{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,5]],"date-time":"2025-12-05T12:31:36Z","timestamp":1764937896334,"version":"3.44.0"},"reference-count":34,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T00:00:00Z","timestamp":1750291200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T00:00:00Z","timestamp":1750291200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Peer-to-Peer Netw. Appl."],"published-print":{"date-parts":[[2025,7]]},"DOI":"10.1007\/s12083-025-02039-z","type":"journal-article","created":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T05:08:40Z","timestamp":1750309720000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["LEFAM: Lightweight scalable efficient failover authentication mechanism for fog-based IoT environment"],"prefix":"10.1007","volume":"18","author":[{"given":"Mohammad","family":"Abdussami","sequence":"first","affiliation":[]},{"given":"Sanjeev Kumar","family":"Dwivedi","sequence":"additional","affiliation":[]},{"given":"Ruhul","family":"Amin","sequence":"additional","affiliation":[]},{"given":"Cheng-Chi","family":"Lee","sequence":"additional","affiliation":[]},{"given":"Taher","family":"Al-Shehari","sequence":"additional","affiliation":[]},{"given":"Taha","family":"Alfakih","sequence":"additional","affiliation":[]},{"given":"Hussain","family":"Alsalman","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,6,19]]},"reference":[{"key":"2039_CR1","doi-asserted-by":"crossref","unstructured":"Abdussami M, Dwivedi SK, Al-Shehari T, Saravanan P, Kadrie M, Alfakih T, Alsalman H, Amin R (2024) Deac-iot: Design of lightweight authenticated key agreement protocol for intra and inter-iot device communication using ecc with fpga implementation. Comput Electr Eng 120:109696","DOI":"10.1016\/j.compeleceng.2024.109696"},{"key":"2039_CR2","doi-asserted-by":"crossref","unstructured":"Ponnuru RB, Kumar SA, Azab M, Alavalapati GR (2025) Baap-fiot: Blockchain assisted authentication protocol for fog-enabled internet of things environment. IEEE Internet Things J","DOI":"10.1109\/JIOT.2025.3528746"},{"issue":"1","key":"2039_CR3","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s12083-024-01843-3","volume":"18","author":"SP Satpathy","year":"2025","unstructured":"Satpathy SP, Mohanty S, Pradhan M (2025) A sustainable mutual authentication protocol for iot-fog-cloud environment. Peer-to-Peer Netw Appl 18(1):1\u201323","journal-title":"Peer-to-Peer Netw Appl"},{"issue":"12","key":"2039_CR4","first-page":"1417","volume":"10","author":"S Banerjee","year":"2021","unstructured":"Banerjee S, Das AK, Chattopadhyay S, Jamal SS, Rodrigues JJ, Park Y (2021) Lightweight failover authentication mechanism for iot-based fog computing environment. Electr 10(12):1417","journal-title":"Electr"},{"issue":"1","key":"2039_CR5","doi-asserted-by":"publisher","DOI":"10.1002\/spy2.267","volume":"6","author":"P Chandrakar","year":"2023","unstructured":"Chandrakar P, Bagga R, Kumar Y, Dwivedi SK, Amin R (2023) Blockchain based security protocol for device to device secure communication in internet of things networks. Secur Priv 6(1):e267","journal-title":"Secur Priv"},{"issue":"6","key":"2039_CR6","doi-asserted-by":"publisher","first-page":"1373","DOI":"10.1007\/s10207-022-00619-1","volume":"21","author":"M Abdussami","year":"2022","unstructured":"Abdussami M, Amin R, Vollala S (2022) Lassi: A lightweight authenticated key agreement protocol for fog-enabled iot deployment. Int J Inf Secur 21(6):1373\u20131387","journal-title":"Int J Inf Secur"},{"key":"2039_CR7","doi-asserted-by":"publisher","first-page":"4737","DOI":"10.1007\/s11276-018-1759-3","volume":"25","author":"X Jia","year":"2019","unstructured":"Jia X, He D, Kumar N, Choo KKR (2019) Authenticated key agreement scheme for fog-driven iot healthcare system. Wirel Netw 25:4737\u20134750","journal-title":"Wirel Netw"},{"key":"2039_CR8","doi-asserted-by":"publisher","first-page":"223","DOI":"10.1016\/j.cose.2019.06.003","volume":"86","author":"P Gope","year":"2019","unstructured":"Gope P (2019) Laap: Lightweight anonymous authentication protocol for d2d-aided fog computing paradigm. Comput Secur 86:223\u2013237","journal-title":"Comput Secur"},{"key":"2039_CR9","first-page":"1","volume":"2021","author":"TY Wu","year":"2021","unstructured":"Wu TY, Wang T, Lee YQ, Zheng W, Kumari S, Kumar S (2021) Improved authenticated key agreement scheme for fog-driven iot healthcare system. Secur Commun Netw 2021:1\u201316","journal-title":"Secur Commun Netw"},{"key":"2039_CR10","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2022.108818","volume":"207","author":"Y Guo","year":"2022","unstructured":"Guo Y, Zhang Z, Guo Y (2022) Secfhome: Secure remote authentication in fog-enabled smart home environment. Comput Netw 207:108818","journal-title":"Comput Netw"},{"issue":"6","key":"2039_CR11","doi-asserted-by":"publisher","DOI":"10.1016\/j.asej.2022.101752","volume":"13","author":"M Hamada","year":"2022","unstructured":"Hamada M, Salem SA, Salem FM (2022) Lamas: Lightweight anonymous mutual authentication scheme for securing fog computing environments. Ain Shams Eng J 13(6):101752","journal-title":"Ain Shams Eng J"},{"key":"2039_CR12","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2022.108942","volume":"210","author":"SO Ogundoyin","year":"2022","unstructured":"Ogundoyin SO, Kamil IA (2022) Secure and privacy-preserving d2d communication in fog computing services. Comput Netw 210:108942","journal-title":"Comput Netw"},{"issue":"6","key":"2039_CR13","doi-asserted-by":"publisher","first-page":"1359","DOI":"10.1007\/s00607-022-01055-8","volume":"104","author":"U Chatterjee","year":"2022","unstructured":"Chatterjee U, Ray S, Khan MK, Dasgupta M, Chen CM (2022) An ecc-based lightweight remote user authentication and key management scheme for iot communication in context of fog computing. Comput 104(6):1359\u20131395","journal-title":"Comput"},{"key":"2039_CR14","doi-asserted-by":"publisher","DOI":"10.1016\/j.sysarc.2021.102370","volume":"123","author":"M Wazid","year":"2022","unstructured":"Wazid M, Das AK, Hussain R, Kumar N, Roy S (2022) Buaka-cs: Blockchain-enabled user authentication and key agreement scheme for crowdsourcing system. J Syst Arch 123:102370","journal-title":"J Syst Arch"},{"key":"2039_CR15","doi-asserted-by":"crossref","unstructured":"Vangala A, Roy S, Das AK (2022) Blockchain-based lightweight authentication protocol for iot-enabled smart agriculture. In 2022 international conference on cyber-physical social intelligence (ICCSI), IEEE, pp 110\u2013115","DOI":"10.1109\/ICCSI55536.2022.9970603"},{"key":"2039_CR16","doi-asserted-by":"publisher","first-page":"276","DOI":"10.1016\/j.future.2022.12.042","volume":"142","author":"NC Gowda","year":"2023","unstructured":"Gowda NC, Manvi SS, Malakreddy B, Lorenz P (2023) Bskm-fc: Blockchain-based secured key management in a fog computing environment. Futur Gen Comput Syst 142:276\u2013291","journal-title":"Futur Gen Comput Syst"},{"issue":"2","key":"2039_CR17","doi-asserted-by":"publisher","first-page":"629","DOI":"10.1007\/s12083-022-01425-1","volume":"16","author":"MA Akram","year":"2023","unstructured":"Akram MA, Mian AN, Kumari S (2023) Fog-based low latency and lightweight authentication protocol for vehicular communication. Peer-to-Peer Netw Appl 16(2):629\u2013643","journal-title":"Peer-to-Peer Netw Appl"},{"issue":"4","key":"2039_CR18","doi-asserted-by":"publisher","first-page":"1671","DOI":"10.1007\/s11276-022-03220-5","volume":"29","author":"PC Senthil Mahesh","year":"2023","unstructured":"Senthil Mahesh PC, Muthumanickam K (2023) Secure and novel authentication model for protecting data centers in fog environment. Wirel Netw 29(4):1671\u20131683","journal-title":"Wirel Netw"},{"issue":"3","key":"2039_CR19","doi-asserted-by":"publisher","first-page":"20","DOI":"10.54097\/fcis.v4i3.10737","volume":"4","author":"Y Huo","year":"2023","unstructured":"Huo Y, Kang B, Zuo X, Niu S, Li A (2023) Analysis and improvement of authentication schemes for industrial wireless sensor networks with fog computing. Front Comput Intell Syst 4(3):20\u201327","journal-title":"Front Comput Intell Syst"},{"issue":"3","key":"2039_CR20","doi-asserted-by":"publisher","DOI":"10.1002\/dac.5028","volume":"35","author":"SS Sahoo","year":"2022","unstructured":"Sahoo SS, Mohanty S, Majhi B (2022) An efficient three-factor user authentication scheme for industrial wireless sensor network with fog computing. Int J Commun Syst 35(3):e5028","journal-title":"Int J Commun Syst"},{"issue":"3","key":"2039_CR21","doi-asserted-by":"publisher","first-page":"1386","DOI":"10.1109\/TETC.2020.2978866","volume":"9","author":"C Wang","year":"2020","unstructured":"Wang C, Shen J, Lai JF, Liu J (2020) B-tsca: Blockchain assisted trustworthiness scalable computation for v2i authentication in vanets. IEEE Trans Emerg Top Comput 9(3):1386\u20131396","journal-title":"IEEE Trans Emerg Top Comput"},{"issue":"9","key":"2039_CR22","doi-asserted-by":"publisher","first-page":"6925","DOI":"10.1016\/j.jksuci.2021.07.023","volume":"34","author":"M Saqib","year":"2022","unstructured":"Saqib M, Jasra B, Moon AH (2022) A lightweight three factor authentication framework for iot based critical applications. J King Saud Univ-Comput Inf Sci 34(9):6925\u20136937","journal-title":"J King Saud Univ-Comput Inf Sci"},{"issue":"6","key":"2039_CR23","first-page":"3491","volume":"10","author":"SK Dwivedi","year":"2023","unstructured":"Dwivedi SK, Amin R, Vollala S, Khan MK (2023) B-has: Blockchain-assisted efficient handover authentication and secure communication protocol in vanets. IEEE Trans Netw Sci Eng 10(6):3491\u20133504","journal-title":"IEEE Trans Netw Sci Eng"},{"issue":"3","key":"2039_CR24","doi-asserted-by":"publisher","first-page":"1346","DOI":"10.1109\/TNSE.2022.3142287","volume":"9","author":"S Son","year":"2022","unstructured":"Son S, Lee J, Park Y, Park Y, Das AK (2022) Design of blockchain-based lightweight v2i handover authentication protocol for vanet. IEEE Trans Netw Sci Eng 9(3):1346\u20131358","journal-title":"IEEE Trans Netw Sci Eng"},{"key":"2039_CR25","doi-asserted-by":"crossref","unstructured":"Mahmood K, Ferzund J, Saleem MA, Shamshad S, Das AK, Park Y (2022) A provably secure mobile user authentication scheme for big data collection in iot-enabled maritime intelligent transportation system. IEEE Trans Intell Transp Syst 24(2):2411\u20132421","DOI":"10.1109\/TITS.2022.3177692"},{"issue":"2","key":"2039_CR26","doi-asserted-by":"publisher","first-page":"358","DOI":"10.1016\/j.dcan.2022.11.001","volume":"9","author":"C Patel","year":"2023","unstructured":"Patel C, Bashir AK, AlZubi AA, Jhaveri R (2023) Ebake-se: A novel ecc-based authenticated key exchange between industrial iot devices using secure element. Digit Commun Netw 9(2):358\u2013366","journal-title":"Digit Commun Netw"},{"key":"2039_CR27","doi-asserted-by":"crossref","unstructured":"Dwivedi SK, Abdussami M, Amin R, Khan MK (2023) D3apts: Design of ecc based authentication protocol and data storage for tactile internet enabled iod system with blockchain. IEEE Trans Consum Electron","DOI":"10.1109\/TCE.2023.3345893"},{"issue":"2","key":"2039_CR28","doi-asserted-by":"publisher","first-page":"198","DOI":"10.1109\/TIT.1983.1056650","volume":"29","author":"D Dolev","year":"1983","unstructured":"Dolev D, Yao A (1983) On the security of public key protocols. IEEE Trans Inf Theory 29(2):198\u2013208","journal-title":"IEEE Trans Inf Theory"},{"key":"2039_CR29","doi-asserted-by":"crossref","unstructured":"Das AK, Goswami A (2013) A secure and efficient uniqueness-and-anonymity-preserving remote user authentication scheme for connected health care. J Med Syst 37(3):1\u201316","DOI":"10.1007\/s10916-013-9948-1"},{"key":"2039_CR30","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2020.106719","volume":"86","author":"SK Dwivedi","year":"2020","unstructured":"Dwivedi SK, Amin R, Vollala S, Chaudhry R (2020) Blockchain-based secured event-information sharing protocol in internet of vehicles for smart cities. Comput Electr Eng 86:106719","journal-title":"Comput Electr Eng"},{"key":"2039_CR31","doi-asserted-by":"crossref","unstructured":"Shariq M, Conti M, Singh K, Dwivedi SK, Abdussami M, Amin R, Masud M (2024) Design of provably secure and lightweight authentication protocol for unmanned aerial vehicle systems. Comput Commun 107971","DOI":"10.1016\/j.comcom.2024.107971"},{"key":"2039_CR32","doi-asserted-by":"crossref","unstructured":"Dwivedi SK, Amin R, Vollala S (2023) Design of secured blockchain based decentralized authentication protocol for sensor networks with auditing and accountability. Comput Commun 197:124\u2013140","DOI":"10.1016\/j.comcom.2022.10.016"},{"key":"2039_CR33","doi-asserted-by":"crossref","unstructured":"Kumar CM, Dwivedi SK, Brindha M, Al-Shehari T, Alfakih T, Alsalman H, Amin R (2024) Repaca: Robust ecc based privacy-controlled mutual authentication and session key sharing protocol in coalmines application with provable security. Peer-to-Peer Netw Appl 1\u201322","DOI":"10.1007\/s12083-024-01806-8"},{"key":"2039_CR34","doi-asserted-by":"crossref","unstructured":"Abdussami M, Amin R, Saravanan P, Vollala S (2023) Bsapm: Blockchain based secured authentication protocol for large scale wsn with fpga implementation. Comput Commun","DOI":"10.1016\/j.comcom.2023.06.011"}],"container-title":["Peer-to-Peer Networking and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-025-02039-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s12083-025-02039-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-025-02039-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,27]],"date-time":"2025-09-27T15:22:40Z","timestamp":1758986560000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s12083-025-02039-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,6,19]]},"references-count":34,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2025,7]]}},"alternative-id":["2039"],"URL":"https:\/\/doi.org\/10.1007\/s12083-025-02039-z","relation":{},"ISSN":["1936-6442","1936-6450"],"issn-type":[{"type":"print","value":"1936-6442"},{"type":"electronic","value":"1936-6450"}],"subject":[],"published":{"date-parts":[[2025,6,19]]},"assertion":[{"value":"6 November 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"11 June 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"19 June 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"This work does not involve any studies conducted with human participants or animals by any of the authors.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical Statements"}},{"value":"All authors of this work declare that there is no conflict of interest.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflicts of Interest"}},{"value":"The authors declare no competing interests.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"218"}}