{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,31]],"date-time":"2026-01-31T07:31:53Z","timestamp":1769844713582,"version":"3.49.0"},"reference-count":56,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2022,1,17]],"date-time":"2022-01-17T00:00:00Z","timestamp":1642377600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,1,17]],"date-time":"2022-01-17T00:00:00Z","timestamp":1642377600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Peer-to-Peer Netw. Appl."],"published-print":{"date-parts":[[2022,3]]},"DOI":"10.1007\/s12083-021-01242-y","type":"journal-article","created":{"date-parts":[[2022,1,17]],"date-time":"2022-01-17T08:23:58Z","timestamp":1642407838000},"page":"1163-1188","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":9,"title":["A secure IoT-based micro-payment protocol for wearable devices"],"prefix":"10.1007","volume":"15","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-8801-4292","authenticated-orcid":false,"given":"Sriramulu","family":"Bojjagani","sequence":"first","affiliation":[]},{"given":"P. V. Venkateswara","family":"Rao","sequence":"additional","affiliation":[]},{"given":"Dinesh Reddy","family":"Vemula","sequence":"additional","affiliation":[]},{"given":"B Ramachandra","family":"Reddy","sequence":"additional","affiliation":[]},{"given":"T. Jaya","family":"Lakshmi","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,1,17]]},"reference":[{"key":"1242_CR1","doi-asserted-by":"publisher","first-page":"3028","DOI":"10.1109\/ACCESS.2017.2676119","volume":"5","author":"S Challa","year":"2017","unstructured":"Challa S, Wazid M, Das AK, Kumar N, Reddy AG, Yoon E-J, Yoo K-Y (2017) Secure signature-based authenticated key establishment scheme for future iot applications. IEEE Access 5:3028\u20133043","journal-title":"IEEE Access"},{"key":"1242_CR2","doi-asserted-by":"publisher","first-page":"10288","DOI":"10.1109\/ACCESS.2016.2638038","volume":"4","author":"KH Yeh","year":"2016","unstructured":"Yeh KH (2016) A secure iot-based healthcare system with body sensor networks. IEEE Access 4:10288\u201310299","journal-title":"IEEE Access"},{"key":"1242_CR3","doi-asserted-by":"publisher","first-page":"15210","DOI":"10.1109\/ACCESS.2019.2894062","volume":"7","author":"Y Chen","year":"2019","unstructured":"Chen Y, Xu W, Peng L, Zhang H (2019) Light-weight and privacy-preserving authentication protocol for mobile payments in the context of iot. IEEE Access 7:15210\u201315221","journal-title":"IEEE Access"},{"key":"1242_CR4","doi-asserted-by":"publisher","unstructured":"Guravaiah K, Thivyavignesh R, Velusamy RL (2017) Vehicle monitoring using internet of things. In Proceedings of the 1st International Conference on Internet of Things and Machine Learning pp.1\u20137. https:\/\/doi.org\/10.1145\/3109761.3109785","DOI":"10.1145\/3109761.3109785"},{"issue":"3","key":"1242_CR5","doi-asserted-by":"publisher","first-page":"329","DOI":"10.1109\/TCE.2019.2920086","volume":"65","author":"K Guravaiah","year":"2019","unstructured":"Guravaiah K, Velusamy RL (2019) Prototype of home monitoring device using internet of things and river formation dynamics-based multi-hop routing protocol (rfdhm). IEEE Trans Consum Electron 65(3):329\u2013338","journal-title":"IEEE Trans Consum Electron"},{"key":"1242_CR6","unstructured":"Tehrani K, Michael A (2020)\u00a0http:\/\/www.wearabledevices.com\/what-is-a-wearable-device\/. Accessed 03 Jun\u00a02020"},{"key":"1242_CR7","unstructured":"Finnegan M (2020)\u00a0https:\/\/www.computerworld.com\/article\/3556753\/banking-on-wearables-time-for-finance-sector-to-take.html. Accessed 20 May\u00a02020"},{"issue":"4","key":"1242_CR8","doi-asserted-by":"publisher","first-page":"2573","DOI":"10.1109\/COMST.2017.2731979","volume":"19","author":"S Seneviratne","year":"2017","unstructured":"Seneviratne S, Hu Y, Nguyen T, Lan G, Khalifa S, Thilakarathna K, Hassan M, Seneviratne A (2017) A survey of wearable devices and challenges. IEEE Commun Surv Tutorials 19(4):2573\u20132620","journal-title":"IEEE Commun Surv Tutorials"},{"issue":"4","key":"1242_CR9","doi-asserted-by":"publisher","first-page":"1310","DOI":"10.1109\/JBHI.2017.2753464","volume":"22","author":"AK Das","year":"2017","unstructured":"Das AK, Wazid M, Kumar N, Khan MK, Choo KKR, Park Y (2017) Design of secure and lightweight authentication protocol for wearable devices environment. IEEE J Biomed Health Inform 22(4):1310\u20131322","journal-title":"IEEE J Biomed Health Inform"},{"key":"1242_CR10","unstructured":"Online Available. https:\/\/www.opnessl.org\/. Accessed 10 Jun2020"},{"key":"1242_CR11","doi-asserted-by":"publisher","first-page":"196","DOI":"10.1016\/j.compeleceng.2017.03.008","volume":"63","author":"AK Das","year":"2017","unstructured":"Das AK, Zeadally S, Wazid M (2017) Lightweight authentication protocols for wearable devices. Comput Electr Eng 63:196\u2013208","journal-title":"Comput Electr Eng"},{"key":"1242_CR12","first-page":"8","volume":"47","author":"D Kumar","year":"2019","unstructured":"Kumar D, Grover HS et al (2019) A secure authentication protocol for wearable devices environment using ecc. J Inf Secur Appl 47:8\u201315","journal-title":"J Inf Secur Appl"},{"key":"1242_CR13","doi-asserted-by":"publisher","first-page":"144","DOI":"10.1016\/j.jnca.2015.10.001","volume":"60","author":"S Liu","year":"2016","unstructured":"Liu S, Hu S, Weng J, Zhu S, Chen Z (2016) A novel asymmetric three-party based authentication scheme in wearable devices environment. J Netw Comput Appl 60:144\u2013154","journal-title":"J Netw Comput Appl"},{"key":"1242_CR14","doi-asserted-by":"crossref","unstructured":"Yohan A, Lo NW, Randy V, Chen SJ, Hsu MY (2016) A novel authentication protocol for micropayment with wearable devices. In ACM Proceedings of the 10th International Conference on Ubiquitous Information Management and Communication, Danang, Viet Nam pp. 1\u20137","DOI":"10.1145\/2857546.2857565"},{"key":"1242_CR15","unstructured":"Online Available Github. https:\/\/github.com\/sriramulub"},{"issue":"4","key":"1242_CR16","doi-asserted-by":"publisher","first-page":"1784","DOI":"10.1109\/TCE.2008.4711235","volume":"54","author":"DZ Sun","year":"2008","unstructured":"Sun DZ, Huai JP, Sun JZ, Zhang JW, Feng ZY (2008) A new design of wearable token system for mobile device security. IEEE Trans Consum Electron 54(4):1784\u20131789","journal-title":"IEEE Trans Consum Electron"},{"issue":"1\u20132","key":"1242_CR17","doi-asserted-by":"publisher","first-page":"7","DOI":"10.1007\/s11276-004-4743-z","volume":"11","author":"MD Corner","year":"2005","unstructured":"Corner MD, Noble BD (2005) Protecting file systems with transient authentication. Wireless Netw 11(1\u20132):7\u201319","journal-title":"Wireless Netw"},{"key":"1242_CR18","doi-asserted-by":"crossref","unstructured":"Saravanan K, Yuvaraj D (2010) An new secure mechanism for bluetooth network. In 2010 the 2nd international conference on computer and automation engineering (ICCAE). IEEE1:202\u2013205","DOI":"10.1109\/ICCAE.2010.5451967"},{"key":"1242_CR19","doi-asserted-by":"publisher","unstructured":"Bojjagani S, Sastry V (2019) A secure end-to-end proximity nfc-based mobile payment protocol. Comput Stand Interfaces p 103348. https:\/\/doi.org\/10.1016\/j.csi.2019.04.007","DOI":"10.1016\/j.csi.2019.04.007"},{"key":"1242_CR20","first-page":"24","volume":"120","author":"R Patel","year":"2015","unstructured":"Patel R, Kunche A, Mishra N, Bhaiyat Z, Joshi R (2015) Paytooth-a cashless mobile payment system based on bluetooth. Int J Comput Appl 120:24","journal-title":"Int J Comput Appl"},{"issue":"3","key":"1242_CR21","doi-asserted-by":"publisher","first-page":"469","DOI":"10.1007\/s00779-016-0926-8","volume":"20","author":"W Liu","year":"2016","unstructured":"Liu W, Liu H, Wan Y, Kong H, Ning H (2016) The yoking-proof-based authentication protocol for cloud-assisted wearable devices. Pers Ubiquit Comput 20(3):469\u2013479","journal-title":"Pers Ubiquit Comput"},{"key":"1242_CR22","doi-asserted-by":"publisher","first-page":"168","DOI":"10.1016\/j.compeleceng.2017.04.012","volume":"63","author":"F Wu","year":"2017","unstructured":"Wu F, Li X, Xu L, Kumari S, Karuppiah M, Shen J (2017) A lightweight and privacy-preserving mutual authentication scheme for wearable devices assisted by cloud server. Comput Electr Eng 63:168\u2013181","journal-title":"Comput Electr Eng"},{"key":"1242_CR23","doi-asserted-by":"publisher","first-page":"29","DOI":"10.1016\/j.comnet.2018.11.021","volume":"149","author":"A Gupta","year":"2019","unstructured":"Gupta A, Tripathi M, Shaikh TJ, Sharma A (2019) A lightweight anonymous user authentication and key establishment scheme for wearable devices. Comput Netw 149:29\u201342","journal-title":"Comput Netw"},{"issue":"15","key":"1242_CR24","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1002\/dac.3302","volume":"30","author":"S Bojjagani","year":"2017","unstructured":"Bojjagani S, Sastry V (2017) A secure end-to-end sms-based mobile banking protocol. Int J Commun Syst 30(15):1\u201319. https:\/\/doi.org\/10.1002\/dac.3302","journal-title":"Int J Commun Syst"},{"key":"1242_CR25","doi-asserted-by":"publisher","unstructured":"Bojjagani S, Sastry V (2017) Vaptai: A threat model for vulnerability assessment and penetration testing of android and ios mobile banking apps. In IEEE 3rd International Conference on Collaboration and Internet Computing (CIC), San Jose, California, USA, pp 77\u201386. https:\/\/doi.org\/10.1109\/CIC.2017.00022","DOI":"10.1109\/CIC.2017.00022"},{"key":"1242_CR26","doi-asserted-by":"publisher","unstructured":"Bojjagani S, Sastry V (2016) Stamba: Security testing for android mobile banking apps. In Advances in Signal Processing and Intelligent Recognition Systems. Springer pp 671\u2013683. https:\/\/doi.org\/10.1007\/978-3-319-28658-7_57","DOI":"10.1007\/978-3-319-28658-7_57"},{"key":"1242_CR27","unstructured":"Moonsamy V, Batten L (2014) Mitigating man-in-the-middle attacks on smartphones-a discussion of ssl pinning and dnssec. In Proceedings of the 12th Australian Information Security Management Conference.Edith Cowan University pp 5\u201313"},{"key":"1242_CR28","doi-asserted-by":"publisher","first-page":"1110","DOI":"10.1016\/j.procs.2020.04.119","volume":"171","author":"S Bojjagani","year":"2020","unstructured":"Bojjagani S, Brabin DD, Rao PV (2020) Phishpreventer: A secure authentication protocol for prevention of phishing attacks in mobile environment with formal verification. Procedia Comput Sci 171:1110\u20131119. https:\/\/doi.org\/10.1016\/j.procs.2020.04.119","journal-title":"Procedia Comput Sci"},{"key":"1242_CR29","doi-asserted-by":"publisher","unstructured":"Bojjagani S, Sastry V, Chen CM, Kumari S, Khan MK (2021) Systematic survey of mobile payments, protocols, and security infrastructure. J Ambient Intell Humaniz Comput pp. 1\u201346. https:\/\/doi.org\/10.1007\/s12652-021-03316-4","DOI":"10.1007\/s12652-021-03316-4"},{"key":"#cr-split#-1242_CR30.1","doi-asserted-by":"crossref","unstructured":"Fahl S, Harbach M, Muders T, Baumg\u00e4rtner L, Freisleben B, Smith M (2012) Why eve and mallory love android: An analysis of android ssl","DOI":"10.1145\/2382196.2382205"},{"key":"#cr-split#-1242_CR30.2","unstructured":"(in) security. In Proceedings of the 2012 ACM conference on Computer and communications security pp 50-61"},{"key":"1242_CR31","doi-asserted-by":"crossref","unstructured":"Patel R, Borisaniya B, Patel A, Patel D, Rajarajan M, Zisman A (2010) Comparative analysis of formal model checking tools for security protocol verification. In International Conference on Network Security and Applications. Springer pp 152\u2013163","DOI":"10.1007\/978-3-642-14478-3_16"},{"issue":"1","key":"1242_CR32","first-page":"89","volume":"12","author":"JCL Pimentel","year":"2008","unstructured":"Pimentel JCL, Monroy R (2008) Formal support to security protocol development: A survey. Computaci\u00f3n y Sistemas 12(1):89\u2013108","journal-title":"Computaci\u00f3n y Sistemas"},{"issue":"5","key":"1242_CR33","doi-asserted-by":"publisher","first-page":"627","DOI":"10.1007\/s00165-010-0159-y","volume":"23","author":"C Braghin","year":"2011","unstructured":"Braghin C, Sharygina N, Barone-Adesi K (2011) A model checking-based approach for security policy verification of mobile systems. Form Asp Comput 23(5):627\u2013648","journal-title":"Form Asp Comput"},{"issue":"6","key":"1242_CR34","doi-asserted-by":"publisher","first-page":"1943","DOI":"10.1007\/s12083-020-00929-y","volume":"13","author":"R Shashidhara","year":"2020","unstructured":"Shashidhara R, Bojjagani S, Maurya AK, Kumari S, Xiong H (2020) A robust user authentication protocol with privacy-preserving for roaming service in mobility environments. Peer Peer Netw Appl 13(6):1943\u20131966.\u00a0https:\/\/doi.org\/10.1007\/s12083-020-00929-y\u00a0","journal-title":"Peer Peer Netw Appl"},{"issue":"10","key":"1242_CR35","first-page":"2503","volume":"7","author":"H Shi","year":"2012","unstructured":"Shi H, Ma W, Yang M, Zhang X (2012) A case study of model checking retail banking system with spin. JCP 7(10):2503\u20132510","journal-title":"JCP"},{"issue":"3\u20134","key":"1242_CR36","doi-asserted-by":"publisher","first-page":"91","DOI":"10.1007\/s11235-008-9131-z","volume":"40","author":"L Tobarra","year":"2009","unstructured":"Tobarra L, Cazorla D, Cuartero F, D\u00edaz G, Cambronero E (2009) Model checking wireless sensor network security protocols: Tinysec+ leap+ tinypk. Telecommun Syst 40(3\u20134):91\u201399","journal-title":"Telecommun Syst"},{"key":"1242_CR37","doi-asserted-by":"crossref","unstructured":"Burrows M, Abadi M (1989) A logic of authentication. In Proc R Soc Lond A.The Royal Society 426:233\u2013271","DOI":"10.1098\/rspa.1989.0125"},{"issue":"2","key":"1242_CR38","doi-asserted-by":"publisher","first-page":"198","DOI":"10.1109\/TIT.1983.1056650","volume":"29","author":"D Dolev","year":"1983","unstructured":"Dolev D, Yao A (1983) On the security of public key protocols. IEEE Trans Inf Theory 29(2):198\u2013208","journal-title":"IEEE Trans Inf Theory"},{"key":"1242_CR39","doi-asserted-by":"crossref","unstructured":"Kim M, Lee J, Yu S, Park K, Park Y, Park Y (2019) A secure authentication and key establishment scheme for wearable devices. In 2019 28th International Conference on Computer Communication and Networks (ICCCN).IEEE pp 1\u20132","DOI":"10.1109\/ICCCN.2019.8847173"},{"issue":"2","key":"1242_CR40","doi-asserted-by":"publisher","first-page":"561","DOI":"10.12928\/telkomnika.v17i2.10344","volume":"17","author":"GB Santosa","year":"2019","unstructured":"Santosa GB, Budiyanto S (2019) New design of lightweight authentication protocol in wearable technology. Telkomnika 17(2):561\u2013572","journal-title":"Telkomnika"},{"key":"1242_CR41","doi-asserted-by":"crossref","unstructured":"Gupta V, Gupta S, Chang S, Stebila D (2002) Performance analysis of elliptic curve cryptography for ssl. In Proceedings of the 1st ACM workshop on Wireless security, Atlanta, GA, USA pp. 87\u201394","DOI":"10.1145\/570681.570691"},{"key":"1242_CR42","doi-asserted-by":"crossref","unstructured":"Lo NW, Yohan A (2020) Ble-based authentication protocol for micropayment using wearable device. Wirel Pers Commun\u00a0pp. 1\u201322","DOI":"10.1007\/s11277-020-07153-0"},{"issue":"9","key":"1242_CR43","first-page":"1552","volume":"2","author":"BK Alese","year":"2012","unstructured":"Alese BK, Philemon E, Falaki SO (2012) Comparative analysis of public-key encryption schemes. Int J Eng Technol 2(9):1552\u20131568","journal-title":"Int J Eng Technol"},{"issue":"4","key":"1242_CR44","doi-asserted-by":"publisher","first-page":"50","DOI":"10.1007\/s10916-017-0699-2","volume":"41","author":"P Mohit","year":"2017","unstructured":"Mohit P, Amin R, Karati A, Biswas G, Khan MK (2017) A standard mutual authentication protocol for cloud computing based health care system. J Med Syst 41(4):50","journal-title":"J Med Syst"},{"issue":"5","key":"1242_CR45","doi-asserted-by":"publisher","first-page":"1001","DOI":"10.3390\/s17051001","volume":"17","author":"KH Yeh","year":"2017","unstructured":"Yeh KH, Su C, Choo KKR, Chiu W (2017) A novel certificateless signature scheme for smart objects in the internet-of-things. Sensors 17(5):1001","journal-title":"Sensors"},{"key":"1242_CR46","first-page":"183","volume":"180","author":"P Gallagher","year":"1995","unstructured":"Gallagher P, Director A (1995) Secure hash standard (shs). FIPS PUB 180:183","journal-title":"FIPS PUB"},{"key":"1242_CR47","unstructured":"The Network Simulator-ns-2, Online Available: URL: https:\/\/www.isi.edu\/nsnam\/ns\/. Accessed on: 20 Oct 2020"},{"key":"1242_CR48","unstructured":"Castle Bouncy, \"Bouncy castle crypto APIs\", Online Available: https:\/\/www.bouncycastle.org\/. Accessed on:10 Mar 2020"},{"key":"1242_CR49","unstructured":"GlobalPlatform for Wearables (2021)\u00a0Online Available: https:\/\/globalplatform.org\/use-case\/wearables\/. Accessed on:15 Apr 2021"},{"key":"1242_CR50","unstructured":"Cremers CJF (2008) The Scyther tool: Automatic verification of security protocols, Computer Aided Verification 5423:414-418"},{"key":"1242_CR51","volume-title":"Scyther: Semantics and verification of security protocols","author":"CJF Cremers","year":"2006","unstructured":"Cremers CJF (2006) Scyther: Semantics and verification of security protocols. Eindhoven University of Technology Eindhoven, Netherlands"},{"key":"1242_CR52","doi-asserted-by":"crossref","unstructured":"Cremers CJ (2008) The scyther tool: Verification, falsification, and analysis of security protocols. In International Conference on Computer Aided Verification. Springer pp 414\u2013418","DOI":"10.1007\/978-3-540-70545-1_38"},{"key":"1242_CR53","doi-asserted-by":"crossref","unstructured":"Meier S, Schmidt B, Cremers C, Basin D (2013) The tamarin prover for the symbolic analysis of security protocols. In International Conference on Computer Aided Verification. Springer pp 696\u2013701","DOI":"10.1007\/978-3-642-39799-8_48"},{"key":"1242_CR54","unstructured":"Team T et al (2020) Tamarin-prover manual. Accessed 14 Feb 2019"},{"key":"1242_CR55","doi-asserted-by":"publisher","unstructured":"Bojjagani S, Sastry\u00a0VN (2015) \"SSMBP: A secure SMS-based mobile banking protocol with formal verification,\" 2015 IEEE 11th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob), pp. 252-259. https:\/\/doi.org\/10.1109\/WiMOB.2015.7347969","DOI":"10.1109\/WiMOB.2015.7347969"}],"container-title":["Peer-to-Peer Networking and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-021-01242-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s12083-021-01242-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-021-01242-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,3,16]],"date-time":"2022-03-16T08:19:31Z","timestamp":1647418771000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s12083-021-01242-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,1,17]]},"references-count":56,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2022,3]]}},"alternative-id":["1242"],"URL":"https:\/\/doi.org\/10.1007\/s12083-021-01242-y","relation":{},"ISSN":["1936-6442","1936-6450"],"issn-type":[{"value":"1936-6442","type":"print"},{"value":"1936-6450","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,1,17]]},"assertion":[{"value":"26 December 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"1 September 2021","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"17 January 2022","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}