{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,5]],"date-time":"2026-03-05T15:28:25Z","timestamp":1772724505629,"version":"3.50.1"},"reference-count":50,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2025,6,5]],"date-time":"2025-06-05T00:00:00Z","timestamp":1749081600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,6,5]],"date-time":"2025-06-05T00:00:00Z","timestamp":1749081600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Peer-to-Peer Netw. Appl."],"published-print":{"date-parts":[[2025,7]]},"DOI":"10.1007\/s12083-025-02016-6","type":"journal-article","created":{"date-parts":[[2025,6,5]],"date-time":"2025-06-05T07:47:18Z","timestamp":1749109638000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["A secure and resource-efficient authenticated key agreement framework for mobile edge computing"],"prefix":"10.1007","volume":"18","author":[{"given":"Muhammad","family":"Tanveer","sequence":"first","affiliation":[]},{"given":"Abdullah G.","family":"Alharbi","sequence":"additional","affiliation":[]},{"given":"Muhammad Jawad","family":"Akhtar","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,6,5]]},"reference":[{"issue":"4","key":"2016_CR1","doi-asserted-by":"publisher","first-page":"2322","DOI":"10.1109\/COMST.2017.2745201","volume":"19","author":"Y Mao","year":"2017","unstructured":"Mao Y, You C, Zhang J, Huang K, Letaief KB (2017) A survey on mobile edge computing: The communication perspective. IEEE Commun Surv & Tutorials 19(4):2322\u20132358","journal-title":"IEEE Commun Surv & Tutorials"},{"key":"2016_CR2","doi-asserted-by":"publisher","first-page":"121522","DOI":"10.1109\/ACCESS.2021.3109264","volume":"9","author":"MA Al-Shareeda","year":"2021","unstructured":"Al-Shareeda MA, Anbar M, Manickam S, Khalil A, Hasbullah IH (2021) Security and privacy schemes in vehicular ad-hoc network with identity-based cryptography approach: A survey. IEEE Access 9:121522\u2013121531","journal-title":"IEEE Access"},{"issue":"1","key":"2016_CR3","doi-asserted-by":"publisher","first-page":"450","DOI":"10.1109\/JIOT.2017.2750180","volume":"5","author":"N Abbas","year":"2017","unstructured":"Abbas N, Zhang Y, Taherkordi A, Skeie T (2017) Mobile edge computing: A survey. IEEE Internet of Things Journal 5(1):450\u2013465","journal-title":"IEEE Internet of Things Journal"},{"issue":"3","key":"2016_CR4","doi-asserted-by":"publisher","first-page":"1628","DOI":"10.1109\/COMST.2017.2682318","volume":"19","author":"P Mach","year":"2017","unstructured":"Mach P, Becvar Z (2017) Mobile edge computing: A survey on architecture and computation offloading. IEEE Commun Surv & Tutor 19(3):1628\u20131656","journal-title":"IEEE Commun Surv & Tutor"},{"issue":"12","key":"2016_CR5","doi-asserted-by":"publisher","first-page":"22","DOI":"10.1109\/MCOM.2016.1600492CM","volume":"54","author":"X Sun","year":"2016","unstructured":"Sun X, Ansari N (2016) Edgeiot: Mobile edge computing for the internet of things. IEEE Commun Mag 54(12):22\u201329","journal-title":"IEEE Commun Mag"},{"key":"2016_CR6","doi-asserted-by":"crossref","unstructured":"Ahmed E, Rehmani MH (2017) Mobile edge computing: opportunities. solutions, and challenges","DOI":"10.1016\/j.future.2016.09.015"},{"key":"2016_CR7","doi-asserted-by":"crossref","unstructured":"Al-shareeda MMA, Anbar M, Alazzawi MA, Manickam S, Hasbullah IH (2020) Security schemes based conditional privacy-preserving in vehicular ad hoc networks. Indonesian Journal of Electrical Engineering and Computer Science 21(1)","DOI":"10.11591\/ijeecs.v21.i1.pp479-488"},{"issue":"4","key":"2016_CR8","doi-asserted-by":"publisher","first-page":"84","DOI":"10.1109\/MCE.2016.2590118","volume":"5","author":"D Sabella","year":"2016","unstructured":"Sabella D, Vaillant A, Kuure P, Rauschenbach U, Giust F (2016) Mobile-edge computing architecture: The role of mec in the internet of things. IEEE Cons Electron Mag 5(4):84\u201391","journal-title":"IEEE Cons Electron Mag"},{"issue":"6","key":"2016_CR9","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0287291","volume":"18","author":"AA Almazroi","year":"2023","unstructured":"Almazroi AA, Aldhahri EA, Al-Shareeda MA, Manickam S (2023) Eca-vfog: An efficient certificateless authentication scheme for 5g-assisted vehicular fog computing. Plos one 18(6):e0287291","journal-title":"Plos one"},{"issue":"5","key":"2016_CR10","doi-asserted-by":"publisher","first-page":"298","DOI":"10.1109\/MNET.211.2000526","volume":"35","author":"S Garg","year":"2021","unstructured":"Garg S, Kaur K, Kaddoum G, Garigipati P, Aujla GS (2021) Security in iot-driven mobile edge computing: New paradigms, challenges, and opportunities. IEEE Network 35(5):298\u2013305","journal-title":"IEEE Network"},{"issue":"13","key":"2016_CR11","doi-asserted-by":"publisher","first-page":"5026","DOI":"10.3390\/s22135026","volume":"22","author":"MA Al-Shareeda","year":"2022","unstructured":"Al-Shareeda MA, Manickam S, Mohammed BA, Al-Mekhlafi ZG, Qtaish A, Alzahrani AJ, Alshammari G, Sallam AA, Almekhlafi K (2022) Cm-cppa: Chaotic map-based conditional privacy-preserving authentication scheme in 5g-enabled vehicular networks. Sensors 22(13):5026","journal-title":"Sensors"},{"key":"2016_CR12","doi-asserted-by":"crossref","unstructured":"Abbood AA, AL-Shammri FK, Alzamili ZM, Al-Shareeda MA, Almaiah MA, AlAli R (2025) Investigating quantum-resilient security mechanisms for flying ad-hoc networks (fanets). J Robot Control (JRC) 6(1):456\u2013469","DOI":"10.18196\/jrc.v6i1.25351"},{"issue":"2","key":"2016_CR13","doi-asserted-by":"publisher","first-page":"1078","DOI":"10.1109\/COMST.2021.3062546","volume":"23","author":"P Ranaweera","year":"2021","unstructured":"Ranaweera P, Jurcut AD, Liyanage M (2021) Survey on multi-access edge computing security and privacy. IEEE Commun Surv & Tutor 23(2):1078\u20131124","journal-title":"IEEE Commun Surv & Tutor"},{"key":"2016_CR14","doi-asserted-by":"publisher","first-page":"136119","DOI":"10.1109\/ACCESS.2020.3011477","volume":"8","author":"Y Hou","year":"2020","unstructured":"Hou Y, Garg S, Hui L, Jayakody DNK, Jin R, Hossain MS (2020) A data security enhanced access control mechanism in mobile edge computing. IEEE Access 8:136119\u2013136130","journal-title":"IEEE Access"},{"issue":"6","key":"2016_CR15","doi-asserted-by":"publisher","first-page":"1373","DOI":"10.1007\/s10207-022-00619-1","volume":"21","author":"M Abdussami","year":"2022","unstructured":"Abdussami M, Amin R, Vollala S (2022) Lassi: a lightweight authenticated key agreement protocol for fog-enabled iot deployment. Int J Inf Secur 21(6):1373\u20131387","journal-title":"Int J Inf Secur"},{"key":"2016_CR16","unstructured":"Das S, Namasudra S (2022) A lightweight and anonymous mutual authentication scheme for medical big data in distributed smart healthcare systems. IEEE\/ACM Transactions on Computational Biology and Bioinformatics"},{"key":"2016_CR17","doi-asserted-by":"crossref","unstructured":"Alruwaili O, Tanveer M, Alotaibi FM, Abdelfattah W, Armghan A, Alserhani FM (2024) Securing the iot-enabled smart healthcare system: A puf-based resource-efficient authentication mechanism. Heliyon","DOI":"10.1016\/j.heliyon.2024.e37577"},{"key":"2016_CR18","doi-asserted-by":"publisher","first-page":"109673","DOI":"10.1109\/ACCESS.2024.3438618","volume":"12","author":"F Mohammed Alotaibi","year":"2024","unstructured":"Mohammed Alotaibi F, Maghrabi LA, Tanveer M, Ahmad M, Naith QH (2024) Rap-mec: Robust authentication protocol for the mobile edge computing services. IEEE Access 12:109673\u2013109689. https:\/\/doi.org\/10.1109\/ACCESS.2024.3438618","journal-title":"IEEE Access"},{"key":"2016_CR19","volume":"26","author":"M Tanveer","year":"2024","unstructured":"Tanveer M, Chelloug SA, Alabdulhafith M, Abd El-Latif AA (2024) Lightweight authentication protocol for connected medical iot through privacy-preserving access. Egypt Inf J 26:100474","journal-title":"Egypt Inf J"},{"issue":"3","key":"2016_CR20","doi-asserted-by":"publisher","first-page":"3453","DOI":"10.1007\/s13369-023-08047-6","volume":"49","author":"M Tanveer","year":"2024","unstructured":"Tanveer M, Bhutta MNM, Alzahrani BA, Albeshri A, Alsubhi K, Chaudhry SA (2024) Cmap-iot: Chaotic map-based authentication protocol for crowdsourcing internet of things. Arab J Sci Eng 49(3):3453\u20133466","journal-title":"Arab J Sci Eng"},{"issue":"4","key":"2016_CR21","doi-asserted-by":"publisher","first-page":"1994","DOI":"10.1007\/s12083-022-01333-4","volume":"15","author":"Z Yukun","year":"2022","unstructured":"Yukun Z, Wenxue W (2022) Lightweight anonymous authentication and key agreement protocols for mobile edge computing. Peer-to-Peer Netw Appl 15(4):1994\u20132006","journal-title":"Peer-to-Peer Netw Appl"},{"issue":"4","key":"2016_CR22","doi-asserted-by":"publisher","first-page":"3474","DOI":"10.1109\/JIOT.2020.2970974","volume":"7","author":"D Fang","year":"2020","unstructured":"Fang D, Qian Y, Hu RQ (2020) A flexible and efficient authentication and secure data transmission scheme for iot applications. IEEE Internet of Things Journal 7(4):3474\u20133484","journal-title":"IEEE Internet of Things Journal"},{"key":"2016_CR23","doi-asserted-by":"publisher","first-page":"23008","DOI":"10.1109\/ACCESS.2022.3153069","volume":"10","author":"M Tanveer","year":"2022","unstructured":"Tanveer M, Alkhayyat A, Chaudhry SA, Zikria YB, Kim SW et al (2022) Reas-tmis: Resource-efficient authentication scheme for telecare medical information system. IEEE Access 10:23008\u201323021","journal-title":"IEEE Access"},{"key":"2016_CR24","doi-asserted-by":"publisher","first-page":"24639","DOI":"10.1109\/ACCESS.2018.2799942","volume":"6","author":"S-C Cha","year":"2018","unstructured":"Cha S-C, Chen J-F, Su C, Yeh K-H (2018) A blockchain connected gateway for ble-based devices in the internet of things. ieee access 6:24639\u201324649","journal-title":"ieee access"},{"issue":"1","key":"2016_CR25","doi-asserted-by":"publisher","first-page":"219","DOI":"10.3390\/electronics12010219","volume":"12","author":"S Liu","year":"2023","unstructured":"Liu S, Chai Y, Hui L, Wu W (2023) Blockchain-based anonymous authentication in edge computing environment. Electronics 12(1):219","journal-title":"Electronics"},{"issue":"13","key":"2016_CR26","doi-asserted-by":"publisher","DOI":"10.1002\/cpe.6920","volume":"34","author":"M Xu","year":"2022","unstructured":"Xu M, Xu G, Xu H, Zhou J, Li S (2022) A decentralized lightweight authentication protocol under blockchain. Concurr Comput: Prac Exp 34(13):e6920","journal-title":"Concurr Comput: Prac Exp"},{"issue":"5","key":"2016_CR27","doi-asserted-by":"publisher","first-page":"2525","DOI":"10.1109\/TNSE.2022.3203927","volume":"10","author":"M Tanveer","year":"2022","unstructured":"Tanveer M, Ahmad M, Nguyen TN, Abd El-Latif AA et al (2022) Resource-efficient authenticated data sharing mechanism for smart wearable systems. IEEE Trans Netw Sci Eng 10(5):2525\u20132536","journal-title":"IEEE Trans Netw Sci Eng"},{"issue":"11","key":"2016_CR28","doi-asserted-by":"publisher","first-page":"2794","DOI":"10.1109\/TPDS.2013.277","volume":"25","author":"S Guo","year":"2013","unstructured":"Guo S, Zeng D, Xiang Y (2013) Chameleon hashing for secure and privacy-preserving vehicular communications. IEEE Trans Parallel Distrib Syst 25(11):2794\u20132803","journal-title":"IEEE Trans Parallel Distrib Syst"},{"issue":"1","key":"2016_CR29","doi-asserted-by":"publisher","first-page":"3","DOI":"10.3390\/cryptography1010003","volume":"1","author":"W Che","year":"2016","unstructured":"Che W, Martin M, Pocklassery G, Kajuluri VK, Saqib F, Plusquellic J (2016) A privacy-preserving, mutual puf-based authentication protocol. Cryptography 1(1):3","journal-title":"Cryptography"},{"issue":"11","key":"2016_CR30","doi-asserted-by":"publisher","first-page":"2831","DOI":"10.1109\/TIFS.2018.2832849","volume":"13","author":"P Gope","year":"2018","unstructured":"Gope P, Lee J, Quek TQ (2018) Lightweight and practical anonymous authentication protocol for rfid systems using physically unclonable functions. IEEE Trans Inf Foren Secur 13(11):2831\u20132843","journal-title":"IEEE Trans Inf Foren Secur"},{"issue":"4","key":"2016_CR31","doi-asserted-by":"publisher","first-page":"3953","DOI":"10.1109\/TSG.2018.2844403","volume":"10","author":"P Gope","year":"2018","unstructured":"Gope P, Sikdar B (2018) Privacy-aware authenticated key agreement scheme for secure smart grid communication. IEEE Trans Smart Grid 10(4):3953\u20133962","journal-title":"IEEE Trans Smart Grid"},{"issue":"1","key":"2016_CR32","doi-asserted-by":"publisher","first-page":"734","DOI":"10.1109\/JIOT.2022.3203991","volume":"10","author":"D Xie","year":"2022","unstructured":"Xie D, Yang J, Bian W, Chen F, Wang T (2022) An improved identity-based anonymous authentication scheme resistant to semi-trusted server attacks. IEEE Internet of Things Journal 10(1):734\u2013746","journal-title":"IEEE Internet of Things Journal"},{"issue":"1","key":"2016_CR33","doi-asserted-by":"publisher","first-page":"935","DOI":"10.1109\/JSYST.2020.2979006","volume":"15","author":"Y Li","year":"2020","unstructured":"Li Y, Cheng Q, Liu X, Li X (2020) A secure anonymous identity-based scheme in new authentication architecture for mobile edge computing. IEEE Syst J 15(1):935\u2013946","journal-title":"IEEE Syst J"},{"issue":"12","key":"2016_CR34","first-page":"5529","volume":"10","author":"A Irshad","year":"2016","unstructured":"Irshad A, Sher M, Ahmad HF, Alzahrani BA, Chaudhry SA, Kumar R (2016) An improved multi-server authentication scheme for distributed mobile cloud computing services. KSII Trans Internet Inf Syst (TIIS) 10(12):5529\u20135552","journal-title":"KSII Trans Internet Inf Syst (TIIS)"},{"issue":"2","key":"2016_CR35","doi-asserted-by":"publisher","first-page":"198","DOI":"10.1109\/TIT.1983.1056650","volume":"29","author":"D Dolev","year":"1983","unstructured":"Dolev D, Yao A (1983) On the security of public key protocols. IEEE Trans Inf Theory 29(2):198\u2013208","journal-title":"IEEE Trans Inf Theory"},{"key":"2016_CR36","doi-asserted-by":"publisher","DOI":"10.1016\/j.iot.2023.100902","volume":"23","author":"M Tanveer","year":"2023","unstructured":"Tanveer M, Badshah A, Alasmary H, Chaudhry SA et al (2023) Cmaf-iiot: Chaotic map-based authentication framework for industrial internet of things. Internet of Things 23:100902","journal-title":"Internet of Things"},{"key":"2016_CR37","doi-asserted-by":"crossref","unstructured":"Yuan M, Tan H, Zheng W, Vijayakumar P, Alqahtani F, Tolba A (2024) A robust ecc-based authentication and key agreement protocol for 6g-based smart home environments. IEEE Internet of Things Journal","DOI":"10.1109\/JIOT.2024.3392498"},{"key":"2016_CR38","doi-asserted-by":"crossref","unstructured":"Tanveer M, Aldosary A, Das AK, Aldossari SA, Chaudhry SA et al (2024) Paf-iod: Puf-enabled authentication framework for the internet of drones. IEEE Transactions on Vehicular Technology","DOI":"10.2139\/ssrn.4681491"},{"issue":"11","key":"2016_CR39","doi-asserted-by":"publisher","first-page":"8205","DOI":"10.1109\/JIOT.2022.3142084","volume":"9","author":"P Mall","year":"2022","unstructured":"Mall P, Amin R, Das AK, Leung MT, Choo K-KR (2022) Puf-based authentication and key agreement protocols for iot, wsns, and smart grids: A comprehensive survey. IEEE Internet of Things Journal 9(11):8205\u20138228","journal-title":"IEEE Internet of Things Journal"},{"key":"2016_CR40","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s00145-021-09398-9","volume":"34","author":"C Dobraunig","year":"2021","unstructured":"Dobraunig C, Eichlseder M, Mendel F, Schl\u00e4ffer M (2021) Ascon v1. 2: Lightweight authenticated encryption and hashing. Journal of Cryptology 34:1\u201342","journal-title":"Journal of Cryptology"},{"issue":"1","key":"2016_CR41","doi-asserted-by":"publisher","first-page":"865","DOI":"10.1007\/s11227-023-05507-6","volume":"80","author":"N Singh","year":"2024","unstructured":"Singh N, Das AK (2024) Tfas: two factor authentication scheme for blockchain enabled iomt using puf and fuzzy extractor. J Supercomput 80(1):865\u2013914","journal-title":"J Supercomput"},{"key":"2016_CR42","doi-asserted-by":"crossref","unstructured":"Bellare M, Rogaway P (1993) Random oracles are practical: A paradigm for designing efficient protocols. In: Proceedings of the 1st ACM conference on computer and communications security, pp 62\u201373","DOI":"10.1145\/168588.168596"},{"key":"2016_CR43","doi-asserted-by":"crossref","unstructured":"Wazid M, Mittal S, Das AK, Islam SH, Alenazi MJ, Vasilakos AV (2025) Designing secure blockchain-based authentication and key management mechanism for internet of drones applications. Journal of Systems Architecture 103365","DOI":"10.1016\/j.sysarc.2025.103365"},{"key":"2016_CR44","unstructured":"Pu C, Choo K-KR, Kora\u0107 D (2024) A lightweight and anonymous application-aware authentication and key agreement protocol for the internet of drones. IEEE Internet of Things Journal"},{"key":"2016_CR45","doi-asserted-by":"crossref","unstructured":"Aldosary A, Tanveer M, Ahmad M, Maghrabi LA, Ahmed EA, Hussain A, Abd El-Latif AA (2024) A secure authentication framework for consumer mobile crowdsourcing networks. IEEE Transactions on Consumer Electronics","DOI":"10.1109\/TCE.2024.3473930"},{"issue":"3","key":"2016_CR46","doi-asserted-by":"publisher","first-page":"982","DOI":"10.3390\/s25030982","volume":"25","author":"J Choi","year":"2025","unstructured":"Choi J, Son S, Kwon D, Park Y (2025) A puf-based secure authentication and key agreement scheme for the internet of drones. Sensors 25(3):982","journal-title":"Sensors"},{"key":"2016_CR47","doi-asserted-by":"publisher","first-page":"13","DOI":"10.1016\/j.cosrev.2016.07.002","volume":"22","author":"F Abed","year":"2016","unstructured":"Abed F, Forler C, Lucks S (2016) General classification of the authenticated encryption schemes for the caesar competition. Comput Sci Rev 22:13\u201326","journal-title":"Comput Sci Rev"},{"key":"2016_CR48","doi-asserted-by":"crossref","unstructured":"Wang K, Dong J, Xu Y, Ji X, Sha L, Xiao F (2024) Read: Resource efficient authentication scheme for digital twin edge networks. Future Generation Computer Systems 107498","DOI":"10.1016\/j.future.2024.107498"},{"key":"2016_CR49","doi-asserted-by":"publisher","first-page":"229","DOI":"10.1016\/j.comcom.2020.02.011","volume":"153","author":"B Bera","year":"2020","unstructured":"Bera B, Chattaraj D, Das AK (2020) Designing secure blockchain-based access control scheme in iot-enabled internet of drones deployment. Comput Commun 153:229\u2013249","journal-title":"Comput Commun"},{"key":"2016_CR50","unstructured":"Team A (2024) Ascon reference implementations. https:\/\/github.com\/ascon\/ascon-c, accessed: 2024-09-12"}],"container-title":["Peer-to-Peer Networking and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-025-02016-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s12083-025-02016-6\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-025-02016-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,27]],"date-time":"2025-09-27T15:22:37Z","timestamp":1758986557000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s12083-025-02016-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,6,5]]},"references-count":50,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2025,7]]}},"alternative-id":["2016"],"URL":"https:\/\/doi.org\/10.1007\/s12083-025-02016-6","relation":{},"ISSN":["1936-6442","1936-6450"],"issn-type":[{"value":"1936-6442","type":"print"},{"value":"1936-6450","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,6,5]]},"assertion":[{"value":"6 February 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"13 May 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"5 June 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"200"}}