{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,20]],"date-time":"2025-11-20T18:39:33Z","timestamp":1763663973440,"version":"3.37.3"},"reference-count":37,"publisher":"Wiley","license":[{"start":{"date-parts":[[2019,3,17]],"date-time":"2019-03-17T00:00:00Z","timestamp":1552780800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Security and Communication Networks"],"published-print":{"date-parts":[[2019,3,17]]},"abstract":"<jats:p>Providing a mechanism to authenticate users in healthcare applications is an essential security requirement to prevent both external and internal attackers from penetrating patients\u2019 identities and revealing their health data. Many schemes have been developed to provide authentication mechanisms to ensure that only legitimate users are authorised to connect, but these schemes still suffer from vulnerable security. Various attacks expose patients\u2019 data for malicious tampering or destruction. Transferring health-related data and information between users and the health centre makes them exposed to penetration by adversaries as they may move through an insecure channel. In addition, previous mechanisms have suffered from the poor protection of users\u2019 authentication information. To ensure the protection of patients\u2019 information and data, we propose a scheme that authenticates users based on the information of both the device and the legitimate user. In this paper, we propose a Robust Authentication Model for Healthcare Users (RAMHU) that provides mutual authentication between the server and clients. This model utilizes an Elliptic Curve Integrated Encryption Scheme (ECIES) and PHOTON to achieve strong security and good overall performance. RAMHU relies on multiple-pseudonym, physical address, and one-time password mechanisms to authenticate legitimate users. Moreover, extensive informal and formal security analysis with the automated validation of Internet security protocols and applications (AVISPA) tool demonstrate that our model offers a high level of security in repelling a wide variety of possible attacks.<\/jats:p>","DOI":"10.1155\/2019\/3263902","type":"journal-article","created":{"date-parts":[[2019,3,17]],"date-time":"2019-03-17T19:33:19Z","timestamp":1552851199000},"page":"1-26","source":"Crossref","is-referenced-by-count":27,"title":["RAMHU: A New Robust Lightweight Scheme for Mutual Users Authentication in Healthcare Applications"],"prefix":"10.1155","volume":"2019","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-3149-9129","authenticated-orcid":true,"given":"Mishall","family":"Al-Zubaidie","sequence":"first","affiliation":[{"name":"Thi-Qar University, Nasiriyah 64001, Iraq"},{"name":"Faculty of Health, Engineering and Sciences, University of Southern Queensland, Toowoomba, QLD 4350, Australia"}]},{"given":"Zhongwei","family":"Zhang","sequence":"additional","affiliation":[{"name":"Faculty of Health, Engineering and Sciences, University of Southern Queensland, Toowoomba, QLD 4350, Australia"}]},{"given":"Ji","family":"Zhang","sequence":"additional","affiliation":[{"name":"Faculty of Health, Engineering and Sciences, University of Southern Queensland, Toowoomba, QLD 4350, Australia"}]}],"member":"311","reference":[{"key":"1","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2015.7010518"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1155\/2018\/5978636","volume":"2018","year":"2018","journal-title":"Security and Communication Networks"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1007\/s10916-015-0365-5"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1007\/s10916-015-0259-6"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-016-3718-6"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1002\/sec.1214"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1016\/j.jii.2016.03.004"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2018.01.003"},{"issue":"1","key":"10","doi-asserted-by":"crossref","first-page":"64","DOI":"10.1109\/JSYST.2015.2428620","volume":"12","year":"2018","journal-title":"IEEE Systems Journal"},{"issue":"11","key":"11","doi-asserted-by":"crossref","first-page":"229","DOI":"10.1007\/s10916-016-0596-0","volume":"40","year":"2016","journal-title":"Journal of Medical Systems"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2017.10.045"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1007\/s10916-014-0145-7"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2016.01.002"},{"key":"19","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2017.05.009"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1016\/j.eij.2016.11.001"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2016.2638038"},{"key":"26","doi-asserted-by":"publisher","DOI":"10.1007\/s10916-016-0521-6"},{"key":"27","doi-asserted-by":"publisher","DOI":"10.1007\/s12083-015-0332-4"},{"issue":"10","key":"28","doi-asserted-by":"crossref","first-page":"3826","DOI":"10.1007\/s11227-015-1610-x","volume":"72","year":"2016","journal-title":"The Journal of Supercomputing"},{"key":"23","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2015.2427838"},{"key":"29","doi-asserted-by":"publisher","DOI":"10.1109\/tit.1983.1056650"},{"key":"30","doi-asserted-by":"publisher","DOI":"10.1016\/j.entcs.2007.12.013"},{"journal-title":"Journal of Ambient Intelligence and Humanized Computing","first-page":"1","year":"2017","key":"33"},{"key":"35","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2016.11.033"},{"key":"41","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-22792-9_13"},{"key":"42","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-23951-9_21"},{"key":"47","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-34047-5_9"},{"issue":"7","key":"49","doi-asserted-by":"crossref","first-page":"072101","DOI":"10.1007\/s11432-016-0165-6","volume":"60","year":"2017","journal-title":"Science China Information Sciences"},{"key":"50","doi-asserted-by":"publisher","DOI":"10.1007\/s11071-016-3171-9"},{"key":"51","doi-asserted-by":"publisher","DOI":"10.1515\/popets-2017-0054"},{"key":"52","doi-asserted-by":"publisher","DOI":"10.1007\/s12243-016-0505-z"},{"key":"53","doi-asserted-by":"publisher","DOI":"10.1364\/JOCN.7.00A309"},{"key":"54","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2016.2524258"},{"key":"57","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2016.2620999"},{"key":"59","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2016.12.028"},{"key":"60","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2016.05.032"},{"key":"61","doi-asserted-by":"publisher","DOI":"10.1002\/dac.3302"}],"container-title":["Security and Communication Networks"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/downloads.hindawi.com\/journals\/scn\/2019\/3263902.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/scn\/2019\/3263902.xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/scn\/2019\/3263902.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,3,17]],"date-time":"2019-03-17T19:33:22Z","timestamp":1552851202000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.hindawi.com\/journals\/scn\/2019\/3263902\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,3,17]]},"references-count":37,"alternative-id":["3263902","3263902"],"URL":"https:\/\/doi.org\/10.1155\/2019\/3263902","relation":{},"ISSN":["1939-0114","1939-0122"],"issn-type":[{"type":"print","value":"1939-0114"},{"type":"electronic","value":"1939-0122"}],"subject":[],"published":{"date-parts":[[2019,3,17]]}}}