{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,26]],"date-time":"2026-02-26T15:33:43Z","timestamp":1772120023189,"version":"3.50.1"},"reference-count":30,"publisher":"Springer Science and Business Media LLC","issue":"5","license":[{"start":{"date-parts":[[2024,6,13]],"date-time":"2024-06-13T00:00:00Z","timestamp":1718236800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,6,13]],"date-time":"2024-06-13T00:00:00Z","timestamp":1718236800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"name":"University of Science, VNU-HCM","award":["CNTT 2022-13"],"award-info":[{"award-number":["CNTT 2022-13"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Peer-to-Peer Netw. Appl."],"published-print":{"date-parts":[[2024,9]]},"DOI":"10.1007\/s12083-024-01729-4","type":"journal-article","created":{"date-parts":[[2024,6,13]],"date-time":"2024-06-13T09:02:21Z","timestamp":1718269341000},"page":"3025-3048","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["A secure user authentication scheme for crypto-wallet in IoT environment"],"prefix":"10.1007","volume":"17","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-8308-008X","authenticated-orcid":false,"given":"Toan-Thinh","family":"Truong","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3046-3041","authenticated-orcid":false,"given":"Minh-Triet","family":"Tran","sequence":"additional","affiliation":[]},{"given":"Anh-Duc","family":"Duong","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,6,13]]},"reference":[{"issue":"12","key":"1729_CR1","doi-asserted-by":"publisher","first-page":"4481","DOI":"10.3390\/s18124481","volume":"18","author":"J Ryu","year":"2018","unstructured":"Ryu J, Lee H, Kim H, Won D (2018) Secure and efficient three-factor protocol for wireless sensor networks. Sensors 18(12):4481","journal-title":"Sensors"},{"issue":"1","key":"1729_CR2","doi-asserted-by":"publisher","first-page":"357","DOI":"10.1109\/TWC.2015.2473165","volume":"15","author":"CC Chang","year":"2015","unstructured":"Chang CC, Le HD (2015) A provably secure efficient and flexible authentication scheme for ad hoc wireless sensor networks. IEEE Trans Wireless Commun 15(1):357\u201366","journal-title":"IEEE Trans Wireless Commun"},{"issue":"19","key":"1729_CR3","doi-asserted-by":"publisher","first-page":"5604","DOI":"10.3390\/s20195604","volume":"20","author":"HL Wu","year":"2020","unstructured":"Wu HL, Chang CC, Zheng YZ, Chen LS, Chen CC (2020) A secure IoT-based authentication system in cloud computing environment. Sensors 20(19):5604. https:\/\/doi.org\/10.3390\/s20195604","journal-title":"Sensors"},{"key":"1729_CR4","doi-asserted-by":"publisher","first-page":"497","DOI":"10.1007\/s11227-021-03857-7","volume":"78","author":"M Bouchaala","year":"2022","unstructured":"Bouchaala M, Ghazel C, Saidane LA (2022) Enhancing security and efficiency in cloud computing authentication and key agreement scheme based on smart card. J Supercomput 78:497\u2013522","journal-title":"J Supercomput"},{"key":"1729_CR5","doi-asserted-by":"publisher","first-page":"2565","DOI":"10.1007\/s11277-020-07811-3","volume":"116","author":"A Jabbari","year":"2021","unstructured":"Jabbari A, Mohasefi JB (2021) Improvement of a user authentication scheme for wireless sensor networks based on internet of things security. Wireless Pers Commun 116:2565\u20132591","journal-title":"Wireless Pers Commun"},{"issue":"8","key":"1729_CR6","doi-asserted-by":"publisher","first-page":"9589","DOI":"10.3390\/s130809589","volume":"13","author":"CT Li","year":"2013","unstructured":"Li CT, Weng CY, Lee CC (2013) An advanced temporal credential-based security scheme with mutual authentication and key agreement for wireless sensor networks. Sensors 13(8):9589\u2013603","journal-title":"Sensors"},{"issue":"10","key":"1729_CR7","doi-asserted-by":"publisher","first-page":"1789","DOI":"10.3390\/app8101789","volume":"8","author":"CM Chen","year":"2018","unstructured":"Chen CM, Xiang B, Wang KH, Yeh KH, Wu TY (2018) A robust mutual authentication with a key agreement scheme for session initiation protocol. Appl Sci 8(10):1789. https:\/\/doi.org\/10.3390\/app8101789","journal-title":"Appl Sci"},{"key":"1729_CR8","doi-asserted-by":"publisher","first-page":"152","DOI":"10.1016\/j.adhoc.2015.05.014","volume":"36","author":"MS Farash","year":"2016","unstructured":"Farash MS, Turkanovic M, Kumari S, Holbl M (2016) An efficient user authentication and key agreement scheme for heterogeneous wireless sensor network tailored for the internet of things environment. Ad Hoc Netw 36:152\u2013176. https:\/\/doi.org\/10.1016\/j.adhoc.2015.05.014","journal-title":"Ad Hoc Netw"},{"key":"1729_CR9","doi-asserted-by":"publisher","unstructured":"Oh J, Yu S, Lee J, Son S, Kim M, Park Y (2021) A secure and lightweight authentication protocol for IoT-based smart homes. Sensors 21(4):1488. https:\/\/doi.org\/10.3390\/s21041488","DOI":"10.3390\/s21041488"},{"key":"1729_CR10","doi-asserted-by":"publisher","unstructured":"Kim K, Ryu J, Lee Y, Won D (2023) An improved lightweight user authentication scheme for the internet of medical things. Sensors 23(3):1122. https:\/\/doi.org\/10.3390\/s23031122","DOI":"10.3390\/s23031122"},{"key":"1729_CR11","doi-asserted-by":"publisher","first-page":"182","DOI":"10.1016\/j.compeleceng.2017.03.016","volume":"63","author":"Q Jiang","year":"2017","unstructured":"Jiang Q, Ma J, Yang C, Ma X, Shen J, Chaudhry SA (2017) Efficient end-to-end authentication protocol for wearable health monitoring systems. Comput Electr Eng 63:182\u2013195","journal-title":"Comput Electr Eng"},{"key":"1729_CR12","doi-asserted-by":"publisher","first-page":"727","DOI":"10.1016\/j.future.2017.08.042","volume":"82","author":"F Wu","year":"2018","unstructured":"Wu F, Li X, Sangaiah AK, Xu L, Kumari S, Wu L, Shen J (2018) A lightweight and robust two-factor authentication scheme for personalized healthcare systems using wireless medical sensor networks. Futur Gener Comput Syst 82:727\u201337","journal-title":"Futur Gener Comput Syst"},{"key":"1729_CR13","doi-asserted-by":"publisher","first-page":"12137","DOI":"10.1109\/ACCESS.2022.3146393","volume":"10","author":"J Mo","year":"2022","unstructured":"Mo J, Hu Z, Shen W (2022) A provably secure three-factor authentication protocol based on Chebyshev chaotic mapping for wireless sensor network. IEEE Access 10:12137\u201312152. https:\/\/doi.org\/10.1109\/ACCESS.2022.3146393","journal-title":"IEEE Access"},{"key":"1729_CR14","doi-asserted-by":"publisher","unstructured":"Moon J, Choi Y, Kim J, Won D (2016) An improvement of robust and efficient biometrics based password authentication scheme for telecare medicine information systems using extended chaotic maps. J Med Syst 40(3):1\u201311. https:\/\/doi.org\/10.1007\/s10916-015-0422-0","DOI":"10.1007\/s10916-015-0422-0"},{"issue":"2","key":"1729_CR15","doi-asserted-by":"publisher","first-page":"569","DOI":"10.1007\/s11277-016-3293-x","volume":"89","author":"X Li","year":"2016","unstructured":"Li X, Niu J, Kumari S, Islam SKH, Wu F, Khan MK, Das AK (2016) A novel chaotic maps-based user authentication and key agreement protocol for multi-server environments with provable security. Wireless Pers Commun 89(2):569\u2013597","journal-title":"Wireless Pers Commun"},{"issue":"1","key":"1729_CR16","doi-asserted-by":"publisher","first-page":"18","DOI":"10.1145\/77648.77649","volume":"8","author":"M Burrows","year":"1990","unstructured":"Burrows M, Abadi M, Needham R (1990) A logic of authentication. ACM Trans Comput Syst 8(1):18\u201336","journal-title":"ACM Trans Comput Syst"},{"key":"1729_CR17","doi-asserted-by":"crossref","unstructured":"Blake Wilson S, Johnson D, Menezes A (1997) Key agreement protocols and their security analysis, 6$$^{th}$$ IMA International Conference on Cryptography and Coding","DOI":"10.1007\/BFb0024447"},{"issue":"3","key":"1729_CR18","doi-asserted-by":"publisher","first-page":"2735","DOI":"10.1007\/s11277-017-3956-2","volume":"95","author":"S Jangirala","year":"2017","unstructured":"Jangirala S, Mukhopadhya S, Das AK (2017) A multi-server environment with secure and efficient remote user authentication scheme based on dynamic id using smart cards. Wireless Pers Commun 95(3):2735\u20132767","journal-title":"Wireless Pers Commun"},{"issue":"3","key":"1729_CR19","doi-asserted-by":"publisher","first-page":"3391","DOI":"10.1007\/s11277-017-4003-z","volume":"95","author":"L Han","year":"2017","unstructured":"Han L, Xie Q, Liu W, Wang S (2017) A new efficient chaotic maps based three factor user authentication and key agreement scheme. Wireless Pers Commun 95(3):3391\u20133406","journal-title":"Wireless Pers Commun"},{"issue":"3","key":"1729_CR20","doi-asserted-by":"publisher","first-page":"3185","DOI":"10.1007\/s11277-017-3990-0","volume":"95","author":"A Irshad","year":"2017","unstructured":"Irshad A, Sher M, Ashraf MU (2017) An improved and secure chaotic-map based multi-server authentication protocol based on Lu et al. and Tsai and Lo\u2019s scheme. Wireless Pers Commun 95(3):3185\u20133208","journal-title":"Wireless Pers Commun"},{"issue":"12","key":"1729_CR21","doi-asserted-by":"publisher","first-page":"8239","DOI":"10.1007\/s13369-018-3494-6","volume":"43","author":"BA Alzahrani","year":"2018","unstructured":"Alzahrani BA, Irshad A (2018) A secure and efficient TMIS-based authentication scheme improved against Zhang et al.\u2019s scheme. Arab J Sci Eng 43(12):8239\u20138253","journal-title":"Arab J Sci Eng"},{"issue":"4","key":"1729_CR22","first-page":"708","volume":"15","author":"D Wang","year":"2018","unstructured":"Wang D, Wang P (2018) Two birds with one stone: two-factor authentication with security beyond conventional bound. IEEE Trans Dependable Secure Comput 15(4):708\u2013722","journal-title":"IEEE Trans Dependable Secure Comput"},{"issue":"3","key":"1729_CR23","doi-asserted-by":"publisher","first-page":"1377","DOI":"10.1007\/s11277-015-2288-3","volume":"82","author":"AK Das","year":"2015","unstructured":"Das AK (2015) A secure and efficient user anonymity-preserving three-factor authentication protocol for large-scale distributed wireless sensor networks. Wireless Pers Commun 82(3):1377\u20131404. https:\/\/doi.org\/10.1007\/s11277-015-2288-3","journal-title":"Wireless Pers Commun"},{"issue":"16","key":"1729_CR24","doi-asserted-by":"publisher","first-page":"e3323","DOI":"10.1002\/dac.3323","volume":"30","author":"PK Dhillon","year":"2017","unstructured":"Dhillon PK, Kalra S (2017) Secure multi-factor remote user authentication scheme for Internet of Things environments. Commun Syst 30(16):e3323. https:\/\/doi.org\/10.1002\/dac.3323","journal-title":"Commun Syst"},{"key":"1729_CR25","doi-asserted-by":"publisher","first-page":"102494","DOI":"10.1016\/j.jisa.2020.102494","volume":"52","author":"H Lee","year":"2020","unstructured":"Lee H, Kang D, Ryu J, Won D, Kim H, Lee Y (2020) A three-factor anonymous user authentication scheme for Internet of Things environments. J Inf Secur Appl 52:102494. https:\/\/doi.org\/10.1016\/j.jisa.2020.102494","journal-title":"J Inf Secur Appl"},{"key":"1729_CR26","doi-asserted-by":"publisher","unstructured":"Krishnasrija R, Mandal AK, Cortesi A (2023) A lightweight mutual and transitive authentication mechanism for IoT network. Ad Hoc Netw 138:103003. https:\/\/doi.org\/10.1016\/j.adhoc.2022.103003","DOI":"10.1016\/j.adhoc.2022.103003"},{"key":"1729_CR27","doi-asserted-by":"crossref","unstructured":"Kumari S, Khan MK, Atiquzzaman M (2015) User authentication scheme for wireless sensor networks: a review. Ad Hoc Netw 27:159\u2013194","DOI":"10.1016\/j.adhoc.2014.11.018"},{"key":"1729_CR28","unstructured":"Hankerson D, Menezes AJ, Vanstone S (2004) Guide to elliptic curve cryptography. Springer-Verlag, Berlin, Germany"},{"issue":"6","key":"1729_CR29","doi-asserted-by":"publisher","first-page":"1133","DOI":"10.1109\/TDSC.2018.2857811","volume":"17","author":"J Srinivas","year":"2018","unstructured":"Srinivas J, Das AK, Wazid M, Kumar N (2018) Anonymous lightweight chaotic map-based authenticated key agreement protocol for industrial internet of things. IEEE Trans Dependable Secure Comput 17(6):1133\u20131146. https:\/\/doi.org\/10.1109\/TDSC.2018.2857811","journal-title":"IEEE Trans Dependable Secure Comput"},{"key":"1729_CR30","doi-asserted-by":"publisher","unstructured":"Wu TY, Yang L, Lee Z, Chen CM, Pan JS, Islam SH (2021) Improved ECC-based three-factor multi-server authentication scheme. Secur Commun Netw 6627956(6627956):14. https:\/\/doi.org\/10.1155\/2021\/6627956","DOI":"10.1155\/2021\/6627956"}],"container-title":["Peer-to-Peer Networking and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-024-01729-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s12083-024-01729-4\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-024-01729-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,10,3]],"date-time":"2024-10-03T12:13:15Z","timestamp":1727957595000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s12083-024-01729-4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,6,13]]},"references-count":30,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2024,9]]}},"alternative-id":["1729"],"URL":"https:\/\/doi.org\/10.1007\/s12083-024-01729-4","relation":{"has-preprint":[{"id-type":"doi","id":"10.21203\/rs.3.rs-3352434\/v1","asserted-by":"object"}]},"ISSN":["1936-6442","1936-6450"],"issn-type":[{"value":"1936-6442","type":"print"},{"value":"1936-6450","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,6,13]]},"assertion":[{"value":"18 November 2023","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"7 May 2024","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"13 June 2024","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"This work follows the Committee on Publication Ethics guidelines on how to deal with potential acts of misconduct.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethics"}},{"value":"The authors declare no competing interests.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}