{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,21]],"date-time":"2026-02-21T20:28:23Z","timestamp":1771705703929,"version":"3.50.1"},"reference-count":46,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2020,1,16]],"date-time":"2020-01-16T00:00:00Z","timestamp":1579132800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,1,16]],"date-time":"2020-01-16T00:00:00Z","timestamp":1579132800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Reliable Intell Environ"],"published-print":{"date-parts":[[2020,6]]},"DOI":"10.1007\/s40860-020-00098-y","type":"journal-article","created":{"date-parts":[[2020,1,16]],"date-time":"2020-01-16T13:03:07Z","timestamp":1579179787000},"page":"79-94","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":66,"title":["A secure mutual authentication protocol for IoT environment"],"prefix":"10.1007","volume":"6","author":[{"given":"Prabhat Kumar","family":"Panda","sequence":"first","affiliation":[]},{"given":"Sudipta","family":"Chattopadhyay","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,1,16]]},"reference":[{"key":"98_CR1","doi-asserted-by":"publisher","first-page":"2787","DOI":"10.1016\/j.comnet.2010.05.010","volume":"54","author":"L Atzori","year":"2010","unstructured":"Atzori L, Lera A, Morabito G (2010) The Internet of Things: a survey. Comput Netw 54:2787\u20132805","journal-title":"Comput Netw"},{"issue":"4","key":"98_CR2","doi-asserted-by":"publisher","first-page":"2347","DOI":"10.1109\/COMST.2015.2444095","volume":"17","author":"A Al-Fuqaha","year":"2015","unstructured":"Al-Fuqaha A, Guizani M, Mohammadi M, Aledhari M, Ayyash M (2015) Internet of Things: a survey on enabling technologies, protocols, and applications. IEEE Commun Surv Tutor 17(4):2347\u20132376","journal-title":"IEEE Commun Surv Tutor"},{"key":"98_CR3","doi-asserted-by":"publisher","first-page":"199","DOI":"10.1016\/j.comnet.2018.03.012","volume":"141","author":"DE Kouicem","year":"2018","unstructured":"Kouicem DE, Bouabdallah A, Lakhlef H (2018) Internet of Things security: a top-down survey. Comput Netw 141:199\u2013221","journal-title":"Comput Netw"},{"key":"98_CR4","doi-asserted-by":"publisher","first-page":"684","DOI":"10.1016\/j.future.2015.09.021","volume":"56","author":"A Botta","year":"2016","unstructured":"Botta A, Donato WD, Persico V, Pescape A (2016) Integration of cloud computing and Internet of things: a survey. Future Gener Comput Syst 56:684\u2013700","journal-title":"Future Gener Comput Syst"},{"key":"98_CR5","doi-asserted-by":"publisher","first-page":"1065","DOI":"10.1016\/j.sysarc.2008.04.003","volume":"54","author":"M Sascha","year":"2008","unstructured":"Sascha M, Sebastian W (2008) Secure communication in microcomputer bus systems for embedded devices. J Syst Archit 54:1065\u20131076","journal-title":"J Syst Archit"},{"issue":"1","key":"98_CR6","doi-asserted-by":"publisher","first-page":"72","DOI":"10.1109\/JIOT.2014.2360121","volume":"2","author":"H Debiao","year":"2015","unstructured":"Debiao H, Sherali Z (2015) An analysis of RFID authentication schemes for Internet of Things in healthcare environment using elliptic curve cryptography. IEEE Internet Things J 2(1):72\u201383","journal-title":"IEEE Internet Things J"},{"issue":"3","key":"98_CR7","first-page":"84","volume":"3","author":"R Afreen","year":"2011","unstructured":"Afreen R, Mehrotra SC (2011) A review on elliptic curve cryptography for embedded systems. J Comput Sci Inf Technol 3(3):84\u2013103","journal-title":"J Comput Sci Inf Technol"},{"key":"98_CR8","doi-asserted-by":"publisher","first-page":"138","DOI":"10.1016\/j.cose.2008.11.008","volume":"28","author":"J Yang","year":"2009","unstructured":"Yang J, Chang C (2009) An ID-based remote mutual authentication with key agreement protocol for on elliptic curve cryptosystem. Comput Secur 28:138\u2013143","journal-title":"Comput Secur"},{"key":"98_CR9","unstructured":"Yoon EJ, Yoo KY (2009) Robust ID-based remote mutual authentication with key agreement protocol for mobile devices on ECC. In: Proceedings of the international conference on computational science and engineering, pp 633\u2013640"},{"issue":"11","key":"98_CR10","doi-asserted-by":"publisher","first-page":"1892","DOI":"10.1016\/j.jss.2011.06.061","volume":"84","author":"SK Hafizul","year":"2011","unstructured":"Hafizul SK, Biswas GP (2011) A more efficient and secure ID-based remote mutual authentication with key agreement scheme for mobile devices on elliptic curve crypto systems. J Syst Softw 84(11):1892\u20131898","journal-title":"J Syst Softw"},{"issue":"2","key":"98_CR11","doi-asserted-by":"publisher","first-page":"973","DOI":"10.1007\/s11227-013-0962-3","volume":"66","author":"CH Chou","year":"2013","unstructured":"Chou CH, Tsai KY, Lu CF (2013) Two ID-based authenticated schemes with key agreement for mobile environments. J Supercomput 66(2):973\u2013988","journal-title":"J Supercomput"},{"key":"98_CR12","doi-asserted-by":"publisher","first-page":"395","DOI":"10.1007\/s11227-014-1170-5","volume":"69","author":"MS Farash","year":"2014","unstructured":"Farash MS, Attari MA (2014) A secure and efficient identity-based authenticated key exchange protocol for mobile client\u2013server networks. J Supercomput 69:395\u2013411","journal-title":"J Supercomput"},{"key":"98_CR13","doi-asserted-by":"publisher","first-page":"133","DOI":"10.1016\/j.adhoc.2013.02.004","volume":"18","author":"YP Liao","year":"2014","unstructured":"Liao YP, Hsiao CM (2014) A secure ECC-based RFID authentication scheme integrated with ID-verifier transfer protocol. Ad Hoc Netw 18:133\u2013146","journal-title":"Ad Hoc Netw"},{"key":"98_CR14","unstructured":"Peeters R, Hermans J (2013) Attack on Liao and Hsiao\u2019s Secure ECC based RFID authentication scheme integrated with ID-verifier transfer protocol. Cryptology ePrint Archive. Report 2013\/399"},{"key":"98_CR15","doi-asserted-by":"publisher","first-page":"198","DOI":"10.1016\/j.procs.2014.05.415","volume":"32","author":"SR Moosavi","year":"2014","unstructured":"Moosavi SR, Nigussie E, Virtanen S, Isoaho J (2014) An elliptic curve-based mutual authentication scheme for RFID implants systems. Procedia Comput Sci 32:198\u2013206","journal-title":"Procedia Comput Sci"},{"key":"98_CR16","doi-asserted-by":"crossref","unstructured":"Khatwani C, Roy S (2015) Security analysis of ECC based authentication protocols. In: Proceedings of ieee international conference on computational intelligence and communication networks, pp 1167\u20131172","DOI":"10.1109\/CICN.2015.226"},{"issue":"3","key":"98_CR17","doi-asserted-by":"publisher","first-page":"1328","DOI":"10.1109\/TR.2018.2850966","volume":"67","author":"D Abbasinezhad-Mood","year":"2018","unstructured":"Abbasinezhad-Mood D, Nikooghadam M (2018) Efficient design of a novel ECC-based public key scheme for medical data protection by utilization of NanoPi fire. IEEE Trans Reliab 67(3):1328\u20131339","journal-title":"IEEE Trans Reliab"},{"issue":"11","key":"98_CR18","first-page":"4815","volume":"4","author":"D Abbasinezhad-Mood","year":"2018","unstructured":"Abbasinezhad-Mood D, Nikooghadam M (2018) Efficient anonymous password-authenticated key exchange protocol to read isolated smart meters by utilization of extended chebyshev chaotic maps. IEEE Trans Ind Inf 4(11):4815\u20134828","journal-title":"IEEE Trans Ind Inf"},{"issue":"4","key":"98_CR19","doi-asserted-by":"publisher","first-page":"2844","DOI":"10.1109\/TIE.2019.2912789","volume":"67","author":"D Abbasinezhad-Mood","year":"2019","unstructured":"Abbasinezhad-Mood D, Ostad-Sharif A, Nikooghadam M (2019) Novel anonymous key establishment protocol for isolated smart meters. IEEE Trans Ind Electron 67(4):2844\u20132851","journal-title":"IEEE Trans Ind Electron"},{"key":"98_CR20","first-page":"156","volume":"45","author":"M Alshahrani","year":"2019","unstructured":"Alshahrani M, Traore I (2019) Secure mutual authentication and automated access control for IoT smart home using cumulative Keyed-hash chain. J Inf Secur Appl 45:156\u2013175","journal-title":"J Inf Secur Appl"},{"issue":"8","key":"98_CR21","doi-asserted-by":"publisher","first-page":"3599","DOI":"10.1109\/TII.2017.2773666","volume":"14","author":"X Li","year":"2018","unstructured":"Li X, Niu J, Bhuiyan MZA, Wu F, Karuppiah M, Kumari S (2018) A robust ECC based provable secure authentication protocol with privacy preserving for Industrial Internet of Things. IEEE Trans Ind Inf 14(8):3599\u20133609","journal-title":"IEEE Trans Ind Inf"},{"key":"98_CR22","doi-asserted-by":"publisher","first-page":"111","DOI":"10.1016\/j.cose.2013.05.007","volume":"37","author":"A Alcaide","year":"2013","unstructured":"Alcaide A, Palomar E, Montero-Castillo J, Ribagorda A (2013) Anonymous authentication for privacy-preserving IoT target-driven applications. Comput Secur 37:111\u2013123","journal-title":"Comput Secur"},{"key":"98_CR23","doi-asserted-by":"publisher","first-page":"142","DOI":"10.1016\/j.cose.2014.08.002","volume":"48","author":"X-J Lin","year":"2015","unstructured":"Lin X-J, Sun L, Qu H (2015) Insecurity of an anonymous authentication for privacy-preserving IoT target-driven applications. Comput Secur 48:142\u2013149","journal-title":"Comput Secur"},{"key":"98_CR24","doi-asserted-by":"publisher","first-page":"e3323","DOI":"10.1002\/dac.3323","volume":"6","author":"PK Dhillon","year":"2017","unstructured":"Dhillon PK, Kalra S (2017) Secure multi-factor remote user authentication scheme for Internet of Things environments. Int J Commun Syst 6:e3323","journal-title":"Int J Commun Syst"},{"key":"98_CR25","doi-asserted-by":"publisher","first-page":"82","DOI":"10.1016\/j.future.2019.04.019","volume":"100","author":"A Ostad-Sharif","year":"2019","unstructured":"Ostad-Sharif A, Arshad H, Nikooghadam M, Abbasinezhad-Mood D (2019) Three party secure data transmission in IoT networks through design of a lightweight authenticated key agreement scheme. Future Gener Comput Syst 100:82\u2013892","journal-title":"Future Gener Comput Syst"},{"key":"98_CR26","doi-asserted-by":"publisher","first-page":"235","DOI":"10.1016\/j.jnca.2012.09.001","volume":"36","author":"A Waquar","year":"2013","unstructured":"Waquar A, Raza A, Abbas H, Khan MK (2013) A framework for preservation of cloud users\u2019 data privacy using dynamic reconstruction of metadata. J Netw Comput Appl 36:235\u2013248","journal-title":"J Netw Comput Appl"},{"key":"98_CR27","doi-asserted-by":"publisher","first-page":"127","DOI":"10.1016\/j.pmcj.2014.09.006","volume":"20","author":"S Distefano","year":"2015","unstructured":"Distefano S, Merlino G, Puliafito A (2015) A utility paradigm for IoT: the sensing cloud. Pervasive Mob Comput 20:127\u2013144","journal-title":"Pervasive Mob Comput"},{"key":"98_CR28","doi-asserted-by":"publisher","first-page":"210","DOI":"10.1016\/j.procs.2015.05.059","volume":"52","author":"P Persson","year":"2015","unstructured":"Persson P, Angelsmark O (2015) Calvin\u2014merging cloud and IoT. Procedia Comput Sci 52:210\u2013217","journal-title":"Procedia Comput Sci"},{"key":"98_CR29","doi-asserted-by":"publisher","first-page":"964","DOI":"10.1016\/j.future.2016.11.031","volume":"78","author":"C Stergiou","year":"2018","unstructured":"Stergiou C, Psannis KE, Kim B-G, Gupta B (2018) Secure integration of IoT and cloud computing. Future Gener Comput Syst 78:964\u2013975","journal-title":"Future Gener Comput Syst"},{"key":"98_CR30","volume-title":"Smart computing paradigms: new progresses and challenges Advances in intelligent systems and computing","author":"S Chatterjee","year":"2020","unstructured":"Chatterjee S, Samaddar SG (2020) A robust lightweight ECC-based three-way authentication scheme for IoT in cloud. In: El\u00e7i A, Sa P, Modi C, Olague G, Sahoo M, Bakshi S (eds) Smart computing paradigms: new progresses and challenges Advances in intelligent systems and computing, vol 767. Springer, Singapore"},{"key":"98_CR31","doi-asserted-by":"publisher","first-page":"210","DOI":"10.1016\/j.pmcj.2015.08.001","volume":"24","author":"S Kalra","year":"2015","unstructured":"Kalra S, Sood SK (2015) Secure authentication scheme for IOT and cloud servers. Pervasive Mob Comput 24:210\u2013223","journal-title":"Pervasive Mob Comput"},{"key":"98_CR32","doi-asserted-by":"publisher","first-page":"275","DOI":"10.1016\/j.pmcj.2015.12.003","volume":"38","author":"C-C Chang","year":"2017","unstructured":"Chang C-C, Wu H-L, Sun C-Y (2017) Notes on secure authentication scheme for IOT and cloud servers. Pervasive Mob Comput 38:275\u2013278","journal-title":"Pervasive Mob Comput"},{"key":"98_CR33","doi-asserted-by":"publisher","first-page":"15","DOI":"10.1016\/j.pmcj.2017.09.004","volume":"42","author":"K-H Wang","year":"2017","unstructured":"Wang K-H, Chen C-M, Fang W, Wu T-Y (2017) A secure authentication scheme for internet of things. Pervasive Mob Comput 42:15\u201326","journal-title":"Pervasive Mob Comput"},{"key":"98_CR34","doi-asserted-by":"publisher","first-page":"6428","DOI":"10.1007\/s11227-017-2048-0","volume":"74","author":"S Kumari","year":"2018","unstructured":"Kumari S, Karuppiah M, Das AK (2018) A secure authentication scheme based on elliptic curve cryptography for IoT and cloud servers. J Supercomput 74:6428\u20136453","journal-title":"J Supercomput"},{"issue":"15","key":"98_CR35","first-page":"1571","volume":"119","author":"S Bhubaneswari","year":"2018","unstructured":"Bhubaneswari S, Ananth NV (2018) Enhanced mutual authentication scheme for cloud of things. Int J Pure Appl Math 119(15):1571\u20131583","journal-title":"Int J Pure Appl Math"},{"key":"98_CR36","volume-title":"Guide to elliptic curve cryptography","author":"D Hankerson","year":"2004","unstructured":"Hankerson D, Menezes A, Vanstone S (2004) Guide to elliptic curve cryptography. Springer, New York"},{"key":"98_CR37","unstructured":"Mahto D, Khan DA, Yadav DK (2016) Security analysis of elliptic curve cryptography and RSA. In: Proceedings of the world congress on engineering, pp 1\u20134"},{"issue":"1","key":"98_CR38","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s12083-016-0485-9","volume":"11","author":"F Wu","year":"2018","unstructured":"Wu F, Xu L, Kumari S, Li X (2018) An improved and provably secure three-factor user authentication scheme for wireless sensor networks. Peer-to-Peer Netw Appl 11(1):1\u201320","journal-title":"Peer-to-Peer Netw Appl"},{"key":"98_CR39","doi-asserted-by":"publisher","DOI":"10.1007\/s12652-019-01248-8","author":"PK Panda","year":"2019","unstructured":"Panda PK, Chattopadhyay S (2019) An improved authentication and security scheme for LTE\/LTE-a networks. J Ambient Intell Hum Comput. https:\/\/doi.org\/10.1007\/s12652-019-01248-8","journal-title":"J Ambient Intell Hum Comput"},{"key":"98_CR40","doi-asserted-by":"publisher","first-page":"61","DOI":"10.1016\/j.entcs.2005.11.052","volume":"155","author":"L Vigano","year":"2006","unstructured":"Vigano L (2006) Automated security protocol analysis with the AVISPA tool. Electron Notes Theor Comput Sci 155:61\u201386","journal-title":"Electron Notes Theor Comput Sci"},{"key":"98_CR41","unstructured":"[Online]. AVISPA: automated validation of internet security protocols and applications. Accessed Jan (2018). http:\/\/www.avispaproject.org\/"},{"issue":"1","key":"98_CR42","doi-asserted-by":"publisher","first-page":"269","DOI":"10.1109\/JIOT.2017.2780232","volume":"5","author":"M Wazid","year":"2018","unstructured":"Wazid M, Das AK, Odelu V, Kumar N, Conti M, Jo M (2018) Design of secure user authenticated key management protocol for generic IoT networks. IEEE Internet Things J 5(1):269\u2013282","journal-title":"IEEE Internet Things J"},{"issue":"2","key":"98_CR43","doi-asserted-by":"publisher","first-page":"198","DOI":"10.1109\/TIT.1983.1056650","volume":"29","author":"D Dolev","year":"1983","unstructured":"Dolev D, Yao AC (1983) On the security of public key protocols. IEEE Trans Inf Theory 29(2):198\u2013208","journal-title":"IEEE Trans Inf Theory"},{"key":"98_CR44","unstructured":"Secure hash standard (1995) Nat. Inst. Standards Technol. (NIST), USA, Tech. Rep. FIPS PUB: 180-1"},{"key":"98_CR45","doi-asserted-by":"publisher","first-page":"107","DOI":"10.1016\/j.csi.2018.06.002","volume":"61","author":"PK Panda","year":"2019","unstructured":"Panda PK, Chattopadhyay S (2019) A modified PKM environment for the security enhancement of IEEE 802.16e. Comput Standard Interface 61:107\u2013120","journal-title":"Comput Standard Interface"},{"key":"98_CR46","doi-asserted-by":"publisher","first-page":"3028","DOI":"10.1109\/ACCESS.2017.2676119","volume":"5","author":"S Challa","year":"2017","unstructured":"Challa S, Wazid M, Das AK, Kumar N, Reddy AG, Yoon E-J, Yoo K-Y (2017) Secure signature based authenticated key establishment scheme for future IOT applications. IEEE Access 5:3028\u20133043","journal-title":"IEEE Access"}],"container-title":["Journal of Reliable Intelligent Environments"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s40860-020-00098-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s40860-020-00098-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s40860-020-00098-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,1,15]],"date-time":"2021-01-15T00:09:22Z","timestamp":1610669362000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s40860-020-00098-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,1,16]]},"references-count":46,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2020,6]]}},"alternative-id":["98"],"URL":"https:\/\/doi.org\/10.1007\/s40860-020-00098-y","relation":{},"ISSN":["2199-4668","2199-4676"],"issn-type":[{"value":"2199-4668","type":"print"},{"value":"2199-4676","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,1,16]]},"assertion":[{"value":"18 August 2019","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"4 January 2020","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"16 January 2020","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}