{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,8]],"date-time":"2026-04-08T16:56:07Z","timestamp":1775667367035,"version":"3.50.1"},"reference-count":34,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2023,7,6]],"date-time":"2023-07-06T00:00:00Z","timestamp":1688601600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,7,6]],"date-time":"2023-07-06T00:00:00Z","timestamp":1688601600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Supercomput"],"published-print":{"date-parts":[[2024,1]]},"DOI":"10.1007\/s11227-023-05463-1","type":"journal-article","created":{"date-parts":[[2023,7,6]],"date-time":"2023-07-06T12:03:06Z","timestamp":1688644986000},"page":"942-969","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":13,"title":["UPSRVNet: Ultralightweight, Privacy preserved, and Secure RFID-based authentication protocol for VIoT Networks"],"prefix":"10.1007","volume":"80","author":[{"given":"Rakesh","family":"Kumar","sequence":"first","affiliation":[]},{"given":"Sunil K.","family":"Singh","sequence":"additional","affiliation":[]},{"given":"D. K.","family":"Lobiyal","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,7,6]]},"reference":[{"key":"5463_CR1","doi-asserted-by":"crossref","unstructured":"Shariq M, Singh K, Maurya PK, Ahmadian A, Taniar D (2022) AnonSURP: an anonymous and secure ultralightweight RFID protocol for deployment on the internet of vehicle systems. J Supercomput, pp 1\u201326","DOI":"10.1007\/s11227-021-04232-2"},{"key":"5463_CR2","doi-asserted-by":"crossref","unstructured":"Shariq M, Singh K, Maurya PK, Ahmadian A, Ariffin MRK (2021) Urasp: an ultralightweight RFID authentication scheme using permutation operation. Peer-to-Peer Netw Appl pp 1\u201321","DOI":"10.1007\/s12083-021-01192-5"},{"issue":"2","key":"5463_CR3","doi-asserted-by":"publisher","first-page":"1094","DOI":"10.1007\/s11227-020-03302-1","volume":"77","author":"M Adeli","year":"2021","unstructured":"Adeli M, Bagheri N (2021) Mdsbsp: a search protocol based on mds codes for RFID-based internet of vehicle. The J Supercomput 77(2):1094\u20131113","journal-title":"The J Supercomput"},{"key":"5463_CR4","unstructured":"Fan K, Jiang W, Luo Q, Li H, Yang Y (2019) Cloud-based RFID mutual authentication scheme for efficient privacy-preserving in iov. J Franklin Inst"},{"issue":"1","key":"5463_CR5","doi-asserted-by":"publisher","first-page":"152","DOI":"10.3390\/s19010152","volume":"19","author":"K Fan","year":"2019","unstructured":"Fan K, Kang J, Zhu S, Li H, Yang Y (2019) Permutation matrix encryption-based ultralightweight secure RFID scheme in the internet of vehicles. Sensors 19(1):152","journal-title":"Sensors"},{"issue":"4","key":"5463_CR6","doi-asserted-by":"publisher","first-page":"723","DOI":"10.1007\/s12083-017-0553-9","volume":"11","author":"K Fan","year":"2018","unstructured":"Fan K, Wang W, Jiang W, Li H, Yang Y (2018) Secure ultra-lightweight RFID mutual authentication protocol based on transparent computing for iov. Peer-to-Peer Netw Appl 11(4):723\u2013734","journal-title":"Peer-to-Peer Netw Appl"},{"issue":"4","key":"5463_CR7","doi-asserted-by":"publisher","first-page":"1656","DOI":"10.1109\/TII.2018.2794996","volume":"14","author":"K Fan","year":"2018","unstructured":"Fan K, Jiang W, Li H, Yang Y (2018) Lightweight RFID protocol for medical privacy protection in IoT. IEEE Trans Industr Inf 14(4):1656\u20131665","journal-title":"IEEE Trans Industr Inf"},{"issue":"4","key":"5463_CR8","doi-asserted-by":"publisher","first-page":"919","DOI":"10.1007\/s12652-017-0485-5","volume":"9","author":"F Wu","year":"2018","unstructured":"Wu F, Xu L, Kumari S, Li X, Das AK, Shen J (2018) A lightweight and anonymous RFID tag authentication protocol with cloud assistance for e-healthcare applications. J Ambient Intell Humaniz Comput 9(4):919\u2013930","journal-title":"J Ambient Intell Humaniz Comput"},{"issue":"11","key":"5463_CR9","doi-asserted-by":"publisher","first-page":"e3166","DOI":"10.1002\/ett.3166","volume":"28","author":"M Benssalah","year":"2017","unstructured":"Benssalah M, Djeddou M, Drouiche K (2017) A provably secure RFID authentication protocol based on elliptic curve signature with message recovery suitable for m-Health environments. Trans Emerg Telecommun Technol 28(11):e3166","journal-title":"Trans Emerg Telecommun Technol"},{"key":"5463_CR10","doi-asserted-by":"crossref","unstructured":"Xiao H, Alshehri AA, Christianson B (2016) A cloud-based RFID authentication protocol with insecure communication channels. In: 2016 IEEE Trustcom\/BigDataSE\/ISPA, pp 332\u2013339. IEEE","DOI":"10.1109\/TrustCom.2016.0081"},{"key":"5463_CR11","doi-asserted-by":"crossref","unstructured":"Surekha B, Narayana KL, Jayaprakash P, Vorugunti CS (2016) A realistic lightweight authentication protocol for securing cloud-based RFID system. In: 2016 IEEE International Conference on Cloud Computing in Emerging Markets (CCEM), pp. 54\u201360. IEEE","DOI":"10.1109\/CCEM.2016.018"},{"key":"5463_CR12","doi-asserted-by":"crossref","unstructured":"Abughazalah S, Markantonakis K, Mayes K (2014) Secure improved cloud-based RFID authentication protocol. In: data privacy management, autonomous spontaneous security, and security assurance, pp. 147\u2013164. Springer","DOI":"10.1007\/978-3-319-17016-9_10"},{"key":"5463_CR13","doi-asserted-by":"crossref","unstructured":"Xie W, Xie L, Zhang C, Zhang Q, Tang C (2013) Cloud-based Rfid authentication. In: 2013 IEEE International Conference on RFID (RFID), pp. 168\u2013175. IEEE","DOI":"10.1109\/RFID.2013.6548151"},{"key":"5463_CR14","doi-asserted-by":"crossref","unstructured":"Bilal Z, Masood A, Kausar F (2009) Security analysis of ultra-lightweight cryptographic protocol for low-cost RFID tags: gossamer protocol. In: 2009 International Conference on Network-Based Information Systems, pp. 260\u2013267. IEEE","DOI":"10.1109\/NBiS.2009.9"},{"key":"5463_CR15","doi-asserted-by":"crossref","unstructured":"Peris-Lopez P, Hernandez-Castro JC, Tapiador JM, Ribagorda A (2008) Advances in ultralightweight cryptography for low-cost RFID tags: gossamer protocol. In: International workshop on information security applications, pp. 56\u201368. Springer","DOI":"10.1007\/978-3-642-00306-6_5"},{"issue":"4","key":"5463_CR16","doi-asserted-by":"publisher","first-page":"316","DOI":"10.1109\/TDSC.2008.33","volume":"6","author":"RCW Phan","year":"2008","unstructured":"Phan RCW (2008) Cryptanalysis of a new ultralightweight RFID authentication protocol-sasi. IEEE Trans Depend Secure Comput 6(4):316\u2013320","journal-title":"IEEE Trans Depend Secure Comput"},{"issue":"4","key":"5463_CR17","doi-asserted-by":"publisher","first-page":"337","DOI":"10.1109\/TDSC.2007.70226","volume":"4","author":"HY Chien","year":"2007","unstructured":"Chien HY (2007) Sasi: a new ultralightweight RFID authentication protocol providing strong authentication and strong integrity. IEEE Trans Depend Secure Comput 4(4):337\u2013340","journal-title":"IEEE Trans Depend Secure Comput"},{"key":"5463_CR18","doi-asserted-by":"crossref","unstructured":"Li T, Wang G (2007) Security Analysis of Two Ultra-Lightweight RFID Authentication Protocols. In: IFIP International Information Security Conference, pp. 109\u2013120. Springer","DOI":"10.1007\/978-0-387-72367-9_10"},{"key":"5463_CR19","doi-asserted-by":"crossref","unstructured":"Peris-Lopez P, Hernandez-Castro JC, Estevez-Tapiador JM, Ribagorda A (2006) Emap: an efficient mutual-authentication protocol for low-cost rfid tags. In: OTM Confederated International Conferences \u201cOn the Move to Meaningful Internet Systems,\u201d pp. 352\u2013361. Springer","DOI":"10.1007\/11915034_59"},{"key":"5463_CR20","doi-asserted-by":"crossref","unstructured":"Peris-Lopez P, Hernandez-Castro JC, Est\u00e9vez-Tapiador JM, Ribagorda A (2006) Lmap: a real lightweight mutual authentication protocol for low-cost rfid tags. In: Proc of 2nd Workshop on RFID Security, vol. 6","DOI":"10.1007\/11833529_93"},{"key":"5463_CR21","doi-asserted-by":"crossref","unstructured":"Peris-Lopez P, Hernandez-Castro JC, Estevez-Tapiador JM, Ribagorda A (2006) m2ap: a minimalist mutual-authentication protocol for low-cost rfid tags. In: International Conference on Ubiquitous Intelligence and Computing, pp. 912\u2013923. Springer.","DOI":"10.1007\/11833529_93"},{"key":"5463_CR22","doi-asserted-by":"publisher","first-page":"621","DOI":"10.1016\/j.future.2019.07.004","volume":"101","author":"SF Aghili","year":"2019","unstructured":"Aghili SF, Mala H, Kaliyar P, Conti M (2019) SecLAP: secure and lightweight RFID authentication protocol for Medical IoT. Futur Gener Comput Syst 101:621\u2013634","journal-title":"Futur Gener Comput Syst"},{"key":"5463_CR23","doi-asserted-by":"crossref","unstructured":"Singh SK (2021)\u00a0Linux yourself: concept and programming. CRC Press.","DOI":"10.1201\/9780429446047"},{"key":"5463_CR24","doi-asserted-by":"publisher","first-page":"8532","DOI":"10.1007\/s11227-020-03550-1","volume":"77","author":"M Shariq","year":"2021","unstructured":"Shariq M, Singh K (2021) A novel vector-space-based lightweight privacy-preserving rfid authentication protocol for iot environment. J Supercomput 77:8532\u20138562","journal-title":"J Supercomput"},{"key":"5463_CR25","doi-asserted-by":"publisher","first-page":"103354","DOI":"10.1016\/j.scs.2021.103354","volume":"75","author":"M Shariq","year":"2021","unstructured":"Shariq M, Singh K, Bajuri MY, Pantelous AA, Ahmadian A, Salimi M (2021) A secure and reliable RFID authentication protocol using digital schnorr cryptosystem for IoT-enabled healthcare in COVID-19 scenario. Sustain Cities Soc 75:103354","journal-title":"Sustain Cities Soc"},{"key":"5463_CR26","first-page":"95","volume":"42","author":"YL Liu","year":"2015","unstructured":"Liu YL, Qin XL, Zhao XJ, Hao GS, Dong YQ (2015) Lightweight rfid authentication protocol based on digital signature. Comput Sci 42:95\u2013107","journal-title":"Comput Sci"},{"issue":"2","key":"5463_CR27","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s41650-017-0018-6","volume":"2","author":"F Yang","year":"2017","unstructured":"Yang F, Li J, Lei T, Wang S (2017) Architecture and key technologies for internet of vehicles: a survey. J Commun Inf Netw 2(2):1\u201317","journal-title":"J Commun Inf Netw"},{"key":"5463_CR28","doi-asserted-by":"crossref","unstructured":"Zheng D, Wang J, & Ben K (2013) Research of information processing for massive sensors in extended IOV applications. In\u00a02013 15th IEEE International Conference on Communication Technology\u00a0(pp. 438\u2013443). IEEE.","DOI":"10.1109\/ICCT.2013.6820416"},{"issue":"5","key":"5463_CR29","doi-asserted-by":"publisher","first-page":"702","DOI":"10.1109\/LCOMM.2012.031212.120237","volume":"16","author":"Y Tian","year":"2012","unstructured":"Tian Y, Chen G, Li J (2012) A new ultralightweight RFID authentication protocol with permutation. IEEE Commun Lett 16(5):702\u2013705","journal-title":"IEEE Commun Lett"},{"issue":"1","key":"5463_CR30","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1504\/IJICA.2022.121387","volume":"12","author":"R Kumar","year":"2022","unstructured":"Kumar R, Singh SK, Lobiyal DK, Chui KT, Santaniello D, Rafsanjani MK (2022) A novel decentralized group key management scheme for cloud-based vehicular IoT networks. Int J Cloud Appl Comput (IJCAC) 12(1):1\u201334","journal-title":"Int J Cloud Appl Comput (IJCAC)"},{"key":"5463_CR31","doi-asserted-by":"publisher","first-page":"121","DOI":"10.1016\/j.comcom.2022.01.014","volume":"186","author":"X Wang","year":"2022","unstructured":"Wang X, Fan K, Yang K, Cheng X, Dong Q, Li H, Yang Y (2022) A new RFID ultra-lightweight authentication protocol for medical privacy protection in smart living. Comput Commun 186:121\u2013132","journal-title":"Comput Commun"},{"key":"5463_CR32","doi-asserted-by":"publisher","first-page":"147","DOI":"10.1016\/j.comcom.2023.04.013","volume":"205","author":"A Kumar","year":"2023","unstructured":"Kumar A, Singh K, Shariq M, Lal C, Conti M, Amin R, Chaudhry SA (2023) An efficient and reliable ultralightweight RFID authentication scheme for healthcare systems. Comput Commun 205:147\u2013157","journal-title":"Comput Commun"},{"key":"5463_CR33","unstructured":"Sharma S, & Singh SK. (2022) IoT and its uses in Security Surveillance, Insights2Techinfo, pp1."},{"key":"5463_CR34","first-page":"23","volume":"11","author":"N Liu","year":"2011","unstructured":"Liu N (2011) Internet of vehicles: your next connection. Huawei WinWin 11:23\u201328","journal-title":"Huawei WinWin"}],"container-title":["The Journal of Supercomputing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11227-023-05463-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11227-023-05463-1\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11227-023-05463-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T19:17:15Z","timestamp":1729711035000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11227-023-05463-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,7,6]]},"references-count":34,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2024,1]]}},"alternative-id":["5463"],"URL":"https:\/\/doi.org\/10.1007\/s11227-023-05463-1","relation":{},"ISSN":["0920-8542","1573-0484"],"issn-type":[{"value":"0920-8542","type":"print"},{"value":"1573-0484","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,7,6]]},"assertion":[{"value":"29 May 2023","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"6 July 2023","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"No organizations and funding agencies are available to promote the work. We do not have any competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"We have not applied any tests on humans\/animals in this research paper. So, no need for ethical approval.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical approval"}}]}}