{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,27]],"date-time":"2025-09-27T15:40:12Z","timestamp":1758987612777,"version":"3.44.0"},"reference-count":37,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2025,5,29]],"date-time":"2025-05-29T00:00:00Z","timestamp":1748476800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,5,29]],"date-time":"2025-05-29T00:00:00Z","timestamp":1748476800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Peer-to-Peer Netw. Appl."],"published-print":{"date-parts":[[2025,7]]},"DOI":"10.1007\/s12083-025-02006-8","type":"journal-article","created":{"date-parts":[[2025,5,29]],"date-time":"2025-05-29T09:27:50Z","timestamp":1748510870000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["A lightweight biometric-assisted authentication approach for internet of things"],"prefix":"10.1007","volume":"18","author":[{"given":"Kamal","family":"Rahmani","sequence":"first","affiliation":[]},{"given":"Shahram","family":"Babaie","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,5,29]]},"reference":[{"key":"2006_CR1","doi-asserted-by":"publisher","first-page":"95","DOI":"10.1016\/j.future.2022.03.001","volume":"133","author":"I Martins","year":"2022","unstructured":"Martins I, Resende JS, Sousa PR, Silva S, Antunes L, Gama J (2022) Host-based IDS: A review and open issues of an anomaly detection system in IoT. Futur Gener Comput Syst 133:95\u2013113. https:\/\/doi.org\/10.1016\/j.future.2022.03.001","journal-title":"Futur Gener Comput Syst"},{"issue":"5","key":"2006_CR2","doi-asserted-by":"publisher","first-page":"8182","DOI":"10.1109\/JIOT.2019.2935189","volume":"6","author":"F Meneghello","year":"2019","unstructured":"Meneghello F, Calore M, Zucchetto D, Polese M, Zanella A (2019) IoT: Internet of threats? A survey of practical security vulnerabilities in real IoT devices. IEEE Internet Things J 6(5):8182\u20138201. https:\/\/doi.org\/10.1109\/JIOT.2019.2935189","journal-title":"IEEE Internet Things J"},{"issue":"6","key":"2006_CR3","doi-asserted-by":"publisher","first-page":"1373","DOI":"10.1007\/s10207-022-00619-1","volume":"21","author":"M Abdussami","year":"2022","unstructured":"Abdussami M, Amin R, Vollala S (2022) LASSI: a lightweight authenticated key agreement protocol for fog-enabled IoT deployment. Int J Inf Secur 21(6):1373\u20131387. https:\/\/doi.org\/10.1007\/s10207-022-00619-1","journal-title":"Int J Inf Secur"},{"issue":"3","key":"2006_CR4","doi-asserted-by":"publisher","first-page":"1583","DOI":"10.1007\/s10207-023-00806-8","volume":"23","author":"E Ebrahimpour","year":"2024","unstructured":"Ebrahimpour E, Jie S (2024) Authentication in the Internet of Things, protocols, attacks, and open issues: a systematic literature review. Int J Inf Secur 23(3):1583\u20131602. https:\/\/doi.org\/10.1007\/s10207-023-00806-8","journal-title":"Int J Inf Secur"},{"issue":"11","key":"2006_CR5","doi-asserted-by":"publisher","first-page":"8039","DOI":"10.1109\/TII.2022.3156629","volume":"18","author":"F Rafique","year":"2022","unstructured":"Rafique F, Obaidat MS, Mahmood K, Ayub MF, Ferzund J, Chaudhry SA (2022) An efficient and provably secure certificateless protocol for industrial internet of things. IEEE Trans Industr Inform 18(11):8039\u20138046. https:\/\/doi.org\/10.1109\/TII.2022.3156629","journal-title":"IEEE Trans Industr Inform"},{"issue":"6","key":"2006_CR6","doi-asserted-by":"publisher","first-page":"2609","DOI":"10.1007\/s11276-022-02988-w","volume":"28","author":"S Gavel","year":"2022","unstructured":"Gavel S, Raghuvanshi AS, Tiwari S (2022) An optimized maximum correlation based feature reduction scheme for intrusion detection in data networks. Wireless Netw 28(6):2609\u20132624. https:\/\/doi.org\/10.1007\/s11276-022-02988-w","journal-title":"Wireless Netw"},{"key":"2006_CR7","doi-asserted-by":"publisher","first-page":"108600","DOI":"10.1016\/j.compeleceng.2023.108600","volume":"106","author":"Z Majidian","year":"2023","unstructured":"Majidian Z, Arasteh B, TaghipourEivazi S, Babaie S (2023) An intrusion detection method to detect denial of service attacks using error-correcting output codes and adaptive neuro-fuzzy interference. Comp and Elect Engi 106:108600. https:\/\/doi.org\/10.1016\/j.compeleceng.2023.108600","journal-title":"Comp and Elect Engi"},{"issue":"1","key":"2006_CR8","doi-asserted-by":"publisher","first-page":"100","DOI":"10.1109\/TMC.2021.3068717","volume":"22","author":"J Li","year":"2023","unstructured":"Li J, Wu J, Chen L, Li J, Lam S-K (2023) Blockchain-based secure key management for mobile edge computing. IEEE Trans Mob Comput 22(1):100\u2013114. https:\/\/doi.org\/10.1109\/TMC.2021.3068717","journal-title":"IEEE Trans Mob Comput"},{"key":"2006_CR9","doi-asserted-by":"publisher","first-page":"104714","DOI":"10.1016\/J.JPDC.2023.104714","volume":"179","author":"Y Li","year":"2023","unstructured":"Li Y (2023) A secure and efficient three-factor authentication protocol for IoT environments. J Parallel Distrib Comput 179:104714. https:\/\/doi.org\/10.1016\/J.JPDC.2023.104714","journal-title":"J Parallel Distrib Comput"},{"key":"2006_CR10","doi-asserted-by":"publisher","first-page":"100615","DOI":"10.1016\/J.IOT.2022.100615","volume":"20","author":"H Ahmetoglu","year":"2022","unstructured":"Ahmetoglu H, Das R (2022) A comprehensive review on detection of cyber-attacks: Data sets, methods, challenges, and future research directions. Internet of Things 20:100615. https:\/\/doi.org\/10.1016\/J.IOT.2022.100615","journal-title":"Internet of Things"},{"key":"2006_CR11","doi-asserted-by":"publisher","unstructured":"Zheng J, Zhang L, Feng Y, Wu Z (2022) Blockchain-based key management and authentication scheme for IoT networks with chaotic scrambling. IEEE Trans Netw Sci Eng 1\u201311. https:\/\/doi.org\/10.1109\/TNSE.2022.3205913","DOI":"10.1109\/TNSE.2022.3205913"},{"key":"2006_CR12","doi-asserted-by":"publisher","unstructured":"Zahoor A et al. (2003) An access control scheme in IoT-enabled Smart-Grid systems using blockchain and PUF. Internet of Things 100708. https:\/\/doi.org\/10.1016\/J.IOT.2023.100708","DOI":"10.1016\/J.IOT.2023.100708"},{"key":"2006_CR13","unstructured":"Gupta A, Christie R, Manjula PR (2017) Scalability in Internet of Things\u202f: Features , Techniques and Research Challenges 13(7):1617\u20131627"},{"key":"2006_CR14","doi-asserted-by":"publisher","first-page":"108288","DOI":"10.1016\/j.compeleceng.2022.108288","volume":"102","author":"F Ghasemi","year":"2022","unstructured":"Ghasemi F, Babaie S (2022) A lightweight secure authentication approach based on stream ciphering for RFID-based internet of things. Comput Electr Eng 102:108288. https:\/\/doi.org\/10.1016\/j.compeleceng.2022.108288","journal-title":"Comput Electr Eng"},{"key":"2006_CR15","doi-asserted-by":"publisher","first-page":"199","DOI":"10.1016\/J.JPDC.2022.06.018","volume":"169","author":"M Adeli","year":"2022","unstructured":"Adeli M, Bagheri N, Mart\u00edn H, Peris-Lopez P (2022) Challenging the security of \u2018A PUF-based hardware mutual authentication protocol.\u2019 J Parallel Distrib Comput 169:199\u2013210. https:\/\/doi.org\/10.1016\/J.JPDC.2022.06.018","journal-title":"J Parallel Distrib Comput"},{"issue":"9","key":"2006_CR16","doi-asserted-by":"publisher","first-page":"6424","DOI":"10.1109\/TII.2022.3145584","volume":"18","author":"Q Fan","year":"2022","unstructured":"Fan Q, Chen J, Shojafar M, Kumari S, He D (2022) SAKE*: A symmetric authenticated key exchange protocol with perfect forward secrecy for industrial internet of things. IEEE Trans Industr Inform 18(9):6424\u20136434. https:\/\/doi.org\/10.1109\/TII.2022.3145584","journal-title":"IEEE Trans Industr Inform"},{"key":"2006_CR17","doi-asserted-by":"publisher","unstructured":"Ghafouri Mirsaraei A, Barati A, Barati H (2022) A secure three-factor authentication scheme for IoT environments. J Parallel Distrib Comput 169:87\u2013105. https:\/\/doi.org\/10.1016\/J.JPDC.2022.06.011","DOI":"10.1016\/J.JPDC.2022.06.011"},{"issue":"4","key":"2006_CR18","doi-asserted-by":"publisher","first-page":"3303","DOI":"10.1109\/TNSE.2021.3110315","volume":"8","author":"H Seddiqi","year":"2021","unstructured":"Seddiqi H, Babaie S (2021) A new protection-based approach for link failure management of software-defined networks. IEEE Trans on Netw Sci and Eng 8(4):3303\u20133312. https:\/\/doi.org\/10.1109\/TNSE.2021.3110315","journal-title":"IEEE Trans on Netw Sci and Eng"},{"issue":"March","key":"2006_CR19","doi-asserted-by":"publisher","first-page":"33089","DOI":"10.1109\/ACCESS.2024.3372390","volume":"12","author":"BA Mohammed","year":"2024","unstructured":"Mohammed BA et al (2024) Efficient blockchain-based pseudonym authentication scheme supporting revocation for 5G-assisted vehicular fog computing. IEEE Access 12(March):33089\u201333099. https:\/\/doi.org\/10.1109\/ACCESS.2024.3372390","journal-title":"IEEE Access"},{"issue":"4","key":"2006_CR20","doi-asserted-by":"publisher","first-page":"1900","DOI":"10.1007\/s12083-023-01498-6","volume":"16","author":"E Ebrahimpour","year":"2023","unstructured":"Ebrahimpour E, Babaie S (2023) A Lightweight authentication approach based on linear feedback shift register and majority function for internet of things. Peer Peer Netw Appl 16(4):1900\u20131915. https:\/\/doi.org\/10.1007\/s12083-023-01498-6","journal-title":"Peer Peer Netw Appl"},{"key":"2006_CR21","unstructured":"Babaie S (2020) Biometric authentication: An efficient option for internet of things applications during the COVID-19 pandemic. Acta Scientific- Computer Sciences 2(10):1\u20132. Accessed: Nov. 14, 2020. [Online]. Available: www.actascientific.com\/submission.php"},{"issue":"14","key":"2006_CR22","doi-asserted-by":"publisher","first-page":"16056","DOI":"10.1007\/s11227-022-04520-5","volume":"78","author":"I Alshawish","year":"2022","unstructured":"Alshawish I, Al-Haj A (2022) An efficient mutual authentication scheme for IoT systems. J Supercomput 78(14):16056\u201316087. https:\/\/doi.org\/10.1007\/s11227-022-04520-5","journal-title":"J Supercomput"},{"issue":"1","key":"2006_CR23","doi-asserted-by":"publisher","first-page":"739","DOI":"10.1007\/s12652-023-04732-4","volume":"15","author":"H Zangoulechi","year":"2024","unstructured":"Zangoulechi H, Babaie S (2024) An adaptive traffic engineering approach based on retransmission timeout adjustment for software-defined networks. J Ambient Intell Humaniz Comput 15(1):739\u2013750. https:\/\/doi.org\/10.1007\/s12652-023-04732-4","journal-title":"J Ambient Intell Humaniz Comput"},{"key":"2006_CR24","doi-asserted-by":"publisher","first-page":"167875","DOI":"10.1109\/ACCESS.2020.3022778","volume":"8","author":"S Yu","year":"2020","unstructured":"Yu S, Lee J, Park K, Das AK, Park Y (2020) IoV-SMAP: Secure and efficient message authentication protocol for IoV in smart city environment. IEEE Access 8:167875\u2013167886. https:\/\/doi.org\/10.1109\/ACCESS.2020.3022778","journal-title":"IEEE Access"},{"key":"2006_CR25","doi-asserted-by":"publisher","first-page":"126","DOI":"10.1016\/J.COSE.2018.06.004","volume":"78","author":"MT Hammi","year":"2018","unstructured":"Hammi MT, Hammi B, Bellot P, Serhrouchni A (2018) Bubbles of trust: A decentralized blockchain-based authentication system for IoT. Comput Secur 78:126\u2013142. https:\/\/doi.org\/10.1016\/J.COSE.2018.06.004","journal-title":"Comput Secur"},{"key":"2006_CR26","doi-asserted-by":"publisher","first-page":"255","DOI":"10.1016\/J.JISA.2017.01.003","volume":"34","author":"PK Dhillon","year":"2017","unstructured":"Dhillon PK, Kalra S (2017) A lightweight biometrics based remote user authentication scheme for IoT services. J Inform Secur Appl 34:255\u2013270. https:\/\/doi.org\/10.1016\/J.JISA.2017.01.003","journal-title":"J Inform Secur Appl"},{"issue":"3","key":"2006_CR27","doi-asserted-by":"publisher","first-page":"247","DOI":"10.1049\/iet-ifs.2011.0348","volume":"7","author":"H Yeh","year":"2013","unstructured":"Yeh H, Chen T, Hu K, Shih W (2013) Robust elliptic curve cryptography-based three factor user authentication providing privacy of biometric data. IET Inf Secur 7(3):247\u2013252. https:\/\/doi.org\/10.1049\/iet-ifs.2011.0348","journal-title":"IET Inf Secur"},{"key":"2006_CR28","doi-asserted-by":"publisher","unstructured":"Wang C-H, Hsu K-C (2019) Enhancing biometric and mutual verification in multi-server three-factor user remote authentication scheme with elliptic curve cryptography. In Proceedings of the 7th International Conference on Communications and Broadband Networking, New York, NY, USA: ACM, Apr. 2019, pp. 46\u201352. https:\/\/doi.org\/10.1145\/3330180.3330188","DOI":"10.1145\/3330180.3330188"},{"key":"2006_CR29","doi-asserted-by":"publisher","unstructured":"Najafi Z, Babaie S (2023) A lightweight hierarchical key management approach for internet of things. J Inf Secur Appl 75(4). https:\/\/doi.org\/10.1016\/j.jisa.2023.103485","DOI":"10.1016\/j.jisa.2023.103485"},{"issue":"12","key":"2006_CR30","doi-asserted-by":"publisher","first-page":"2123","DOI":"10.3390\/s16122123","volume":"16","author":"Y Park","year":"2016","unstructured":"Park Y, Park Y (2016) Three-factor user authentication and key agreement using elliptic curve cryptosystem in wireless sensor networks. Sensors 16(12):2123. https:\/\/doi.org\/10.3390\/s16122123","journal-title":"Sensors"},{"key":"2006_CR31","doi-asserted-by":"publisher","unstructured":"Al-Mekhlafi ZG et al. (2023) Chebyshev polynomial-based fog computing scheme supporting pseudonym revocation for 5G-enabled vehicular networks. Electron 12(4). https:\/\/doi.org\/10.3390\/electronics12040872","DOI":"10.3390\/electronics12040872"},{"issue":"2","key":"2006_CR32","doi-asserted-by":"publisher","first-page":"1","DOI":"10.3390\/math11020399","volume":"11","author":"ZG Al-Mekhlafi","year":"2023","unstructured":"Al-Mekhlafi ZG, Al-Shareeda MA, Manickam S, Mohammed BA, Qtaish A (2023) Lattice-based lightweight quantum resistant scheme in 5G-enabled vehicular networks. Mathematics 11(2):1\u201317. https:\/\/doi.org\/10.3390\/math11020399","journal-title":"Mathematics"},{"key":"2006_CR33","doi-asserted-by":"publisher","unstructured":"Al-Shareeda MA, Manickam S (2022) COVID-19 vehicle based on an efficient mutual authentication scheme for 5G-enabled vehicular fog computing. Int J Environ Res Public Health 19(23). https:\/\/doi.org\/10.3390\/ijerph192315618","DOI":"10.3390\/ijerph192315618"},{"issue":"3","key":"2006_CR34","doi-asserted-by":"publisher","first-page":"1867","DOI":"10.1007\/s11277-020-07769-2","volume":"116","author":"S Majumder","year":"2021","unstructured":"Majumder S, Ray S, Sadhukhan D, Khan MK, Dasgupta M (2021) ECC-CoAP: Elliptic curve cryptography based constraint application protocol for internet of things. Wirel Pers Commun 116(3):1867\u20131896. https:\/\/doi.org\/10.1007\/s11277-020-07769-2","journal-title":"Wirel Pers Commun"},{"key":"2006_CR35","doi-asserted-by":"publisher","first-page":"100092","DOI":"10.1016\/J.IMU.2018.02.003","volume":"16","author":"N Radhakrishnan","year":"2019","unstructured":"Radhakrishnan N, Karuppiah M (2019) An efficient and secure remote user mutual authentication scheme using smart cards for Telecare medical information systems. Inform Med Unlocked 16:100092. https:\/\/doi.org\/10.1016\/J.IMU.2018.02.003","journal-title":"Inform Med Unlocked"},{"issue":"4","key":"2006_CR36","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/LSENS.2019.2905020","volume":"3","author":"S Dey","year":"2019","unstructured":"Dey S, Hossain A (2019) Session-key establishment and authentication in a smart home network using public key cryptography. IEEE Sens Lett 3(4):1\u20134. https:\/\/doi.org\/10.1109\/LSENS.2019.2905020","journal-title":"IEEE Sens Lett"},{"key":"2006_CR37","doi-asserted-by":"publisher","unstructured":"Vigan\u00f2 L (2006) Automated security protocol analysis with the AVISPA tool. Electron Notes Theor Comput Sci 155(1) SPEC. ISS., 61\u201386, 2006, https:\/\/doi.org\/10.1016\/j.entcs.2005.11.052","DOI":"10.1016\/j.entcs.2005.11.052"}],"container-title":["Peer-to-Peer Networking and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-025-02006-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s12083-025-02006-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-025-02006-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,27]],"date-time":"2025-09-27T15:21:30Z","timestamp":1758986490000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s12083-025-02006-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,5,29]]},"references-count":37,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2025,7]]}},"alternative-id":["2006"],"URL":"https:\/\/doi.org\/10.1007\/s12083-025-02006-8","relation":{},"ISSN":["1936-6442","1936-6450"],"issn-type":[{"type":"print","value":"1936-6442"},{"type":"electronic","value":"1936-6450"}],"subject":[],"published":{"date-parts":[[2025,5,29]]},"assertion":[{"value":"13 March 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"3 May 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"29 May 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no competing interests.All authors have participated in (a) conception and design, or analysis and interpretation of the data; (b) drafting the article or revising it critically for important intellectual content; and (c) approval of the final version.This manuscript has not been submitted to, nor is under review at, another journal or other publishing venue.The following authors have affiliations with organizations with direct or indirect financial interest in the subject matter discussed in the manuscript: Kamal Rahmani: Department of Computer Engineering, Tabriz Branch, Islamic Azad University, Tabriz, Iran. Shahram Babaie: Department of Computer Engineering, Tabriz Branch, Islamic Azad University, Tabriz, Iran.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflicts of interest"}}],"article-number":"195"}}