{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,13]],"date-time":"2025-12-13T10:41:38Z","timestamp":1765622498514,"version":"3.48.0"},"reference-count":28,"publisher":"Springer Science and Business Media LLC","issue":"6","license":[{"start":{"date-parts":[[2025,10,1]],"date-time":"2025-10-01T00:00:00Z","timestamp":1759276800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,10,1]],"date-time":"2025-10-01T00:00:00Z","timestamp":1759276800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Peer-to-Peer Netw. Appl."],"published-print":{"date-parts":[[2025,10]]},"DOI":"10.1007\/s12083-025-02129-y","type":"journal-article","created":{"date-parts":[[2025,10,8]],"date-time":"2025-10-08T09:08:17Z","timestamp":1759914497000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Lightweight Dual-Factor authentication protocol for secure WBAN communication"],"prefix":"10.1007","volume":"18","author":[{"given":"Jegadeesan","family":"Subramani","sequence":"first","affiliation":[]},{"given":"Azees","family":"Maria","sequence":"additional","affiliation":[]},{"given":"Arun Sekar","family":"Rajasekaran","sequence":"additional","affiliation":[]},{"given":"Y. Mary","family":"Reeja","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,10,8]]},"reference":[{"key":"2129_CR1","doi-asserted-by":"publisher","unstructured":"Yang X, Yi X, Nepal S, Khalil I, Huang X, Shen J Secure and lightweight authentication for Mobile-Edge Computing-Enabled WBANs. IEEE Internet Things J, 9, 14, pp. 12563\u201312572, 15 July 2022, https:\/\/doi.org\/10.1109\/JIOT.2021.3138989","DOI":"10.1109\/JIOT.2021.3138989"},{"key":"2129_CR2","doi-asserted-by":"publisher","unstructured":"Preethichandra DMG, Piyathilaka L, Izhar U, Samarasinghe R, Silva S (2023) Wireless Body Area Networks and Their Applications\u2014A Review, IEEE Access, vol. 11, pp. 9202\u20139220, Jan. https:\/\/doi.org\/10.1109\/ACCESS.2023.3239008","DOI":"10.1109\/ACCESS.2023.3239008"},{"key":"2129_CR3","doi-asserted-by":"publisher","unstructured":"Subramani J, Azees M, Sekar A, Al-Turjman F (2021) Lightweight privacy and confidentiality preserving anonymous authentication scheme for WBANs. IEEE Trans Industr Inf 1\u20131. https:\/\/doi.org\/10.1109\/TII.2021.3097759","DOI":"10.1109\/TII.2021.3097759"},{"issue":"11","key":"2129_CR4","doi-asserted-by":"publisher","first-page":"17666","DOI":"10.1109\/TITS.2024.3413321","volume":"25","author":"BK Meher","year":"2024","unstructured":"Meher BK, Amin R, Abdussami M, Sureshkumar V, Hossain MA (2024) Efficient certificateless anonymous mutual authentication in WBANs for smart healthcare. IEEE Trans Intell Transp Syst 25(11):17666\u201317675. https:\/\/doi.org\/10.1109\/TITS.2024.3413321","journal-title":"IEEE Trans Intell Transp Syst"},{"key":"2129_CR5","doi-asserted-by":"publisher","unstructured":"Soni M, Singh K (2023) New directions for security attacks, privacy, and malware detection in WBAN. Evol Intel. https:\/\/doi.org\/10.1007\/s12065-022-00759-2","DOI":"10.1007\/s12065-022-00759-2"},{"issue":"17","key":"2129_CR6","doi-asserted-by":"publisher","first-page":"20283","DOI":"10.1109\/JSEN.2023.3295381","volume":"23","author":"M Gupta","year":"2023","unstructured":"Gupta M, Kumar BS (2023) Lightweight secure session key protection, mutual authentication, and access control (LSSMAC) for WBAN-assisted IoT network. IEEE Sens J 23(17):20283\u201320293. https:\/\/doi.org\/10.1109\/JSEN.2023.3295381","journal-title":"IEEE Sens J"},{"key":"2129_CR7","doi-asserted-by":"publisher","first-page":"175385","DOI":"10.1109\/ACCESS.2020.3026630","volume":"8","author":"ZU Rehman","year":"2020","unstructured":"Rehman ZU, Altaf S, Iqbal S (2020) An efficient lightweight key agreement and authentication scheme for WBAN. IEEE Access 8:175385\u2013175397. https:\/\/doi.org\/10.1109\/ACCESS.2020.3026630","journal-title":"IEEE Access"},{"issue":"4","key":"2129_CR8","doi-asserted-by":"publisher","first-page":"2555","DOI":"10.1007\/s12083-024-01686-y","volume":"17","author":"S Marandi","year":"2024","unstructured":"Marandi S, Moazami F, Malekinezhad A (2024) A lightweight and anonymous mutual authentication and key agreement scheme for WBAN. Peer-to-Peer Netw Appl 17(4):2555\u20132571","journal-title":"Peer-to-Peer Netw Appl"},{"issue":"19","key":"2129_CR9","doi-asserted-by":"publisher","first-page":"19000","DOI":"10.1109\/JSEN.2022.3198645","volume":"22","author":"D Jiang","year":"2022","unstructured":"Jiang D, Zhang L, Wang T, Li X, Zeng K (2022) Dual-factor WBAN enhanced authentication system based on Iris and ECG descriptors. IEEE Sens J 22(19):19000\u201319009","journal-title":"IEEE Sens J"},{"issue":"5","key":"2129_CR10","doi-asserted-by":"publisher","first-page":"2728","DOI":"10.1109\/TSC.2021.3059856","volume":"15","author":"X Yang","year":"2022","unstructured":"Yang X, Yi X, Nepal S, Khalil I, Huang X, Shen J (2022) Efficient and anonymous authentication for healthcare service with cloud-based WBANs. IEEE Trans Serv Comput 15(5):2728\u20132741. https:\/\/doi.org\/10.1109\/TSC.2021.3059856","journal-title":"IEEE Trans Serv Comput"},{"key":"2129_CR11","doi-asserted-by":"publisher","first-page":"347","DOI":"10.1007\/s11235-020-00662-0","volume":"74","author":"G Mwitende","year":"2020","unstructured":"Mwitende G, Subramani T, Kumar S, Rajan R, Patel D (2020) Authenticated key agreement for blockchain-based WBAN. Telecommun Syst 74:347\u2013365","journal-title":"Telecommun Syst"},{"key":"2129_CR12","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2020.101838","volume":"96","author":"A Sammoud","year":"2020","unstructured":"Sammoud A, Ghourabi FS, Gharbi M, Bouallegue R (2020) A new biometrics-based key establishment protocol in WBAN: energy efficiency and security robustness analysis. Comput Secur 96:101838","journal-title":"Comput Secur"},{"issue":"5","key":"2129_CR13","doi-asserted-by":"publisher","DOI":"10.1002\/cpe.7934","volume":"36","author":"I Nagasundharamoorthi","year":"2024","unstructured":"Nagasundharamoorthi I, Venkatesan P, Velusamy P (2024) Hash message authentication codes for securing data in wireless body area networks. Concurrency Comput Pract Exper 36(5):e7934","journal-title":"Concurrency Comput Pract Exper"},{"key":"2129_CR14","doi-asserted-by":"publisher","DOI":"10.1016\/j.sysarc.2020.101883","volume":"113","author":"B Narwal","year":"2021","unstructured":"Narwal B, Mohapatra AK (2021) A survey on security and authentication in wireless body area networks. J Syst Archit 113:101883","journal-title":"J Syst Archit"},{"key":"2129_CR15","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2023.109598","volume":"224","author":"F Pirmoradian","year":"2023","unstructured":"Pirmoradian F, Safkhani M, Dakhilalian SM (2023) ECCPWS: an ECC-based protocol for WBAN systems. Comput Netw 224:109598","journal-title":"Comput Netw"},{"key":"2129_CR16","doi-asserted-by":"crossref","unstructured":"Ryu H, Kim H (2021) Privacy-preserving authentication protocol for wireless body area networks in healthcare applications. Healthcare, vol 9. MDPI, 9","DOI":"10.3390\/healthcare9091114"},{"key":"2129_CR17","doi-asserted-by":"publisher","DOI":"10.1016\/j.csa.2024.100062","volume":"3","author":"M Manickam","year":"2025","unstructured":"Manickam M, Devarajan GG (2025) An improved three-factor authentication protocol for wireless body area networks. Cyber Security and Applications 3:100062","journal-title":"Cyber Security and Applications"},{"key":"2129_CR18","doi-asserted-by":"publisher","first-page":"38287","DOI":"10.1109\/ACCESS.2024.3351844","volume":"12","author":"J Subramani","year":"2024","unstructured":"Subramani J, Anand S, Balaji K, Kumar VS (2024) Blockchain-enabled secure data collection scheme for fog-based WBAN. IEEE Access 12:38287\u201338297","journal-title":"IEEE Access"},{"issue":"5","key":"2129_CR19","doi-asserted-by":"publisher","first-page":"1080","DOI":"10.1016\/j.dcan.2022.04.009","volume":"9","author":"N Garg","year":"2023","unstructured":"Garg N, Jadon RS, Kumar A, Aggarwal S, Sharma D (2023) On the design of an AI-driven secure communication scheme for internet of medical things environment. Digit Commun Networks 9(5):1080\u20131089","journal-title":"Digit Commun Networks"},{"key":"2129_CR20","doi-asserted-by":"crossref","unstructured":"Sivasangari A, Kavitha M, Chandrasekar N, Arunkumar B (2021) Security and privacy in wireless body sensor networks using lightweight cryptography scheme. Security and privacy issues in IoT devices and sensor networks. Academic, pp 43\u201359","DOI":"10.1016\/B978-0-12-821255-4.00003-1"},{"key":"2129_CR21","doi-asserted-by":"publisher","DOI":"10.1016\/j.iot.2024.101200","volume":"26","author":"AN Bahache","year":"2024","unstructured":"Bahache AN, Chikouche N, Akleylek S (2024) Securing cloud-based healthcare applications with a quantum-resistant authentication and key agreement framework. Internet of Things 26:101200","journal-title":"Internet of Things"},{"key":"2129_CR22","doi-asserted-by":"publisher","first-page":"20","DOI":"10.1016\/j.comcom.2020.10.017","volume":"165","author":"F Ullah","year":"2021","unstructured":"Ullah F, Khan A, Tariq S, Ahmad N, Ali I (2021) An energy-efficient and reliable routing scheme to enhance the stability period in wireless body area networks. Comput Commun 165:20\u201332","journal-title":"Comput Commun"},{"key":"2129_CR23","doi-asserted-by":"crossref","unstructured":"Islam MM, Shamshuzzoha M (2025) Securing wireless body area networks data transmission with machine learning: A cross-tier framework for anomaly detection and intrusion prevention. Comput Struct Biotechnol Rep, vol. p. 100031","DOI":"10.1016\/j.csbr.2025.100031"},{"key":"2129_CR24","doi-asserted-by":"publisher","first-page":"195914","DOI":"10.1109\/ACCESS.2020.3034219","volume":"8","author":"Z Liu","year":"2020","unstructured":"Liu Z, Guo C, Wang B (2020) \u2018A physically secure, lightweight three- 1102 factor and anonymous user authentication protocol for iot\u2019. IEEE Access 8:195914\u20131959281103","journal-title":"IEEE Access"},{"key":"2129_CR25","doi-asserted-by":"crossref","unstructured":"Chen Y, Chen J (2021) \u2018\u2018An efficient mutual authentication and key agree- 1105 ment scheme without password for wireless sensor networks,\u2019\u2019 J. Super- 1106 Comput., vol. 77, no. 12, pp. 13653\u201313675, Dec","DOI":"10.1007\/s11227-021-03820-6"},{"key":"2129_CR26","doi-asserted-by":"crossref","unstructured":"Xia Y, Qi R, Ji S, Shen J, Miao T, Wang H (2022) \u2018\u2018PUF- 1108 assisted lightweight group authentication and key agreement protocol in 1109 smart home,\u2019\u2019 Wireless Commun. Mobile Comput., vol. pp. 1\u201315, 1110 Mar. 2022","DOI":"10.1155\/2022\/8865158"},{"key":"2129_CR27","doi-asserted-by":"publisher","unstructured":"Zou S, Cao Q, Wang C, Huang Z, Xu G (2022) \u2018\u2018A robust two1060 factor user authentication scheme-based ECC for smart home in 1061 IoT,\u2019\u2019 IEEE Syst. J., vol. 16, no. 3, pp. 4938\u20134949, Sep. doi: 1062 https:\/\/doi.org\/10.1109\/JSYST.2021.3127438","DOI":"10.1109\/JSYST.2021.3127438"},{"issue":"2","key":"2129_CR28","doi-asserted-by":"publisher","first-page":"815","DOI":"10.1109\/TGCN.2021.3126618","volume":"6","author":"S Jegadeesan","year":"2022","unstructured":"Jegadeesan S, Obaidat MS, Vijayakumar P, Azees M (2022) SEAT: secure and energy efficient anonymous authentication with trajectory privacy-preserving scheme for marine traffic management. IEEE Trans Green Commun Netw 6(2):815\u2013824. https:\/\/doi.org\/10.1109\/TGCN.2021.3126618","journal-title":"IEEE Trans Green Commun Netw"}],"container-title":["Peer-to-Peer Networking and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-025-02129-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s12083-025-02129-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-025-02129-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,12,13]],"date-time":"2025-12-13T10:37:15Z","timestamp":1765622235000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s12083-025-02129-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,10]]},"references-count":28,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2025,10]]}},"alternative-id":["2129"],"URL":"https:\/\/doi.org\/10.1007\/s12083-025-02129-y","relation":{},"ISSN":["1936-6442","1936-6450"],"issn-type":[{"type":"print","value":"1936-6442"},{"type":"electronic","value":"1936-6450"}],"subject":[],"published":{"date-parts":[[2025,10]]},"assertion":[{"value":"14 February 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"17 September 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"8 October 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"295"}}