{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,11]],"date-time":"2025-11-11T15:46:50Z","timestamp":1762876010726},"reference-count":53,"publisher":"Springer Science and Business Media LLC","issue":"7","license":[{"start":{"date-parts":[[2018,7,16]],"date-time":"2018-07-16T00:00:00Z","timestamp":1531699200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Ambient Intell Human Comput"],"published-print":{"date-parts":[[2019,7]]},"DOI":"10.1007\/s12652-018-0937-6","type":"journal-article","created":{"date-parts":[[2018,7,16]],"date-time":"2018-07-16T01:17:57Z","timestamp":1531703877000},"page":"2607-2619","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":18,"title":["A lightweight hierarchical authentication scheme for internet of things"],"prefix":"10.1007","volume":"10","author":[{"given":"Aida","family":"Akbarzadeh","sequence":"first","affiliation":[]},{"given":"Majid","family":"Bayat","sequence":"additional","affiliation":[]},{"given":"Behnam","family":"Zahednejad","sequence":"additional","affiliation":[]},{"given":"Ali","family":"Payandeh","sequence":"additional","affiliation":[]},{"given":"Mohammad Reza","family":"Aref","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,7,16]]},"reference":[{"key":"937_CR1","doi-asserted-by":"crossref","unstructured":"Abomhara M, K\u00f8ien GM (2014) Security and privacy in the internet of things: Current status and open issues. In: Privacy and Security in Mobile Systems (PRISMS), 2014 International Conference on IEEE, pp 1\u20138","DOI":"10.1109\/PRISMS.2014.6970594"},{"key":"937_CR2","doi-asserted-by":"crossref","unstructured":"Axelrod CW (2015) Enforcing security, safety and privacy for the internet of things. In: Systems, Applications and Technology Conference (LISAT), 2015 IEEE Long Island, IEEE, pp 1\u20136","DOI":"10.1109\/LISAT.2015.7160214"},{"key":"937_CR3","doi-asserted-by":"crossref","unstructured":"Bohli JM, Skarmeta A, Moreno MV, Garc\u00eda D, Langend\u00f6rfer P (2015) Smartie project: Secure iot data management for smart cities. In: Recent Advances in Internet of Things (RIoT), 2015 International Conference on IEEE, pp 1\u20136","DOI":"10.1109\/RIOT.2015.7104906"},{"issue":"1871","key":"937_CR4","doi-asserted-by":"publisher","first-page":"233","DOI":"10.1098\/rspa.1989.0125","volume":"426","author":"M Burrows","year":"1989","unstructured":"Burrows M, Abadi M, Needham RM (1989) A logic of authentication. Proc R Soc Lond A 426(1871):233\u2013271","journal-title":"Proc R Soc Lond A"},{"issue":"6","key":"937_CR5","first-page":"147","volume":"9","author":"Z Cai","year":"2015","unstructured":"Cai Z, Feng Y, Zhang J, Gan Y, Zhang Q (2015) A chebyshev-map based one-way authentication and key agreement scheme for multi-server environment. Int J Secur Appl 9(6):147\u201356","journal-title":"Int J Secur Appl"},{"key":"937_CR6","doi-asserted-by":"crossref","unstructured":"Cavoukian A, Chibba M (2016) Cognitive cities, big data and citizen participation: The essentials of privacy and security. In: Towards Cognitive Cities, Springer, pp 61\u201382","DOI":"10.1007\/978-3-319-33798-2_4"},{"key":"937_CR7","unstructured":"Chatterjee S, Roy S, Das AK, Chattopadhyay S, Kumar N, Vasilakos AV (2016) Secure biometric-based authentication scheme using chebyshev chaotic map for multi-server environment. IEEE Transactions on Dependable and Secure Computing"},{"key":"937_CR8","unstructured":"Chung H (2013) Chaos based rfid authentication protocol. PhD thesis, Universit\u00e9 d\u2019Ottawa\/University of Ottawa"},{"issue":"1","key":"937_CR9","doi-asserted-by":"publisher","first-page":"94","DOI":"10.1016\/S1005-8885(14)60274-0","volume":"21","author":"G Cong","year":"2014","unstructured":"Cong G, Zj Zhang, Zhu Lh, Ya Tan, Zhen Y (2014) A novel secure group rfid authentication protocol. J China Univ Posts Telecommun 21(1):94\u2013103","journal-title":"J China Univ Posts Telecommun"},{"key":"937_CR10","unstructured":"Crossman MA, Liu H (2015) Study of authentication with iot testbed. In: Technologies for Homeland Security (HST), 2015 IEEE International Symposium on, IEEE, pp 1\u20137"},{"key":"937_CR11","doi-asserted-by":"crossref","unstructured":"Doukas C, Maglogiannis I (2012) Bringing iot and cloud computing towards pervasive healthcare. In: Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS), 2012 Sixth International Conference on, IEEE, pp 922\u2013926","DOI":"10.1109\/IMIS.2012.26"},{"key":"937_CR12","doi-asserted-by":"publisher","first-page":"115","DOI":"10.1016\/j.pmcj.2014.11.001","volume":"20","author":"I Erguler","year":"2015","unstructured":"Erguler I (2015) A potential weakness in rfid-based internet-of-things systems. Pervasive Mobile Comput 20:115\u2013126","journal-title":"Pervasive Mobile Comput"},{"key":"937_CR13","unstructured":"Flood P, Schukat M (2014) Peer to peer authentication for small embedded systems. In: Proceedings of 10th international conference on digital technology, pp 68\u201372"},{"key":"937_CR14","doi-asserted-by":"publisher","first-page":"271","DOI":"10.1016\/j.cose.2015.05.004","volume":"55","author":"P Gope","year":"2015","unstructured":"Gope P, Hwang T (2015) A realistic lightweight authentication protocol preserving strong anonymity for securing rfid system. Comput Secur 55:271\u2013280","journal-title":"Comput Secur"},{"key":"937_CR15","doi-asserted-by":"publisher","first-page":"393","DOI":"10.1016\/j.procs.2014.09.011","volume":"36","author":"PH Griffin","year":"2014","unstructured":"Griffin PH (2014) Telebiometric authentication objects. Procedia Comput Sci 36:393\u2013400","journal-title":"Procedia Comput Sci"},{"issue":"2","key":"937_CR16","doi-asserted-by":"publisher","first-page":"9919","DOI":"10.1007\/s10916-012-9919-y","volume":"37","author":"X Hao","year":"2013","unstructured":"Hao X, Wang J, Yang Q, Yan X, Li P (2013) A chaotic map-based authentication scheme for telecare medicine information systems. J Med Syst 37(2):9919. \n                    https:\/\/doi.org\/10.1007\/s10916-012-9919-y","journal-title":"J Med Syst"},{"key":"937_CR17","doi-asserted-by":"crossref","unstructured":"Huaxin S, Qi X, Xiaodong L, Baoyan L, Shusong M, Xuezhong Z (2012) Constructing ideas of health service platform for the elderly. In: e-Health Networking, Applications and Services (Healthcom), 2012 IEEE 14th International Conference on IEEE, pp 526\u2013529","DOI":"10.1109\/HealthCom.2012.6379478"},{"issue":"12","key":"937_CR18","first-page":"5572","volume":"10","author":"A Irshad","year":"2016","unstructured":"Irshad A, Ahmad HF, Alzahrani BA, Sher M, Chaudhry SA (2016) An efficient and anonymous chaotic map based authenticated key agreement for multi-server architecture. KSII Trans Internet Inf Syst (TIIS) 10(12):5572\u20135595","journal-title":"KSII Trans Internet Inf Syst (TIIS)"},{"key":"937_CR19","doi-asserted-by":"publisher","first-page":"678","DOI":"10.1109\/ACCESS.2015.2437951","volume":"3","author":"SR Islam","year":"2015","unstructured":"Islam SR, Kwak D, Kabir MH, Hossain M, Kwak KS (2015) The internet of things for health care: a comprehensive survey. IEEE Access 3:678\u2013708","journal-title":"IEEE Access"},{"issue":"2","key":"937_CR20","doi-asserted-by":"publisher","first-page":"12","DOI":"10.1007\/s10916-014-0012-6","volume":"38","author":"Q Jiang","year":"2014","unstructured":"Jiang Q, Ma J, Lu X, Tian Y (2014) Robust chaotic map-based authentication and key agreement scheme with strong anonymity for telecare medicine information systems. J Med Syst 38(2):12","journal-title":"J Med Syst"},{"issue":"8","key":"937_CR21","doi-asserted-by":"publisher","first-page":"2481","DOI":"10.1007\/s11276-014-0761-7","volume":"20","author":"Q Jing","year":"2014","unstructured":"Jing Q, Vasilakos AV, Wan J, Lu J, Qiu D (2014) Security of the internet of things: perspectives and challenges. Wireless Netw 20(8):2481\u20132501","journal-title":"Wireless Netw"},{"key":"937_CR22","doi-asserted-by":"publisher","first-page":"210","DOI":"10.1016\/j.pmcj.2015.08.001","volume":"24","author":"S Kalra","year":"2015","unstructured":"Kalra S, Sood SK (2015) Secure authentication scheme for iot and cloud servers. Pervasive Mob Comput 24:210\u2013223","journal-title":"Pervasive Mob Comput"},{"issue":"22","key":"937_CR23","first-page":"5968","volume":"9","author":"S Kamesh","year":"2014","unstructured":"Kamesh S, Priya S (2014) Security enhancement of authenticated rfid generation. Int J Appl Eng Res 9(22):5968\u20135974","journal-title":"Int J Appl Eng Res"},{"issue":"8","key":"937_CR24","doi-asserted-by":"publisher","first-page":"2710","DOI":"10.1016\/j.adhoc.2013.05.003","volume":"11","author":"T Kothmayr","year":"2013","unstructured":"Kothmayr T, Schmitt C, Hu W, Br\u00fcnig M, Carle G (2013) Dtls based security and two-way authentication for the internet of things. Ad Hoc Netw 11(8):2710\u20132723","journal-title":"Ad Hoc Netw"},{"key":"937_CR25","doi-asserted-by":"publisher","first-page":"63","DOI":"10.1016\/j.ins.2014.08.041","volume":"290","author":"TF Lee","year":"2015","unstructured":"Lee TF (2015a) Enhancing the security of password authenticated key agreement protocols based on chaotic maps. Inf Sci 290:63\u201371","journal-title":"Inf Sci"},{"key":"937_CR26","unstructured":"Lee TF (2015b) Provably secure anonymous single-sign-on authentication mechanisms using extended chebyshev chaotic maps for distributed computer networks. IEEE Systems Journal"},{"issue":"9","key":"937_CR27","doi-asserted-by":"publisher","first-page":"77","DOI":"10.1007\/s10916-014-0077-2","volume":"38","author":"CT Li","year":"2014","unstructured":"Li CT, Lee CC, Weng CY (2014) A secure chaotic maps and smart cards based password authentication and key agreement scheme with user anonymity for telecare medicine information systems. J Med Syst 38(9):77","journal-title":"J Med Syst"},{"issue":"11","key":"937_CR28","doi-asserted-by":"publisher","first-page":"233","DOI":"10.1007\/s10916-016-0586-2","volume":"40","author":"CT Li","year":"2016","unstructured":"Li CT, Lee CC, Weng CY, Chen SJ (2016) A secure dynamic identity and chaotic maps based user authentication and key agreement scheme for e-healthcare systems. J Med Syst 40(11):233","journal-title":"J Med Syst"},{"key":"937_CR29","doi-asserted-by":"publisher","first-page":"149","DOI":"10.1016\/j.future.2017.08.029","volume":"84","author":"X Li","year":"2018","unstructured":"Li X, Wu F, Khan MK, Xu L, Shen J, Jo M (2018) A secure chaotic map-based remote authentication scheme for telecare medicine information systems. Future Gener Comput Syst 84:149\u2013159","journal-title":"Future Gener Comput Syst"},{"issue":"2","key":"937_CR30","doi-asserted-by":"publisher","first-page":"549","DOI":"10.1007\/s11071-015-2506-2","volume":"84","author":"Y Liu","year":"2016","unstructured":"Liu Y, Xue K (2016) An improved secure and efficient password and chaos-based two-party key agreement protocol. Nonlinear Dyn 84(2):549\u2013557","journal-title":"Nonlinear Dyn"},{"issue":"10","key":"937_CR31","doi-asserted-by":"publisher","first-page":"120","DOI":"10.1007\/s10916-014-0120-3","volume":"38","author":"D Mishra","year":"2014","unstructured":"Mishra D, Srinivas J, Mukhopadhyay S (2014) A secure and efficient chaotic map-based authenticated key agreement scheme for telecare medicine information systems. J Med Syst 38(10):120","journal-title":"J Med Syst"},{"key":"937_CR32","doi-asserted-by":"crossref","unstructured":"Mohammad AAK, Mirza A, Vemuru S (2016) Cluster based mutual authenticated key agreement based on chaotic maps for mobile ad hoc networks. Indian Journal of Science and Technology 9(26):","DOI":"10.17485\/ijst\/2016\/v9i26\/95137"},{"key":"937_CR33","doi-asserted-by":"publisher","first-page":"198","DOI":"10.1016\/j.procs.2014.05.415","volume":"32","author":"SR Moosavi","year":"2014","unstructured":"Moosavi SR, Nigussie E, Virtanen S, Isoaho J (2014) An elliptic curve-based mutual authentication scheme for rfid implant systems. Procedia Comput Sci 32:198\u2013206","journal-title":"Procedia Comput Sci"},{"key":"937_CR34","doi-asserted-by":"publisher","DOI":"10.1201\/b14742","volume-title":"Unit and ubiquitous internet of things","author":"H Ning","year":"2016","unstructured":"Ning H (2016) Unit and ubiquitous internet of things. CRC Press, Boca Raton"},{"issue":"4","key":"937_CR35","doi-asserted-by":"publisher","first-page":"461","DOI":"10.1109\/LCOMM.2011.022411.110120","volume":"15","author":"H Ning","year":"2011","unstructured":"Ning H, Wang Z (2011) Future internet of things architecture: like mankind neural system or social organization framework? IEEE Commun Lett 15(4):461\u2013463","journal-title":"IEEE Commun Lett"},{"key":"937_CR36","first-page":"1","volume":"1","author":"H Ning","year":"2015","unstructured":"Ning H, Liu H, Yang L (2015) Aggregated-proof based hierarchical authentication scheme for the internet of things. IEEE Trans Parallel Distrib Syst 1:1\u20131","journal-title":"IEEE Trans Parallel Distrib Syst"},{"key":"937_CR37","doi-asserted-by":"crossref","unstructured":"P\u00f6hls HC, Angelakis V, Suppan S, Fischer K, Oikonomou G, Tragos EZ, Rodriguez RD, Mouroutis T (2014) Rerum: Building a reliable iot upon privacy-and security-enabled smart objects. In: Wireless Communications and Networking Conference Workshops (WCNCW), 2014 IEEE, IEEE, pp 122\u2013127","DOI":"10.1109\/WCNCW.2014.6934872"},{"issue":"10","key":"937_CR38","doi-asserted-by":"publisher","first-page":"2266","DOI":"10.1016\/j.comnet.2012.12.018","volume":"57","author":"R Roman","year":"2013","unstructured":"Roman R, Zhou J, Lopez J (2013) On the features and challenges of security and privacy in distributed internet of things. Comput Netw 57(10):2266\u20132279","journal-title":"Comput Netw"},{"key":"937_CR39","doi-asserted-by":"crossref","unstructured":"Sarvabhatla M, Vorugunti CS (2014) A secure biometric-based user authentication scheme for heterogeneous wsn. In: Emerging Applications of Information Technology (EAIT), 2014 Fourth International Conference of, IEEE, pp 367\u2013372","DOI":"10.1109\/EAIT.2014.23"},{"key":"937_CR40","doi-asserted-by":"crossref","unstructured":"Shivraj V, Rajan M, Singh M, Balamuralidhar P (2015) One time password authentication scheme based on elliptic curves for internet of things (iot). In: Information Technology: Towards New Smart World (NSITNSW), 2015 5th National Symposium on, IEEE, pp 1\u20136","DOI":"10.1109\/NSITNSW.2015.7176384"},{"key":"937_CR41","doi-asserted-by":"publisher","first-page":"146","DOI":"10.1016\/j.comnet.2014.11.008","volume":"76","author":"S Sicari","year":"2015","unstructured":"Sicari S, Rizzardi A, Grieco LA, Coen-Porisini A (2015) Security, privacy and trust in internet of things: the road ahead. Comput Netw 76:146\u2013164","journal-title":"Comput Netw"},{"key":"937_CR42","doi-asserted-by":"crossref","unstructured":"Song T, Li R, Mei B, Yu J, Xing X, Cheng X (2016) A privacy preserving communication protocol for iot applications in smart homes. In: Identification, Information and Knowledge in the Internet of Things (IIKI), 2016 International Conference on, IEEE, pp 519\u2013524","DOI":"10.1109\/IIKI.2016.3"},{"key":"937_CR43","doi-asserted-by":"crossref","unstructured":"Suciu G, Vulpe A, Halunga S, Fratu O, Todoran G, Suciu V (2013) Smart cities built on resilient cloud computing and secure internet of things. In: Control systems and computer science (CSCS), 2013 19th International Conference on, IEEE, pp 513\u2013518","DOI":"10.1109\/CSCS.2013.58"},{"issue":"1","key":"937_CR44","doi-asserted-by":"publisher","first-page":"101","DOI":"10.1007\/s12652-016-0345-8","volume":"8","author":"F Wu","year":"2017","unstructured":"Wu F, Xu L, Kumari S, Li X (2017) A privacy-preserving and provable user authentication scheme for wireless sensor networks based on internet of things security. J Ambient Intell Humaniz Comput 8(1):101\u2013116","journal-title":"J Ambient Intell Humaniz Comput"},{"key":"937_CR45","unstructured":"Wu ST, Chiu JH, Chieu BC (2005) Id-based remote authentication with smart cards on open distributed system from elliptic curve cryptography. In: Electro Information Technology, 2005 IEEE International Conference on, IEEE, p 5"},{"key":"937_CR46","doi-asserted-by":"publisher","first-page":"69","DOI":"10.1016\/S1005-8885(13)60218-6","volume":"20","author":"Jc YANG","year":"2013","unstructured":"YANG Jc, Hao P, X ZHANG (2013) Enhanced mutual authentication model of iot. J China Univ Posts Telecommun 20:69\u201374","journal-title":"J China Univ Posts Telecommun"},{"issue":"3","key":"937_CR47","doi-asserted-by":"publisher","first-page":"669","DOI":"10.1016\/j.chaos.2006.09.047","volume":"37","author":"L Zhang","year":"2008","unstructured":"Zhang L (2008) Cryptanalysis of the public key encryption based on multiple chaotic systems. Chaos, Solitons & Fractals 37(3):669\u2013674","journal-title":"Chaos, Solitons & Fractals"},{"issue":"2","key":"937_CR48","doi-asserted-by":"publisher","first-page":"465","DOI":"10.1109\/JBHI.2016.2517146","volume":"21","author":"L Zhang","year":"2017","unstructured":"Zhang L, Zhu S, Tang S (2017a) Privacy protection for telecare medicine information systems using a chaotic map-based three-factor authenticated key agreement scheme. IEEE J Biomed Health Inf 21(2):465\u2013475","journal-title":"IEEE J Biomed Health Inf"},{"issue":"2","key":"937_CR49","doi-asserted-by":"publisher","first-page":"465","DOI":"10.1109\/JBHI.2016.2517146","volume":"21","author":"L Zhang","year":"2017","unstructured":"Zhang L, Zhu S, Tang S (2017b) Privacy protection for telecare medicine information systems using a chaotic map-based three-factor authenticated key agreement scheme. IEEE J Biomed Health Inf 21(2):465\u2013475","journal-title":"IEEE J Biomed Health Inf"},{"issue":"7","key":"937_CR50","doi-asserted-by":"publisher","first-page":"1053","DOI":"10.1007\/s00779-015-0876-6","volume":"19","author":"Z Zhang","year":"2015","unstructured":"Zhang Z, Wang H, Gao Y (2015) C2mp: Chebyshev chaotic map-based authentication protocol for rfid applications. Personal Ubiquitous Comput 19(7):1053\u20131061","journal-title":"Personal Ubiquitous Comput"},{"issue":"3","key":"937_CR51","first-page":"221","volume":"3","author":"P Zhen","year":"2014","unstructured":"Zhen P, Zhao G, Min L, Li X (2014) Key agreement protocol based on extended chaotic maps with anonymous authentication. Chaotic Model Simul (CMSIM0) 3(3):221\u201331","journal-title":"Chaotic Model Simul (CMSIM0)"},{"key":"937_CR52","doi-asserted-by":"publisher","first-page":"711","DOI":"10.1109\/ACCESS.2017.2775038","volume":"6","author":"Q Zheng","year":"2018","unstructured":"Zheng Q, Wang X, Khan MK, Zhang W, Gupta B, Guo W (2018) A lightweight authenticated encryption scheme based on chaotic scml for railway cloud service. IEEE Access 6:711\u2013722","journal-title":"IEEE Access"},{"key":"937_CR53","doi-asserted-by":"publisher","DOI":"10.1201\/b13090","volume-title":"The internet of things in the cloud: a middleware perspective","author":"H Zhou","year":"2012","unstructured":"Zhou H (2012) The internet of things in the cloud: a middleware perspective. CRC Press, Boca Raton"}],"container-title":["Journal of Ambient Intelligence and Humanized Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s12652-018-0937-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s12652-018-0937-6\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s12652-018-0937-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,7,15]],"date-time":"2019-07-15T23:18:51Z","timestamp":1563232731000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s12652-018-0937-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,7,16]]},"references-count":53,"journal-issue":{"issue":"7","published-print":{"date-parts":[[2019,7]]}},"alternative-id":["937"],"URL":"https:\/\/doi.org\/10.1007\/s12652-018-0937-6","relation":{},"ISSN":["1868-5137","1868-5145"],"issn-type":[{"value":"1868-5137","type":"print"},{"value":"1868-5145","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,7,16]]},"assertion":[{"value":"12 February 2018","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"2 July 2018","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"16 July 2018","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}