{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,5]],"date-time":"2025-11-05T06:58:57Z","timestamp":1762325937582,"version":"3.37.3"},"reference-count":30,"publisher":"Springer Science and Business Media LLC","issue":"9","license":[{"start":{"date-parts":[[2024,6,21]],"date-time":"2024-06-21T00:00:00Z","timestamp":1718928000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,6,21]],"date-time":"2024-06-21T00:00:00Z","timestamp":1718928000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Ambient Intell Human Comput"],"published-print":{"date-parts":[[2024,9]]},"DOI":"10.1007\/s12652-024-04810-1","type":"journal-article","created":{"date-parts":[[2024,6,21]],"date-time":"2024-06-21T13:01:55Z","timestamp":1718974915000},"page":"3331-3345","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Lightweight and privacy-preserving device-to-device authentication to enable secure transitive communication in IoT-based smart healthcare systems"],"prefix":"10.1007","volume":"15","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-6952-086X","authenticated-orcid":false,"given":"Sangjukta","family":"Das","sequence":"first","affiliation":[]},{"given":"Maheshwari Prasad","family":"Singh","sequence":"additional","affiliation":[]},{"given":"Suyel","family":"Namasudra","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,6,21]]},"reference":[{"key":"4810_CR1","first-page":"65","volume-title":"\u201cPassword-based authenticated key exchange in the three-party setting\u201d, in International Workshop on Public Key Cryptography","author":"M Abdalla","year":"2005","unstructured":"Abdalla M, Fouque PA, Pointcheval D (2005) \u201cPassword-based authenticated key exchange in the three-party setting\u201d, in International Workshop on Public Key Cryptography. Springer, Berlin, pp 65\u201384"},{"key":"4810_CR2","doi-asserted-by":"publisher","first-page":"2143","DOI":"10.1007\/s10586-021-03389-y","volume":"25","author":"HM Ali","year":"2022","unstructured":"Ali HM et al (2022) Planning a secure and reliable IoT-enabled FOG-assisted computing infrastructure for healthcare. Clust Comput 25:2143\u20132161","journal-title":"Clust Comput"},{"issue":"1","key":"4810_CR3","doi-asserted-by":"publisher","first-page":"243","DOI":"10.1007\/s11277-019-06252-x","volume":"107","author":"S Banerjee","year":"2019","unstructured":"Banerjee S, Chunka C, Sen S, Goswami RS (2019) An enhanced and secure biometric based user authentication scheme in wireless sensor networks using smart cards. Wireless Pers Commun 107(1):243\u2013270","journal-title":"Wireless Pers Commun"},{"issue":"1","key":"4810_CR4","doi-asserted-by":"publisher","first-page":"357","DOI":"10.1109\/TWC.2015.2473165","volume":"15","author":"C Chang","year":"2016","unstructured":"Chang C, Le H (2016) A provably secure, efficient, and flexible authentication scheme for ad hoc wireless sensor networks. IEEE Trans Wireless Commun 15(1):357\u2013366","journal-title":"IEEE Trans Wireless Commun"},{"issue":"3","key":"4810_CR5","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3425707","volume":"21","author":"SA Chaudhry","year":"2021","unstructured":"Chaudhry SA, Irshad A, Yahya K, Kumar N, Alazab M, Zikria YB (2021) Rotating behind privacy: an improved lightweight authentication scheme for cloud-based IoT environment. ACM Trans Internet Technol 21(3):1\u201319","journal-title":"ACM Trans Internet Technol"},{"issue":"3","key":"4810_CR6","doi-asserted-by":"publisher","first-page":"103","DOI":"10.47852\/bonviewJCCE149145205514","volume":"1","author":"Z Chen","year":"2022","unstructured":"Chen Z (2022) Research on internet security situation awareness prediction technology based on improved RBF neural network algorithm. J Comput Cognit Eng 1(3):103\u2013108","journal-title":"J Comput Cognit Eng"},{"key":"4810_CR7","doi-asserted-by":"publisher","DOI":"10.1002\/ett.4716","author":"S Das","year":"2023","unstructured":"Das S, Namasudra S (2023) Lightweight and efficient privacy-preserving mutual authentication scheme to secure Internet of Things-based smart healthcare. Trans Emerg Telecommun Technol. https:\/\/doi.org\/10.1002\/ett.4716","journal-title":"Trans Emerg Telecommun Technol"},{"key":"4810_CR8","doi-asserted-by":"publisher","first-page":"152","DOI":"10.1016\/j.adhoc.2015.05.014","volume":"36","author":"MS Farash","year":"2016","unstructured":"Farash MS, Turkanovi\u00b4c M, Kumari S, Holbl M (2016) An efficient user authentication and key agreement scheme for heterogeneous wireless sensor network tailored for the internet of things environment. Ad Hoc Networks 36:152\u2013176","journal-title":"Ad Hoc Networks"},{"issue":"1","key":"4810_CR30","doi-asserted-by":"publisher","first-page":"149","DOI":"10.1049\/cit2.12171","volume":"8","author":"VS Gaur","year":"2023","unstructured":"Gaur VS, Sharma V, McAllister J (2023) Abusive adversarial agents and attack strategies in cyber-physical systems. CAAI Trans Intell Technol 8(1):149\u2013165","journal-title":"CAAI Trans Intell Technol"},{"issue":"2","key":"4810_CR9","first-page":"267","volume":"7","author":"IA Gomaa","year":"2016","unstructured":"Gomaa IA, Elrahman EA, Abid M (2016) Virtual identity approaches evaluation for anonymous communication in cloud environments. Int J Adv Comput Sci Appl 7(2):267\u2013276","journal-title":"Int J Adv Comput Sci Appl"},{"issue":"11","key":"4810_CR10","doi-asserted-by":"publisher","first-page":"7124","DOI":"10.1109\/TIE.2016.2585081","volume":"63","author":"P Gope","year":"2016","unstructured":"Gope P, Hwang T (2016) A realistic lightweight anonymous authentication protocol for securing real-time application data access in wireless sensor networks. IEEE Trans Industr Electron 63(11):7124\u20137132","journal-title":"IEEE Trans Industr Electron"},{"key":"4810_CR11","doi-asserted-by":"publisher","DOI":"10.1049\/cit2.12093","author":"A Gutub","year":"2022","unstructured":"Gutub A (2022) Boosting image watermarking authenticity spreading secrecy from counting-based secret-sharing. CAAI Trans Intell Technol. https:\/\/doi.org\/10.1049\/cit2.12093","journal-title":"CAAI Trans Intell Technol"},{"issue":"2","key":"4810_CR12","doi-asserted-by":"publisher","first-page":"112","DOI":"10.37256\/ccds.4220232697","volume":"4","author":"YK Huang","year":"2023","unstructured":"Huang YK (2023) Design of a smart cabin lighting system based on internet of things. Cloud Comput Data Sci 4(2):112\u2013121","journal-title":"Cloud Comput Data Sci"},{"key":"4810_CR13","first-page":"1","volume":"58","author":"S Izza","year":"2021","unstructured":"Izza S, Benssalah M, Drouiche K (2021) An enhanced scalable and secure RFID authentication protocol for WBAN within an IoT environment. J Inform Secur Appl 58:1\u201315","journal-title":"J Inform Secur Appl"},{"issue":"8","key":"4810_CR14","doi-asserted-by":"publisher","first-page":"5829","DOI":"10.1109\/TII.2020.3043802","volume":"17","author":"MA Jan","year":"2021","unstructured":"Jan MA et al (2021) Lightweight mutual authentication and privacy-preservation scheme for intelligent wearable devices in industrial-CPS. IEEE Trans Industr Inf 17(8):5829\u20135839","journal-title":"IEEE Trans Industr Inf"},{"key":"4810_CR15","doi-asserted-by":"publisher","DOI":"10.1007\/s12083-017-0627-8","author":"AA Jolfaei","year":"2017","unstructured":"Jolfaei AA, Talouki MA, Aghili SF (2017) Lightweight and anonymous three-factor authentication and access control scheme for real-time applications in wireless sensor networks. Peer Peer Netw Appl. https:\/\/doi.org\/10.1007\/s12083-017-0627-8","journal-title":"Peer Peer Netw Appl"},{"issue":"2","key":"4810_CR16","first-page":"77","volume":"3","author":"S Khasim","year":"2022","unstructured":"Khasim S, Basha SS (2022) An improved fast and secure CAMEL based authenticated key in smart health care system. Cloud Comput Data Sci 3(2):77\u201391","journal-title":"Cloud Comput Data Sci"},{"key":"4810_CR17","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.adhoc.2022.103003","volume":"138","author":"R Krishnasrija","year":"2023","unstructured":"Krishnasrija R, Mandal AK, Cortesi A (2023) A lightweight mutual and transitive authentication mechanism for IoT network. Ad Hoc Networks 138:1\u201317","journal-title":"Ad Hoc Networks"},{"key":"4810_CR18","doi-asserted-by":"publisher","first-page":"21474","DOI":"10.1007\/s11227-023-05437-3","volume":"79","author":"EP Kumar","year":"2023","unstructured":"Kumar EP, Priyanka S (2023) A password less authentication protocol for multi-server environment using physical unclonable function. J Supercomput 79:21474\u201321506","journal-title":"J Supercomput"},{"key":"4810_CR19","doi-asserted-by":"publisher","first-page":"429","DOI":"10.1016\/j.comnet.2017.03.013","volume":"129","author":"X Li","year":"2017","unstructured":"Li X, Ibrahim MH, Kumari S, Sangaiah AK, Gupta V, Choo KKR (2017) Anonymous mutual authentication and key agreement scheme for wearable sensors in wireless body area networks. Comput Netw 129:429\u2013443","journal-title":"Comput Netw"},{"issue":"4","key":"4810_CR20","doi-asserted-by":"publisher","first-page":"2649","DOI":"10.1109\/JIOT.2021.3080461","volume":"9","author":"M Masud","year":"2022","unstructured":"Masud M, Gaba GS, Choudhary K, Hossain MS, Alhamid MF, Muhammad G (2022) Lightweight and anonymity-preserving user authentication scheme for IoT-based healthcare. IEEE Internet Things J 9(4):2649\u20132656","journal-title":"IEEE Internet Things J"},{"key":"4810_CR21","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2022.3179536","author":"SA Moqurrab","year":"2022","unstructured":"Moqurrab SA, Anjum A, Tariq N, Srivastava G (2022) Instant_Anonymity: a lightweight semantic privacy guarantee for 5g-enabled IIoT. IEEE Trans Industr Inf. https:\/\/doi.org\/10.1109\/TII.2022.3179536","journal-title":"IEEE Trans Industr Inf"},{"key":"4810_CR22","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2022.3186361","author":"S Namasudra","year":"2022","unstructured":"Namasudra S, Sharma P (2022) Achieving a decentralized and secure cab sharing system using blockchain technology. IEEE Trans Intell Transp Syst. https:\/\/doi.org\/10.1109\/TITS.2022.3186361","journal-title":"IEEE Trans Intell Transp Syst"},{"key":"4810_CR23","doi-asserted-by":"publisher","first-page":"132","DOI":"10.1016\/j.cose.2019.06.002","volume":"86","author":"M Shuai","year":"2019","unstructured":"Shuai M, Yu N, Wang H, Xiong L (2019) Anonymous authentication scheme for smart home environment with provable security. Comput Secur 86:132\u2013146","journal-title":"Comput Secur"},{"key":"4810_CR24","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.sysarc.2021.102108","volume":"117","author":"K Sowjanya","year":"2021","unstructured":"Sowjanya K, Dasgupta M, Ray S (2021) A lightweight key management scheme for key-escrow-free ECC-based CP-ABE for IoT healthcare systems. J Syst Architect 117:1\u201310","journal-title":"J Syst Architect"},{"key":"4810_CR25","doi-asserted-by":"publisher","first-page":"96","DOI":"10.1016\/j.adhoc.2014.03.009","volume":"20","author":"M Turkanovi\u0107","year":"2014","unstructured":"Turkanovi\u0107 M, Brumen B, H\u00f6lbl M (2014) A novel user authentication and key agreement scheme for heterogeneous ad hoc wireless sensor networks, based on the internet of things notion. Ad Hoc Netw 20:96\u2013112","journal-title":"Ad Hoc Netw"},{"issue":"2","key":"4810_CR26","doi-asserted-by":"publisher","first-page":"896","DOI":"10.1109\/TVT.2015.2402166","volume":"65","author":"F Wang","year":"2016","unstructured":"Wang F, Xu Y, Zhang H, Zhang Y, Zhu L (2016) 2FLIP: A two-factor lightweight privacy-preserving authentication scheme for VANET. IEEE Trans Veh Technol 65(2):896\u2013911","journal-title":"IEEE Trans Veh Technol"},{"key":"4810_CR27","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1155\/2022\/8288855","volume":"2022","author":"H Wang","year":"2022","unstructured":"Wang H, Meng J, Du X, Cao T, Xie Y (2022) Lightweight and anonymous mutual authentication protocol for edge iot nodes with physical unclonable function. Secur Commun Netw 2022:1\u201311","journal-title":"Secur Commun Netw"},{"key":"4810_CR28","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.jnca.2019.102496","volume":"150","author":"M Wazid","year":"2020","unstructured":"Wazid M, Das AK, Bhat V, Vasilakos AV (2020) LAM-CIoT: Lightweight authentication mechanism in cloud-based IoT environment. J Netw Comput Appl 150:1\u201316","journal-title":"J Netw Comput Appl"},{"key":"4810_CR29","doi-asserted-by":"publisher","first-page":"244","DOI":"10.1016\/j.future.2018.08.038","volume":"91","author":"L Zhou","year":"2019","unstructured":"Zhou L, Li X, Yeh KH, Su C, Chiu W (2019) Lightweight IoT-based authentication scheme in cloud computing circumstance. Future Gener Comput Syst 91:244\u2013251","journal-title":"Future Gener Comput Syst"}],"container-title":["Journal of Ambient Intelligence and Humanized Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12652-024-04810-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s12652-024-04810-1\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12652-024-04810-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,8,19]],"date-time":"2024-08-19T16:15:10Z","timestamp":1724084110000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s12652-024-04810-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,6,21]]},"references-count":30,"journal-issue":{"issue":"9","published-print":{"date-parts":[[2024,9]]}},"alternative-id":["4810"],"URL":"https:\/\/doi.org\/10.1007\/s12652-024-04810-1","relation":{},"ISSN":["1868-5137","1868-5145"],"issn-type":[{"type":"print","value":"1868-5137"},{"type":"electronic","value":"1868-5145"}],"subject":[],"published":{"date-parts":[[2024,6,21]]},"assertion":[{"value":"12 June 2023","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"30 April 2024","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"21 June 2024","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}