{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,27]],"date-time":"2026-01-27T08:39:23Z","timestamp":1769503163479,"version":"3.49.0"},"reference-count":39,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2016,9,20]],"date-time":"2016-09-20T00:00:00Z","timestamp":1474329600000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Wireless Pers Commun"],"published-print":{"date-parts":[[2017,6]]},"DOI":"10.1007\/s11277-016-3718-6","type":"journal-article","created":{"date-parts":[[2016,9,20]],"date-time":"2016-09-20T16:13:33Z","timestamp":1474388013000},"page":"1899-1933","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":63,"title":["A Secure Smartcard-Based Anonymous User Authentication Scheme for Healthcare Applications Using Wireless Medical Sensor Networks"],"prefix":"10.1007","volume":"94","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-5196-9589","authenticated-orcid":false,"given":"Ashok Kumar","family":"Das","sequence":"first","affiliation":[]},{"given":"Anil Kumar","family":"Sutrala","sequence":"additional","affiliation":[]},{"given":"Vanga","family":"Odelu","sequence":"additional","affiliation":[]},{"given":"Adrijit","family":"Goswami","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,9,20]]},"reference":[{"issue":"1","key":"3718_CR1","doi-asserted-by":"crossref","first-page":"49","DOI":"10.1007\/s00530-013-0346-9","volume":"21","author":"D He","year":"2015","unstructured":"He, D., Kumar, N., Chen, J., Lee, C.-C., Chilamkurti, N., & Yeo, S.-S. (2015). Robust anonymous authentication protocol for health-care applications using wireless medical sensor networks. Multimedia Systems, 21(1), 49\u201360.","journal-title":"Multimedia Systems"},{"issue":"2","key":"3718_CR2","doi-asserted-by":"crossref","first-page":"1625","DOI":"10.3390\/s120201625","volume":"12","author":"P Kumar","year":"2012","unstructured":"Kumar, P., Lee, S. G., & Lee, H. J. (2012). E-SAP: Efficient-strong authentication protocol for healthcare applications using wireless medical sensor networks. Sensors, 12(2), 1625\u20131647.","journal-title":"Sensors"},{"issue":"4","key":"3718_CR3","doi-asserted-by":"crossref","first-page":"400","DOI":"10.1109\/JSAC.2009.090505","volume":"27","author":"YM Huang","year":"2009","unstructured":"Huang, Y. M., Hsieh, M. Y., Chao, H. C., Hung, S. H., & Park, J. H. (2009). Pervasive, secure access to a hierarchical sensor-based healthcare monitoring architecture in wireless heterogeneous networks. IEEE Journal on Selected Areas in Communications, 27(4), 400\u2013411.","journal-title":"IEEE Journal on Selected Areas in Communications"},{"issue":"1","key":"3718_CR4","doi-asserted-by":"crossref","first-page":"223","DOI":"10.1007\/s12083-014-0324-9","volume":"9","author":"AK Das","year":"2016","unstructured":"Das, A. K. (2016). A secure and robust temporal credential-based three-factor user authentication scheme for wireless sensor networks. Peer-to-Peer Networking and Applications, 9(1), 223\u2013244.","journal-title":"Peer-to-Peer Networking and Applications"},{"key":"3718_CR5","doi-asserted-by":"publisher","unstructured":"Das, A. K. (2015). A secure and effective biometric-based user authentication scheme for wireless sensor networks using smart card and fuzzy extractor. International Journal of Communication Systems, 1\u201325. doi: 10.1002\/dac.2933 .","DOI":"10.1002\/dac.2933"},{"issue":"3","key":"3718_CR6","doi-asserted-by":"crossref","first-page":"1377","DOI":"10.1007\/s11277-015-2288-3","volume":"82","author":"AK Das","year":"2015","unstructured":"Das, A. K. (2015). A secure and efficient user anonymity-preserving three-factor authentication protocol for large-scale distributed wireless sensor networks. Wireless Personal Communications, 82(3), 1377\u20131404.","journal-title":"Wireless Personal Communications"},{"key":"3718_CR7","doi-asserted-by":"crossref","first-page":"2450","DOI":"10.3390\/s100302450","volume":"10","author":"MK Khan","year":"2010","unstructured":"Khan, M. K., & Alghathbar, K. (2010). Cryptanalysis and security improvements of \u2018two-factor user authentication in wireless sensor networks\u2019. Sensors, 10, 2450\u20132459.","journal-title":"Sensors"},{"issue":"4","key":"3718_CR8","first-page":"1","volume":"37","author":"MK Khan","year":"2013","unstructured":"Khan, M. K., & Kumari, S. (2013). An authentication scheme for secure access to healthcare services. Journal of Medical Systems, 37(4), 1\u201312.","journal-title":"Journal of Medical Systems"},{"key":"3718_CR9","doi-asserted-by":"crossref","first-page":"159","DOI":"10.1016\/j.adhoc.2014.11.018","volume":"27","author":"S Kumari","year":"2015","unstructured":"Kumari, S., Khan, M. K., & Atiquzzaman, M. (2015). User authentication schemes for wireless sensor networks: A review. Ad Hoc Networks, 27, 159\u2013194.","journal-title":"Ad Hoc Networks"},{"key":"3718_CR10","doi-asserted-by":"publisher","unstructured":"Li, X., Niu, J., Kumari, S., Liao, J., Liang, W., & Khan, M. K. (2015). A new authentication protocol for healthcare applications using wireless medical sensor networks with user anonymity. Security and Communication Networks. doi: 10.1002\/sec.1214 .","DOI":"10.1002\/sec.1214"},{"key":"3718_CR11","doi-asserted-by":"publisher","unstructured":"Shi, W., & Gong, P.(2013) A new user authentication protocol for wireless sensor networks using elliptic curves cryptography. International Journal of Distributed Sensor Networks, 2013:1\u20137. Article ID 730831, doi: 10.1155\/2013\/730831 .","DOI":"10.1155\/2013\/730831"},{"issue":"5","key":"3718_CR12","doi-asserted-by":"crossref","first-page":"4767","DOI":"10.3390\/s110504767","volume":"11","author":"HL Yeh","year":"2011","unstructured":"Yeh, H. L., Chen, T. H., Liu, P. C., Kim, T. H., & Wei, H. W. (2011). A secured authentication protocol for wireless sensor networks using elliptic curves cryptography. Sensors, 11(5), 4767\u20134779.","journal-title":"Sensors"},{"key":"3718_CR13","unstructured":"Han, W. (2011). Weakness of a secured authentication protocol for wireless sensor networks using elliptic curves cryptography. http:\/\/eprint.iacr.org\/2011\/293 ."},{"issue":"5","key":"3718_CR14","doi-asserted-by":"crossref","first-page":"1646","DOI":"10.1016\/j.jnca.2012.03.011","volume":"35","author":"AK Das","year":"2012","unstructured":"Das, A. K., Sharma, P., Chatterjee, S., & Sing, J. K. (2012). A dynamic password-based user authentication scheme for hierarchical wireless sensor networks. Journal of Network and Computer Applications, 35(5), 1646\u20131656.","journal-title":"Journal of Network and Computer Applications"},{"key":"3718_CR15","doi-asserted-by":"crossref","unstructured":"Kocher, P., Jaffe, J., & Jun, B. (1999). Differential power analysis. In Proceedings of 19th Annual International Cryptology Conference. Advances in Cryptology\u2014CRYPTO\u201999, Lecture Notes in Computer Science, (Vol. 1666, pp. 388\u2013397) Santa Barbara, California, USA.","DOI":"10.1007\/3-540-48405-1_25"},{"issue":"5","key":"3718_CR16","doi-asserted-by":"crossref","first-page":"541","DOI":"10.1109\/TC.2002.1004593","volume":"51","author":"TS Messerges","year":"2002","unstructured":"Messerges, T. S., Dabbish, E. A., & Sloan, R. H. (2002). Examining smart-card security under the threat of power analysis attacks. IEEE Transactions on Computers, 51(5), 541\u2013552.","journal-title":"IEEE Transactions on Computers"},{"issue":"2","key":"3718_CR17","doi-asserted-by":"crossref","first-page":"198","DOI":"10.1109\/TIT.1983.1056650","volume":"29","author":"D Dolev","year":"1983","unstructured":"Dolev, D., & Yao, A. (1983). On the security of public key protocols. IEEE Transactions on Information Theory, 29(2), 198\u2013208.","journal-title":"IEEE Transactions on Information Theory"},{"issue":"9","key":"3718_CR18","doi-asserted-by":"crossref","first-page":"1953","DOI":"10.1109\/TIFS.2015.2439964","volume":"10","author":"V Odelu","year":"2015","unstructured":"Odelu, V., Das, A. K., & Goswami, A. (2015). A secure biometrics-based multi-server authentication protocol using smart cards. IEEE Transactions on Information Forensics and Security, 10(9), 1953\u20131966.","journal-title":"IEEE Transactions on Information Forensics and Security"},{"issue":"1","key":"3718_CR19","doi-asserted-by":"crossref","first-page":"30","DOI":"10.1109\/TCE.2016.7448560","volume":"62","author":"V Odelu","year":"2016","unstructured":"Odelu, V., Das, A. K., & Goswami, A. (2016). SEAP: Secure and efficient authentication protocol for NFC applications using pseudonyms. IEEE Transactions on Consumer Electronics, 62(1), 30\u201338.","journal-title":"IEEE Transactions on Consumer Electronics"},{"issue":"1","key":"3718_CR20","doi-asserted-by":"crossref","first-page":"18","DOI":"10.1145\/77648.77649","volume":"8","author":"M Burrows","year":"1990","unstructured":"Burrows, M., Abadi, M., & Needham, R. (1990). A logic of authentication. ACM Transactions on Computer Systems, 8(1), 18\u201336.","journal-title":"ACM Transactions on Computer Systems"},{"issue":"9","key":"3718_CR21","doi-asserted-by":"crossref","first-page":"1752","DOI":"10.1002\/sec.1140","volume":"8","author":"S Chatterjee","year":"2015","unstructured":"Chatterjee, S., & Das, A. K. (2015). An effective ECC-based user access control scheme with attribute-based encryption for wireless sensor networks. Security and Communication Networks, 8(9), 1752\u20131771.","journal-title":"Security and Communication Networks"},{"issue":"9","key":"3718_CR22","doi-asserted-by":"crossref","first-page":"1732","DOI":"10.1002\/sec.1139","volume":"8","author":"V Odelu","year":"2015","unstructured":"Odelu, V., Das, A. K., & Goswami, A. (2015). A secure and efficient ECC-based user anonymity preserving single sign-on scheme for distributed computer networks. Security and Communication Networks, 8(9), 1732\u20131751.","journal-title":"Security and Communication Networks"},{"key":"3718_CR23","doi-asserted-by":"crossref","first-page":"80","DOI":"10.1016\/j.ins.2012.04.036","volume":"209","author":"AK Das","year":"2012","unstructured":"Das, A. K., Paul, N. R., & Tripathy, L. (2012). Cryptanalysis and improvement of an access control in user hierarchy based on elliptic curve cryptosystem. Information Sciences, 209, 80\u201392.","journal-title":"Information Sciences"},{"key":"3718_CR24","doi-asserted-by":"crossref","first-page":"270","DOI":"10.1016\/j.ins.2013.10.022","volume":"269","author":"V Odelu","year":"2014","unstructured":"Odelu, V., Das, A. K., & Goswami, A. (2014). A secure effective key management scheme for dynamic access control in a large leaf class hierarchy. Information Sciences, 269, 270\u2013285.","journal-title":"Information Sciences"},{"issue":"18","key":"3718_CR25","doi-asserted-by":"crossref","first-page":"3383","DOI":"10.1002\/sec.1266","volume":"8","author":"AK Das","year":"2015","unstructured":"Das, A. K., Mishra, D., & Mukhopadhyay, S. (2015). An anonymous and secure biometric-based enterprise digital rights management system for mobile environment. Security and Communication Networks, 8(18), 3383\u20133404.","journal-title":"Security and Communication Networks"},{"issue":"3","key":"3718_CR26","first-page":"1","volume":"39","author":"AK Das","year":"2015","unstructured":"Das, A. K. (2015). A secure user anonymity-preserving three-factor remote user authentication scheme for the telecare medicine information systems. Journal of Medical Systems, 39(3), 1\u201320.","journal-title":"Journal of Medical Systems"},{"issue":"4","key":"3718_CR27","doi-asserted-by":"crossref","first-page":"167","DOI":"10.1002\/nem.739","volume":"20","author":"Y-H Chuang","year":"2010","unstructured":"Chuang, Y.-H., & Tseng, Y.-M. (2010). An efficient dynamic group key agreement protocol for imbalanced wireless networks. International Journal of Network Management, 20(4), 167\u2013180.","journal-title":"International Journal of Network Management"},{"issue":"4","key":"3718_CR28","doi-asserted-by":"crossref","first-page":"2325","DOI":"10.1007\/s10916-011-9700-7","volume":"36","author":"S Wu","year":"2012","unstructured":"Wu, S., & Chen, K. (2012). An efficient key-management scheme for hierarchical access control in E-medicine system. Journal of Medical Systems, 36(4), 2325\u20132337.","journal-title":"Journal of Medical Systems"},{"key":"3718_CR29","unstructured":"AVISPA. Automated Validation of Internet Security Protocols and Applications. http:\/\/www.avispa-project.org\/ . Accessed January 2015."},{"issue":"1","key":"3718_CR30","doi-asserted-by":"crossref","first-page":"498","DOI":"10.1016\/j.jnca.2012.04.006","volume":"36","author":"C Lv","year":"2013","unstructured":"Lv, C., Ma, M., Li, H., Ma, J., & Zhang, Y. (2013). An novel three-party authenticated key exchange protocol using one-time key. Journal of Network and Computer Applications, 36(1), 498\u2013503.","journal-title":"Journal of Network and Computer Applications"},{"key":"3718_CR31","unstructured":"von\u00a0Oheimb, D. (2005). The high-level protocol specification language hlpsl developed in the eu project avispa. In Proceedings of APPSEM 2005 Workshop, (pp. 1\u201317) Tallinn."},{"key":"3718_CR32","unstructured":"AVISPA. SPAN, the Security Protocol ANimator for AVISPA. http:\/\/www.avispa-project.org\/ . Accessed July 2016."},{"issue":"3","key":"3718_CR33","doi-asserted-by":"crossref","first-page":"181","DOI":"10.1007\/s10207-004-0055-7","volume":"4","author":"D Basin","year":"2005","unstructured":"Basin, D., Modersheim, S., & Vigano, L. (2005). OFMC: A symbolic model checker for security protocols. International Journal of Information Security, 4(3), 181\u2013208.","journal-title":"International Journal of Information Security"},{"issue":"12","key":"3718_CR34","doi-asserted-by":"crossref","first-page":"2681","DOI":"10.1109\/TIFS.2015.2473820","volume":"10","author":"D He","year":"2015","unstructured":"He, D., Zeadally, S., Xu, B., & Huang, X. (2015). An efficient identity-based conditional privacy-preserving authentication scheme for vehicular ad hoc networks. IEEE Transactions on Information Forensics and Security, 10(12), 2681\u20132691.","journal-title":"IEEE Transactions on Information Forensics and Security"},{"issue":"1","key":"3718_CR35","doi-asserted-by":"crossref","first-page":"30","DOI":"10.1109\/TCE.2014.6780922","volume":"60","author":"D He","year":"2014","unstructured":"He, D., Kumar, N., Lee, J. H., & Sherratt, R. S. (2014). Enhanced three-factor security protocol for consumer USB mass storage devices. IEEE Transactions on Consumer Electronics, 60(1), 30\u201337.","journal-title":"IEEE Transactions on Consumer Electronics"},{"key":"3718_CR36","unstructured":"Advanced Encryption Standard (AES). FIPS PUB 197, National Institute of Standards and Technology (NIST), U.S. Department of Commerce, November 2001. http:\/\/csrc.nist.gov\/publications\/fips\/fips197\/fips-197 ."},{"issue":"2\u20133","key":"3718_CR37","doi-asserted-by":"crossref","first-page":"173","DOI":"10.1023\/A:1008354106356","volume":"19","author":"N Koblitz","year":"2000","unstructured":"Koblitz, N., Menezes, A., & Vanstone, S. A. (2000). The state of elliptic curve cryptography. Designs, Codes and Cryptography, 19(2\u20133), 173\u2013193.","journal-title":"Designs, Codes and Cryptography"},{"issue":"2","key":"3718_CR38","doi-asserted-by":"crossref","first-page":"120","DOI":"10.1145\/359340.359342","volume":"21","author":"RL Rivest","year":"1978","unstructured":"Rivest, R. L., Shamir, A., & Adleman, L. M. (1978). A method for obtaining digital signatures and public-key cryptosystems. Communications of the ACM, 21(2), 120\u2013126.","journal-title":"Communications of the ACM"},{"key":"3718_CR39","unstructured":"Secure hash standard. FIPS PUB 180-1, National Institute of Standards and Technology (NIST), U.S. Department of Commerce, April 1995. http:\/\/csrc.nist.gov\/publications\/fips\/fips180-2\/fips180-2 ."}],"container-title":["Wireless Personal Communications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11277-016-3718-6\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-016-3718-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-016-3718-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,6,19]],"date-time":"2024-06-19T13:33:56Z","timestamp":1718804036000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11277-016-3718-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,9,20]]},"references-count":39,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2017,6]]}},"alternative-id":["3718"],"URL":"https:\/\/doi.org\/10.1007\/s11277-016-3718-6","relation":{},"ISSN":["0929-6212","1572-834X"],"issn-type":[{"value":"0929-6212","type":"print"},{"value":"1572-834X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016,9,20]]}}}