{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,26]],"date-time":"2026-02-26T10:24:10Z","timestamp":1772101450091,"version":"3.50.1"},"reference-count":37,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2021,2,19]],"date-time":"2021-02-19T00:00:00Z","timestamp":1613692800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,2,19]],"date-time":"2021-02-19T00:00:00Z","timestamp":1613692800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Wireless Netw"],"published-print":{"date-parts":[[2021,4]]},"DOI":"10.1007\/s11276-021-02560-y","type":"journal-article","created":{"date-parts":[[2021,2,19]],"date-time":"2021-02-19T20:46:05Z","timestamp":1613767565000},"page":"2119-2130","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":55,"title":["An efficient anonymous authentication and confidentiality preservation schemes for secure communications in wireless body area networks"],"prefix":"10.1007","volume":"27","author":[{"given":"Maria","family":"Azees","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5451-8946","authenticated-orcid":false,"given":"Pandi","family":"Vijayakumar","sequence":"additional","affiliation":[]},{"given":"Marimuthu","family":"Karuppiah","sequence":"additional","affiliation":[]},{"given":"Anand","family":"Nayyar","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,2,19]]},"reference":[{"issue":"4","key":"2560_CR1","first-page":"1","volume":"11","author":"L Zhang","year":"2019","unstructured":"Zhang, L., Yuan, X., Wang, K., & Zhang, D. (2019). Multiple-image encryption mechanism based on ghost imaging and public key cryptography. IEEE Photonics Journal, 11(4), 1\u201314.","journal-title":"IEEE Photonics Journal"},{"issue":"2","key":"2560_CR2","doi-asserted-by":"publisher","first-page":"332","DOI":"10.1109\/TPDS.2013.145","volume":"25","author":"J Liu","year":"2014","unstructured":"Liu, J., Zhang, Z., Chen, X., & Kwak, K. (2014). Certificateless remote anonymous authentication schemes for wireless body area networks. IEEE Transactions on Parallel and Distributed Systems, 25(2), 332\u2013342.","journal-title":"IEEE Transactions on Parallel and Distributed Systems"},{"issue":"3","key":"2560_CR3","doi-asserted-by":"publisher","first-page":"2439","DOI":"10.1007\/s10586-017-0848-x","volume":"20","author":"P Vijayakumar","year":"2017","unstructured":"Vijayakumar, P., Azees, M., Chang, V., Deborah, J., & Balusamy, B. (2017). Computationally efficient privacy preserving authentication and key distribution techniques for vehicular ad hoc networks. Cluster Computing, 20(3), 2439\u20132450.","journal-title":"Cluster Computing"},{"issue":"9","key":"2560_CR4","doi-asserted-by":"publisher","first-page":"2467","DOI":"10.1109\/TITS.2016.2634623","volume":"18","author":"M Azees","year":"2017","unstructured":"Azees, M., Vijayakumar, P., & Deboarh, L. J. (2017). EAAP: Efficient anonymous authentication with conditional privacy-preserving scheme for vehicular ad hoc networks. IEEE Transactions on Intelligent Transportation Systems, 18(9), 2467\u20132476.","journal-title":"IEEE Transactions on Intelligent Transportation Systems"},{"key":"2560_CR5","doi-asserted-by":"crossref","unstructured":"Vijayakumar, P., Azees, M., & Deboarh, L. J. (2015). CPAV: Computationally efficient privacy preserving anonymous authentication scheme for vehicular ad hoc networks. In 2015 IEEE 2nd international conference on cyber security and cloud computing.","DOI":"10.1109\/CSCloud.2015.32"},{"issue":"2","key":"2560_CR6","first-page":"171","volume":"10","author":"M Azees","year":"2016","unstructured":"Azees, M., & Vijayakumar, P. (2016). CEKD: Computationally efficient key distribution scheme for vehicular ad-hoc networks. Australian Journal of Basic and Applied Sciences, 10(2), 171\u2013175.","journal-title":"Australian Journal of Basic and Applied Sciences"},{"key":"2560_CR7","doi-asserted-by":"publisher","first-page":"747","DOI":"10.1007\/s11276-020-02482-1","volume":"27","author":"A Abuelkhail","year":"2020","unstructured":"Abuelkhail, A., Baroudi, U., Raad, M., & Sheltami, T. (2020). Internet of things for healthcare monitoring applications based on RFID clustering scheme. Wireless Networks, 27, 747\u2013763.","journal-title":"Wireless Networks"},{"issue":"6","key":"2560_CR8","doi-asserted-by":"publisher","first-page":"3081","DOI":"10.1007\/s11276-018-1704-5","volume":"25","author":"MES Saeed","year":"2018","unstructured":"Saeed, M. E. S., Liu, Q.-Y., Tian, G., Gao, B., & Li, F. (2018). AKAIoTs: authenticated key agreement for Internet of Things. Wireless Networks, 25(6), 3081\u20133101.","journal-title":"Wireless Networks"},{"key":"2560_CR9","doi-asserted-by":"crossref","unstructured":"Mahapatra,B., & Nayyar, A. (2019). Swarm intelligence and evolutionary algorithms for cancer diagnosis. In Swarm intelligence and evolutionary algorithms in healthcare and drug development (pp. 19\u201344).","DOI":"10.1201\/9780429289675-2"},{"issue":"3","key":"2560_CR10","first-page":"347","volume":"21","author":"A Nayyar","year":"2020","unstructured":"Nayyar, A., Pramankit, P. K. D., & Mohana, R. (2020). Introduction to special issue the on evolving IoT and Cyber-physical systems: Advancements, applications, and solutions. Scalable Computing: Practice and Experience, 21(3), 347\u2013348.","journal-title":"Scalable Computing: Practice and Experience"},{"key":"2560_CR11","doi-asserted-by":"crossref","unstructured":"Pramanik, P. K. D., Nayyar, A., & Pareek, G. (2019). WBAN: Driving e-healthcare beyond telemedicine to remote health monitoring. In Telemedicine technologies (pp. 89\u2013119).","DOI":"10.1016\/B978-0-12-816948-3.00007-6"},{"key":"2560_CR12","doi-asserted-by":"crossref","unstructured":"Pramanik, P. K. D., Pareek, G., & Nayyar, A. Security and privacy in remote healthcare: Issues, solutions, and standards. In Telemedicine technologies (pp. 201\u2013225). Academic Press.","DOI":"10.1016\/B978-0-12-816948-3.00014-3"},{"key":"2560_CR13","doi-asserted-by":"crossref","unstructured":"Deebak, B. D., Al-Turjman, F., & Nayyar, A. (2020). Chaotic-map based authenticated security framework with privacy preservation for remote point-of-care. Multimedia Tools and Applications.","DOI":"10.1007\/s11042-020-10134-x"},{"issue":"22","key":"2560_CR14","doi-asserted-by":"publisher","first-page":"8291","DOI":"10.3390\/app10228291","volume":"10","author":"AK Singh","year":"2020","unstructured":"Singh, A. K., Solanki, A., Nayyar, A., & Qureshi, B. (2020). Elliptic curve signcryption-based mutual authentication protocol for smart cards. Applied Sciences, 10(22), 8291.","journal-title":"Applied Sciences"},{"issue":"12","key":"2560_CR15","doi-asserted-by":"publisher","first-page":"2327","DOI":"10.1109\/TIFS.2014.2363553","volume":"9","author":"H Xiong","year":"2014","unstructured":"Xiong, H. (2014). Cost-effective scalable and anonymous certificateless remote authentication protocol. IEEE Transactions on Information Forensics and Security, 9(12), 2327\u20132339.","journal-title":"IEEE Transactions on Information Forensics and Security"},{"issue":"11","key":"2560_CR16","doi-asserted-by":"publisher","first-page":"136","DOI":"10.1007\/s10916-015-0331-2","volume":"39","author":"C Wang","year":"2015","unstructured":"Wang, C., & Zhang, Y. (2015). New authentication scheme for wireless body area networks using the bilinear pairing. Journal of Medical Systems, 39(11), 136.","journal-title":"Journal of Medical Systems"},{"key":"2560_CR17","doi-asserted-by":"crossref","unstructured":"Li,M., Yu, S., Lou, W., & Ren, K. (2010). Group device pairing based secure sensor association and key management for body area networks. In Proceedings IEEE. INFOCOM (pp. 1\u20139).","DOI":"10.1109\/INFCOM.2010.5462095"},{"key":"2560_CR18","doi-asserted-by":"crossref","unstructured":"Jiang, C., Li, B., & Xu, H. (2007). An efficient scheme for user authentication in wireless sensor networks. In International conference on advanced information networking and applications Workshops (pp. 438\u2013442).","DOI":"10.1109\/AINAW.2007.80"},{"issue":"6","key":"2560_CR19","first-page":"929","volume":"15","author":"P Guo","year":"2014","unstructured":"Guo, P., Wang, J., Li, B., & Lee, S. (2014). A variable threshold-value authentication architecture for wireless mesh networks. Journal of Internet Technology, 15(6), 929\u2013936.","journal-title":"Journal of Internet Technology"},{"issue":"1","key":"2560_CR20","first-page":"171","volume":"16","author":"J Shen","year":"2015","unstructured":"Shen, J., Tan, H., Wang, J., Wang, J., & Lee, S. (2015). A novel routing protocol providing good transmission reliability in underwater sensor networks. Journal of Internet Technology, 16(1), 171\u2013178.","journal-title":"Journal of Internet Technology"},{"key":"2560_CR21","doi-asserted-by":"crossref","unstructured":"Orenda, M. P., Garg, L., & Garg, G. (2017). Exploring the feasibility to authenticate users of web and cloud services using a brain-computer interface (BCI). In International conference on image analysis and processing 2017 (pp. 353\u2013363). Springer.","DOI":"10.1007\/978-3-319-70742-6_33"},{"issue":"1","key":"2560_CR22","first-page":"071","volume":"7","author":"S Schiavone","year":"2014","unstructured":"Schiavone, S., Garg, L., & Summers, K. (2014). Ontology of information security in enterprises. The Electronic Journal Information Systems Evaluation, 7(1), 071\u2013087.","journal-title":"The Electronic Journal Information Systems Evaluation"},{"key":"2560_CR23","doi-asserted-by":"publisher","first-page":"723","DOI":"10.32604\/cmc.2021.014802","volume":"67","author":"D Datta","year":"2020","unstructured":"Datta, D., Garg, L., Srinivasan, K., Inoue, A., Reddy, G. T., Reddy, M. P. K., et al. (2020). An efficient sound and data steganography based secure authentication system. CMC-Computers Materials & Continua, 67, 723\u2013751.","journal-title":"CMC-Computers Materials & Continua"},{"key":"2560_CR24","doi-asserted-by":"publisher","first-page":"956","DOI":"10.1016\/j.future.2016.11.033","volume":"78","author":"J Shen","year":"2018","unstructured":"Shen, J., Chang, S., Shen, J., Liu, Q., & Sun, X. (2018). A lightweight multi-layer authentication protocol for wireless body area networks. Future Generation Computer Systems, 78, 956\u2013963.","journal-title":"Future Generation Computer Systems"},{"issue":"2","key":"2560_CR25","doi-asserted-by":"publisher","first-page":"13","DOI":"10.1007\/s10916-014-0013-5","volume":"38","author":"Z Zhao","year":"2014","unstructured":"Zhao, Z. (2014). An efficient anonymous authentication scheme for wireless body area networks using elliptic curve cryptosystem. Journal of Medical Systems, 38(2), 13.","journal-title":"Journal of Medical Systems"},{"issue":"2","key":"2560_CR26","doi-asserted-by":"publisher","first-page":"25","DOI":"10.1007\/s10916-016-0670-7","volume":"41","author":"AA Omala","year":"2017","unstructured":"Omala, A. A., Kibiwott, K. P., & Li, F. (2017). An efficient remote authentication scheme for wireless body area network. Journal of Medical Systems, 41(2), 25.","journal-title":"Journal of Medical Systems"},{"issue":"2","key":"2560_CR27","doi-asserted-by":"publisher","first-page":"429","DOI":"10.1016\/j.comnet.2017.03.013","volume":"129","author":"X Li","year":"2017","unstructured":"Li, X., Ibrahim, M. H., Kumari, S., Sangaiah, A. K., Gupta, V., & Choo, K.-K.-R. (2017). Anonymous mutual authentication and key agreement scheme for wearable sensors in wireless body area networks. Computer Networks, 129(2), 429\u2013443.","journal-title":"Computer Networks"},{"key":"2560_CR28","doi-asserted-by":"publisher","first-page":"607","DOI":"10.1016\/j.future.2017.04.012","volume":"83","author":"X Li","year":"2018","unstructured":"Li, X., Niu, J., Kumari, S., Wu, F., & Choo, K.-K.-R. (2018). A robust biometrics based three-factor authentication scheme for global mobility networks in smart city. Future Generation Computer Systems, 83, 607\u2013618.","journal-title":"Future Generation Computer Systems"},{"key":"2560_CR29","doi-asserted-by":"publisher","first-page":"53922","DOI":"10.1109\/ACCESS.2019.2912870","volume":"7","author":"Z Xu","year":"2019","unstructured":"Xu, Z., Xu, C., Liang, W., Xu, J., & Chen, H. (2019). A lightweight mutual authentication and key agreement scheme for medical Internet of Things. IEEE Access, 7, 53922\u201353931.","journal-title":"IEEE Access"},{"issue":"14","key":"2560_CR30","doi-asserted-by":"publisher","first-page":"e5295","DOI":"10.1002\/cpe.5295","volume":"31","author":"Z Xu","year":"2019","unstructured":"Xu, Z., Xu, C., Chen, H., & Yang, F. (2019). A lightweight anonymous mutual authentication and key agreement scheme for WBAN. Concurrency and Computation: Practice and Experience, 31(14), e5295.","journal-title":"Concurrency and Computation: Practice and Experience"},{"issue":"4","key":"2560_CR31","doi-asserted-by":"publisher","first-page":"1310","DOI":"10.1109\/JBHI.2017.2753464","volume":"22","author":"AK Das","year":"2018","unstructured":"Das, A. K., Wazid, M., Kumar, N., Khan, M. K., Choo, K.-K.-R., & Park, Y. (2018). Design of secure and lightweight authentication protocol for wearable devices environment. IEEE Journal of Biomedical and Health Informatics, 22(4), 1310\u20131322.","journal-title":"IEEE Journal of Biomedical and Health Informatics"},{"key":"2560_CR32","doi-asserted-by":"publisher","DOI":"10.1109\/jsyst.2020.2990749","author":"M Kumar","year":"2020","unstructured":"Kumar, M., & Chand, S. (2020). A lightweight cloud-assisted identity-based anonymous authentication and key agreement protocol for secure wireless body area network. IEEE Systems Journal.  https:\/\/doi.org\/10.1109\/jsyst.2020.2990749.","journal-title":"IEEE Systems Journal"},{"key":"2560_CR33","doi-asserted-by":"publisher","first-page":"2603","DOI":"10.1109\/TII.2019.2925071","volume":"16","author":"P Vijayakumar","year":"2019","unstructured":"Vijayakumar, P., Obaidat, M., Azees, M., Islam, S. H., & Kumar, N. (2019). Efficient and secure anonymous authentication with location privacy for IoT-based WBANs. IEEE Transactions on Industrial Informatics, 16, 2603\u20132611.","journal-title":"IEEE Transactions on Industrial Informatics"},{"key":"2560_CR34","doi-asserted-by":"publisher","first-page":"48576","DOI":"10.1109\/access.2020.2977968","volume":"8","author":"S Jegadeesan","year":"2020","unstructured":"Jegadeesan, S., Azees, M., Babu, N. R., Subramaniam, U., & Almakhles, J. D. (2020). EPAW: Efficient privacy preserving anonymous mutual authentication scheme for wireless body area networks (WBANs). IEEE Access, 8, 48576\u201348586. https:\/\/doi.org\/10.1109\/access.2020.2977968.","journal-title":"IEEE Access"},{"key":"2560_CR35","series-title":"Lecture notes in computer science","doi-asserted-by":"publisher","first-page":"514","DOI":"10.1007\/3-540-47719-5_40","volume-title":"Information security and privacy. ACISP 2001","author":"K Shim","year":"2001","unstructured":"Shim, K. (2001). Reducing certain elliptic curve discrete logarithms to logarithms in a finite field. In V. Varadharajan, Y. Mu (Eds.), Information security and privacy. ACISP 2001. Lecture notes in computer science, vol 2119 (pp. 514\u2013520). Berlin, Heidelberg: Springer. https:\/\/doi.org\/10.1007\/3-540-47719-5_40."},{"key":"2560_CR36","unstructured":"Cygwin: Linux Environment Emulator for Windows. http:\/\/www.cygwin.com\/. [25\u201311\u20132020]."},{"key":"2560_CR37","unstructured":"PBC library : https:\/\/crypto.stanford.edu\/pbc\/. [26\u201310\u20132020]."}],"container-title":["Wireless Networks"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11276-021-02560-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11276-021-02560-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11276-021-02560-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,22]],"date-time":"2021-04-22T07:41:28Z","timestamp":1619077288000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11276-021-02560-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,2,19]]},"references-count":37,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2021,4]]}},"alternative-id":["2560"],"URL":"https:\/\/doi.org\/10.1007\/s11276-021-02560-y","relation":{},"ISSN":["1022-0038","1572-8196"],"issn-type":[{"value":"1022-0038","type":"print"},{"value":"1572-8196","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,2,19]]},"assertion":[{"value":"21 January 2021","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"19 February 2021","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}