{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,13]],"date-time":"2025-12-13T10:41:44Z","timestamp":1765622504816,"version":"3.48.0"},"reference-count":42,"publisher":"Springer Science and Business Media LLC","issue":"6","license":[{"start":{"date-parts":[[2025,10,1]],"date-time":"2025-10-01T00:00:00Z","timestamp":1759276800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,10,1]],"date-time":"2025-10-01T00:00:00Z","timestamp":1759276800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"DOI":"10.13039\/501100001410","name":"Human Resource Development Group","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100001410","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001843","name":"Science and Engineering Research Board","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100001843","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Peer-to-Peer Netw. Appl."],"published-print":{"date-parts":[[2025,10]]},"DOI":"10.1007\/s12083-025-02128-z","type":"journal-article","created":{"date-parts":[[2025,10,30]],"date-time":"2025-10-30T13:01:12Z","timestamp":1761829272000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Authentication protocol for RFID-enabled TMIS: An LCD code-based approach"],"prefix":"10.1007","volume":"18","author":[{"given":"Haradhan","family":"Ghosh","sequence":"first","affiliation":[]},{"given":"Pramod Kumar","family":"Maurya","sequence":"additional","affiliation":[]},{"given":"Satya","family":"Bagchi","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,10,30]]},"reference":[{"issue":"7","key":"2128_CR1","doi-asserted-by":"publisher","first-page":"205","DOI":"10.1016\/j.ipl.2013.01.003","volume":"113","author":"Z Ahmadian","year":"2013","unstructured":"Ahmadian Z, Salmasizadeh M, Aref MR (2013) Desynchronization attack on rapp ultralightweight authentication protocol. Inf Process Lett 113(7):205\u2013209","journal-title":"Inf Process Lett"},{"issue":"3","key":"2128_CR2","doi-asserted-by":"publisher","first-page":"816","DOI":"10.1007\/s12083-019-00830-3","volume":"13","author":"SF Aghili","year":"2020","unstructured":"Aghili SF, Mala H (2020) Tracking and impersonating tags in a crc-based ultralightweight rfid authentication protocol. Peer-to-Peer Netw Appl 13(3):816\u2013824","journal-title":"Peer-to-Peer Netw Appl"},{"issue":"1","key":"2128_CR3","doi-asserted-by":"publisher","first-page":"47","DOI":"10.1007\/s11277-020-07237-x","volume":"117","author":"BA Alzahrani","year":"2021","unstructured":"Alzahrani BA, Irshad A, Albeshri A, Alsubhi K (2021) A provably secure and lightweight patient-healthcare authentication protocol in wireless body area networks. Wirel Pers Commun 117(1):47\u201369","journal-title":"Wirel Pers Commun"},{"issue":"1871","key":"2128_CR4","first-page":"233","volume":"426","author":"M Burrows","year":"1989","unstructured":"Burrows M, Abadi M, Needham RM (1989) A logic of authentication. Proc R Soc London, A Math. Phys. Sci. 426(1871):233\u2013271","journal-title":"Proc R Soc London, A Math. Phys. Sci."},{"key":"2128_CR5","doi-asserted-by":"publisher","first-page":"425","DOI":"10.1016\/j.comcom.2022.05.002","volume":"191","author":"B Chander","year":"2022","unstructured":"Chander B, Gopalakrishnan K (2022) A secured and lightweight rfid-tag based authentication protocol with privacy-preserving in telecare medicine information system. Comput Commun 191:425\u2013437","journal-title":"Comput Commun"},{"key":"2128_CR6","doi-asserted-by":"publisher","first-page":"5503","DOI":"10.1007\/s11042-017-4464-9","volume":"77","author":"SA Chaudhry","year":"2018","unstructured":"Chaudhry SA, Naqvi H, Khan MK (2018) An enhanced lightweight anonymous biometric based authentication protocol for tmis. Multimed Tools Appl 77:5503\u20135524","journal-title":"Multimed Tools Appl"},{"key":"2128_CR7","doi-asserted-by":"publisher","first-page":"516","DOI":"10.1007\/s12083-021-01260-w","volume":"15","author":"Y Chen","year":"2022","unstructured":"Chen Y, Chen J (2022) An efficient and privacy-preserving mutual authentication with key agreement protocol for telecare medicine information system. Peer-to-Peer Netw Appl 15:516\u2013528","journal-title":"Peer-to-Peer Netw Appl"},{"issue":"3","key":"2128_CR8","doi-asserted-by":"publisher","first-page":"369","DOI":"10.1007\/s10916-009-9373-7","volume":"35","author":"HY Chien","year":"2011","unstructured":"Chien HY, Yang CC, Wu TC, Lee CF (2011) Two rfid-based solutions to enhance inpatient medication safety. J Med Syst 35(3):369\u2013375","journal-title":"J Med Syst"},{"key":"2128_CR9","doi-asserted-by":"crossref","unstructured":"David M, Prasad NR (2009) Providing strong security and high privacy in low-cost RFID networks. In: Schmidt AU, Lian S (eds) Security and privacy in mobile information and communication systems. MobiSec 2009. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 17. Springer, Berlin, Heidelberg","DOI":"10.1007\/978-3-642-04434-2_15"},{"issue":"8","key":"2128_CR10","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s10916-021-01750-7","volume":"45","author":"D Dharminder","year":"2021","unstructured":"Dharminder D, Kundu N, Mishra D (2021) Construction of a chaotic map-based authentication protocol for tmis. J Med Syst 45(8):1\u201310","journal-title":"J Med Syst"},{"key":"2128_CR11","doi-asserted-by":"publisher","first-page":"723","DOI":"10.1007\/s12083-017-0553-9","volume":"11","author":"K Fan","year":"2018","unstructured":"Fan K, Wang W, Jiang W, Li H, Yang Y (2018) Secure ultra-lightweight RFID mutual authentication protocol based on transparent computing for IoV. Peer-to-Peer Netw Appl 11:723\u2013734","journal-title":"Peer-to-Peer Netw Appl"},{"issue":"4","key":"2128_CR12","doi-asserted-by":"publisher","first-page":"1656","DOI":"10.1109\/TII.2018.2794996","volume":"14","author":"K Fan","year":"2018","unstructured":"Fan K, Jiang W, Li H, Yang Y (2018) Lightweight RFID protocol for medical privacy protection in IoT. IEEE Trans Industr Inform 14(4):1656\u20131665","journal-title":"IEEE Trans Industr Inform"},{"key":"2128_CR13","doi-asserted-by":"publisher","first-page":"10893","DOI":"10.1007\/s11227-021-04252-y","volume":"78","author":"M Gao","year":"2022","unstructured":"Gao M, Lu Y (2022) URAP: a new ultra-lightweight RFID authentication protocol in passive RFID system. J Supercomput 78:10893\u201310905","journal-title":"J Supercomput"},{"key":"2128_CR14","doi-asserted-by":"publisher","first-page":"629","DOI":"10.1016\/j.future.2017.06.023","volume":"83","author":"P Gope","year":"2018","unstructured":"Gope P, Amin R, Islam SH, Kumar N, Bhalla VK (2018) Lightweight and privacy-preserving RFID authentication scheme for distributed IoT infrastructure with secure localization services for smart city environment. Future Gener Comput Syst 83:629\u2013637","journal-title":"Future Gener Comput Syst"},{"key":"2128_CR15","doi-asserted-by":"publisher","first-page":"79","DOI":"10.1016\/j.comcom.2023.05.022","volume":"208","author":"H Ghosh","year":"2023","unstructured":"Ghosh H, Maurya PK, Bagchi S (2023) Linear complementary pair of codes based lightweight RFID protocol. Comput Commun 208:79\u201388","journal-title":"Comput Commun"},{"key":"2128_CR16","doi-asserted-by":"publisher","first-page":"110367","DOI":"10.1016\/j.compeleceng.2025.110367","volume":"124","author":"H Ghosh","year":"2025","unstructured":"Ghosh H, Maurya PK, Bagchi S, Dwivedi AD (2025) Lightweight RFID-enabled authentication protocol in post-quantum environment. Comput Electr Eng 124:110367","journal-title":"Comput Electr Eng"},{"issue":"6","key":"2128_CR17","doi-asserted-by":"publisher","first-page":"467","DOI":"10.1007\/s10916-008-9207-z","volume":"33","author":"HH Huang","year":"2009","unstructured":"Huang HH, Ku CY (2009) A RFID grouping proof protocol for medication safety of inpatient. J Med Syst 33(6):467\u2013474","journal-title":"J Med Syst"},{"key":"2128_CR18","doi-asserted-by":"publisher","first-page":"24","DOI":"10.1007\/s10916-015-0213-7","volume":"39","author":"C Jin","year":"2015","unstructured":"Jin C, Xu C, Zhang X, Zhao J (2015) A secure RFID mutual authentication protocol for healthcare environments using elliptic curve cryptography. J Med Syst 39:24","journal-title":"J Med Syst"},{"issue":"1","key":"2128_CR19","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/1609956.1609963","volume":"13","author":"A Juels","year":"2009","unstructured":"Juels A, Weis SA (2009) Defining strong privacy for RFID. ACM Trans Inf Syst Sec (TISSEC) 13(1):1\u201323","journal-title":"ACM Trans Inf Syst Sec (TISSEC)"},{"key":"2128_CR20","doi-asserted-by":"crossref","unstructured":"Khalid M, Mujahid U, Najam-ul-Islam M (2018) Cryptanalysis of ultralightweight mutual authentication protocol for radio frequency identification enabled internet of things networks. Int J Distrib Sens Netw 14(8)","DOI":"10.1177\/1550147718795120"},{"issue":"12","key":"2128_CR21","doi-asserted-by":"publisher","first-page":"5518","DOI":"10.3390\/s23125518","volume":"23","author":"MA Khan","year":"2023","unstructured":"Khan MA, Ullah S, Ahmad T, Jawad K, Buriro A (2023) Enhancing security and privacy in healthcare systems using a lightweight RFID protocol. Sensors 23(12):5518","journal-title":"Sensors"},{"key":"2128_CR22","doi-asserted-by":"publisher","first-page":"147","DOI":"10.1016\/j.comcom.2023.04.013","volume":"205","author":"A Kumar","year":"2023","unstructured":"Kumar A, Singh K, Shariq M, Lal C, Conti M, Amin R, Chaudhry SA (2023) An efficient and reliable ultralightweight RFID authentication scheme for healthcare systems. Comput Commun 205:147\u2013157","journal-title":"Comput Commun"},{"key":"2128_CR23","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511755279","volume-title":"Coding Theory","author":"S Ling","year":"2004","unstructured":"Ling S, Xing C (2004) Coding Theory, 1st edn. Cambridge University Press","edition":"1"},{"issue":"1","key":"2128_CR24","doi-asserted-by":"publisher","first-page":"967","DOI":"10.1007\/s11277-017-4546-z","volume":"97","author":"PK Maurya","year":"2017","unstructured":"Maurya PK, Pal J, Bagchi S (2017) A coding theory based ultralightweight RFID authentication protocol with CRC. Wirel Pers Commun 97(1):967\u2013976","journal-title":"Wirel Pers Commun"},{"key":"2128_CR25","doi-asserted-by":"publisher","first-page":"1005","DOI":"10.1007\/s11276-018-1850-9","volume":"26","author":"PK Maurya","year":"2020","unstructured":"Maurya PK, Bagchi S (2020) Cyclic group based mutual authentication protocol for RFID system. Wirel Netw 26:1005\u20131015","journal-title":"Wirel Netw"},{"issue":"11","key":"2128_CR26","doi-asserted-by":"publisher","first-page":"16533","DOI":"10.1007\/s11042-022-14170-7","volume":"82","author":"PK Maurya","year":"2023","unstructured":"Maurya PK, Bagchi S (2023) Quadratic residue-based unilateral authentication protocol for RFID system. Multimed Tools Appl 82(11):16533\u201316554","journal-title":"Multimed Tools Appl"},{"issue":"4","key":"2128_CR27","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s11277-015-2538-4","volume":"83","author":"O Mir","year":"2015","unstructured":"Mir O, Nikooghadam M (2015) A secure biometrics based authentication with key agreement scheme in telemedicine networks for e-health services. Wirel Pers Commun 83(4):1\u201323","journal-title":"Wirel Pers Commun"},{"key":"2128_CR28","doi-asserted-by":"publisher","first-page":"23335","DOI":"10.1007\/s11042-018-5683-4","volume":"77","author":"M Qi","year":"2018","unstructured":"Qi M, Chen J (2018) New robust biometrics-based mutual authentication scheme with key agreement using elliptic curve cryptography. Multimed Tools Appl 77:23335\u201323351","journal-title":"Multimed Tools Appl"},{"key":"2128_CR29","unstructured":"Safkhani M, Bagheri N (2016) Generalized desynchronization attack on UMAP: application to $$RCIA$$, $$KMAP$$, $$SLAP$$ and $$SASI^+$$ protocols. Cryptology ePrint Archive, Paper 2016\/905"},{"key":"2128_CR30","doi-asserted-by":"publisher","first-page":"382","DOI":"10.1016\/j.ins.2019.07.029","volume":"527","author":"FM Salem","year":"2020","unstructured":"Salem FM, Amin R (2020) A privacy-preserving RFID authentication protocol based on El-Gamal cryptosystem for secure TMIS. Inf Sci 527:382\u2013393","journal-title":"Inf Sci"},{"key":"2128_CR31","doi-asserted-by":"publisher","first-page":"8532","DOI":"10.1007\/s11227-020-03550-1","volume":"77","author":"M Shariq","year":"2021","unstructured":"Shariq M, Singh K (2021) A novel vector-space-based lightweight privacy-preserving RFID authentication protocol for IoT environment. J Supercomput 77:8532\u20138562","journal-title":"J Supercomput"},{"key":"2128_CR32","doi-asserted-by":"publisher","first-page":"8577","DOI":"10.1007\/s11227-021-04232-2","volume":"78","author":"M Shariq","year":"2022","unstructured":"Shariq M, Singh K, Maurya PK, Ahmadian A, Taniar D (2022) Anonsurp: an anonymous and secure ultralightweight RFID protocol for deployment in internet of vehicles systems. J Supercomput 78:8577\u20138602","journal-title":"J Supercomput"},{"key":"2128_CR33","doi-asserted-by":"publisher","first-page":"108427","DOI":"10.1016\/j.comnet.2021.108427","volume":"198","author":"M Shokouhifar","year":"2021","unstructured":"Shokouhifar M (2021) Swarm intelligence RFID network planning using multi-antenna readers for asset tracking in hospital environments. Comput Netw 198:108427","journal-title":"Comput Netw"},{"key":"2128_CR34","doi-asserted-by":"publisher","first-page":"153","DOI":"10.1007\/s10916-014-0153-7","volume":"39","author":"K Srivastava","year":"2015","unstructured":"Srivastava K, Awasthi AK, Kaul SD (2015) A hash based mutual RFID tag authentication protocol in telecare medicine information system. J Med Syst 39:153","journal-title":"J Med Syst"},{"issue":"4","key":"2128_CR35","doi-asserted-by":"publisher","first-page":"327","DOI":"10.1007\/s10916-008-9137-9","volume":"32","author":"PR Sun","year":"2008","unstructured":"Sun PR, Wang BH, Wu F (2008) A new method to guard inpatient medication safety by the implementation of RFID. J Med Syst 32(4):327\u2013332","journal-title":"J Med Syst"},{"key":"2128_CR36","doi-asserted-by":"publisher","first-page":"1085","DOI":"10.1007\/s11227-016-1849-x","volume":"73","author":"A Tewari","year":"2017","unstructured":"Tewari A, Gupta BB (2017) Cryptanalysis of a novel ultra-lightweight mutual authentication protocol for IoT devices using RFID tags. J Supercomput 73:1085\u20131102","journal-title":"J Supercomput"},{"issue":"5","key":"2128_CR37","doi-asserted-by":"publisher","first-page":"702","DOI":"10.1109\/LCOMM.2012.031212.120237","volume":"16","author":"Y Tian","year":"2012","unstructured":"Tian Y, Chen G, Li J (2012) A new ultralightweight RFID authentication protocol with permutation. IEEE Commun Lett 16(5):702\u2013705","journal-title":"IEEE Commun Lett"},{"key":"2128_CR38","doi-asserted-by":"publisher","first-page":"65","DOI":"10.1007\/s11227-017-2105-8","volume":"74","author":"K Wang","year":"2018","unstructured":"Wang K, Chen C, Fang W (2018) On the security of a new ultra-lightweight authentication protocol in IoT environment for RFID tags. J Supercomput 74:65\u201370","journal-title":"J Supercomput"},{"key":"2128_CR39","doi-asserted-by":"publisher","first-page":"121","DOI":"10.1016\/j.comcom.2022.01.014","volume":"186","author":"X Wang","year":"2022","unstructured":"Wang X, Fan K, Yang K, Cheng X, Dong Q, Li H, Yang Y (2022) A new RFID ultra-lightweight authentication protocol for medical privacy protection in smart living. Comput Commun 186:121\u2013132","journal-title":"Comput Commun"},{"issue":"3","key":"2128_CR40","doi-asserted-by":"publisher","first-page":"1529","DOI":"10.1007\/s10916-010-9614-9","volume":"36","author":"ZY Wu","year":"2012","unstructured":"Wu ZY, Lee YC, Lai F, Lee HC, Chung Y (2012) A secure authentication scheme for telecare medicine information systems. J Med Syst 36(3):1529\u20131535","journal-title":"J Med Syst"},{"issue":"3","key":"2128_CR41","doi-asserted-by":"publisher","first-page":"769","DOI":"10.1080\/09540091.2021.1889976","volume":"33","author":"L Xiao","year":"2021","unstructured":"Xiao L, Xie S, Han D, Liang W, Guo J, Chou WK (2021) A lightweight authentication scheme for telecare medical information system. Connect Sci 33(3):769\u2013785","journal-title":"Connect Sci"},{"key":"2128_CR42","doi-asserted-by":"publisher","first-page":"779","DOI":"10.1007\/s11277-017-4895-7","volume":"98","author":"X Zhuang","year":"2018","unstructured":"Zhuang X, Zhu Y, Chang C (2018) Security issues in ultralightweight RFID authentication protocols. Wirel Pers Commun 98:779\u2013814","journal-title":"Wirel Pers Commun"}],"container-title":["Peer-to-Peer Networking and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-025-02128-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s12083-025-02128-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-025-02128-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,12,13]],"date-time":"2025-12-13T10:37:28Z","timestamp":1765622248000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s12083-025-02128-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,10]]},"references-count":42,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2025,10]]}},"alternative-id":["2128"],"URL":"https:\/\/doi.org\/10.1007\/s12083-025-02128-z","relation":{},"ISSN":["1936-6442","1936-6450"],"issn-type":[{"type":"print","value":"1936-6442"},{"type":"electronic","value":"1936-6450"}],"subject":[],"published":{"date-parts":[[2025,10]]},"assertion":[{"value":"25 January 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"17 September 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"30 October 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"Not applicable.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical Approval"}},{"value":"Not applicable.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent for publication"}},{"value":"The authors declare no competing interests.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"317"}}