{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,21]],"date-time":"2026-01-21T18:30:00Z","timestamp":1769020200688,"version":"3.49.0"},"reference-count":39,"publisher":"Walter de Gruyter GmbH","issue":"1","license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,4,7]]},"abstract":"<jats:title>Abstract<\/jats:title>\n                  <jats:p>The Internet of Medical Things has enabled the development of smart healthcare systems, allowing users to collect, process, and transmit patient health data to cloud servers for further analysis. Internet of Things devices and cloud servers\u2019 physical distance raise network latency and jitter even with ample storage and processing capability. Additionally, this connectivity raises serious challenges about security and privacy in smart healthcare environments. In this article, we focused on addressing those security concerns in a hierarchical smart healthcare system involving devices, gateway, and medical servers. To show the security issues in the existing solution, we reviewed the Das and Namasudra authentication scheme, identifying vulnerabilities such as replay attacks, device impersonation, and denial of service attacks. This article proposes a Privacy-Preserved Lightweight and Secure Multi-level Authentication (PLASMA) scheme to mitigate these vulnerabilities. PLASMA\u2019s security and key privacy are validated through the Real-Or-Random (ROR) model and simulated using the widely accepted Scyther tool. PLASMA\u2019s performance was evaluated by comparing its computational and communication costs with related schemes, and functional analysis was demonstrated to show the security and efficiency of the scheme. The results prove that PLASMA offers a secure, scalable solution for smart healthcare systems.<\/jats:p>","DOI":"10.1515\/comp-2025-0024","type":"journal-article","created":{"date-parts":[[2025,4,8]],"date-time":"2025-04-08T03:41:53Z","timestamp":1744083713000},"source":"Crossref","is-referenced-by-count":1,"title":["PLASMA-Privacy-Preserved Lightweight and Secure Multi-level Authentication scheme for IoMT-based smart healthcare"],"prefix":"10.1515","volume":"15","author":[{"given":"Manjunath","family":"Hegde","sequence":"first","affiliation":[{"name":"Department of Data Science and Computer Applications, Manipal Institute of Technology, Manipal Academy of Higher Education , Manipal , Karnataka, 576104 , India"}]},{"given":"Karthik","family":"M.","sequence":"additional","affiliation":[{"name":"Department of Data Science and Computer Applications, Manipal Institute of Technology, Manipal Academy of Higher Education , Manipal , Karnataka, 576104 , India"}]},{"given":"Varun","family":"Hegde","sequence":"additional","affiliation":[{"name":"Department of Data Science and Computer Applications, Manipal Institute of Technology, Manipal Academy of Higher Education , Manipal , Karnataka, 576104 , India"}]},{"given":"Rohini R.","family":"Rao","sequence":"additional","affiliation":[{"name":"Department of Data Science and Computer Applications, Manipal Institute of Technology, Manipal Academy of Higher Education , Manipal , Karnataka, 576104 , India"}]},{"given":"Vinayak M.","family":"Mantoor","sequence":"additional","affiliation":[{"name":"Department of Data Science and Computer Applications, Manipal Institute of Technology, Manipal Academy of Higher Education , Manipal , Karnataka, 576104 , India"}]},{"given":"Radhakrishna","family":"Bhat","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Engineering, Manipal Institute of Technology, Manipal Academy of Higher Education , Manipal , Karnataka, 576104 , India"}]}],"member":"374","published-online":{"date-parts":[[2025,4,7]]},"reference":[{"key":"2025122008514877682_j_comp-2025-0024_ref_001","doi-asserted-by":"crossref","unstructured":"H. Amintoosi, M. Nikooghadam, M. Shojafar, S. Kumari, and M. Alazab, \u201cSlight: A lightweight authentication scheme for smart healthcare services,\u201d Comput. Electr. Eng., vol. 99, p. 107803, 2022.","DOI":"10.1016\/j.compeleceng.2022.107803"},{"key":"2025122008514877682_j_comp-2025-0024_ref_002","doi-asserted-by":"crossref","unstructured":"C. Huang, J. Wang, S. Wang, and Y. Zhang, \u201cInternet of medical things: A systematic review,\u201d Neurocomputing, p. 126719, 2023.","DOI":"10.1016\/j.neucom.2023.126719"},{"key":"2025122008514877682_j_comp-2025-0024_ref_003","doi-asserted-by":"crossref","unstructured":"M. A. Khan, I. U. Din, T. Majali, and B.-S. Kim, \u201cA survey of authentication in internet of things-enabled healthcare systems,\u201d Sensors, vol. 22, no. 23, p. 9089, 2022.","DOI":"10.3390\/s22239089"},{"key":"2025122008514877682_j_comp-2025-0024_ref_004","doi-asserted-by":"crossref","unstructured":"H. Qiao, X. Dong, Q. Jiang, S. Ma, C. Liu, N. Xi, and Y. Shen, \u201cAnonymous lightweight authenticated key agreement protocol for fog-assisted healthcare iot system,\u201d IEEE Internet Things J., 2023, vol. 10, pp. 16715\u201316726.","DOI":"10.1109\/JIOT.2023.3270300"},{"key":"2025122008514877682_j_comp-2025-0024_ref_005","doi-asserted-by":"crossref","unstructured":"X. Jia, D. He, N. Kumar, and K.-K. R. Choo, \u201cAuthenticated key agreement scheme for fog-driven iot healthcare system,\u201d Wireless Networks, vol. 25, no. 8, pp. 4737\u20134750, 2019.","DOI":"10.1007\/s11276-018-1759-3"},{"key":"2025122008514877682_j_comp-2025-0024_ref_006","doi-asserted-by":"crossref","unstructured":"A. Ostad-Sharif, D. Abbasinezhad-Mood, and M. Nikooghadam, \u201cA robust and efficient ECC-based mutual authentication and session key generation scheme for healthcare applications,\u201d J. Med. Syst., vol. 43, no. 1, p. 10, 2019.","DOI":"10.1007\/s10916-018-1120-5"},{"key":"2025122008514877682_j_comp-2025-0024_ref_007","doi-asserted-by":"crossref","unstructured":"D. Giri, T. Maitra, R. Amin, and P. Srivastava, \u201cAn efficient and robust rsa-based remote user authentication for telecare medical information systems,\u201d J. Med. Syst., vol. 39, pp. 1\u20139, 2015.","DOI":"10.1007\/s10916-014-0145-7"},{"key":"2025122008514877682_j_comp-2025-0024_ref_008","doi-asserted-by":"crossref","unstructured":"R. Amin and G. Biswas, \u201cAn improved rsa based user authentication and session key agreement protocol usable in TMIS,\u201d J. Med. Syst., vol. 39, no. 8, p. 79, 2015.","DOI":"10.1007\/s10916-015-0262-y"},{"key":"2025122008514877682_j_comp-2025-0024_ref_009","doi-asserted-by":"crossref","unstructured":"H. Arshad and A. Rasoolzadegan, \u201cDesign of a secure authentication and key agreement scheme preserving user privacy usable in telecare medicine information systems,\u201d J. Med. Syst., vol. 40, pp. 1\u201319, 2016.","DOI":"10.1007\/s10916-016-0585-3"},{"key":"2025122008514877682_j_comp-2025-0024_ref_010","doi-asserted-by":"crossref","unstructured":"S. Khatoon, S. M. M. Rahman, M. Alrubaian, and A. Alamri, \u201cPrivacy-preserved, provable secure, mutually authenticated key agreement protocol for healthcare in a smart city environment,\u201d IEEE Acc., vol. 7, pp. 47962\u201347971, 2019.","DOI":"10.1109\/ACCESS.2019.2909556"},{"key":"2025122008514877682_j_comp-2025-0024_ref_011","doi-asserted-by":"crossref","unstructured":"M. Masud, G. S. Gaba, S. Alqahtani, G. Muhammad, B. B. Gupta, P. Kumar, and A. Ghoneim, \u201cA lightweight and robust secure key establishment protocol for internet of medical things in covid-19 patients care,\u201d IEEE Internet Things J., vol. 8, no. 21, pp. 15694\u201315703, 2020.","DOI":"10.1109\/JIOT.2020.3047662"},{"key":"2025122008514877682_j_comp-2025-0024_ref_012","doi-asserted-by":"crossref","unstructured":"A. M.-K. Wong, C.-L. Hsu, T.-V. Le, M.-C. Hsieh, and T.-W. Lin, \u201cThree-factor fast authentication scheme with time bound and user anonymity for multi-server e-health systems in 5g-based wireless sensor networks,\u201d Sensors, vol. 20, no. 9, p. 2511, 2020.","DOI":"10.3390\/s20092511"},{"key":"2025122008514877682_j_comp-2025-0024_ref_013","doi-asserted-by":"crossref","unstructured":"L. Zhang, Y. Zhang, S. Tang, and H. Luo, \u201cPrivacy protection for e-health systems by means of dynamic authentication and three-factor key agreement,\u201d IEEE Trans. Ind. Electron., vol. 65, no. 3, pp. 2795\u20132805, 2017.","DOI":"10.1109\/TIE.2017.2739683"},{"key":"2025122008514877682_j_comp-2025-0024_ref_014","doi-asserted-by":"crossref","unstructured":"M. Fotouhi, M. Bayat, A. K. Das, H. A. N. Far, S. M. Pournaghi, and M.-A. Doostari, \u201cA lightweight and secure two-factor authentication scheme for wireless body area networks in health-care IoT,\u201d Computer Networks, vol. 177, p. 107333, 2020.","DOI":"10.1016\/j.comnet.2020.107333"},{"key":"2025122008514877682_j_comp-2025-0024_ref_015","doi-asserted-by":"crossref","unstructured":"J. Li, Z. Su, D. Guo, K.-K. R. Choo, and Y. Ji, \u201cPsl-maaka: Provably secure and lightweight mutual authentication and key agreement protocol for fully public channels in internet of medical things,\u201d IEEE Internet Things J., vol. 8, no. 17, pp. 13183\u201313195, 2021.","DOI":"10.1109\/JIOT.2021.3055827"},{"key":"2025122008514877682_j_comp-2025-0024_ref_016","doi-asserted-by":"crossref","unstructured":"M. Masud, G. S. Gaba, K. Choudhary, M. S. Hossain, M. F. Alhamid, and G. Muhammad, \u201cLightweight and anonymity-preserving user authentication scheme for IoT-based healthcare,\u201d IEEE Internet Things J., vol. 9, no. 4, pp. 2649\u20132656, 2021.","DOI":"10.1109\/JIOT.2021.3080461"},{"key":"2025122008514877682_j_comp-2025-0024_ref_017","doi-asserted-by":"crossref","unstructured":"W. Wang, Q. Chen, Z. Yin, G. Srivastava, T. R. Gadekallu, F. Alsolami, and C. Su, \u201cBlockchain and puf-based lightweight authentication protocol for wireless medical sensor networks,\u201d IEEE Internet Things J., vol. 9, no. 11, pp. 8883\u20138891, 2021.","DOI":"10.1109\/JIOT.2021.3117762"},{"key":"2025122008514877682_j_comp-2025-0024_ref_018","doi-asserted-by":"crossref","unstructured":"T.-Y. Wu, T. Wang, Y.-Q. Lee, W. Zheng, S. Kumari, and S. Kumar, \u201cImproved authenticated key agreement scheme for fog-driven iot healthcare system,\u201d Security and Communication Networks, vol. 2021, pp. 1\u201316, 2021.","DOI":"10.1155\/2021\/6658041"},{"key":"2025122008514877682_j_comp-2025-0024_ref_019","doi-asserted-by":"crossref","unstructured":"K. Sowjanya, M. Dasgupta, and S. Ray, \u201cElliptic curve cryptography based authentication scheme for internet of medical things,\u201d J. Inf. Secur., vol. 58, p. 102761, 2021.","DOI":"10.1016\/j.jisa.2021.102761"},{"key":"2025122008514877682_j_comp-2025-0024_ref_020","doi-asserted-by":"crossref","unstructured":"D. He, S. Zeadally, N. Kumar, and J.-H. Lee, \u201cAnonymous authentication for wireless body area networks with provable security,\u201d IEEE Systems Journal, vol. 11, no. 4, pp. 2590\u20132601, 2016.","DOI":"10.1109\/JSYST.2016.2544805"},{"key":"2025122008514877682_j_comp-2025-0024_ref_021","doi-asserted-by":"crossref","unstructured":"S. Yu and Y. Park, \u201cA robust authentication protocol for wireless medical sensor networks using blockchain and physically unclonable functions,\u201d IEEE Internet Things J., vol. 9, no. 20, pp. 20214\u201320228, 2022.","DOI":"10.1109\/JIOT.2022.3171791"},{"key":"2025122008514877682_j_comp-2025-0024_ref_022","doi-asserted-by":"crossref","unstructured":"A. Gupta, M. Tripathi, S. Muhuri, G. Singal, and N. Kumar, \u201cA secure and lightweight anonymous mutual authentication scheme for wearable devices in medical internet of things,\u201d J. Inf. Secur., vol. 68, p. 103259, 2022.","DOI":"10.1016\/j.jisa.2022.103259"},{"key":"2025122008514877682_j_comp-2025-0024_ref_023","doi-asserted-by":"crossref","unstructured":"V. Sumithra, R. Shashidhara, and D. Mukhopadhyay, \u201cDesign of a secure and privacy preserving authentication protocol for telecare medical information systems,\u201d Security and Privacy, vol. 5, no. 4, p. 222228, 2022.","DOI":"10.1002\/spy2.228"},{"key":"2025122008514877682_j_comp-2025-0024_ref_024","doi-asserted-by":"crossref","unstructured":"C.-M. Chen, Z. Chen, S. Kumari, and M.-C. Lin, \u201cLap-IoHT: A lightweight authentication protocol for the internet of health things,\u201d Sensors, vol. 22, no. 14, p. 5401, 2022.","DOI":"10.3390\/s22145401"},{"key":"2025122008514877682_j_comp-2025-0024_ref_025","doi-asserted-by":"crossref","unstructured":"Y. Ma, Y. Ma, Y. Liu, and Q. Cheng, \u201cA secure and efficient certificateless authenticated key agreement protocol for smart healthcare,\u201d Comput. Stand. Inter., vol. 86, p. 103735, 2023.","DOI":"10.1016\/j.csi.2023.103735"},{"key":"2025122008514877682_j_comp-2025-0024_ref_026","doi-asserted-by":"crossref","unstructured":"W. Wang, H. Huang, F. Xiao, Q. Li, L. Xue, and J. Jiang, \u201cComputation-transferable authenticated key agreement protocol for smart healthcare,\u201d J. Syst. Archit., vol. 118, p. 102215, 2021.","DOI":"10.1016\/j.sysarc.2021.102215"},{"key":"2025122008514877682_j_comp-2025-0024_ref_027","doi-asserted-by":"crossref","unstructured":"K. Kim, J. Ryu, Y. Lee, and D. Won, \u201cAn improved lightweight user authentication scheme for the internet of medical things,\u201d Sensors, vol. 23, no. 3, p. 1122, 2023.","DOI":"10.3390\/s23031122"},{"key":"2025122008514877682_j_comp-2025-0024_ref_028","doi-asserted-by":"crossref","unstructured":"K. K. Saini, D. Kaur, D. Kumar, and B. Kumar, \u201cAn efficient three-factor authentication protocol for wireless healthcare sensor networks,\u201d Multimedia Tools and Applications, vol., 83, pp. 1\u201323, 2024.","DOI":"10.1007\/s11042-024-18114-1"},{"key":"2025122008514877682_j_comp-2025-0024_ref_029","doi-asserted-by":"crossref","unstructured":"P. Soni, A. K. Pal, and S. H. Islam, \u201cAn improved three-factor authentication scheme for patient monitoring using WSN in remote health-care system,\u201d Computer methods and programs in biomedicine, vol. 182, p. 105054, 2019.","DOI":"10.1016\/j.cmpb.2019.105054"},{"key":"2025122008514877682_j_comp-2025-0024_ref_030","doi-asserted-by":"crossref","unstructured":"A. Aldosary and M. Tanveer, \u201cPaaf-shs: Puf and authenticated encryption based authentication framework for the IoT-enabled smart healthcare system,\u201d Internet of Things, vol. 26, p. 101159, 2024.","DOI":"10.1016\/j.iot.2024.101159"},{"key":"2025122008514877682_j_comp-2025-0024_ref_031","doi-asserted-by":"crossref","unstructured":"D. Dolev and A. Yao, \u201cOn the security of public key protocols,\u201d IEEE Trans. Inf. Theory, vol. 29, no. 2, pp. 198\u2013208, 1983.","DOI":"10.1109\/TIT.1983.1056650"},{"key":"2025122008514877682_j_comp-2025-0024_ref_032","doi-asserted-by":"crossref","unstructured":"C. Blundo, A. De Santis, A. Herzberg, S. Kutten, U. Vaccaro, and M. Yung, \u201cPerfectly secure key distribution for dynamic conferences,\u201d Information and Computation, vol. 146, no. 1, pp. 1\u201323, 1998.","DOI":"10.1006\/inco.1998.2717"},{"key":"2025122008514877682_j_comp-2025-0024_ref_033","doi-asserted-by":"crossref","unstructured":"Y. Zhou and Y. Fang, \u201cA two-layer key establishment scheme for wireless sensor networks,\u201d IEEE Trans Mob Comput., vol. 6, no. 9, pp. 1009\u20131020, 2007.","DOI":"10.1109\/TMC.2007.1008"},{"key":"2025122008514877682_j_comp-2025-0024_ref_034","doi-asserted-by":"crossref","unstructured":"V. Odelu, A. K. Das, M. Wazid, M. Conti, \u201cProvably secure authenticated key agreement scheme for smart grid,\u201d IEEE Transactions on Smart Grid, vol. 9, no. 3, pp. 1900\u20131910, 2016.","DOI":"10.1109\/TSG.2016.2602282"},{"key":"2025122008514877682_j_comp-2025-0024_ref_035","doi-asserted-by":"crossref","unstructured":"R. Canetti and H. Krawczyk, \u201cAnalysis of key-exchange protocols and their use for building secure channels,\u201d in International conference on the theory and applications of cryptographic techniques, Springer, 2001, pp. 453\u2013474.","DOI":"10.1007\/3-540-44987-6_28"},{"key":"2025122008514877682_j_comp-2025-0024_ref_036","doi-asserted-by":"crossref","unstructured":"J.-L. Tsai and N.-W. Lo, \u201cSecure anonymous key distribution scheme for smart grid,\u201d IEEE Transactions on Smart Grid, vol. 7, no. 2, pp. 906\u2013914, 2015.","DOI":"10.1109\/TSG.2015.2440658"},{"key":"2025122008514877682_j_comp-2025-0024_ref_037","doi-asserted-by":"crossref","unstructured":"X. Jin, N. Lin, Z. Li, W. Jiang, Y. Jia, and Q. Li, \u201cA lightweight authentication scheme for power IoT based on PUF and Chebyshev chaotic map,\u201d IEEE Acc., vol. 12, 83692\u201383706, 2024.","DOI":"10.1109\/ACCESS.2024.3413853"},{"key":"2025122008514877682_j_comp-2025-0024_ref_038","doi-asserted-by":"crossref","unstructured":"M. Nikooghadam, H. Amintoosi, and N. Bagheri, \u201cLightweight authentication for remote healthcare systems in cloud-IoT,\u201d in: 2020 10th International Conference on Computer and Knowledge Engineering (ICCKE), IEEE, 2020, pp. 636\u2013643.","DOI":"10.1109\/ICCKE50421.2020.9303671"},{"key":"2025122008514877682_j_comp-2025-0024_ref_039","doi-asserted-by":"crossref","unstructured":"S. Das and S. Namasudra, \u201cLightweight and efficient privacy-preserving mutual authentication scheme to secure internet of things-based smart healthcare,\u201d Trans. Emerg. Telecommun. Technol., vol. 34, no. 11, p. e4716, 2023.","DOI":"10.1002\/ett.4716"}],"container-title":["Open Computer Science"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.degruyterbrill.com\/document\/doi\/10.1515\/comp-2025-0024\/xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.degruyterbrill.com\/document\/doi\/10.1515\/comp-2025-0024\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,12,20]],"date-time":"2025-12-20T08:57:17Z","timestamp":1766221037000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.degruyterbrill.com\/document\/doi\/10.1515\/comp-2025-0024\/html"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,1,1]]},"references-count":39,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2025,9,17]]},"published-print":{"date-parts":[[2025,9,17]]}},"alternative-id":["10.1515\/comp-2025-0024"],"URL":"https:\/\/doi.org\/10.1515\/comp-2025-0024","relation":{},"ISSN":["2299-1093"],"issn-type":[{"value":"2299-1093","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,1,1]]},"article-number":"20250024"}}