org\/10.1007\/s11227-021-04144-1","order":6,"name":"change_details","label":"Change Details","group":{"name":"ArticleHistory","label":"Article History"}}]}}