{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,24]],"date-time":"2026-04-24T02:24:44Z","timestamp":1776997484094,"version":"3.51.4"},"reference-count":61,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2021,1,2]],"date-time":"2021-01-02T00:00:00Z","timestamp":1609545600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,1,2]],"date-time":"2021-01-02T00:00:00Z","timestamp":1609545600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Wireless Netw"],"published-print":{"date-parts":[[2021,2]]},"DOI":"10.1007\/s11276-020-02523-9","type":"journal-article","created":{"date-parts":[[2021,1,2]],"date-time":"2021-01-02T16:02:52Z","timestamp":1609603372000},"page":"1389-1412","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":78,"title":["LAPTAS: lightweight anonymous privacy-preserving three-factor authentication scheme for WSN-based IIoT"],"prefix":"10.1007","volume":"27","author":[{"given":"Hossein","family":"Abdi Nasib Far","sequence":"first","affiliation":[]},{"given":"Majid","family":"Bayat","sequence":"additional","affiliation":[]},{"given":"Ashok","family":"Kumar Das","sequence":"additional","affiliation":[]},{"given":"Mahdi","family":"Fotouhi","sequence":"additional","affiliation":[]},{"given":"S. Morteza","family":"Pournaghi","sequence":"additional","affiliation":[]},{"given":"M. A.","family":"Doostari","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,1,2]]},"reference":[{"key":"2523_CR1","doi-asserted-by":"publisher","unstructured":"Atzori, L., Iera, A., & Morabito, G. (2010). The Internet of Things: A survey. Computer Networks, 54(15), 2787\u20132805. https:\/\/doi.org\/10.1016\/j.comnet.2010.05.010, URL https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S1389128610001568.","DOI":"10.1016\/j.comnet.2010.05.010"},{"key":"2523_CR2","doi-asserted-by":"publisher","unstructured":"Al-Turjman, F., & Alturjman, S. (2018). Context-Sensitive Access in Industrial Internet of Things (IIoT) Healthcare Applications. IEEE Transactions on Industrial Informatics, 14(6), 2736\u20132744. https:\/\/doi.org\/10.1109\/TII.2018.2808190, URL https:\/\/ieeexplore.ieee.org\/document\/8295246\/.","DOI":"10.1109\/TII.2018.2808190"},{"key":"2523_CR3","doi-asserted-by":"publisher","unstructured":"Ketshabetswe, L. K., Zungeru, A. M., Mangwala, M., Chuma, J. M., & Sigweni, B. (2019). Communication protocols for wireless sensor networks: A survey and comparison. Heliyon, 5(5), e01591. https:\/\/doi.org\/10.1016\/j.heliyon.2019.e01591, URL https:\/\/www.sciencedirect.com\/science\/article\/pii\/S2405844018340192#bib3.","DOI":"10.1016\/j.heliyon.2019.e01591"},{"key":"2523_CR4","doi-asserted-by":"publisher","unstructured":"Ibrahim, A. (2007). Wireless sensor networks: technology, protocols, and applications. PhD thesis, https:\/\/doi.org\/10.5860\/choice.45-1482, URL https:\/\/books.google.fr\/books?hl=fa&lr=&id=I3bJGo690SUC&oi=fnd&pg=PR5&ots=omTr2SRsPo&sig=si30JEvL0lVXambHoMp6jWFWvpY&redir_esc=y#v=onepage&q&f=false","DOI":"10.5860\/choice.45-1482"},{"key":"2523_CR5","doi-asserted-by":"publisher","unstructured":"Akkaya, K., & Younis, M. (2005). A survey on routing protocols for wireless sensor networks. Ad Hoc Networks, 3(3), 325\u2013349. https:\/\/doi.org\/10.1016\/j.adhoc.2003.09.010, URL https:\/\/www.sciencedirect.com\/science\/article\/abs\/pii\/S1570870503000738.","DOI":"10.1016\/j.adhoc.2003.09.010"},{"key":"2523_CR6","doi-asserted-by":"publisher","unstructured":"Akyildiz, I. F., Su, W., Sankarasubramaniam, Y., & Cayirci, E. (2002). Wireless sensor networks: A survey. Computer Networks, 38(4), 393\u2013422. https:\/\/doi.org\/10.1016\/S1389-1286(01)00302-4, URL https:\/\/www.sciencedirect.com\/science\/article\/abs\/pii\/S1389128601003024.","DOI":"10.1016\/S1389-1286(01)00302-4"},{"issue":"4","key":"2523_CR7","doi-asserted-by":"publisher","first-page":"660","DOI":"10.1109\/TWC.2002.804190","volume":"1","author":"WB Heinzelman","year":"2002","unstructured":"Heinzelman, W. B., Chandrakasan, A. P., & Balakrishnan, H. (2002). An application-specific protocol architecture for wireless microsensor networks. IEEE Transactions on Wireless Communications, 1(4), 660\u2013670. https:\/\/doi.org\/10.1109\/TWC.2002.804190.","journal-title":"IEEE Transactions on Wireless Communications"},{"key":"2523_CR8","doi-asserted-by":"publisher","unstructured":"Wang, Z. (2018). A privacy-preserving and accountable authentication protocol for IoT end-devices with weaker identity. Future Generation Computer Systems, 82, 342\u2013348. https:\/\/doi.org\/10.1016\/j.future.2017.09.042, URL http:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0167739X17307495.","DOI":"10.1016\/j.future.2017.09.042"},{"key":"2523_CR9","doi-asserted-by":"publisher","first-page":"956","DOI":"10.1016\/j.future.2016.11.033","volume":"78","author":"JJ Shen","year":"2018","unstructured":"Shen, J. J., Chang, S., Shen, J. J., Liu, Q., & Sun, X. (2018). A lightweight multi-layer authentication protocol for wireless body area networks. Future Generation Computer Systems, 78, 956\u2013963. https:\/\/doi.org\/10.1016\/j.future.2016.11.033.","journal-title":"Future Generation Computer Systems"},{"key":"2523_CR10","doi-asserted-by":"publisher","unstructured":"Ferrag, M.A., Maglaras, L.A., Janicke, H., Jiang, J., & Shu, L. (2017). Authentication Protocols for Internet of Things: A Comprehensive Survey. Security and Communication Networks 2017:1\u201341, https:\/\/doi.org\/10.1155\/2017\/6562953, URL https:\/\/www.hindawi.com\/journals\/scn\/2017\/6562953\/, arXiv:1612.07206.","DOI":"10.1155\/2017\/6562953"},{"issue":"12","key":"2523_CR11","doi-asserted-by":"publisher","first-page":"2019","DOI":"10.1109\/JPROC.2003.819605","volume":"91","author":"J Esch","year":"2003","unstructured":"Esch, J. (2003). Comparing passwords, tokens, and biometrics for user authentication. Proceedings of the IEEE, 91(12), 2019\u20132020. https:\/\/doi.org\/10.1109\/JPROC.2003.819605.","journal-title":"Proceedings of the IEEE"},{"issue":"5","key":"2523_CR12","doi-asserted-by":"publisher","first-page":"1491","DOI":"10.1016\/j.tele.2018.03.018","volume":"35","author":"MH Barkadehi","year":"2018","unstructured":"Barkadehi, M. H., Nilashi, M., Ibrahim, O., Zakeri Fardi, A., & Samad, S. (2018). Authentication systems: A literature review and classification. Telematics and Informatics, 35(5), 1491\u20131511. https:\/\/doi.org\/10.1016\/j.tele.2018.03.018.","journal-title":"Telematics and Informatics"},{"key":"2523_CR13","doi-asserted-by":"publisher","unstructured":"Srinivas J, Das AK, Wazid M, Kumar N (2018) Anonymous Lightweight Chaotic Map-Based Authenticated Key Agreement Protocol for Industrial Internet of Things. IEEE Transactions on Dependable and Secure Computing PP(c):1, https:\/\/doi.org\/10.1109\/TDSC.2018.2857811","DOI":"10.1109\/TDSC.2018.2857811"},{"issue":"4","key":"2523_CR14","doi-asserted-by":"publisher","first-page":"2233","DOI":"10.1109\/TII.2014.2300753","volume":"10","author":"L Da Xu","year":"2014","unstructured":"Da Xu, L., He, W., & Li, S. (2014). Internet of things in industries: A survey. IEEE Transactions on Industrial Informatics, 10(4), 2233\u20132243.","journal-title":"IEEE Transactions on Industrial Informatics"},{"issue":"11","key":"2523_CR15","doi-asserted-by":"publisher","first-page":"770","DOI":"10.1145\/358790.358797","volume":"24","author":"L Lamport","year":"1981","unstructured":"Lamport, L. (1981). Password authentication with insecure communication. Communications of the ACM, 24(11), 770\u2013772. https:\/\/doi.org\/10.1145\/358790.358797.","journal-title":"Communications of the ACM"},{"issue":"3","key":"2523_CR16","doi-asserted-by":"publisher","first-page":"1086","DOI":"10.1109\/TWC.2008.080128","volume":"8","author":"ML Das","year":"2009","unstructured":"Das, M. L. (2009). Two-factor user authentication in wireless sensor networks. IEEE Transactions on Wireless Communications, 8(3), 1086\u20131090. https:\/\/doi.org\/10.1109\/TWC.2008.080128.","journal-title":"IEEE Transactions on Wireless Communications"},{"issue":"3","key":"2523_CR17","doi-asserted-by":"publisher","first-page":"2450","DOI":"10.3390\/s100302450","volume":"10","author":"MK Khan","year":"2010","unstructured":"Khan, M. K., & Alghathbar, K. (2010). Cryptanalysis and security improvements of \u2019two-factor user authentication in wireless sensor networks\u2019. Sensors, 10(3), 2450\u20132459. https:\/\/doi.org\/10.3390\/s100302450.","journal-title":"Sensors"},{"issue":"4","key":"2523_CR18","first-page":"361","volume":"10","author":"D He","year":"2010","unstructured":"He, D., Gao, Y., Chan, S., Chen, C., & Bu, J. (2010). An enhanced two-factor user authentication scheme in wireless sensor networks. Ad-Hoc and Sensor Wireless Networks, 10(4), 361\u2013371.","journal-title":"Ad-Hoc and Sensor Wireless Networks"},{"issue":"5","key":"2523_CR19","doi-asserted-by":"publisher","first-page":"4767","DOI":"10.3390\/s110504767","volume":"11","author":"HL Yeh","year":"2011","unstructured":"Yeh, H. L., Chen, T. H., Liu, P. C., Kim, T. H., & Wei, H. W. (2011). A secured authentication protocol for wireless sensor networks using elliptic curves cryptography. Sensors, 11(5), 4767\u20134779. https:\/\/doi.org\/10.3390\/s110504767.","journal-title":"Sensors"},{"key":"2523_CR20","doi-asserted-by":"publisher","first-page":"730831","DOI":"10.1155\/2013\/730831","volume":"9","author":"W Shi","year":"2013","unstructured":"Shi, W., & Gong, P. (2013). A new user authentication protocol for wireless sensor networks using elliptic curves cryptography. International Journal of Distributed Sensor Networks, 9, 730831. https:\/\/doi.org\/10.1155\/2013\/730831.","journal-title":"International Journal of Distributed Sensor Networks"},{"issue":"6","key":"2523_CR21","doi-asserted-by":"publisher","first-page":"10081","DOI":"10.3390\/s140610081","volume":"14","author":"Y Choi","year":"2014","unstructured":"Choi, Y., Lee, D., Kim, J., Jung, J., Nam, J., & Won, D. (2014). Security enhanced user authentication protocol for wireless sensor networks using elliptic curves cryptography. Sensors (Switzerland), 14(6), 10081\u201310106. https:\/\/doi.org\/10.3390\/s140610081.","journal-title":"Sensors (Switzerland)"},{"issue":"1","key":"2523_CR22","doi-asserted-by":"publisher","first-page":"316","DOI":"10.1016\/j.jnca.2012.05.010","volume":"36","author":"K Xue","year":"2013","unstructured":"Xue, K., Ma, C., Hong, P., & Ding, R. (2013). A temporal-credential-based mutual authentication and key agreement scheme for wireless sensor networks. Journal of Network and Computer Applications, 36(1), 316\u2013323.","journal-title":"Journal of Network and Computer Applications"},{"key":"2523_CR23","doi-asserted-by":"publisher","first-page":"263","DOI":"10.1016\/j.ins.2015.02.010","volume":"321","author":"D He","year":"2015","unstructured":"He, D., Kumar, N., & Chilamkurti, N. (2015). A secure temporal-credential-based mutual authentication and key agreement scheme with pseudo identity for wireless sensor networks. Information Sciences, 321, 263\u2013277. https:\/\/doi.org\/10.1016\/j.ins.2015.02.010.","journal-title":"Information Sciences"},{"key":"2523_CR24","doi-asserted-by":"publisher","unstructured":"Jiang, Q., Ma, J., Wei, F., Tian, Y., Shen, J., & Yang, Y. (2016). An untraceable temporal-credential-based two-factor authentication scheme using ECC for wireless sensor networks. Journal of Network and Computer Applications, 76, 37\u201348. https:\/\/doi.org\/10.1016\/j.jnca.2016.10.001, URL https:\/\/www.sciencedirect.com\/science\/article\/pii\/S1084804516302302?via%3Dihub.","DOI":"10.1016\/j.jnca.2016.10.001"},{"key":"2523_CR25","doi-asserted-by":"publisher","unstructured":"Li, X., Niu, J., Bhuiyan, M. Z. A., Wu, F., Karuppiah, M., & Kumari, S. (2018a). A robust ECC-Based provable secure authentication protocol with privacy preserving for industrial internet of things. IEEE Transactions on Industrial Informatics, 14(8), 3599\u20133609. https:\/\/doi.org\/10.1109\/TII.2017.2773666, URL https:\/\/ieeexplore.ieee.org\/abstract\/document\/8110708.","DOI":"10.1109\/TII.2017.2773666"},{"key":"2523_CR26","doi-asserted-by":"publisher","first-page":"194","DOI":"10.1016\/j.jnca.2017.07.001","volume":"103","author":"X Li","year":"2018","unstructured":"Li, X., Niu, J., Kumari, S., Wu, F., Sangaiah, A. K., & Choo, K. K. R. (2018b). A three-factor anonymous authentication scheme for wireless sensor networks in internet of things environments. Journal of Network and Computer Applications, 103, 194\u2013204. https:\/\/doi.org\/10.1016\/j.jnca.2017.07.001.","journal-title":"Journal of Network and Computer Applications"},{"key":"2523_CR27","doi-asserted-by":"publisher","unstructured":"Das, A. K., Wazid, M., Kumar, N., Vasilakos, A. V., & Rodrigues, J. J. P. C. (2018). Biometrics-Based Privacy-Preserving User Authentication Scheme for Cloud-Based Industrial Internet of Things Deployment. IEEE Internet of Things Journal, 5(6), 4900\u20134913. https:\/\/doi.org\/10.1109\/JIOT.2018.2877690, URL https:\/\/ieeexplore.ieee.org\/document\/8506419\/.","DOI":"10.1109\/JIOT.2018.2877690"},{"key":"2523_CR28","doi-asserted-by":"publisher","first-page":"101596","DOI":"10.1109\/access.2019.2930542","volume":"7","author":"F Wang","year":"2019","unstructured":"Wang, F., Xu, G., & Xu, G. (2019). A provably secure anonymous biometrics-based authentication scheme for wireless sensor networks using chaotic map. IEEE Access, 7, 101596\u2013101608. https:\/\/doi.org\/10.1109\/access.2019.2930542.","journal-title":"IEEE Access"},{"key":"2523_CR29","doi-asserted-by":"publisher","unstructured":"Kumar, D., Singh, H. K., & Ahlawat, C. (2020). A secure three-factor authentication scheme for wireless sensor networks using ECC. Journal of Discrete Mathematical Sciences and Cryptography, 23(4), 879\u2013900. https:\/\/doi.org\/10.1080\/09720529.2019.1627072, URL https:\/\/www.tandfonline.com\/doi\/full\/10.1080\/09720529.2019.1627072.","DOI":"10.1080\/09720529.2019.1627072"},{"key":"2523_CR30","doi-asserted-by":"publisher","unstructured":"Vinoth, R., Deborah, L.J., Vijayakumar, P., & Kumar, N. (2020). Secure Multi-factor Authenticated Key Agreement Scheme for Industrial IoT. IEEE Internet of Things Journal XX(X):1\u201310, https:\/\/doi.org\/10.1109\/JIOT.2020.3024703, URL https:\/\/ieeexplore.ieee.org\/document\/9199812\/.","DOI":"10.1109\/JIOT.2020.3024703"},{"key":"2523_CR31","unstructured":"Schwab, K. (2017). The fourth industrial revolution (First U.S. edition). Crown Business."},{"issue":"1","key":"2523_CR32","doi-asserted-by":"publisher","first-page":"236","DOI":"10.1109\/JIOT.2016.2646375","volume":"4","author":"Z Meng","year":"2016","unstructured":"Meng, Z., Wu, Z., Muvianto, C., & Gray, J. (2016). A data-oriented m2m messaging mechanism for industrial iot applications. IEEE Internet of Things Journal, 4(1), 236\u2013246.","journal-title":"IEEE Internet of Things Journal"},{"key":"2523_CR33","doi-asserted-by":"publisher","first-page":"156","DOI":"10.1016\/j.jisa.2019.02.003","volume":"45","author":"M Alshahrani","year":"2019","unstructured":"Alshahrani, M., & Traore, I. (2019). Secure mutual authentication and automated access control for IoT smart home using cumulative Keyed-hash chain. Journal of Information Security and Applications, 45, 156\u2013175. https:\/\/doi.org\/10.1016\/j.jisa.2019.02.003.","journal-title":"Journal of Information Security and Applications"},{"key":"2523_CR34","doi-asserted-by":"publisher","first-page":"107333","DOI":"10.1016\/j.comnet.2020.107333","volume":"177","author":"M Fotouhi","year":"2020","unstructured":"Fotouhi, M., Bayat, M., Das, A. K., Far, H. A. N., Pournaghi, S. M., & Doostari, M. A. (2020). A lightweight and secure two-factor authentication scheme for wireless body area networks in health-care IoT. Computer Networks, 177, 107333. https:\/\/doi.org\/10.1016\/j.comnet.2020.107333.","journal-title":"Computer Networks"},{"issue":"2","key":"2523_CR35","doi-asserted-by":"publisher","first-page":"198","DOI":"10.1109\/TIT.1983.1056650","volume":"29","author":"D Dolev","year":"1983","unstructured":"Dolev, D., & Yao, A. (1983). On the security of public key protocols. IEEE Transactions on information theory, 29(2), 198\u2013208.","journal-title":"IEEE Transactions on information theory"},{"key":"2523_CR36","doi-asserted-by":"publisher","unstructured":"Wazid, M., Das, A.K., Odelu, V., Kumar, N., & Susilo, W. (2017). Secure Remote User Authenticated Key Establishment Protocol for Smart Home Environment. IEEE Transactions on Dependable and Secure Computing, https:\/\/doi.org\/10.1109\/TDSC.2017.2764083, URL http:\/\/ieeexplore.ieee.org\/document\/8070995\/.","DOI":"10.1109\/TDSC.2017.2764083"},{"issue":"1","key":"2523_CR37","doi-asserted-by":"publisher","first-page":"97","DOI":"10.1137\/060651380","volume":"38","author":"Y Dodis","year":"2008","unstructured":"Dodis, Y., Ostrovsky, R., Reyzin, L., & Smith, A. (2008). Fuzzy extractors: How to generate strong keys from biometrics and other noisy data. SIAM Journal on Computing, 38(1), 97\u2013139. https:\/\/doi.org\/10.1137\/060651380.","journal-title":"SIAM Journal on Computing"},{"key":"2523_CR38","unstructured":"Carper, T., & Hemmo, D. (2002). Smart card memory management system and method. US Patent 6,480,935"},{"key":"2523_CR39","unstructured":"Hamann, E.M., & Kaisser, M. (2001). Storing data objects in a smart card memory. US Patent 6,296,191."},{"key":"2523_CR40","doi-asserted-by":"publisher","unstructured":"Abdalla, M., Fouque, P. A., & Pointcheval, D. (2006). Password-based authenticated key exchange in the three-party setting. IEE Proceedings: Information Security, 153(1), 27\u201339. https:\/\/doi.org\/10.1049\/ip-ifs:20055073, URL http:\/\/link.springer.com\/10.1007\/978-3-540-30580-4_6.","DOI":"10.1049\/ip-ifs:20055073"},{"issue":"7","key":"2523_CR41","doi-asserted-by":"publisher","first-page":"6903","DOI":"10.1109\/TVT.2019.2911672","volume":"68","author":"J Srinivas","year":"2019","unstructured":"Srinivas, J., Das, A. K., Kumar, N., & Rodrigues, J. J. P. C. (2019). TCALAS: Temporal credential-based anonymous lightweight authentication scheme for internet of drones environment. IEEE Transactions on Vehicular Technology, 68(7), 6903\u20136916. https:\/\/doi.org\/10.1109\/TVT.2019.2911672.","journal-title":"IEEE Transactions on Vehicular Technology"},{"key":"2523_CR42","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2017.2764083","author":"M Wazid","year":"2017","unstructured":"Wazid, M., Das, A. K., Odelu, V., Kumar, N., & Susilo, W. (2017). Secure remote user authenticated key establishment protocol for smart home environment. IEEE Transactions on Dependable and Secure Computing,. https:\/\/doi.org\/10.1109\/TDSC.2017.2764083.","journal-title":"IEEE Transactions on Dependable and Secure Computing"},{"issue":"2","key":"2523_CR43","doi-asserted-by":"publisher","first-page":"3572","DOI":"10.1109\/JIOT.2018.2888821","volume":"6","author":"M Wazid","year":"2019","unstructured":"Wazid, M., Das, A. K., Kumar, N., Vasilakos, A. V., & Rodrigues, J. J. P. C. (2019). Design and analysis of secure lightweight remote user authentication and key agreement scheme in internet of drones deployment. IEEE Internet of Things Journal, 6(2), 3572\u20133584.","journal-title":"IEEE Internet of Things Journal"},{"issue":"9","key":"2523_CR44","doi-asserted-by":"publisher","first-page":"1953","DOI":"10.1109\/TIFS.2015.2439964","volume":"10","author":"V Odelu","year":"2015","unstructured":"Odelu, V., Das, A. K., & Goswami, A. (2015). A secure biometrics-based multi-server authentication protocol using smart cards. IEEE Transactions on Information Forensics and Security, 10(9), 1953\u20131966.","journal-title":"IEEE Transactions on Information Forensics and Security"},{"key":"2523_CR45","doi-asserted-by":"publisher","unstructured":"Safkhani, M., Bagheri, N., Kumari, S., Tavakoli, H., Kumar, S., & Chen, J. (2020). RESEAP: An ECC based authentication and key agreement scheme for IoT applications. IEEE Access, https:\/\/doi.org\/10.1109\/access.2020.3034447.","DOI":"10.1109\/access.2020.3034447"},{"key":"2523_CR46","doi-asserted-by":"publisher","first-page":"388","DOI":"10.1007\/3-540-48405-1_25","volume":"1666","author":"P Kocher","year":"1999","unstructured":"Kocher, P., Jaffe, J., & Jun, B. (1999). Differential power analysis. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 1666, 388\u2013397. https:\/\/doi.org\/10.1007\/3-540-48405-1_25.","journal-title":"Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)"},{"issue":"5","key":"2523_CR47","doi-asserted-by":"publisher","first-page":"541","DOI":"10.1109\/TC.2002.1004593","volume":"51","author":"TS Messerges","year":"2002","unstructured":"Messerges, T. S., Dabbish, E. A., & Sloan, R. H. (2002). Examining smart-card security under the threat of power analysis attacks. IEEE Transactions on Computers, 51(5), 541\u2013552. https:\/\/doi.org\/10.1109\/TC.2002.1004593.","journal-title":"IEEE Transactions on Computers"},{"key":"2523_CR48","unstructured":"Daynes, L.P., & Czajkowski, G.J. (2007). Multi-level undo of main-memory and volatile resources. US Patent 7,234,076."},{"key":"2523_CR49","doi-asserted-by":"publisher","unstructured":"Huang, X., Xiang, Y., Chonka, A., Zhou, J., & Deng, R. H. (2011). A generic framework for three-factor authentication: Preserving security and privacy in distributed systems. IEEE Transactions on Parallel and Distributed Systems, 22(8), 1390\u20131397. https:\/\/doi.org\/10.1109\/TPDS.2010.206, URL http:\/\/doi.ieeecomputersociety.org\/10.1109\/.","DOI":"10.1109\/TPDS.2010.206"},{"issue":"1\u20132","key":"2523_CR50","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1561\/3300000004","volume":"1","author":"B Blanchet","year":"2016","unstructured":"Blanchet, B. (2016). Modeling and Verifying Security Protocols with the Applied Pi Calculus and ProVerif. Foundations and Trends\u00ae in Privacy and Security, 1(1\u20132), 1\u2013135. https:\/\/doi.org\/10.1561\/3300000004.","journal-title":"Foundations and Trends\u00ae in Privacy and Security"},{"key":"2523_CR51","first-page":"54","volume-title":"Automatic verification of security protocols in the symbolic model: The verifier proverif. In: Lecture notes in computer science (including subseries lecture notes in artificial intelligence and lecture notes in bioinformatics)","author":"B Blanchet","year":"2014","unstructured":"Blanchet, B. (2014). Automatic verification of security protocols in the symbolic model: The verifier proverif. In: Lecture notes in computer science (including subseries lecture notes in artificial intelligence and lecture notes in bioinformatics) (pp. 54\u201387). Cham: Springer."},{"key":"2523_CR52","first-page":"226","volume-title":"Proving more observational equivalences with proverif. in: International conference on principles of security and trust","author":"V Cheval","year":"2013","unstructured":"Cheval, V., & Blanchet, B. (2013). Proving more observational equivalences with proverif. in: International conference on principles of security and trust (pp. 226\u2013246). Cham: Springer."},{"key":"2523_CR53","unstructured":"Abdi, H. (2019). hossein73\/proverif. URL https:\/\/github.com\/hossein73\/proverif\/blob\/develop\/LAPTASAuthenticationSchemeWithPrivacyPreservingIIoT.pv."},{"key":"2523_CR54","doi-asserted-by":"publisher","first-page":"102494","DOI":"10.1016\/j.jisa.2020.102494","volume":"52","author":"H Lee","year":"2020","unstructured":"Lee, H., Kang, D., Ryu, J., Won, D., Kim, H., & Lee, Y. (2020). A three-factor anonymous user authentication scheme for Internet of Things environments. Journal of Information Security and Applications, 52, 102494. https:\/\/doi.org\/10.1016\/j.jisa.2020.102494.","journal-title":"Journal of Information Security and Applications"},{"key":"2523_CR55","unstructured":"Dai, W. (2019, April 28). Weidai11\/cryptopp. Crypto++ Library is a free C++ class library of cryptographic schemes. https:\/\/github.com\/weidai11\/cryptopp"},{"key":"2523_CR56","doi-asserted-by":"publisher","unstructured":"Dang, Q.H. (2015). Secure Hash Standard. Tech. rep., National Institute of Standards and Technology, Gaithersburg, MD, https:\/\/doi.org\/10.6028\/NIST.FIPS.180-4, URL https:\/\/nvlpubs.nist.gov\/nistpubs\/FIPS\/NIST.FIPS.180-4.pdf","DOI":"10.6028\/NIST.FIPS.180-4"},{"key":"2523_CR57","doi-asserted-by":"publisher","first-page":"534","DOI":"10.1016\/j.compeleceng.2017.08.003","volume":"69","author":"S Challa","year":"2018","unstructured":"Challa, S., Das, A. K., Odelu, V., Kumar, N., Kumari, S., Khan, M. K., et al. (2018). An efficient ECC-based provably secure three-factor user authentication and key agreement protocol for wireless healthcare sensor networks. Computers and Electrical Engineering, 69, 534\u2013554. https:\/\/doi.org\/10.1016\/j.compeleceng.2017.08.003.","journal-title":"Computers and Electrical Engineering"},{"issue":"7","key":"2523_CR58","doi-asserted-by":"publisher","first-page":"41","DOI":"10.1145\/129902.129905","volume":"35","author":"RL Rivest","year":"1992","unstructured":"Rivest, R. L., Hellman, M. E., Anderson, J. C., & Lyons, J. W. (1992). Responses to NIST\u2019s proposal. Communications of the ACM, 35(7), 41\u201354. https:\/\/doi.org\/10.1145\/129902.129905.","journal-title":"Communications of the ACM"},{"issue":"6","key":"2523_CR59","doi-asserted-by":"publisher","first-page":"158","DOI":"10.1109\/MCOM.2002.1007422","volume":"40","author":"C Zhu","year":"2002","unstructured":"Zhu, C., Yang, O. W., Aweya, J., Ouellette, M., & Montuno, D. Y. (2002). A comparison of active queue management algorithms using the opnet modeler. IEEE Communications Magazine, 40(6), 158\u2013167.","journal-title":"IEEE Communications Magazine"},{"key":"2523_CR60","doi-asserted-by":"crossref","unstructured":"Cao, C., Zuo, Y., & Zhang, F. (2018). Research on comprehensive performance simulation of communication ip network based on opnet. In: 2018 International Conference on Intelligent Transportation, Big Data & Smart City (ICITBS), IEEE, pp 195\u2013197.","DOI":"10.1109\/ICITBS.2018.00057"},{"issue":"4","key":"2523_CR61","doi-asserted-by":"publisher","first-page":"921","DOI":"10.1016\/j.jnca.2007.01.001","volume":"31","author":"K Salah","year":"2008","unstructured":"Salah, K., Calyam, P., & Buhari, M. (2008). Assessing readiness of ip networks to support desktop videoconferencing using opnet. Journal of Network and Computer Applications, 31(4), 921\u2013943.","journal-title":"Journal of Network and Computer Applications"}],"container-title":["Wireless Networks"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11276-020-02523-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11276-020-02523-9\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11276-020-02523-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,6]],"date-time":"2021-05-06T14:46:04Z","timestamp":1620312364000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11276-020-02523-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,1,2]]},"references-count":61,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2021,2]]}},"alternative-id":["2523"],"URL":"https:\/\/doi.org\/10.1007\/s11276-020-02523-9","relation":{},"ISSN":["1022-0038","1572-8196"],"issn-type":[{"value":"1022-0038","type":"print"},{"value":"1572-8196","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,1,2]]},"assertion":[{"value":"10 December 2020","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"2 January 2021","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Compliance with ethical standards"}},{"value":"The authors declared that they had no conflicts of interest with respect to their authorship or the publication of this article.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}