{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,8]],"date-time":"2026-02-08T03:44:49Z","timestamp":1770522289272,"version":"3.49.0"},"reference-count":47,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2023,12,22]],"date-time":"2023-12-22T00:00:00Z","timestamp":1703203200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,12,22]],"date-time":"2023-12-22T00:00:00Z","timestamp":1703203200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Peer-to-Peer Netw. Appl."],"published-print":{"date-parts":[[2024,1]]},"DOI":"10.1007\/s12083-023-01583-w","type":"journal-article","created":{"date-parts":[[2023,12,22]],"date-time":"2023-12-22T12:02:47Z","timestamp":1703246567000},"page":"432-450","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["A Robust Smart Card based Authentication and Key Agreement Scheme for WSN using Fuzzy Extractor"],"prefix":"10.1007","volume":"17","author":[{"given":"Rituparna","family":"Paul","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Shanvendra","family":"Rai","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1920-1913","authenticated-orcid":false,"given":"Subhasish","family":"Banerjee","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Preetisudha","family":"Meher","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2023,12,22]]},"reference":[{"key":"1583_CR1","doi-asserted-by":"publisher","DOI":"10.1016\/j.micpro.2022.104722","volume":"96","author":"B Khalid","year":"2023","unstructured":"Khalid B, Qureshi KN, Ghafoor KZ, Jeon G (2023) An improved biometric based user authentication and key agreement scheme for intelligent sensor based wireless communication. Microprocess Microsyst 96:104722","journal-title":"Microprocess Microsyst"},{"issue":"7","key":"1583_CR2","doi-asserted-by":"publisher","first-page":"155014771665860","DOI":"10.1177\/1550147716658607","volume":"12","author":"Y Park","year":"2016","unstructured":"Park Y, Lee S, Kim C, Park Y (2016) Secure biometric-based authentication scheme with smart card revocation\/reissue for wireless sensor networks. Int J Distrib Sens Netw 12(7):1550147716658607","journal-title":"Int J Distrib Sens Netw"},{"key":"1583_CR3","doi-asserted-by":"publisher","first-page":"3133","DOI":"10.1007\/s12652-018-1029-3","volume":"10","author":"CM Chen","year":"2019","unstructured":"Chen CM, Wang KH, Yeh KH, Xiang B, Wu TY (2019) Attacks and solutions on a three-party password-based authenticated key exchange protocol for wireless communications. J Ambient Intell Humaniz Comput 10:3133\u20133142","journal-title":"J Ambient Intell Humaniz Comput"},{"issue":"7","key":"1583_CR4","doi-asserted-by":"publisher","first-page":"1074","DOI":"10.3390\/app8071074","volume":"8","author":"CM Chen","year":"2018","unstructured":"Chen CM, Xiang B, Wu TY, Wang KH (2018) An anonymous mutual authenticated key agreement scheme for wearable sensors in wireless body area networks. Appl Sci 8(7):1074","journal-title":"Appl Sci"},{"key":"1583_CR5","doi-asserted-by":"publisher","first-page":"192","DOI":"10.1016\/j.jnca.2015.09.008","volume":"60","author":"B Rashid","year":"2016","unstructured":"Rashid B, Rehmani MH (2016) Applications of wireless sensor networks for urban areas: A survey. J Netw Comput Appl 60:192\u2013219","journal-title":"J Netw Comput Appl"},{"key":"1583_CR6","doi-asserted-by":"crossref","unstructured":"Saia R, Carta S, Recupero DR, Fenu G (2019) Internet of entities (IoE): A blockchain-based distributed paradigm for data exchange between wireless-based devices. In\u00a0SENSORNETS 2019-Proc 8th Int Conf Sens Netw 77\u201384. SciTePress","DOI":"10.5220\/0007379600770084"},{"key":"1583_CR7","doi-asserted-by":"crossref","unstructured":"Khan S, Pathan ASK, Alrajeh NA (Eds) (2016) Wireless sensor networks: Current status and future trends","DOI":"10.1201\/b13092"},{"issue":"3","key":"1583_CR8","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3325130","volume":"4","author":"D Wang","year":"2020","unstructured":"Wang D, Wang P, Wang C (2020) Efficient multi-factor user authentication protocol with forward secrecy for real-time data access in WSNs. ACM Transact Cyber-Phys Syst 4(3):1\u201326","journal-title":"ACM Transactions on Cyber-Physical Systems"},{"key":"1583_CR9","doi-asserted-by":"publisher","first-page":"2481","DOI":"10.1007\/s11276-014-0761-7","volume":"20","author":"Q Jing","year":"2014","unstructured":"Jing Q, Vasilakos AV, Wan J, Lu J, Qiu D (2014) Security of the Internet of Things: perspectives and challenges. Wireless Netw 20:2481\u20132501","journal-title":"Wireless Netw"},{"issue":"1","key":"1583_CR10","doi-asserted-by":"publisher","first-page":"1","DOI":"10.15282\/ijsecs.4.1.2018.1.0034","volume":"4","author":"AA Allahham","year":"2018","unstructured":"Allahham AA, Rahman MA (2018) A smart monitoring system for campus using Zigbee wireless sensor networks. Int J Softw Eng Comput Syst (IJSECS) 4(1):1\u201314","journal-title":"International Journal of Software Engineering and Computer Systems (IJSECS)"},{"key":"1583_CR11","doi-asserted-by":"publisher","first-page":"53922","DOI":"10.1109\/ACCESS.2019.2912870","volume":"7","author":"Z Xu","year":"2019","unstructured":"Xu Z, Xu C, Liang W, Xu J, Chen H (2019) A lightweight mutual authentication and key agreement scheme for medical Internet of Things. IEEE Access 7:53922\u201353931","journal-title":"IEEE Access"},{"key":"1583_CR12","doi-asserted-by":"publisher","first-page":"96","DOI":"10.1016\/j.adhoc.2014.03.009","volume":"20","author":"M Turkanovi\u0107","year":"2014","unstructured":"Turkanovi\u0107 M, Brumen B, H\u00f6lbl M (2014) A novel user authentication and key agreement scheme for heterogeneous ad hoc wireless sensor networks, based on the Internet of Things notion. Ad Hoc Netw 20:96\u2013112","journal-title":"Ad Hoc Netw"},{"issue":"1","key":"1583_CR13","doi-asserted-by":"publisher","first-page":"357","DOI":"10.1109\/TWC.2015.2473165","volume":"15","author":"CC Chang","year":"2015","unstructured":"Chang CC, Le HD (2015) A provably secure, efficient, and flexible authentication scheme for ad hoc wireless sensor networks. IEEE Trans Wireless Commun 15(1):357\u2013366","journal-title":"IEEE Trans Wireless Commun"},{"issue":"16","key":"1583_CR14","doi-asserted-by":"publisher","first-page":"3670","DOI":"10.1002\/sec.1573","volume":"9","author":"AK Das","year":"2016","unstructured":"Das AK, Kumari S, Odelu V, Li X, Wu F, Huang X (2016) Provably secure user authentication and key agreement scheme for wireless sensor networks. Secur Commun Netw 9(16):3670\u20133687","journal-title":"Security and Communication Networks"},{"issue":"1","key":"1583_CR15","doi-asserted-by":"publisher","first-page":"155014771875631","DOI":"10.1177\/1550147718756311","volume":"14","author":"J He","year":"2018","unstructured":"He J, Yang Z, Zhang J, Liu W, Liu C (2018) On the security of a provably secure, efficient, and flexible authentication scheme for ad hoc wireless sensor networks. Int J Distrib Sens Netw 14(1):1550147718756311","journal-title":"Int J Distrib Sens Netw"},{"key":"1583_CR16","doi-asserted-by":"publisher","DOI":"10.1016\/j.is.2019.101423","volume":"88","author":"I Santos-Gonz\u00e1lez","year":"2020","unstructured":"Santos-Gonz\u00e1lez I, Rivero-Garc\u00eda A, Burmester M, Munilla J, Caballero-Gil P (2020) Secure lightweight password authenticated key exchange for heterogeneous wireless sensor networks. Inf Syst 88:101423","journal-title":"Inf Syst"},{"issue":"1","key":"1583_CR17","doi-asserted-by":"publisher","DOI":"10.1002\/dac.2933","volume":"30","author":"AK Das","year":"2017","unstructured":"Das AK (2017) A secure and effective biometric-based user authentication scheme for wireless sensor networks using smart card and fuzzy extractor. Int J Commun Syst 30(1):e2933","journal-title":"Int J Commun Syst"},{"issue":"5","key":"1583_CR18","doi-asserted-by":"publisher","DOI":"10.1155\/2013\/407971","volume":"9","author":"O Althobaiti","year":"2013","unstructured":"Althobaiti O, Al-Rodhaan M, Al-Dhelaan A (2013) An efficient biometric authentication protocol for wireless sensor networks. Int J Distrib Sens Netw 9(5):407971","journal-title":"Int J Distrib Sens Netw"},{"key":"1583_CR19","doi-asserted-by":"publisher","first-page":"1461","DOI":"10.1007\/s11276-017-1604-0","volume":"25","author":"Y Lu","year":"2019","unstructured":"Lu Y, Xu G, Li L, Yang Y (2019) Anonymous three-factor authenticated key agreement for wireless sensor networks. Wireless Netw 25:1461\u20131475","journal-title":"Wireless Netw"},{"key":"1583_CR20","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1155\/2019\/2136506","volume":"2019","author":"J Mo","year":"2019","unstructured":"Mo J, Chen H (2019) A lightweight secure user authentication and key agreement protocol for wireless sensor networks. Secur Commun Netw 2019:1\u201317","journal-title":"Security and Communication Networks"},{"key":"1583_CR21","doi-asserted-by":"crossref","unstructured":"Yu S, Park Y (2020) SLUA-WSN: Secure and lightweight three-factor-based user authentication protocol for wireless sensor networks. Sensors 20(15):4143","DOI":"10.3390\/s20154143"},{"issue":"4","key":"1583_CR22","doi-asserted-by":"publisher","first-page":"4927","DOI":"10.1109\/JSYST.2021.3049163","volume":"15","author":"C Meshram","year":"2021","unstructured":"Meshram C, Obaidat MS, Lee CC, Meshram SG (2021) An efficient, robust, and lightweight subtree-based three-factor authentication procedure for large-scale DWSN in random oracle. IEEE Syst J 15(4):4927\u20134938","journal-title":"IEEE Syst J"},{"issue":"1","key":"1583_CR23","doi-asserted-by":"publisher","first-page":"1120","DOI":"10.1109\/JSYST.2020.2981049","volume":"15","author":"F Wu","year":"2020","unstructured":"Wu F, Li X, Xu L, Vijayakumar P, Kumar N (2020) A novel three-factor authentication protocol for wireless sensor networks with IoT notion. IEEE Syst J 15(1):1120\u20131129","journal-title":"IEEE Syst J"},{"issue":"4","key":"1583_CR24","doi-asserted-by":"publisher","first-page":"6197","DOI":"10.1109\/JSYST.2022.3152561","volume":"16","author":"Y Li","year":"2022","unstructured":"Li Y, Tian Y (2022) A lightweight and secure three-factor authentication protocol with adaptive privacy-preserving property for wireless sensor networks. IEEE Syst J 16(4):6197\u20136208","journal-title":"IEEE Syst J"},{"issue":"4","key":"1583_CR25","doi-asserted-by":"publisher","first-page":"5521","DOI":"10.1109\/JSYST.2022.3173538","volume":"16","author":"C Li","year":"2022","unstructured":"Li C, Dong M, Li J, Xu G, Chen XB, Liu W, Ota K (2022) Efficient medical big data management with keyword-searchable encryption in healthchain. IEEE Syst J 16(4):5521\u20135532","journal-title":"IEEE Syst J"},{"key":"1583_CR26","doi-asserted-by":"crossref","unstructured":"Singh M, Mishra D (2023) Post-quantum secure authenticated key agreement protocol for wireless sensor networks.\u00a0Telecommun Syst 1\u201313","DOI":"10.1007\/s11235-023-01043-z"},{"key":"1583_CR27","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2022.109469","volume":"220","author":"FG Darbandeh","year":"2023","unstructured":"Darbandeh FG, Safkhani M (2023) SAPWSN: A secure authentication protocol for wireless sensor networks. Comput Netw 220:109469","journal-title":"Comput Netw"},{"key":"1583_CR28","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.adhoc.2017.12.004","volume":"71","author":"SY Chiou","year":"2018","unstructured":"Chiou SY, Chang SY (2018) An enhanced authentication scheme in mobile RFID system. Ad Hoc Netw 71:1\u201313","journal-title":"Ad Hoc Netw"},{"issue":"2","key":"1583_CR29","doi-asserted-by":"publisher","first-page":"1625","DOI":"10.3390\/s120201625","volume":"12","author":"P Kumar","year":"2012","unstructured":"Kumar P, Lee SG, Lee HJ (2012) E-SAP: Efficient-strong authentication protocol for healthcare applications using wireless medical sensor networks. Sensors 12(2):1625\u20131647","journal-title":"Sensors"},{"key":"1583_CR30","doi-asserted-by":"publisher","first-page":"49","DOI":"10.1007\/s00530-013-0346-9","volume":"21","author":"D He","year":"2015","unstructured":"He D, Kumar N, Chen J, Lee CC, Chilamkurti N, Yeo SS (2015) Robust anonymous authentication protocol for health-care applications using wireless medical sensor networks. Multimedia Syst 21:49\u201360","journal-title":"Multimedia Syst"},{"key":"1583_CR31","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s10916-014-0012-6","volume":"38","author":"Q Jiang","year":"2014","unstructured":"Jiang Q, Ma J, Lu X, Tian Y (2014) Robust chaotic map-based authentication and key agreement scheme with strong anonymity for telecare medicine information systems. J Med Syst 38:1\u20138","journal-title":"J Med Syst"},{"key":"1583_CR32","doi-asserted-by":"publisher","first-page":"255","DOI":"10.1016\/j.ins.2014.09.003","volume":"314","author":"J Zhou","year":"2015","unstructured":"Zhou J, Cao Z, Dong X, Xiong N, Vasilakos AV (2015) 4S: A secure and privacy-preserving key management scheme for cloud-assisted wireless body area network in m-healthcare social networks. Inf Sci 314:255\u2013276","journal-title":"Inf Sci"},{"key":"1583_CR33","doi-asserted-by":"publisher","first-page":"1077","DOI":"10.1007\/s11277-013-1555-4","volume":"77","author":"L Ma","year":"2014","unstructured":"Ma L, Ge Y, Zhu Y (2014) TinyZKP: a lightweight authentication scheme based on zero-knowledge proof for wireless body area networks. Wireless Pers Commun 77:1077\u20131090","journal-title":"Wireless Pers Commun"},{"key":"1583_CR34","doi-asserted-by":"publisher","first-page":"195","DOI":"10.1007\/s00530-015-0476-3","volume":"23","author":"F Wu","year":"2017","unstructured":"Wu F, Xu L, Kumari S, Li X (2017) An improved and anonymous two-factor authentication protocol for health-care applications with wireless medical sensor networks. Multimedia Syst 23:195\u2013205","journal-title":"Multimedia Syst"},{"key":"1583_CR35","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s10916-017-0720-9","volume":"41","author":"J Srinivas","year":"2017","unstructured":"Srinivas J, Mishra D, Mukhopadhyay S (2017) A mutual authentication framework for wireless medical sensor networks. J Med Syst 41:1\u201319","journal-title":"J Med Syst"},{"key":"1583_CR36","doi-asserted-by":"crossref","unstructured":"Moazami F, Safkhani M (2022) TBGODP^+ TBGODP+: improvement of TBGODP, a time bound group ownership delegation protocol.\u00a0J Amb Intell Human Comput 1\u201320","DOI":"10.1007\/s12652-021-03571-5"},{"issue":"8","key":"1583_CR37","doi-asserted-by":"publisher","first-page":"3753","DOI":"10.1007\/s11276-022-03070-1","volume":"28","author":"X Shao","year":"2022","unstructured":"Shao X, Guo Y, Guo Y (2022) A PUF-based anonymous authentication protocol for wireless medical sensor networks. Wireless Netw 28(8):3753\u20133770","journal-title":"Wireless Netw"},{"key":"1583_CR38","doi-asserted-by":"publisher","first-page":"475","DOI":"10.1016\/j.future.2018.09.017","volume":"91","author":"M Wazid","year":"2019","unstructured":"Wazid M, Das AK, Kumar N, Vasilakos AV (2019) Design of secure key management and user authentication scheme for fog computing services. Futur Gener Comput Syst 91:475\u2013492","journal-title":"Futur Gener Comput Syst"},{"key":"1583_CR39","doi-asserted-by":"publisher","first-page":"4737","DOI":"10.1007\/s11276-018-1759-3","volume":"25","author":"X Jia","year":"2019","unstructured":"Jia X, He D, Kumar N, Choo KKR (2019) Authenticated key agreement scheme for fog-driven IoT healthcare system. Wireless Netw 25:4737\u20134750","journal-title":"Wireless Netw"},{"key":"1583_CR40","doi-asserted-by":"publisher","first-page":"1020","DOI":"10.1007\/s10922-019-09496-x","volume":"27","author":"S Naoui","year":"2019","unstructured":"Naoui S, Elhdhili ME, Saidane LA (2019) Lightweight and secure password based smart home authentication protocol: LSP-SHAP. J Netw Syst Manage 27:1020\u20131042","journal-title":"J Netw Syst Manage"},{"key":"1583_CR41","doi-asserted-by":"publisher","first-page":"978","DOI":"10.1016\/j.protcy.2012.10.119","volume":"6","author":"G Sharma","year":"2012","unstructured":"Sharma G, Bala S, Verma AK (2012) Security frameworks for wireless sensor networks-review. Procedia Technol 6:978\u2013987","journal-title":"Procedia Technol"},{"key":"1583_CR42","doi-asserted-by":"crossref","unstructured":"Fatima MN, Obaidat MS, Mahmood K, Shamshad S, Saleem MA, Ayub MF (2023) Privacy-Preserving Three-Factor Authentication Protocol for Wireless Sensor Networks Deployed in Agricultural Field. ACM Transact Sens Netw","DOI":"10.1145\/3607142"},{"issue":"2","key":"1583_CR43","doi-asserted-by":"publisher","first-page":"150","DOI":"10.1016\/j.dcan.2021.07.002","volume":"8","author":"S Shamshad","year":"2022","unstructured":"Shamshad S, Ayub MF, Mahmood K, Kumari S, Chaudhry SA, Chen CM (2022) An enhanced scheme for mutual authentication for healthcare services. Digital Communications and Networks 8(2):150\u2013161","journal-title":"Digital Communications and Networks"},{"key":"1583_CR44","doi-asserted-by":"crossref","unstructured":"Dodis Y, Reyzin L, Smith A (2004) Fuzzy extractors: How to generate strong keys from biometrics and other noisy data. In\u00a0Advances in Cryptology-EUROCRYPT 2004: International Conference on the Theory and Applications of Cryptographic Techniques, Interlaken, Switzerland, May 2\u20136, 2004. Proceedings 23:523\u2013540. Springer Berlin Heidelberg","DOI":"10.1007\/978-3-540-24676-3_31"},{"key":"1583_CR45","unstructured":"Ramli SN, Ahmad R, Abdollah MF, Dutkiewicz E (2013) A biometric-based security for data authentication in wireless body area network (wban). In\u00a02013 15th Int Conf Adv Commun Technol (ICACT) 998\u20131001. IEEE"},{"key":"1583_CR46","first-page":"281","volume-title":"Proceedings 17","author":"Armando, A., Basin, D., Boichut, Y., Chevalier, Y., Compagna, L., Cu\u00e9llar, J., \u2026 & Vigneron, L. (2005). The AVISPA tool for the automated validation of internet security protocols and applications. In Computer Aided Verification: 17th International Conference, CAV 2005, Edinburgh, Scotland, UK, July 6\u201310","year":"2005","unstructured":"Armando A, Basin D, Boichut Y, Chevalier Y, Compagna L, Cu\u00e9llar J, Vigneron L (2005) The AVISPA tool for the automated validation of internet security protocols and applications. In Computer Aided Verification: 17th International Conference, CAV 2005, Edinburgh, Scotland, UK, July 6\u201310 (2005) Proceedings 17. Springer, Berlin Heidelberg 281\u2013285"},{"key":"1583_CR47","unstructured":"Avispa S (2019) the Security Protocol ANimator for AVISPA"}],"container-title":["Peer-to-Peer Networking and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-023-01583-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s12083-023-01583-w\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-023-01583-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,2,17]],"date-time":"2024-02-17T11:04:19Z","timestamp":1708167859000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s12083-023-01583-w"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,12,22]]},"references-count":47,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2024,1]]}},"alternative-id":["1583"],"URL":"https:\/\/doi.org\/10.1007\/s12083-023-01583-w","relation":{},"ISSN":["1936-6442","1936-6450"],"issn-type":[{"value":"1936-6442","type":"print"},{"value":"1936-6450","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,12,22]]},"assertion":[{"value":"4 September 2023","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"22 October 2023","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"22 December 2023","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"This article does not contain any studies with human participants or animals performed by any of the authors.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical approval"}},{"value":"I, Rituparna Paul, on behalf of all co-authors listed in the manuscript grant my consent to publish the manuscript titled \u201cA Robust Smart Card-based Authentication and Key Agreement Scheme for WSN using Fuzzy Extractor\u201d in your reputed journal.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent to Publish"}},{"value":"The authors declare no competing interests.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interest"}}]}}