{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T09:29:50Z","timestamp":1763458190984},"reference-count":36,"publisher":"Springer Science and Business Media LLC","issue":"9","license":[{"start":{"date-parts":[[2023,1,21]],"date-time":"2023-01-21T00:00:00Z","timestamp":1674259200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,1,21]],"date-time":"2023-01-21T00:00:00Z","timestamp":1674259200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Supercomput"],"published-print":{"date-parts":[[2023,6]]},"DOI":"10.1007\/s11227-022-05041-x","type":"journal-article","created":{"date-parts":[[2023,1,21]],"date-time":"2023-01-21T12:02:29Z","timestamp":1674302549000},"page":"9837-9865","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":9,"title":["RKMIS: robust key management protocol for industrial sensor network system"],"prefix":"10.1007","volume":"79","author":[{"given":"Samiulla","family":"Itoo","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Musheer","family":"Ahmad","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Vinod","family":"Kumar","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Ahmed","family":"Alkhayyat","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2023,1,21]]},"reference":[{"key":"5041_CR1","doi-asserted-by":"publisher","first-page":"1005","DOI":"10.1016\/j.future.2016.12.028","volume":"78","author":"R Amin","year":"2018","unstructured":"Amin R, Kumar N, Biswas G, Iqbal R, Chang V (2018) A light weight authentication protocol for IoT-enabled devices in distributed cloud computing environment. Future Gener Comput Syst 78:1005\u20131019","journal-title":"Future Gener Comput Syst"},{"key":"5041_CR2","doi-asserted-by":"publisher","first-page":"16167","DOI":"10.1007\/s11227-022-04513-4","volume":"78","author":"V Kumar","year":"2022","unstructured":"Kumar V, Mahmoud MS, Alkhayyat A, Srinivas J, Ahmad M, Kumari A (2022) RAPCHI: robust authentication protocol for IoMT-based cloud-healthcare infrastructure. J Supercomput 78:16167\u201316196","journal-title":"J Supercomput"},{"issue":"9","key":"5041_CR3","doi-asserted-by":"publisher","first-page":"3110","DOI":"10.3390\/s22093110","volume":"22","author":"V Kumar","year":"2022","unstructured":"Kumar V, Kumar R, Khan AA, Kumar V, Chen Y-C, Chang C-C (2022) RAFI: robust authentication framework for IoT-based RFID infrastructure. Sensors 22(9):3110","journal-title":"Sensors"},{"issue":"12","key":"5041_CR4","first-page":"1398","volume":"6","author":"MR Ahmed","year":"2012","unstructured":"Ahmed MR, Huang X, Sharma D, Cui H (2012) Wireless sensor network: characteristics and architectures. Int J Inf Commun Eng 6(12):1398\u20131401","journal-title":"Int J Inf Commun Eng"},{"key":"5041_CR5","doi-asserted-by":"publisher","first-page":"429","DOI":"10.1016\/j.comnet.2017.03.013","volume":"129","author":"X Li","year":"2017","unstructured":"Li X, Ibrahim MH, Kumari S, Sangaiah AK, Gupta V, Choo K-KR (2017) Anonymous mutual authentication and key agreement scheme for wearable sensors in wireless body area networks. Comput Netw 129:429\u2013443","journal-title":"Comput Netw"},{"issue":"3","key":"5041_CR6","doi-asserted-by":"publisher","first-page":"1086","DOI":"10.1109\/TWC.2008.080128","volume":"8","author":"ML Das","year":"2009","unstructured":"Das ML (2009) Two-factor user authentication in wireless sensor networks. IEEE Trans Wirel Commun. 8(3):1086\u20131090","journal-title":"IEEE Trans Wirel Commun"},{"issue":"3","key":"5041_CR7","doi-asserted-by":"publisher","first-page":"2450","DOI":"10.3390\/s100302450","volume":"10","author":"MK Khan","year":"2010","unstructured":"Khan MK, Alghathbar K (2010) Cryptanalysis and security improvements of \u2018two-factor user authentication in wireless sensor networks\u2019. Sensors 10(3):2450\u20132459","journal-title":"Sensors"},{"issue":"4","key":"5041_CR8","first-page":"361","volume":"10","author":"D He","year":"2010","unstructured":"He D, Gao Y, Chan S, Chen C, Bu J (2010) An enhanced two-factor user authentication scheme in wireless sensor networks. Ad Hoc Sens Wirel Netw 10(4):361\u2013371","journal-title":"Ad Hoc Sens Wirel Netw"},{"issue":"01","key":"5041_CR9","doi-asserted-by":"publisher","first-page":"21","DOI":"10.1142\/S0129626411000047","volume":"21","author":"C-C Lee","year":"2011","unstructured":"Lee C-C, Li C-T, Chen S-D (2011) Two attacks on a two-factor user authentication in wireless sensor networks. Parallel Process Lett 21(01):21\u201326","journal-title":"Parallel Process Lett"},{"issue":"2","key":"5041_CR10","doi-asserted-by":"publisher","first-page":"171","DOI":"10.1002\/sec.517","volume":"9","author":"B Vaidya","year":"2016","unstructured":"Vaidya B, Makrakis D, Mouftah H (2016) Two-factor mutual authentication with key agreement in wireless sensor networks. Secur Commun Netw 9(2):171\u2013183","journal-title":"Secur Commun Netw"},{"issue":"4","key":"5041_CR11","doi-asserted-by":"publisher","first-page":"6443","DOI":"10.3390\/s140406443","volume":"14","author":"J Kim","year":"2014","unstructured":"Kim J, Lee D, Jeon W, Lee Y, Won D (2014) Security analysis and improvements of two-factor mutual authentication with key agreement in wireless sensor networks. Sensors 14(4):6443\u20136462","journal-title":"Sensors"},{"issue":"12","key":"5041_CR12","doi-asserted-by":"publisher","first-page":"29841","DOI":"10.3390\/s151229767","volume":"15","author":"I-P Chang","year":"2015","unstructured":"Chang I-P, Lee T-F, Lin T-H, Liu C-M (2015) Enhanced two-factor authentication and key agreement using dynamic identities in wireless sensor networks. Sensors 15(12):29841\u201329854","journal-title":"Sensors"},{"issue":"4","key":"5041_CR13","doi-asserted-by":"publisher","first-page":"730831","DOI":"10.1155\/2013\/730831","volume":"9","author":"W Shi","year":"2013","unstructured":"Shi W, Gong P (2013) A new user authentication protocol for wireless sensor networks using elliptic curves cryptography. Int J Distrib Sens Netw 9(4):730831","journal-title":"Int J Distrib Sens Netw"},{"issue":"5","key":"5041_CR14","doi-asserted-by":"publisher","first-page":"4767","DOI":"10.3390\/s110504767","volume":"11","author":"H-L Yeh","year":"2011","unstructured":"Yeh H-L, Chen T-H, Liu P-C, Kim T-H, Wei H-W (2011) A secured authentication protocol for wireless sensor networks using elliptic curves cryptography. Sensors 11(5):4767\u20134779","journal-title":"Sensors"},{"issue":"6","key":"5041_CR15","doi-asserted-by":"publisher","first-page":"10081","DOI":"10.3390\/s140610081","volume":"14","author":"Y Choi","year":"2014","unstructured":"Choi Y, Lee D, Kim J, Jung J, Nam J, Won D (2014) Security enhanced user authentication protocol for wireless sensor networks using elliptic curves cryptography. Sensors 14(6):10081\u201310106","journal-title":"Sensors"},{"issue":"11","key":"5041_CR16","doi-asserted-by":"publisher","first-page":"21023","DOI":"10.3390\/s141121023","volume":"14","author":"J Nam","year":"2014","unstructured":"Nam J, Kim M, Paik J, Lee Y, Won D (2014) A provably-secure ECC-based authentication scheme for wireless sensor networks. Sensors 14(11):21023\u201321044","journal-title":"Sensors"},{"key":"5041_CR17","doi-asserted-by":"publisher","first-page":"3376","DOI":"10.1109\/ACCESS.2017.2673239","volume":"5","author":"Q Jiang","year":"2017","unstructured":"Jiang Q, Zeadally S, Ma J, He D (2017) Lightweight three-factor authentication and key agreement protocol for internet-integrated wireless sensor networks. IEEE Access 5:3376\u20133392","journal-title":"IEEE Access"},{"issue":"8","key":"5041_CR18","doi-asserted-by":"publisher","first-page":"3599","DOI":"10.1109\/TII.2017.2773666","volume":"14","author":"X Li","year":"2017","unstructured":"Li X, Niu J, Bhuiyan MZA, Wu F, Karuppiah M, Kumari S (2017) A robust ECC-based provable secure authentication protocol with privacy preserving for industrial internet of things. IEEE Trans Ind Inform 14(8):3599\u20133609","journal-title":"IEEE Trans Ind Inform"},{"issue":"2","key":"5041_CR19","doi-asserted-by":"publisher","first-page":"1114","DOI":"10.1007\/s11227-020-03318-7","volume":"77","author":"D Sadhukhan","year":"2021","unstructured":"Sadhukhan D, Ray S, Biswas G, Khan MK, Dasgupta M (2021) A lightweight remote user authentication scheme for IoT communication using elliptic curve cryptography. J Supercomput 77(2):1114\u20131151","journal-title":"J Supercomput"},{"key":"5041_CR20","doi-asserted-by":"publisher","first-page":"483","DOI":"10.1016\/j.future.2016.05.032","volume":"80","author":"R Amin","year":"2018","unstructured":"Amin R, Islam SH, Biswas G, Khan MK, Kumar N (2018) A robust and anonymous patient monitoring system using wireless medical sensor networks. Future Gener Comput Syst 80:483\u2013495","journal-title":"Future Gener Comput Syst"},{"key":"5041_CR21","doi-asserted-by":"publisher","DOI":"10.1007\/s12652-018-1015-9","author":"R Ali","year":"2018","unstructured":"Ali R, Pal AK, Kumari S, Sangaiah AK, Li X, Wu F (2018) An enhanced three factor based authentication protocol using wireless medical sensor networks for healthcare monitoring. J Ambient Intell Humaniz Comput. https:\/\/doi.org\/10.1007\/s12652-018-1015-9","journal-title":"J Ambient Intell Humaniz Comput"},{"key":"5041_CR22","doi-asserted-by":"publisher","first-page":"132","DOI":"10.1016\/j.cose.2019.06.002","volume":"86","author":"M Shuai","year":"2019","unstructured":"Shuai M, Yu N, Wang H, Xiong L (2019) Anonymous authentication scheme for smart home environment with provable security. Comput Secur 86:132\u2013146","journal-title":"Comput Secur"},{"key":"5041_CR23","doi-asserted-by":"publisher","first-page":"137","DOI":"10.1016\/j.comnet.2016.05.007","volume":"104","author":"S Kumari","year":"2016","unstructured":"Kumari S, Om H (2016) Authentication protocol for wireless sensor networks applications like safety monitoring in coal mines. Comput Netw 104:137\u2013154","journal-title":"Comput Netw"},{"issue":"3","key":"5041_CR24","doi-asserted-by":"publisher","first-page":"1331","DOI":"10.1007\/s11277-016-3393-7","volume":"90","author":"S Ray","year":"2016","unstructured":"Ray S, Biswas G, Dasgupta M (2016) Secure multi-purpose mobile-banking using elliptic curve cryptography. Wirel Pers Commun 90(3):1331\u20131354","journal-title":"Wirel Pers Commun"},{"key":"5041_CR25","doi-asserted-by":"publisher","first-page":"200","DOI":"10.1016\/j.future.2017.06.018","volume":"84","author":"R Ali","year":"2018","unstructured":"Ali R, Pal AK, Kumari S, Karuppiah M, Conti M (2018) A secure user authentication and key-agreement scheme using wireless sensor networks for agriculture monitoring. Future Gener Comput Syst 84:200\u2013215","journal-title":"Future Gener Comput Syst"},{"issue":"6","key":"5041_CR26","doi-asserted-by":"publisher","first-page":"4900","DOI":"10.1109\/JIOT.2018.2877690","volume":"5","author":"AK Das","year":"2018","unstructured":"Das AK, Wazid M, Kumar N, Vasilakos AV, Rodrigues JJ (2018) Biometrics-based privacy-preserving user authentication scheme for cloud-based industrial internet of things deployment. IEEE Internet Things J 5(6):4900\u20134913","journal-title":"IEEE Internet Things J"},{"key":"5041_CR27","doi-asserted-by":"publisher","first-page":"215","DOI":"10.1016\/j.comcom.2020.06.012","volume":"160","author":"M Shuai","year":"2020","unstructured":"Shuai M, Xiong L, Wang C, Yu N (2020) A secure authentication scheme with forward secrecy for industrial internet of things using Rabin cryptosystem. Comput Commun 160:215\u2013227","journal-title":"Comput Commun"},{"issue":"3","key":"5041_CR28","doi-asserted-by":"publisher","first-page":"1548","DOI":"10.1007\/s12083-020-01063-5","volume":"14","author":"D Rangwani","year":"2021","unstructured":"Rangwani D, Sadhukhan D, Ray S, Khan MK, Dasgupta M (2021) A robust provable-secure privacy-preserving authentication protocol for industrial internet of things. Peer-to-Peer Netw Appl 14(3):1548\u20131571","journal-title":"Peer-to-Peer Netw Appl"},{"key":"5041_CR29","doi-asserted-by":"publisher","DOI":"10.1007\/s12652-021-03167-z","author":"R Vinoth","year":"2021","unstructured":"Vinoth R, Deborah LJ (2021) An efficient key agreement and authentication protocol for secure communication in industrial IoT applications. J Ambient Intell Humaniz Comput. https:\/\/doi.org\/10.1007\/s12652-021-03167-z","journal-title":"J Ambient Intell Humaniz Comput"},{"issue":"12","key":"5041_CR30","doi-asserted-by":"publisher","first-page":"2946","DOI":"10.3390\/s17122946","volume":"17","author":"C Wang","year":"2017","unstructured":"Wang C, Xu G, Sun J (2017) An enhanced three-factor user authentication scheme using elliptic curve cryptosystem for wireless sensor networks. Sensors 17(12):2946","journal-title":"Sensors"},{"key":"5041_CR31","doi-asserted-by":"crossref","unstructured":"Li N, Guo F, Mu Y, Susilo W, Nepal S (2017) Fuzzy extractors for biometric identification. In: 2017 IEEE 37th International Conference on Distributed Computing Systems (ICDCS). IEEE, pp 667\u2013677","DOI":"10.1109\/ICDCS.2017.107"},{"issue":"2","key":"5041_CR32","doi-asserted-by":"publisher","first-page":"198","DOI":"10.1109\/TIT.1983.1056650","volume":"29","author":"D Dolev","year":"1983","unstructured":"Dolev D, Yao A (1983) On the security of public key protocols. IEEE Trans Inf Theory 29(2):198\u2013208","journal-title":"IEEE Trans Inf Theory"},{"key":"5041_CR33","doi-asserted-by":"crossref","unstructured":"Canetti R, Krawczyk H (2002) Universally composable notions of key exchange and secure channels. In: International Conference on the Theory and Applications of Cryptographic Techniques. Springer, pp 337\u2013351","DOI":"10.1007\/3-540-46035-7_22"},{"key":"5041_CR34","doi-asserted-by":"publisher","first-page":"102053","DOI":"10.1016\/j.sysarc.2021.102053","volume":"116","author":"AA Khan","year":"2021","unstructured":"Khan AA, Kumar V, Ahmad M, Rana S (2021) LAKAF: lightweight authentication and key agreement framework for smart grid network. J Syst Archit 116:102053","journal-title":"J Syst Archit"},{"key":"5041_CR35","doi-asserted-by":"crossref","unstructured":"Abdalla M, Chevassut O, Fouque P-A, Pointcheval D (2005) A simple threshold authenticated key exchange from short secrets. In: International Conference on the Theory and Application of Cryptology and Information Security. Springer, pp 566\u2013584","DOI":"10.1007\/11593447_31"},{"key":"5041_CR36","doi-asserted-by":"crossref","unstructured":"Cremers CJ (2008) The Scyther tool: verification, falsification, and analysis of security protocols. In: International conference on computer aided verification. Springer, pp 414\u2013418","DOI":"10.1007\/978-3-540-70545-1_38"}],"container-title":["The Journal of Supercomputing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11227-022-05041-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11227-022-05041-x\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11227-022-05041-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,4,24]],"date-time":"2023-04-24T22:06:07Z","timestamp":1682373967000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11227-022-05041-x"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,1,21]]},"references-count":36,"journal-issue":{"issue":"9","published-print":{"date-parts":[[2023,6]]}},"alternative-id":["5041"],"URL":"https:\/\/doi.org\/10.1007\/s11227-022-05041-x","relation":{},"ISSN":["0920-8542","1573-0484"],"issn-type":[{"value":"0920-8542","type":"print"},{"value":"1573-0484","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,1,21]]},"assertion":[{"value":"31 December 2022","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"21 January 2023","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"The manuscript is not currently being considered for publication elsewhere.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical approval"}},{"value":"All authors are agreed for publication.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent for publication"}}]}}