{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,7]],"date-time":"2026-04-07T20:21:06Z","timestamp":1775593266433,"version":"3.50.1"},"reference-count":77,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2021,1,3]],"date-time":"2021-01-03T00:00:00Z","timestamp":1609632000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2021,1,3]],"date-time":"2021-01-03T00:00:00Z","timestamp":1609632000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Complex Intell. Syst."],"published-print":{"date-parts":[[2023,6]]},"abstract":"<jats:title>Abstract<\/jats:title><jats:p>Sustainable Computing has advanced the technological evolution of the Internet and information-based communication technology. It is nowadays emerging in the form of the Cloud of Medical Things (CoMT) to develop smart healthcare systems. The academic community has lately made great strides for the development of security for the CoMT based application systems, such as e-healthcare systems, industrial automation systems, military surveillance systems, and so on. To the architecture of CoMT based Smart Environment, Chebyshev Chaotic-Map based single-user sign-in (S-USI) is found as a significant security-control mechanism. To ensure the fidelity, the S-USI assigns a unary-token to the legal users to access the various services, provided by a service provider over an IP-enabled distributed networks. Numerous authentication mechanisms have been presented for the cloud-based distributed networks. However, most of the schemes are still persuasible to security threats, such as user-anonymity, privileged-insider, mutual authentication, and replay type of attacks. This paper applies a sensor\/sensor-tag based smart healthcare environment that uses S-USI to provide security and privacy. To strengthen the authentication process, a robust secure based S-USI mechanism and a well-formed coexistence protocol proof for pervasive services in the cloud are proposed. Using the formal security analysis, the prominence of the proposed strategies is proven to show the security efficiency of proposed S-USI. From the formal verification, the comparison results demonstrate that the proposed S-USI consumes less computation overhead; and thus it can be more suitable for the telecare medical information systems.<\/jats:p>","DOI":"10.1007\/s40747-020-00231-7","type":"journal-article","created":{"date-parts":[[2021,1,3]],"date-time":"2021-01-03T18:02:30Z","timestamp":1609696950000},"page":"2629-2649","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":29,"title":["Secure-user sign-in authentication for IoT-based eHealth systems"],"prefix":"10.1007","volume":"9","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-4008-6350","authenticated-orcid":false,"given":"B. D.","family":"Deebak","sequence":"first","affiliation":[]},{"given":"Fadi","family":"Al-Turjman","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,1,3]]},"reference":[{"key":"231_CR1","doi-asserted-by":"crossref","first-page":"449","DOI":"10.1016\/j.scs.2017.04.012","volume":"32","author":"SE Bibri","year":"2017","unstructured":"Bibri SE, Krogstie J (2017) ICT of the new wave of computing for sustainable urban forms: their big data and context-aware augmented typologies and design concepts. Sustain Cities Soc 32:449\u2013474","journal-title":"Sustain Cities Soc"},{"key":"231_CR2","doi-asserted-by":"crossref","first-page":"183","DOI":"10.1016\/j.scs.2017.02.016","volume":"31","author":"SE Bibri","year":"2017","unstructured":"Bibri SE, Krogstie J (2017) Smart sustainable cities of the future: an extensive interdisciplinary literature review. Sustain Cities Soc 31:183\u2013212","journal-title":"Sustain Cities Soc"},{"issue":"9","key":"231_CR3","doi-asserted-by":"crossref","first-page":"16","DOI":"10.1109\/MCOM.2017.1600514","volume":"55","author":"Y Mehmood","year":"2017","unstructured":"Mehmood Y, Ahmad F, Yaqoob I, Adnane A, Imran M, Guizani S (2017) Internet-of-things-based smart cities: recent advances and challenges. IEEE Commun Mag 55(9):16\u201324","journal-title":"IEEE Commun Mag"},{"key":"231_CR4","doi-asserted-by":"crossref","unstructured":"Salman O, Elhajj I, Kayssi A, Chehab A (2015) Edge computing enabling the Internet of Things. In: 2015 IEEE 2nd world forum on Internet of Things (WF-IoT). IEEE, pp 603\u2013608","DOI":"10.1109\/WF-IoT.2015.7389122"},{"key":"231_CR5","doi-asserted-by":"crossref","first-page":"135632","DOI":"10.1109\/ACCESS.2019.2941575","volume":"7","author":"BD Deebak","year":"2019","unstructured":"Deebak BD, Al-Turjman F, Aloqaily M, Alfandi O (2019) An authentic-based privacy preservation protocol for smart e-healthcare systems in IoT. IEEE Access 7:135632\u2013135649","journal-title":"IEEE Access"},{"key":"231_CR6","unstructured":"Fadi AT, David DB (2020) Seamless authentication: for IoT-big data technologies in smart industrial application systems. IEEE Trans Ind Informat"},{"issue":"1","key":"231_CR7","doi-asserted-by":"crossref","first-page":"241","DOI":"10.1007\/s11277-015-2736-0","volume":"85","author":"DB David","year":"2015","unstructured":"David DB, Rajappa M, Karupuswamy T, Iyer SP (2015) A dynamic-identity based multimedia server client authentication scheme for tele-care multimedia medical information system. Wirel Pers Commun 85(1):241\u2013261","journal-title":"Wirel Pers Commun"},{"issue":"8","key":"231_CR8","doi-asserted-by":"crossref","first-page":"10741","DOI":"10.1007\/s11042-016-3268-7","volume":"76","author":"DB David","year":"2017","unstructured":"David DB (2017) Mutual authentication scheme for multimedia medical information systems. Multimedia Tools Appl 76(8):10741\u201310759","journal-title":"Multimedia Tools Appl"},{"issue":"9","key":"231_CR9","doi-asserted-by":"crossref","first-page":"4957","DOI":"10.1109\/TII.2019.2895030","volume":"15","author":"P Gope","year":"2019","unstructured":"Gope P, Das AK, Kumar N, Cheng Y (2019) Lightweight and physically secure anonymous mutual authentication protocol for real-time data access in industrial wireless sensor networks. IEEE Trans Ind Inf 15(9):4957\u20134968","journal-title":"IEEE Trans Ind Inf"},{"key":"231_CR10","doi-asserted-by":"crossref","unstructured":"Mohammad Z, Abusukhon A, Qattam TA (2019) A survey of authenticated key agreement protocols for securing IoT. In: 2019 IEEE Jordan international joint conference on electrical engineering and information technology (JEEIT). IEEE, pp 425\u2013430","DOI":"10.1109\/JEEIT.2019.8717529"},{"key":"231_CR11","doi-asserted-by":"crossref","first-page":"185","DOI":"10.1016\/j.sysarc.2018.12.005","volume":"97","author":"M Wazid","year":"2019","unstructured":"Wazid M, Das AK, Hussain R, Succi G, Rodrigues JJ (2019) Authentication in cloud-driven IoT-based big data environment: survey and outlook. J Syst Arch 97:185\u2013196","journal-title":"J Syst Arch"},{"issue":"8","key":"231_CR12","doi-asserted-by":"crossref","first-page":"4737","DOI":"10.1007\/s11276-018-1759-3","volume":"25","author":"X Jia","year":"2019","unstructured":"Jia X, He D, Kumar N, Choo KKR (2019) Authenticated key agreement scheme for fog-driven IoT healthcare system. Wirel Netw 25(8):4737\u20134750","journal-title":"Wirel Netw"},{"key":"231_CR13","doi-asserted-by":"crossref","unstructured":"Kumari S, Renuka K (2019) Design of a password authentication and key agreement scheme to access e-healthcare services. Wirel Pers Commun:1\u201319","DOI":"10.1007\/s11277-019-06755-7"},{"issue":"1","key":"231_CR14","doi-asserted-by":"crossref","first-page":"10","DOI":"10.1007\/s10916-018-1120-5","volume":"43","author":"A Ostad-Sharif","year":"2019","unstructured":"Ostad-Sharif A, Abbasinezhad-Mood D, Nikooghadam M (2019) A robust and efficient ECC-based mutual authentication and session key generation scheme for healthcare applications. J Med Syst 43(1):10","journal-title":"J Med Syst"},{"key":"231_CR15","doi-asserted-by":"crossref","unstructured":"Deebak BD, Al-Turjman F, Aloqaily M, Alfandi O (2020) IoT-BSFCAN: a smart context-aware system in IoT-Cloud using mobile-fogging. Future Gen Comput Syst","DOI":"10.1016\/j.future.2020.03.050"},{"issue":"9","key":"231_CR16","doi-asserted-by":"crossref","first-page":"e4384","DOI":"10.1002\/dac.4384","volume":"33","author":"U Jain","year":"2020","unstructured":"Jain U, Hussain M, Kakarla J (2020) Simple, secure, and lightweight mechanism for mutual authentication of nodes in tiny wireless sensor networks. Int J Commun Syst 33(9):e4384","journal-title":"Int J Commun Syst"},{"key":"231_CR17","doi-asserted-by":"crossref","unstructured":"Wu F, Li X, Xu L, Vijayakumar P, Kumar N (2020) A novel three-factor authentication protocol for wireless sensor networks with IoT notion. IEEE Syst J","DOI":"10.1109\/JSYST.2020.2981049"},{"key":"231_CR18","doi-asserted-by":"crossref","unstructured":"Kumar D, Singh HK, Ahlawat C (2019) A secure three-factor authentication scheme for wireless sensor networks using ECC. J Discrete Math Sci Cryptogr:1\u201322","DOI":"10.1080\/09720529.2019.1627072"},{"key":"231_CR19","doi-asserted-by":"crossref","first-page":"85440","DOI":"10.1109\/ACCESS.2019.2923777","volume":"7","author":"Y Chen","year":"2019","unstructured":"Chen Y, Ge Y, Wang Y, Zeng Z (2019) An improved three-factor user authentication and key agreement scheme for wireless medical sensor networks. IEEE Access 7:85440\u201385451","journal-title":"IEEE Access"},{"issue":"1","key":"231_CR20","doi-asserted-by":"crossref","first-page":"128","DOI":"10.1016\/j.ijinfomgt.2017.07.007","volume":"38","author":"PK Senyo","year":"2018","unstructured":"Senyo PK, Addae E, Boateng R (2018) Cloud computing research: a review of research themes, frameworks, methods and future research directions. Int J Inf Manage 38(1):128\u2013139","journal-title":"Int J Inf Manage"},{"key":"231_CR21","doi-asserted-by":"crossref","unstructured":"Mell P, Grance T (2011) The NIST definition of cloud computing, special publication 800-145, Nat\u2019l Inst.\u00a0Standards and Technology","DOI":"10.6028\/NIST.SP.800-145"},{"key":"231_CR22","doi-asserted-by":"crossref","unstructured":"Senyo PK, Effah J, Addae E (2016) Preliminary insight into cloud computing adoption in a developing country. J Enterprise Inf Manag","DOI":"10.1108\/JEIM-09-2014-0094"},{"key":"231_CR23","doi-asserted-by":"crossref","first-page":"74","DOI":"10.1016\/j.future.2016.06.030","volume":"70","author":"M Smara","year":"2017","unstructured":"Smara M, Aliouat M, Pathan ASK, Aliouat Z (2017) Acceptance test for fault detection in component-based cloud computing and systems. Future Gen Comput Syst 70:74\u201393","journal-title":"Future Gen Comput Syst"},{"issue":"9","key":"231_CR24","doi-asserted-by":"crossref","first-page":"155","DOI":"10.1109\/CC.2017.8068773","volume":"14","author":"S Zhou","year":"2017","unstructured":"Zhou S, Wu L, Jin C (2017) A privacy-based SLA violation detection model for the security of cloud computing. China Commun 14(9):155\u2013165","journal-title":"China Commun"},{"issue":"1","key":"231_CR25","doi-asserted-by":"crossref","first-page":"127","DOI":"10.1109\/TCC.2015.2474403","volume":"6","author":"CH Chen","year":"2015","unstructured":"Chen CH, Lin JW, Kuo SY (2015) MapReduce scheduling for deadline-constrained jobs in heterogeneous cloud computing systems. IEEE Trans Cloud Comput 6(1):127\u2013140","journal-title":"IEEE Trans Cloud Comput"},{"key":"231_CR26","doi-asserted-by":"crossref","first-page":"24617","DOI":"10.1109\/ACCESS.2017.2766090","volume":"5","author":"F Al-Turjman","year":"2017","unstructured":"Al-Turjman F, Ever YK, Ever E, Nguyen HX, David DB (2017) Seamless key agreement framework for mobile-sink in IoT based cloud-centric secured public safety sensor networks. IEEE Access 5:24617\u201324631","journal-title":"IEEE Access"},{"key":"231_CR27","doi-asserted-by":"crossref","first-page":"36611","DOI":"10.1109\/ACCESS.2018.2853148","volume":"6","author":"MM Alam","year":"2018","unstructured":"Alam MM, Malik H, Khan MI, Pardy T, Kuusik A, Le Moullec Y (2018) A survey on the roles of communication technologies in IoT-based personalized healthcare applications. IEEE Access 6:36611\u201336631","journal-title":"IEEE Access"},{"issue":"5","key":"231_CR28","doi-asserted-by":"crossref","first-page":"1790","DOI":"10.1109\/JSEN.2017.2786301","volume":"18","author":"H Baali","year":"2017","unstructured":"Baali H, Djelouat H, Amira A, Bensaali F (2017) Empowering technology enabled care using IoT and smart devices: a review. IEEE Sens J 18(5):1790\u20131809","journal-title":"IEEE Sens J"},{"key":"231_CR29","doi-asserted-by":"crossref","unstructured":"Chaudhari DA, Umamaheswari E (2018) Survey on data management for healthcare using internet of things. In: 2018 Fourth international conference on computing communication control and automation (ICCUBEA). IEEE, pp 1\u20137","DOI":"10.1109\/ICCUBEA.2018.8697556"},{"key":"231_CR30","doi-asserted-by":"crossref","unstructured":"Suguna M, Ramalakshmi MG, Cynthia J, Prakash D (2018) A survey on cloud and Internet of Things based healthcare diagnosis. In: 2018 4th international conference on computing communication and automation (ICCCA). IEEE, pp 1\u20134","DOI":"10.1109\/CCAA.2018.8777606"},{"key":"231_CR31","doi-asserted-by":"crossref","unstructured":"Gandhi DA, Ghosal M (2018) Intelligent healthcare using IoT: a extensive survey. In: 2018 Second international conference on inventive communication and computational technologies (ICICCT). IEEE, pp 800\u2013802","DOI":"10.1109\/ICICCT.2018.8473026"},{"key":"231_CR32","doi-asserted-by":"crossref","unstructured":"Khan I, Amaro AC, Oliveira L (2019) IoT-based systems for improving older adults\u2019 wellbeing: a systematic review. In: 2019 14th Iberian conference on information systems and technologies (CISTI). IEEE, pp 1\u20136","DOI":"10.23919\/CISTI.2019.8760866"},{"key":"231_CR33","doi-asserted-by":"crossref","unstructured":"Darshan KR, Anandakumar KR (2015). A comprehensive review on usage of Internet of Things (IoT) in healthcare system. In: 2015 International conference on emerging research in electronics, computer science and technology (ICERECT). IEEE, pp 132\u2013136","DOI":"10.1109\/ERECT.2015.7499001"},{"key":"231_CR34","doi-asserted-by":"crossref","unstructured":"Deebak BD, Al-Turjman F (2020) Smart mutual authentication protocol for cloud based medical healthcare systems using internet of medical things.\u00a0IEEE J Select Areas Commun","DOI":"10.1109\/JSAC.2020.3020599"},{"key":"231_CR35","doi-asserted-by":"crossref","first-page":"102416","DOI":"10.1016\/j.scs.2020.102416","volume":"63","author":"BD Deebak","year":"2020","unstructured":"Deebak BD (2020) Lightweight authentication and key management in mobile-sink for smart IoT-assisted systems. Sustain Cities Soc 63:102416","journal-title":"Sustain Cities Soc"},{"key":"231_CR36","doi-asserted-by":"crossref","first-page":"106782","DOI":"10.1016\/j.compeleceng.2020.106782","volume":"87","author":"BD Deebak","year":"2020","unstructured":"Deebak BD, Al-Turjman F, Mostarda L (2020) Seamless secure anonymous authentication for cloud-based mobile edge computing. Comput Electr Eng 87:106782","journal-title":"Comput Electr Eng"},{"issue":"5","key":"231_CR37","doi-asserted-by":"crossref","first-page":"e3913","DOI":"10.1002\/dac.3913","volume":"32","author":"A Ostad-Sharif","year":"2019","unstructured":"Ostad-Sharif A, Abbasinezhad-Mood D, Nikooghadam M (2019) An enhanced anonymous and unlinkable user authentication and key agreement protocol for TMIS by utilization of ECC. Int J Commun Syst 32(5):e3913","journal-title":"Int J Commun Syst"},{"key":"231_CR38","doi-asserted-by":"crossref","first-page":"4069","DOI":"10.1016\/j.ins.2010.06.013","volume":"180","author":"X Guo","year":"2010","unstructured":"Guo X, Zhang J (2010) Secure group key agreement protocol based on chaotic hash. Inf Sci 180:4069\u20134074","journal-title":"Inf Sci"},{"key":"231_CR39","doi-asserted-by":"crossref","first-page":"1136","DOI":"10.1016\/j.ins.2006.07.026","volume":"177","author":"D Xiao","year":"2007","unstructured":"Xiao D, Liao X, Deng S (2007) A novel key agreement protocol based on chaotic maps. Inf Sci 177:1136\u20131142","journal-title":"Inf Sci"},{"key":"231_CR40","doi-asserted-by":"crossref","first-page":"2969","DOI":"10.1016\/j.cnsns.2011.11.025","volume":"17","author":"K Xue","year":"2012","unstructured":"Xue K, Hong P (2012) Security improvement on an anonymous key agreement protocol based on chaotic maps. Commun Nonlinear Sci Numer Simul 17:2969\u20132977","journal-title":"Commun Nonlinear Sci Numer Simul"},{"key":"231_CR41","doi-asserted-by":"crossref","first-page":"311","DOI":"10.1007\/s11071-012-0715-5","volume":"72","author":"Z Tan","year":"2013","unstructured":"Tan Z (2013) A chaotic maps-based authenticated key agreement protocol with strong anonymity. Nonlinear Dyn 72:311\u2013320","journal-title":"Nonlinear Dyn"},{"key":"231_CR42","doi-asserted-by":"crossref","first-page":"1433","DOI":"10.1016\/j.cnsns.2012.09.032","volume":"18","author":"C Guo","year":"2013","unstructured":"Guo C, Chang C-C (2013) Chaotic maps-based password-authenticated key agreement using smart cards. Commun Nonlinear Sci Numer Simul 18:1433\u20131440","journal-title":"Commun Nonlinear Sci Numer Simul"},{"key":"231_CR43","doi-asserted-by":"crossref","unstructured":"Hao X, Wang J, Yang Q, Yan X, Li P (2013) A chaotic map-based authentication scheme for telecare medicine information systems. J Med Syst 37","DOI":"10.1007\/s10916-012-9919-y"},{"key":"231_CR44","doi-asserted-by":"crossref","first-page":"12","DOI":"10.1007\/s10916-014-0012-6","volume":"38","author":"Q Jiang","year":"2014","unstructured":"Jiang Q, Ma J, Lu X, Tian Y (2014) Robust chaotic map-based authentication and key agreement scheme with strong anonymity for telecare medicine information systems. J Med Syst 38:12","journal-title":"J Med Syst"},{"key":"231_CR45","doi-asserted-by":"crossref","first-page":"9985","DOI":"10.1007\/s10916-013-9985-9","volume":"37","author":"T-F Lee","year":"2013","unstructured":"Lee T-F (2013) An efficient chaotic maps-based authentication and key agreement scheme using smartcards for telecare medicine information systems. J Med Syst 37:9985","journal-title":"J Med Syst"},{"key":"231_CR46","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/s10916-013-0001-1","volume":"38","author":"D Mishra","year":"2014","unstructured":"Mishra D, Srinivas J, Mukhopadhyay S (2014) A secure and efficient chaotic mapbased authenticated key agreement scheme for telecare medicine information systems. J Med Syst 38:1\u201310","journal-title":"J Med Syst"},{"key":"231_CR47","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/s10916-013-0001-1","volume":"38","author":"C-T Li","year":"2014","unstructured":"Li C-T, Lee C-C, Weng C-Y (2014) A secure chaotic maps and smart cards based password authentication and key agreement scheme with user anonymity for telecare medicine information systems. J Med Syst 38:1\u201311","journal-title":"J Med Syst"},{"key":"231_CR48","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/s10916-014-0182-2","volume":"39","author":"Z Wang","year":"2015","unstructured":"Wang Z, Huo Z, Shi W (2015) A dynamic identity based authentication scheme using chaotic maps for telecare medicine information systems. J Med Syst 39:1\u20138","journal-title":"J Med Syst"},{"key":"231_CR49","doi-asserted-by":"crossref","first-page":"1382","DOI":"10.1109\/TCSI.2005.851701","volume":"52","author":"P Bergamo","year":"2005","unstructured":"Bergamo P, D\u2019Arco P, De Santis A, Kocarev L (2005) Security of public-key cryptosystems based on chebyshev polynomials. IEEE Trans Circuits Syst I Regul Pap 52:1382\u20131393","journal-title":"IEEE Trans Circuits Syst I Regul Pap"},{"key":"231_CR50","doi-asserted-by":"crossref","first-page":"63","DOI":"10.1016\/j.ins.2014.08.041","volume":"290","author":"T-F Lee","year":"2015","unstructured":"Lee T-F (2015) Enhancing the security of password authenticated key agreement protocols based on chaotic maps. Inform Sci 290:63\u201371","journal-title":"Inform Sci"},{"key":"231_CR51","doi-asserted-by":"crossref","first-page":"1529","DOI":"10.1002\/dac.3126","volume":"29","author":"S Islam","year":"2016","unstructured":"Islam S, Obaidat MS, Amin R (2016) An anonymous and provably secure authentication scheme for mobile user. Int J Commun Syst 29:1529\u20131544","journal-title":"Int J Commun Syst"},{"key":"231_CR52","doi-asserted-by":"crossref","first-page":"1487","DOI":"10.1007\/s11277-014-1829-5","volume":"78","author":"H-Y Lin","year":"2014","unstructured":"Lin H-Y (2014) Chaotic map based mobile dynamic id authenticated key agreement scheme. Wirel Pers Commun 78:1487\u20131494","journal-title":"Wirel Pers Commun"},{"key":"231_CR53","doi-asserted-by":"crossref","first-page":"549","DOI":"10.1007\/s11071-015-2506-2","volume":"84","author":"Y Liu","year":"2016","unstructured":"Liu Y, Xue K (2016) An improved secure and efficient password and chaos-based two-party key agreement protocol. Nonlinear Dyn 84:549\u2013557","journal-title":"Nonlinear Dyn"},{"issue":"11","key":"231_CR54","doi-asserted-by":"crossref","first-page":"15255","DOI":"10.1007\/s11042-018-6884-6","volume":"78","author":"R Madhusudhan","year":"2019","unstructured":"Madhusudhan R, Nayak CS (2019) A robust authentication scheme for telecare medical information systems. Multimedia Tools Appl 78(11):15255\u201315273","journal-title":"Multimedia Tools Appl"},{"key":"231_CR55","unstructured":"Biswas A, Roy A (2019) A study on Dynamic ID based user authentication system using smart card. AJCT 5(2)"},{"issue":"1","key":"231_CR56","doi-asserted-by":"crossref","first-page":"62","DOI":"10.3390\/electronics9010062","volume":"9","author":"CL Chen","year":"2020","unstructured":"Chen CL, Deng YY, Weng W, Chen CH, Chiu YJ, Wu CM (2020) A traceable and privacy-preserving authentication for UAV communication control system. Electronics 9(1):62","journal-title":"Electronics"},{"key":"231_CR57","doi-asserted-by":"crossref","first-page":"109597","DOI":"10.1109\/ACCESS.2019.2933576","volume":"7","author":"H Yao","year":"2019","unstructured":"Yao H, Wang C, Fu X, Liu C, Wu B, Li F (2019) A privacy-preserving RLWE-based remote biometric authentication scheme for single and multi-server environments. IEEE Access 7:109597\u2013109611","journal-title":"IEEE Access"},{"issue":"2","key":"231_CR58","doi-asserted-by":"crossref","first-page":"133","DOI":"10.1007\/s40747-017-0040-1","volume":"3","author":"BK Sarkar","year":"2017","unstructured":"Sarkar BK (2017) Big data for secure healthcare system: a conceptual design. Complex Intell Syst 3(2):133\u2013151","journal-title":"Complex Intell Syst"},{"key":"231_CR59","unstructured":"Gomathi P, Baskar S, Shakeel PM Concurrent service access and management framework for user-centric future internet of things in smart cities"},{"key":"231_CR60","doi-asserted-by":"crossref","unstructured":"Mahmoud NM, Fouad H, Soliman AM (2020) Smart healthcare solutions using the internet of medical things for hand gesture recognition system. Complex Intell Syst:1\u201312","DOI":"10.1007\/s40747-020-00194-9"},{"key":"231_CR61","doi-asserted-by":"crossref","first-page":"244","DOI":"10.1016\/j.future.2018.08.038","volume":"91","author":"L Zhou","year":"2019","unstructured":"Zhou L, Li X, Yeh KH, Su C, Chiu W (2019) Lightweight IoT-based authentication scheme in cloud computing circumstance. Future Gen Comput Syst 91:244\u2013251","journal-title":"Future Gen Comput Syst"},{"issue":"3","key":"231_CR62","doi-asserted-by":"crossref","first-page":"e0213976","DOI":"10.1371\/journal.pone.0213976","volume":"14","author":"K Pak","year":"2019","unstructured":"Pak K, Pak S, Ho C, Pak M, Hwang C (2019) Anonymity preserving and round effective three-party authentication key exchange protocol based on chaotic maps. PloS One 14(3):e0213976","journal-title":"PloS One"},{"issue":"3","key":"231_CR63","doi-asserted-by":"crossref","first-page":"669","DOI":"10.1016\/j.chaos.2006.09.047","volume":"37","author":"L Zhang","year":"2008","unstructured":"Zhang L (2008) Cryptanalysis of the public key encryption based on multiple chaotic systems. Chaos Solitons Fract 37(3):669\u2013674","journal-title":"Chaos Solitons Fract"},{"issue":"11","key":"231_CR64","doi-asserted-by":"crossref","first-page":"13401","DOI":"10.1007\/s11042-016-3704-8","volume":"76","author":"M Nikooghadam","year":"2017","unstructured":"Nikooghadam M, Jahantigh R, Arshad H (2017) A lightweight authentication and key agreement protocol preserving user anonymity. Multimedia Tools Appl 76(11):13401\u201313423","journal-title":"Multimedia Tools Appl"},{"issue":"6","key":"231_CR65","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/s10916-015-0244-0","volume":"39","author":"SA Chaudhry","year":"2015","unstructured":"Chaudhry SA, Naqvi H, Shon T, Sher M, Farash MS (2015) Cryptanalysis and improvement of an improved two factor authentication protocol for telecare medicine information systems. J Med Syst 39(6):1\u201311","journal-title":"J Med Syst"},{"issue":"8","key":"231_CR66","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/s10916-015-0259-6","volume":"39","author":"H Arshad","year":"2015","unstructured":"Arshad H, Teymoori V, Nikooghadam M, Abbassi H (2015) On the security of a two-factor authentication and key agreement scheme for telecare medicine information systems. J Med Syst 39(8):1\u201310","journal-title":"J Med Syst"},{"issue":"3","key":"231_CR67","first-page":"1","volume":"39","author":"Y Lu","year":"2015","unstructured":"Lu Y, Li L, Peng H, Yang Y (2015) An enhanced biometric-based authentication scheme for telecare medicine information systems using elliptic curve cryptosystem. J Med Syst 39(3):1\u20138","journal-title":"J Med Syst"},{"key":"231_CR68","doi-asserted-by":"crossref","first-page":"3527","DOI":"10.1002\/sec.1558","volume":"9","author":"F Wu","year":"2016","unstructured":"Wu F, Xu L, Kumari S, Li X, Das AK, Khan MK, Karuppiah M, Baliyan R (2016) A novel and provably secure authentication and key agreement scheme with user anonymity for global mobility networks. Secur Commun Netw 9:3527\u20133542","journal-title":"Secur Commun Netw"},{"issue":"8","key":"231_CR69","first-page":"1","volume":"39","author":"R Amin","year":"2015","unstructured":"Amin R, Biswas GP (2015) A secure three-factor user authentication and key agreement protocol for TMIS with user anonymity. J Med Syst 39(8):1\u201319","journal-title":"J Med Syst"},{"key":"231_CR70","doi-asserted-by":"crossref","unstructured":"Abdalla M, Fouque PA, Pointcheval D (2005) Password-based authenticated key exchange in the three-party setting. In: Proc. of public key cryptography\u2014PKC 2005, lecture notes in computer science 3386, pp 65\u201384","DOI":"10.1007\/978-3-540-30580-4_6"},{"key":"231_CR71","doi-asserted-by":"crossref","first-page":"191","DOI":"10.1007\/978-3-540-30574-3_14","volume":"3376","author":"M Abdalla","year":"2005","unstructured":"Abdalla M, Pointcheval D (2005) Simple password-based authenticated key protocols, topics in cryptology\u2014CT-RSA. Lect Notes Comput Sci 3376:191\u2013208","journal-title":"Lect Notes Comput Sci"},{"key":"231_CR72","doi-asserted-by":"crossref","first-page":"201","DOI":"10.1007\/s11071-012-0652-3","volume":"71","author":"CC Lee","year":"2013","unstructured":"Lee CC, Hsu CW (2013) A secure biometric-based remote user authentication with key agreement scheme using extended chaotic maps. Nonlinear Dyn 71:201\u2013211","journal-title":"Nonlinear Dyn"},{"issue":"2","key":"231_CR73","doi-asserted-by":"crossref","first-page":"765","DOI":"10.1007\/s13369-016-2341-x","volume":"42","author":"P Chandrakar","year":"2016","unstructured":"Chandrakar P, Om H (2016) Cryptanalysis and extended three-factor remote user authentication scheme in multi-server environment. Arab J Sci Eng 42(2):765\u2013786","journal-title":"Arab J Sci Eng"},{"key":"231_CR74","doi-asserted-by":"crossref","unstructured":"Bellare M, Pointcheval D, Rogaway P (2000) Authenticated key exchange secure against dictionary attacks. In: Proc. of Advances in Cryptology\u2014Eurocrypt 2000, lecture notes in computer science 1807, pp 139\u2013155","DOI":"10.1007\/3-540-45539-6_11"},{"key":"231_CR75","doi-asserted-by":"crossref","unstructured":"Chandrakar P, Om H (2018) An extended ECC-based anonymity-preserving 3-factor remote authentication scheme usable in TMIS. Int J Commun Syst:e3540","DOI":"10.1002\/dac.3540"},{"issue":"1","key":"231_CR76","doi-asserted-by":"crossref","first-page":"18","DOI":"10.1145\/77648.77649","volume":"8","author":"M Burrows","year":"1990","unstructured":"Burrows M, Abadi M, Needham R (1990) A logic of authentication. ACM Trans Comput Syst 8(1):18\u201336","journal-title":"ACM Trans Comput Syst"},{"key":"231_CR77","doi-asserted-by":"crossref","DOI":"10.1017\/CBO9780511815102","volume-title":"Security and cooperation in wireless networks: thwarting malicious and selfish behavior in the age of ubiquitous computing","author":"L Buttyan","year":"2007","unstructured":"Buttyan L, Hubaux JP (2007) Security and cooperation in wireless networks: thwarting malicious and selfish behavior in the age of ubiquitous computing. Cambridge University Press, Cambridge"}],"container-title":["Complex &amp; Intelligent Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s40747-020-00231-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s40747-020-00231-7\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s40747-020-00231-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,6,9]],"date-time":"2023-06-09T17:25:09Z","timestamp":1686331509000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s40747-020-00231-7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,1,3]]},"references-count":77,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2023,6]]}},"alternative-id":["231"],"URL":"https:\/\/doi.org\/10.1007\/s40747-020-00231-7","relation":{},"ISSN":["2199-4536","2198-6053"],"issn-type":[{"value":"2199-4536","type":"print"},{"value":"2198-6053","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,1,3]]},"assertion":[{"value":"4 August 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"3 November 2020","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"3 January 2021","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Compliance with ethical standards"}},{"value":"We declare that we do not have any commercial or associative interest that represents a conflict of interest in connection with the work submitted.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}