{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,7]],"date-time":"2026-04-07T02:45:14Z","timestamp":1775529914075,"version":"3.50.1"},"reference-count":17,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2019,4,5]],"date-time":"2019-04-05T00:00:00Z","timestamp":1554422400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Reliable Intell Environ"],"published-print":{"date-parts":[[2020,3]]},"DOI":"10.1007\/s40860-019-00079-w","type":"journal-article","created":{"date-parts":[[2019,4,5]],"date-time":"2019-04-05T16:56:21Z","timestamp":1554483381000},"page":"3-13","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":39,"title":["End to end light weight mutual authentication scheme in IoT-based healthcare environment"],"prefix":"10.1007","volume":"6","author":[{"given":"S D","family":"Suganthi","sequence":"first","affiliation":[]},{"given":"R.","family":"Anitha","sequence":"additional","affiliation":[]},{"given":"V.","family":"Sureshkumar","sequence":"additional","affiliation":[]},{"given":"S.","family":"Harish","sequence":"additional","affiliation":[]},{"given":"S.","family":"Agalya","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,4,5]]},"reference":[{"key":"79_CR1","doi-asserted-by":"publisher","first-page":"37","DOI":"10.1016\/j.jnca.2016.10.001","volume":"76","author":"Q Jiang","year":"2016","unstructured":"Jiang Q, Ma J, Wei F, Tian Y, Shen J, Yang Y (2016) An untraceable temporal-credential-based two-factor authentication scheme using ECC for wireless sensor networks. J Netw Comput Appl 76:37","journal-title":"J Netw Comput Appl"},{"key":"79_CR2","doi-asserted-by":"publisher","first-page":"387","DOI":"10.1007\/978-3-642-14452-3_18","volume-title":"Towards hardware-intrinsic security","author":"J Guajardo","year":"2010","unstructured":"Guajardo J, Asim M, Petkovi\u0107 M (2010) Towards hardware-intrinsic security. Springer, Berlin, pp 387\u2013407"},{"issue":"2","key":"79_CR3","doi-asserted-by":"publisher","first-page":"1625","DOI":"10.3390\/s120201625","volume":"12","author":"P Kumar","year":"2012","unstructured":"Kumar P, Lee SG, Lee HJ (2012) E-SAP: efficient-strong authentication protocol for healthcare applications using wireless medical sensor networks. Sensors 12(2):1625","journal-title":"Sensors"},{"issue":"3","key":"79_CR4","doi-asserted-by":"publisher","first-page":"1989","DOI":"10.1007\/s10916-011-9658-5","volume":"36","author":"H Debiao","year":"2012","unstructured":"Debiao H, Jianhua C, Rui Z (2012) A more secure authentication scheme for telecare medicine information systems. J Med Syst 36(3):1989. \nhttps:\/\/doi.org\/10.1007\/s10916-011-9658-5","journal-title":"J Med Syst"},{"issue":"3","key":"79_CR5","doi-asserted-by":"publisher","first-page":"1529","DOI":"10.1007\/s10916-010-9614-9","volume":"36","author":"ZY Wu","year":"2012","unstructured":"Wu ZY, Lee YC, Lai F, Lee HC, Chung Y (2012) A secure authentication scheme for telecare medicine information systems. J Med Syst 36(3):1529. \nhttps:\/\/doi.org\/10.1007\/s10916-010-9614-9","journal-title":"J Med Syst"},{"issue":"12","key":"79_CR6","doi-asserted-by":"publisher","first-page":"268","DOI":"10.1007\/s10916-016-0629-8","volume":"40","author":"X Li","year":"2016","unstructured":"Li X, Niu J, Karuppiah M, Kumari S, Wu F (2016) Secure and efficient two-factor user authentication scheme with user anonymity for network based E-health care applications. J Med Syst 40(12):268","journal-title":"J Med Syst"},{"issue":"13","key":"79_CR7","doi-asserted-by":"publisher","first-page":"2070","DOI":"10.1002\/sec.1464","volume":"9","author":"AK Das","year":"2016","unstructured":"Das AK, Sutrala AK, Kumari S, Odelu V, Wazid M, Li X (2016) An efficient multi-gateway-based three-factor user authentication and key agreement scheme in hierarchical wireless sensor networks. Secur Commun Netw 9(13):2070. \nhttps:\/\/doi.org\/10.1002\/sec.1464\n\n Sec. 1464","journal-title":"Secur Commun Netw"},{"issue":"11","key":"79_CR8","doi-asserted-by":"publisher","first-page":"137","DOI":"10.1007\/s10916-015-0307-2","volume":"39","author":"R Amin","year":"2015","unstructured":"Amin R, Islam SH, Biswas G, Khan MK, Obaidat MS (2015) Design and analysis of an enhanced patient-server mutual authentication protocol for telecare medical information system. J Med Syst 39(11):137","journal-title":"J Med Syst"},{"key":"79_CR9","doi-asserted-by":"publisher","unstructured":"Amin R, Islam SH, Biswas G, Khan MK, Kumar N (2016) A robust and anonymous patient monitoring system using wireless medical sensor networks. Future Gener Comput Syst. \nhttps:\/\/doi.org\/10.1016\/j.future.2016.05.032","DOI":"10.1016\/j.future.2016.05.032"},{"key":"79_CR10","doi-asserted-by":"publisher","unstructured":"Li X, Peng J, Kumari S, Wu F, Karuppiah M, Choo KKR (2017) An enhanced 1-round authentication protocol for wireless body area networks with user anonymity. Comput Electr Eng. \nhttps:\/\/doi.org\/10.1016\/j.compeleceng.2017.02.011","DOI":"10.1016\/j.compeleceng.2017.02.011"},{"issue":"2","key":"79_CR11","doi-asserted-by":"publisher","first-page":"465","DOI":"10.1109\/JBHI.2016.2517146","volume":"21","author":"L Zhang","year":"2017","unstructured":"Zhang L, Zhu S, Tang S (2017) Privacy protection for telecare medicine information systems using a chaotic map-based three-factor authenticated key agreement scheme. IEEE J Biomed Health Inform 21(2):465","journal-title":"IEEE J Biomed Health Inform"},{"issue":"5","key":"79_CR12","doi-asserted-by":"publisher","first-page":"1368","DOI":"10.1109\/JSEN.2015.2502401","volume":"16","author":"P Gope","year":"2016","unstructured":"Gope P, Hwang T (2016) BSN-care: a secure IoT-based modern healthcare system using body sensor network. IEEE Sens J 16(5):1368","journal-title":"IEEE Sens J"},{"key":"79_CR13","unstructured":"Chang CC, Lee J.S, Lo YY, Liu Y (2017) In: Advances in intelligent information hiding and multimedia signal processing: proceeding of the twelfth international conference on intelligent information hiding and multimedia signal processing, Nov., 21\u201323, 2016, Kaohsiung, Taiwan, vol 1. Springer, pp 303\u2013312"},{"key":"79_CR14","doi-asserted-by":"publisher","unstructured":"Pappu R, Recht B, Taylor J, Gershenfeld N (2002) Physical one-way functions. Science 297(5589):2026. \nhttps:\/\/doi.org\/10.1126\/science.1074376\n\n. \nhttp:\/\/science.sciencemag.org\/content\/297\/5589\/2026","DOI":"10.1126\/science.1074376"},{"key":"79_CR15","unstructured":"Suh GE, Devadas S (2007) Physical Unclonable Functions for Device Authentication and Secret Key Generation. In: 2007 44th ACM\/IEEE design automation conference, pp 9\u201314"},{"issue":"1","key":"79_CR16","doi-asserted-by":"publisher","first-page":"6","DOI":"10.1186\/s13677-015-0030-z","volume":"4","author":"Z Quan","year":"2015","unstructured":"Quan Z, Chunming T, Xianghan Z, Chunming R (2015) A secure user authentication protocol for sensor network in data capturing. J Cloud Comput 4(1):6","journal-title":"J Cloud Comput"},{"issue":"12","key":"79_CR17","doi-asserted-by":"publisher","first-page":"2123","DOI":"10.3390\/s16122123","volume":"16","author":"Y Park","year":"2016","unstructured":"Park Y, Park Y (2016) Three-factor user authentication and key agreement using elliptic curve cryptosystem in wireless sensor networks. Sensors 16(12):2123","journal-title":"Sensors"}],"container-title":["Journal of Reliable Intelligent Environments"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s40860-019-00079-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s40860-019-00079-w\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s40860-019-00079-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,4,3]],"date-time":"2020-04-03T23:24:57Z","timestamp":1585956297000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s40860-019-00079-w"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,4,5]]},"references-count":17,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2020,3]]}},"alternative-id":["79"],"URL":"https:\/\/doi.org\/10.1007\/s40860-019-00079-w","relation":{},"ISSN":["2199-4668","2199-4676"],"issn-type":[{"value":"2199-4668","type":"print"},{"value":"2199-4676","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,4,5]]},"assertion":[{"value":"13 November 2018","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"29 March 2019","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"5 April 2019","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}