{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,25]],"date-time":"2025-10-25T14:21:01Z","timestamp":1761402061152,"version":"3.37.3"},"reference-count":41,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2020,1,24]],"date-time":"2020-01-24T00:00:00Z","timestamp":1579824000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,1,24]],"date-time":"2020-01-24T00:00:00Z","timestamp":1579824000000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100004663","name":"Ministry of Science and Technology, Taiwan","doi-asserted-by":"publisher","award":["MOST 105-2221-E-011-080-MY3","MOST 107-2218-E-011-012","MOST 107-2218-E-011-002"],"award-info":[{"award-number":["MOST 105-2221-E-011-080-MY3","MOST 107-2218-E-011-012","MOST 107-2218-E-011-002"]}],"id":[{"id":"10.13039\/501100004663","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Wireless Pers Commun"],"published-print":{"date-parts":[[2020,6]]},"DOI":"10.1007\/s11277-020-07153-0","type":"journal-article","created":{"date-parts":[[2020,1,24]],"date-time":"2020-01-24T14:04:25Z","timestamp":1579874665000},"page":"2351-2372","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":21,"title":["BLE-Based Authentication Protocol for Micropayment Using Wearable Device"],"prefix":"10.1007","volume":"112","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-4622-4977","authenticated-orcid":false,"given":"Nai-Wei","family":"Lo","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3816-1577","authenticated-orcid":false,"given":"Alexander","family":"Yohan","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,1,24]]},"reference":[{"key":"7153_CR1","doi-asserted-by":"publisher","unstructured":"Ahonen, P., & Savola, R. (2005). Security threats to mobile service development in the age of digital convergence. In EUROCON 2005\u2014the international conference on computer as a tool, vol. 2, pp. 1052\u20131055. https:\/\/doi.org\/10.1109\/EURCON.2005.1630130.","DOI":"10.1109\/EURCON.2005.1630130"},{"key":"7153_CR2","doi-asserted-by":"publisher","unstructured":"Akram, R. N., Markantonakis, K., & Mayes, K. (2011). User centric security model for tamper-resistant devices. In Proceedings\u20142011 IEEE 8th international conference on E-business engineering, pp. 168\u2013177. https:\/\/doi.org\/10.1109\/ICEBE.2011.69.","DOI":"10.1109\/ICEBE.2011.69"},{"key":"7153_CR3","unstructured":"Al Asar Tech Co. Ltd. Customizable bluetooth jammer. Retrieved March 8, 2018, from http:\/\/www.alasartech.cn\/Product-Details?product_id=173."},{"key":"7153_CR4","doi-asserted-by":"publisher","unstructured":"Alahakone, A. U., Senanayake, S. M. N. A., & Senanayake, C. M. (2010). Smart wearable device for real time gait event detection during running. In Proceedings\u20142010 IEEE Asia Pacific conference on circuits and systems, pp. 612\u2013615. https:\/\/doi.org\/10.1109\/APCCAS.2010.5774975.","DOI":"10.1109\/APCCAS.2010.5774975"},{"key":"7153_CR5","doi-asserted-by":"publisher","first-page":"2787","DOI":"10.1016\/j.comnet.2010.05.010","volume":"54","author":"L Atzori","year":"2010","unstructured":"Atzori, L., Iera, A., & Morabito, G. (2010). The internet of things: A survey. Computer Networks, 54, 2787\u20132805. https:\/\/doi.org\/10.1016\/j.comnet.2010.05.010.","journal-title":"Computer Networks"},{"key":"7153_CR6","doi-asserted-by":"publisher","first-page":"147","DOI":"10.1109\/CSQRWC.2012.6294997","volume":"2012","author":"QH Bai","year":"2012","unstructured":"Bai, Q. H. (2012). Comparative research on two kinds of certification system of the public key infrastructure (PKI) and the identity based encryption (IBE). CSQRWC, 2012, 147\u2013150. https:\/\/doi.org\/10.1109\/CSQRWC.2012.6294997.","journal-title":"CSQRWC"},{"key":"7153_CR7","doi-asserted-by":"publisher","unstructured":"Barnickel, J., Wang, J., & Meyer, U. (2012). Implementing an attack on bluetooth 2.1+ secure simple pairing in passkey entry mode. In Proceedings\u20142012 IEEE 11th international conference on trust, security and privacy in computing and communications, pp. 17\u201324. https:\/\/doi.org\/10.1109\/TrustCom.2012.182.","DOI":"10.1109\/TrustCom.2012.182"},{"key":"7153_CR8","doi-asserted-by":"publisher","unstructured":"Beckmann, N., & Potkonjak, M. (2009). Hardware-based public-key cryptography with public physically unclonable functions. In Lecture notes in computer science (including subseries lecture notes in artificial intelligence and lecture notes in bioinformatics), pp. 206\u2013220. https:\/\/doi.org\/10.1007\/978-3-642-04431-1_15.","DOI":"10.1007\/978-3-642-04431-1_15"},{"key":"7153_CR9","unstructured":"Bluetooth SIG. (2014). Specification of the bluetooth system: Core package version 4.2. Retrieved July 14, 2017, from https:\/\/www.bluetooth.org\/DocMan\/handlers\/DownloadDoc.ashx?doc_id=286439."},{"key":"7153_CR10","doi-asserted-by":"publisher","unstructured":"Dementyev, A., Hodges, S., Taylor, S., & Smith, J. (2013). Power consumption analysis of bluetooth low energy, zigbee, and ANT sensor nodes in a cyclic sleep scenario. In Proceedings\u20142013 IEEE international wireless symposium (IWS), pp. 1\u20134. https:\/\/doi.org\/10.1109\/IEEE-IWS.2013.6616827.","DOI":"10.1109\/IEEE-IWS.2013.6616827"},{"key":"7153_CR11","doi-asserted-by":"publisher","unstructured":"Diallo, A. S., Al-Khateeb, W. F. M., Olanrewaju, R. F., & Sado, F. (2014). A secure authentication scheme for bluetooth connection. In Proceedings\u20142014 international conference on computer and communication engineering, pp. 60\u201363. https:\/\/doi.org\/10.1109\/ICCCE.2014.29.","DOI":"10.1109\/ICCCE.2014.29"},{"key":"7153_CR12","doi-asserted-by":"publisher","unstructured":"Dittmar, A., Meffre, R., De Oliveira, F., Gehin, C., & Delhomme, G. (2005). Wearable medical devices using textile and flexible technologies for ambulatory monitoring. In Proceedings\u20142005 IEEE engineering in medicine and biology 27th annual conference, pp. 7161\u20137164. https:\/\/doi.org\/10.1109\/IEMBS.2005.1616159.","DOI":"10.1109\/IEMBS.2005.1616159"},{"key":"7153_CR13","doi-asserted-by":"crossref","unstructured":"Fan, C. I., Liang, Y. K., & Wu, C. N. (2011). An anonymous fair offline micropayment scheme. In International conference on information society (i-Society 2011), pp. 377\u2013381.","DOI":"10.1109\/i-Society18435.2011.5978474"},{"key":"7153_CR14","doi-asserted-by":"publisher","first-page":"610","DOI":"10.26599\/TST.2018.9010031","volume":"23","author":"K Fan","year":"2018","unstructured":"Fan, K., Li, H., Jiang, W., Xiao, C., & Yang, Y. (2018). Secure authentication protocol for mobile payment. Tsinghua Science and Technology, 23, 610\u2013620.","journal-title":"Tsinghua Science and Technology"},{"key":"7153_CR15","doi-asserted-by":"publisher","unstructured":"Handschuh, H., Schrijen, G. J., & Tuyls, P. (2010). Hardware intrinsic security from physically unclonable functions. In Information security and cryptography, pp. 39\u201353. https:\/\/doi.org\/10.1007\/978-3-642-14452-3_2.","DOI":"10.1007\/978-3-642-14452-3_2"},{"key":"7153_CR16","doi-asserted-by":"publisher","first-page":"30","DOI":"10.1109\/TCE.2014.6780922","volume":"60","author":"D He","year":"2014","unstructured":"He, D., Kumar, N., Lee, J. H., & Sherratt, R. (2014). Enhanced three-factor security protocol for consumer USB mass storage devices. IEEE Transactions on Consumer Electronics, 60, 30\u201337. https:\/\/doi.org\/10.1109\/TCE.2014.6780922.","journal-title":"IEEE Transactions on Consumer Electronics"},{"key":"7153_CR17","doi-asserted-by":"publisher","first-page":"56","DOI":"10.1109\/TCE.2015.7064111","volume":"61","author":"D He","year":"2015","unstructured":"He, D., Kumar, N., & Lee, J. H. (2015). Secure pseudonym-based near field communication protocol for the consumer internet of things. IEEE Transactions on Consumer Electronics, 61, 56\u201362. https:\/\/doi.org\/10.1109\/TCE.2015.7064111.","journal-title":"IEEE Transactions on Consumer Electronics"},{"key":"7153_CR18","doi-asserted-by":"publisher","first-page":"1126","DOI":"10.1109\/JPROC.2014.2320516","volume":"102","author":"C Herder","year":"2014","unstructured":"Herder, C., Yu, M. D., Koushanfar, F., & Devadas, S. (2014). Physical unclonable functions and applications: A tutorial. Proceedings of the IEEE, 102, 1126\u20131141. https:\/\/doi.org\/10.1109\/JPROC.2014.2320516.","journal-title":"Proceedings of the IEEE"},{"issue":"6","key":"7153_CR19","doi-asserted-by":"publisher","first-page":"12","DOI":"10.1016\/S1361-3723(07)70077-5","volume":"2007","author":"S Kadhiwal","year":"2007","unstructured":"Kadhiwal, S., & Zulfiquar, M. (2007). Analysis of mobile payment security measures and different standards. Computer Fraud and Security, 2007(6), 12\u201316. https:\/\/doi.org\/10.1016\/S1361-3723(07)70077-5.","journal-title":"Computer Fraud and Security"},{"key":"7153_CR20","doi-asserted-by":"publisher","unstructured":"Khan, M. F. F., & Sakamura, K. (2015). Tamper-resistant security for cyber-physical systems with eTRON architecture. In Proceedings\u20142015 IEEE international conference on data science and data intensive systems, pp. 196\u2013203. https:\/\/doi.org\/10.1109\/DSDIS.2015.98.","DOI":"10.1109\/DSDIS.2015.98"},{"key":"7153_CR21","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-016-3740-8","author":"Y Liu","year":"2017","unstructured":"Liu, Y., Zhao, Q., Liu, G., Chang, L., & Shen, J. (2017). A fairness-enhanced micropayment scheme. Wireless Personal Communications,. https:\/\/doi.org\/10.1007\/s11277-016-3740-8.","journal-title":"Wireless Personal Communications"},{"key":"7153_CR22","doi-asserted-by":"publisher","unstructured":"Madhoun, N. E., Guenane, F., & Pujolle, G. (2016). An online security protocol for NFC payment: Formally analyzed by the Scyther tool. In Proceedings\u20142016 second international conference on mobile and secure services (MobiSecServ), pp. 1\u20137. https:\/\/doi.org\/10.1109\/MOBISECSERV.2016.7440225.","DOI":"10.1109\/MOBISECSERV.2016.7440225"},{"key":"7153_CR23","unstructured":"Madhoun, N. E., & Pujolle, G. (2016). A secure cloud-based NFC payment architecture for small traders. In 2016 3rd smart cloud networks and systems (SCNS), pp. 1\u20136. Retrieved April 30, 2019, from http:\/\/ieeexplore.ieee.org\/document\/7870562\/."},{"key":"7153_CR24","doi-asserted-by":"publisher","first-page":"333","DOI":"10.1109\/TIFS.2011.2165540","volume":"7","author":"A Maiti","year":"2012","unstructured":"Maiti, A., Kim, I., & Schaumont, P. (2012). A robust physical unclonable function with enhanced challenge-response set. IEEE Transactions on Information Forensics and Security, 7, 333\u2013345. https:\/\/doi.org\/10.1109\/TIFS.2011.2165540.","journal-title":"IEEE Transactions on Information Forensics and Security"},{"issue":"2","key":"7153_CR25","doi-asserted-by":"publisher","first-page":"1699","DOI":"10.1007\/s11277-018-5875-2","volume":"103","author":"PK Maurya","year":"2018","unstructured":"Maurya, P. K., & Bagchi, S. (2018). A secure PUF-based unilateral authentication scheme for RFID system. Wireless Personal Communications, 103(2), 1699\u20131712. https:\/\/doi.org\/10.1007\/s11277-018-5875-2.","journal-title":"Wireless Personal Communications"},{"key":"7153_CR26","doi-asserted-by":"publisher","unstructured":"Me, G., & Strangio, M. A. (2005). EC-PAY: An efficient and secure ECC-based wireless local payment scheme. In Proceedings\u20143rd international conference on information technology and applications (ICITA 2005), vol. II, pp. 442\u2013447. https:\/\/doi.org\/10.1109\/ICITA.2005.122.","DOI":"10.1109\/ICITA.2005.122"},{"key":"7153_CR27","doi-asserted-by":"publisher","first-page":"1497","DOI":"10.1016\/j.adhoc.2012.02.016","volume":"10","author":"D Miorandi","year":"2015","unstructured":"Miorandi, D., Sicari, S., De Pellegrini, F., & Chlamtac, I. (2015). Internet of things: Vision, applications, and research challenges. Ad Hoc Networks, 10, 1497\u20131516. https:\/\/doi.org\/10.1016\/j.adhoc.2012.02.016.","journal-title":"Ad Hoc Networks"},{"issue":"8","key":"7153_CR28","first-page":"256","volume":"17","author":"S Nashwan","year":"2017","unstructured":"Nashwan, S. (2017). Secure authentication protocol for NFC mobile payment systems. International Journal of Computer Science and Network Security, 17(8), 256\u2013263.","journal-title":"International Journal of Computer Science and Network Security"},{"key":"7153_CR29","doi-asserted-by":"publisher","first-page":"38","DOI":"10.5120\/21412-4450","volume":"120","author":"R Patel","year":"2015","unstructured":"Patel, R., Kunche, A., Mishra, N., Bhaiyat, Z., & Joshi, P. R. (2015). Paytooth\u2014a cashless mobile payment system based on bluetooth. International Journal of Computer Applications, 120, 38\u201343. https:\/\/doi.org\/10.5120\/21412-4450.","journal-title":"International Journal of Computer Applications"},{"key":"7153_CR30","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1155\/2017\/2046735","volume":"2017","author":"GCCF Pereira","year":"2017","unstructured":"Pereira, G. C. C. F., Alves, R. C. A., da Silva, F. L., Azevedo, R. M., Albertini, B. C., & Margi, C. B. (2017). Performance evaluation of cryptographic algorithms over IoT platforms and operating systems. Security and Communication Networks, 2017, 1\u201316. https:\/\/doi.org\/10.1155\/2017\/2046735.","journal-title":"Security and Communication Networks"},{"key":"7153_CR31","doi-asserted-by":"publisher","unstructured":"Ravi, S., Raghunathan, A., & Chakradhar, S. (2004). Tamper resistance mechanisms for secure embedded systems. In 17th international conference on VLSI design proceedings, pp. 605\u2013611. https:\/\/doi.org\/10.1109\/ICVD.2004.1260985.","DOI":"10.1109\/ICVD.2004.1260985"},{"key":"7153_CR32","doi-asserted-by":"publisher","unstructured":"Saravanan, K., & Yuvaraj, D. (2010). A new secure mechanism for bluetooth network. In 2010 the 2nd international conference on computer and automation engineering (ICCAE), pp. 202\u2013205. https:\/\/doi.org\/10.1109\/ICCAE.2010.5451967.","DOI":"10.1109\/ICCAE.2010.5451967"},{"key":"7153_CR33","doi-asserted-by":"publisher","first-page":"577","DOI":"10.1109\/COMST.2015.2459691","volume":"18","author":"KA Shim","year":"2016","unstructured":"Shim, K. A. (2016). A survey of public-key cryptographic primitives in wireless sensor networks. IEEE Communications Surveys and Tutorials, 18, 577\u2013601. https:\/\/doi.org\/10.1109\/COMST.2015.2459691.","journal-title":"IEEE Communications Surveys and Tutorials"},{"key":"7153_CR34","doi-asserted-by":"publisher","first-page":"89","DOI":"10.5120\/637-892","volume":"2","author":"G Singh Tanwar","year":"2010","unstructured":"Singh Tanwar, G., Singh, G., & Gaur, V. (2010). Secured encryption\u2014concept and challenge. International Journal of Computer Applications, 2, 89\u201394.","journal-title":"International Journal of Computer Applications"},{"key":"7153_CR35","unstructured":"Thammarat, C., Chokngamwong, R., Techapanupreeda, C., & Kungpisdan, S. (2015). A secure lightweight protocol for NFC communications with mutual authentication based on limited-use of session keys. In 2015 international conference on information networking (ICOIN), pp. 133\u2013138. Retrieved April 30, 2019, from http:\/\/ieeexplore.ieee.org\/document\/7057870\/."},{"key":"7153_CR36","doi-asserted-by":"publisher","unstructured":"Weik, M. H. (2000). Closed system. In Computer science and communication dictionary, pp. 222. https:\/\/doi.org\/10.1007\/1-4020-0613-6_2792.","DOI":"10.1007\/1-4020-0613-6_2792"},{"key":"7153_CR37","unstructured":"Wu, T. (1998). The secure remote password protocol. Retrieved May 4, 2019, from https:\/\/citeseerx.ist.psu.edu\/viewdoc\/summary?doi=10.1.1.81.7567."},{"key":"7153_CR38","doi-asserted-by":"publisher","unstructured":"Xu, J., Zhang, T., Lin, D., Mao, Y., Liu, X., Chen, S., Shao, S., Tian, B., & Yi, S. (2013). Pairing and authentication security technologies in low-power bluetooth. In 2013 IEEE international conference on green computing and communications and IEEE internet of things and IEEE cyber, physical and social computing, pp. 1081\u20131085. https:\/\/doi.org\/10.1109\/GreenCom-iThings-CPSCom.2013.185.","DOI":"10.1109\/GreenCom-iThings-CPSCom.2013.185"},{"key":"7153_CR39","doi-asserted-by":"publisher","first-page":"1001","DOI":"10.3390\/s17051001","volume":"17","author":"KH Yeh","year":"2017","unstructured":"Yeh, K. H., Su, C. H., Choo, K. K. R., & Chiu, W. (2017). A novel certificateless signature scheme for smart objects in the internet-of-things. Sensors, 17, 1001. https:\/\/doi.org\/10.3390\/s17051001.","journal-title":"Sensors"},{"key":"7153_CR40","doi-asserted-by":"publisher","first-page":"974","DOI":"10.3390\/s18040974","volume":"18","author":"A Yohan","year":"2018","unstructured":"Yohan, A., Lo, N. W., & Winata, D. (2018). An Indoor positioning-based mobile payment system using bluetooth low energy technology. Sensors, 18, 974. https:\/\/doi.org\/10.3390\/s18040974.","journal-title":"Sensors"},{"key":"7153_CR41","doi-asserted-by":"publisher","unstructured":"Zolfaghar, K., & Mohammadi, S. (2009). Securing bluetooth-based payment system using honeypot. In 2009 international conference on innovations in information technology (IIT), pp. 21\u201325. https:\/\/doi.org\/10.1109\/IIT.2009.5413764.","DOI":"10.1109\/IIT.2009.5413764"}],"container-title":["Wireless Personal Communications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-020-07153-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11277-020-07153-0\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-020-07153-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,1,23]],"date-time":"2021-01-23T00:18:28Z","timestamp":1611361108000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11277-020-07153-0"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,1,24]]},"references-count":41,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2020,6]]}},"alternative-id":["7153"],"URL":"https:\/\/doi.org\/10.1007\/s11277-020-07153-0","relation":{},"ISSN":["0929-6212","1572-834X"],"issn-type":[{"type":"print","value":"0929-6212"},{"type":"electronic","value":"1572-834X"}],"subject":[],"published":{"date-parts":[[2020,1,24]]},"assertion":[{"value":"24 January 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}