{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T08:13:20Z","timestamp":1775031200360,"version":"3.50.1"},"reference-count":38,"publisher":"Informa UK Limited","issue":"4","content-domain":{"domain":["www.tandfonline.com"],"crossmark-restriction":true},"short-container-title":["Cybernetics and Systems"],"published-print":{"date-parts":[[2024,5,18]]},"DOI":"10.1080\/01969722.2022.2137644","type":"journal-article","created":{"date-parts":[[2022,12,17]],"date-time":"2022-12-17T15:40:51Z","timestamp":1671291651000},"page":"848-871","update-policy":"https:\/\/doi.org\/10.1080\/tandf_crossmark_01","source":"Crossref","is-referenced-by-count":9,"title":["An Efficient and Secure Authentication Protocol with Deep Learning Based Key Generation toward Securing Healthcare Data in IoT"],"prefix":"10.1080","volume":"55","author":[{"given":"Sudhir","family":"Sharma","sequence":"first","affiliation":[{"name":"Department of Information Technology (SIT), Manipal University Jaipur, Jaipur, Rajasthan, India"}]},{"given":"Sandesh","family":"Tripathi","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Engineering, Birla Institute of Applied Sciences, Nainital, Uttarakhand, India"}]},{"given":"Kaushal Kishor","family":"Bhatt","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Engineering, Birla Institute of Applied Sciences, Nainital, Uttarakhand, India"}]},{"given":"Nitin","family":"Chhimwal","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Engineering, Birla Institute of Applied Sciences, Nainital, Uttarakhand, India"}]}],"member":"301","published-online":{"date-parts":[[2022,12,17]]},"reference":[{"issue":"5","key":"e_1_3_1_2_1","first-page":"1886","article-title":"Optimization driven mapreduce framework for indexing and retrieval of big data","volume":"14","author":"Abdalla H. B.","year":"2020","unstructured":"Abdalla, H. B., A. M. Ahmed, and M. A. Sibahee. 2020. Optimization driven mapreduce framework for indexing and retrieval of big data. KSII Transactions on Internet and Information Systems 14 (5):1886\u2013908.","journal-title":"KSII Transactions on Internet and Information Systems"},{"key":"e_1_3_1_3_1","doi-asserted-by":"publisher","DOI":"10.1049\/cmu2.12278"},{"key":"e_1_3_1_4_1","doi-asserted-by":"publisher","DOI":"10.14257\/ijsia.2016.10.9.07"},{"key":"e_1_3_1_5_1","unstructured":"Alkeem E. A. C. Y. Yeun and M. J. Zemerly. 2015. Security and privacy framework for ubiquitous healthcare IoT devices. Proceeding of 10th International Conference for Internet Technology and Secured Transactions (ICITST). IEEE London UK."},{"key":"e_1_3_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2020.3020605"},{"issue":"8","key":"e_1_3_1_7_1","first-page":"1829","volume":"100","author":"Atee H. A.","year":"2016","unstructured":"Atee, H. A., H. A. Atee, and A. K. Ilijan. 2016. Foundation of Technical Education. Higher Education and Scientific Research. Baghdad. Iraq Department of Engineering. Utm Razak School of Engineering and Advanced Technology. Journal of Engineering and Applied Sciences 100 (8):1829\u201334.","journal-title":"Journal of Engineering and Applied Sciences"},{"key":"e_1_3_1_8_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2021.108040"},{"key":"e_1_3_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2021.3062754"},{"key":"e_1_3_1_10_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11276-021-02652-9"},{"key":"e_1_3_1_11_1","doi-asserted-by":"publisher","DOI":"10.3390\/s21020552"},{"key":"e_1_3_1_12_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11235-019-00612-5"},{"key":"e_1_3_1_13_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2020.107333"},{"issue":"2","key":"e_1_3_1_14_1","first-page":"24","article-title":"Deep learning based optimization algorithm for cyber security intrusion detection system","volume":"4","author":"Gali M.","year":"2021","unstructured":"Gali, M. 2021. Deep learning based optimization algorithm for cyber security intrusion detection system. Journal of Networking and Communication Systems 4 (2):24\u201330.","journal-title":"Journal of Networking and Communication Systems"},{"key":"e_1_3_1_15_1","doi-asserted-by":"crossref","unstructured":"Gandhi D. A. and M. Ghosal. 2018. Intelligent healthcare using IoT: A extensive survey. 2018\u2009Second International Conference on Inventive Communication and Computational Technologies (ICICCT) 800\u201302.","DOI":"10.1109\/ICICCT.2018.8473026"},{"key":"e_1_3_1_16_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2018.09.024"},{"key":"e_1_3_1_17_1","unstructured":"Heart Disease Data Set. https:\/\/archive.ics.uci.edu\/ml\/datasets\/heart+disease. Accessed February 2022."},{"key":"e_1_3_1_18_1","doi-asserted-by":"crossref","unstructured":"Javaid S. M. Abdullah N. Javaid T. Sultana J. Ahmed and N. A. Sattar. 2019. Towards buildings energy management: Using seasonal schedules under time of use pricing tariff via deep neuro-fuzzy optimizer. 2019 15th International Wireless Communications & Mobile Computing Conference (IWCMC) 1594\u20131599.","DOI":"10.1109\/IWCMC.2019.8766673"},{"issue":"3","key":"e_1_3_1_19_1","first-page":"90","article-title":"Data importance and feedback based adaptive level of authorization for the security of Internet of Things","volume":"7","author":"Jog V. V.","year":"2019","unstructured":"Jog, V. V. 2019. Data importance and feedback based adaptive level of authorization for the security of Internet of Things. Journal of Engineering Research 7 (3):90\u2013104.","journal-title":"Journal of Engineering Research"},{"key":"e_1_3_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/RAICS.2015.7488451"},{"issue":"3","key":"e_1_3_1_21_1","first-page":"1","article-title":"A survey on the security of blockchain systems","volume":"12","author":"Li X.","year":"2017","unstructured":"Li, X., P. Jiang, T. Chen, X. Luo, and Q. Wen. 2017. A survey on the security of blockchain systems. Future Generation Computer Systems 12 (3):1\u201333.","journal-title":"Future Generation Computer Systems"},{"key":"e_1_3_1_22_1","doi-asserted-by":"publisher","DOI":"10.4236\/jcc.2015.35021"},{"key":"e_1_3_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2021.3080461"},{"key":"e_1_3_1_24_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10207-019-00484-5"},{"key":"e_1_3_1_25_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-015-2300-y"},{"key":"e_1_3_1_26_1","doi-asserted-by":"publisher","DOI":"10.3233\/KES-190400"},{"key":"e_1_3_1_27_1","doi-asserted-by":"publisher","DOI":"10.32604\/cmc.2021.015597"},{"issue":"1","key":"e_1_3_1_28_1","first-page":"21","article-title":"Intrusion detection using naive Bayes ant colony optimization algorithm in a wireless communication network","volume":"5","author":"Padma K.","year":"2022","unstructured":"Padma, K. 2022. Intrusion detection using naive Bayes ant colony optimization algorithm in a wireless communication network. Journal of Networking and Communication Systems 5 (1):21\u20139.","journal-title":"Journal of Networking and Communication Systems"},{"key":"e_1_3_1_29_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2018.12.002"},{"issue":"2","key":"e_1_3_1_30_1","first-page":"18","article-title":"Coronavirus disease (COVID-19) cases analysis using machine-learning applications","volume":"11","author":"Rashid A. S. K.","year":"2022","unstructured":"Rashid, A. S. K., H. N. Abduljabbar, and B. Alhayani. 2022. Coronavirus disease (COVID-19) cases analysis using machine-learning applications. Applied Nanoscience 11 (2):18\u201322.","journal-title":"Applied Nanoscience"},{"key":"e_1_3_1_31_1","doi-asserted-by":"publisher","DOI":"10.1007\/s12652-020-02213-6"},{"key":"e_1_3_1_32_1","doi-asserted-by":"publisher","DOI":"10.22452\/mjcs.sp2019no3.9"},{"issue":"6","key":"e_1_3_1_33_1","first-page":"342","article-title":"Survey on providing security and authentication for devices to achieve QOS in IOT","volume":"5","author":"Shaikh M. M.","year":"2016","unstructured":"Shaikh, M. M., and V. Jog. 2016. Survey on providing security and authentication for devices to achieve QOS in IOT. International Journal of Scientific Research 5 (6):342\u20134.","journal-title":"International Journal of Scientific Research"},{"key":"e_1_3_1_34_1","doi-asserted-by":"publisher","DOI":"10.1007\/s40998-018-0146-5"},{"key":"e_1_3_1_35_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cmpb.2019.105054"},{"key":"e_1_3_1_36_1","unstructured":"Valera A. J. J. M. A. Zamora and A. F. G. Skarmeta. 2010. An architecture based on internet of things to support mobility and security in medical environments. Proceeding of 7th IEEE Consumer Communications and Networking Conference. IEEE. Las Vegas NV USA."},{"key":"e_1_3_1_37_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2018.03.030"},{"key":"e_1_3_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/2909067.2909079"},{"key":"e_1_3_1_39_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2019.11.238"}],"container-title":["Cybernetics and Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.tandfonline.com\/doi\/pdf\/10.1080\/01969722.2022.2137644","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,21]],"date-time":"2024-03-21T20:51:32Z","timestamp":1711054292000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.tandfonline.com\/doi\/full\/10.1080\/01969722.2022.2137644"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,12,17]]},"references-count":38,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2024,5,18]]}},"alternative-id":["10.1080\/01969722.2022.2137644"],"URL":"https:\/\/doi.org\/10.1080\/01969722.2022.2137644","relation":{},"ISSN":["0196-9722","1087-6553"],"issn-type":[{"value":"0196-9722","type":"print"},{"value":"1087-6553","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,12,17]]},"assertion":[{"value":"The publishing and review policy for this title is described in its Aims & Scope.","order":1,"name":"peerreview_statement","label":"Peer Review Statement"},{"value":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=ucbs20","URL":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=ucbs20","order":2,"name":"aims_and_scope_url","label":"Aim & Scope"},{"value":"2022-12-17","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}