{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,2]],"date-time":"2025-11-02T10:45:03Z","timestamp":1762080303129,"version":"build-2065373602"},"reference-count":46,"publisher":"SAGE Publications","issue":"2","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IDT"],"published-print":{"date-parts":[[2023,5,15]]},"abstract":"<jats:p>The traditional healthcare systems require more data storage and not a quick responsive mode. The new era of intelligent healthcare systems uses advanced frameworks and devices to work with Internet of things (IoT), Cloud Computing, edge computing devices, and the Internet of Medical Things (IoMT). These technology adoptions may drastically increase healthcare systems performance and are available anytime and anywhere to replace traditional medical methods\u00a0\u2013 the organizations in the network exchange the patient data that has been gathered. The healthcare systems are therefore susceptible to a variety of threats. The attacker may exploit many attacks during the transmission. This paper introduces a novel mechanism of A Secure Robust Privacy-Preserving Authentication and Key Agreement Framework for Mobile Healthcare Applications. The proposed framework collects the patient\u2019s data using wearable devices called sensors, and the collected data is shared with various entities using a secure mechanism. The proposed framework uses Elliptic Curve Cryptography (ECC). Digital sign is created and validated through the Elliptic Curve Digital Signature Algorithm (ECDSA). Security properties of the proposed framework are analyzed through standard model checking tool Automated Validation of Internet Security Protocols (AVISPA). The suggested protocol is simple to develop and can withstand network-related threats.<\/jats:p>","DOI":"10.3233\/idt-220132","type":"journal-article","created":{"date-parts":[[2022,12,13]],"date-time":"2022-12-13T16:50:58Z","timestamp":1670950258000},"page":"377-393","source":"Crossref","is-referenced-by-count":12,"title":["Software-driven secure framework for mobile healthcare applications in IoMT"],"prefix":"10.1177","volume":"17","author":[{"given":"T. Bala Murali","family":"Krishna","sequence":"first","affiliation":[{"name":"Department of Computer Science and Engineering, Dhanekula Institute of Engineering and Technology, Vijayawada, Andhra Pradesh, India"}]},{"given":"S. Phani","family":"Praveen","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Engineering, Prasad V Potluri Siddhartha Institute of Technology, Vijayawada, Andhra Prades, India"}]},{"given":"Shakeel","family":"Ahmed","sequence":"additional","affiliation":[{"name":"Department of Computer Science, College of Computer Sciences and Information Technology, King Faisal University, Al-Ahsa, Saudi Arabia"}]},{"given":"Parvathaneni Naga","family":"Srinivasu","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Engineering, Prasad V Potluri Siddhartha Institute of Technology, Vijayawada, Andhra Prades, India"}]}],"member":"179","reference":[{"issue":"6","key":"10.3233\/IDT-220132_ref1","doi-asserted-by":"crossref","first-page":"8298","DOI":"10.3934\/mbe.2021411","article-title":"Securing industrial communication with software-defined networking","volume":"18","author":"Savaliya","year":"2021","journal-title":"Mathematical Biosciences and Engineering"},{"key":"10.3233\/IDT-220132_ref2","doi-asserted-by":"crossref","first-page":"2250264","DOI":"10.1142\/S0218126622502644","article-title":"SDN Framework for Mitigating Time-Based Delay Attack","author":"Ramani","year":"2022","journal-title":"Journal of Circuits, Systems and Computers"},{"key":"10.3233\/IDT-220132_ref3","doi-asserted-by":"crossref","first-page":"2250303","DOI":"10.1142\/S0218126622503030","article-title":"Probabilistic Buckshot-Driven Cluster Head Identification and Accumulative Data Encryption in WSN","author":"Naga Srinivasu","year":"2022","journal-title":"Journal of Circuits, Systems and Computers"},{"key":"10.3233\/IDT-220132_ref4","doi-asserted-by":"crossref","first-page":"13","DOI":"10.1007\/978-981-32-9690-9_2","article-title":"An Exploration of Distributed Access Control Mechanism Using BlockChain","author":"Swapna","year":"2020","journal-title":"Smart Intelligent Computing and Applications"},{"key":"10.3233\/IDT-220132_ref5","doi-asserted-by":"crossref","first-page":"107969","DOI":"10.1016\/j.compeleceng.2022.107969","article-title":"A smart secure healthcare monitoring system with Internet of Medical Things","volume":"101","author":"Shreya","year":"2022","journal-title":"Computers and Electrical Engineering"},{"issue":"2","key":"10.3233\/IDT-220132_ref6","doi-asserted-by":"crossref","first-page":"198","DOI":"10.1109\/TIT.1983.1056650","article-title":"On the security of public key protocols","volume":"29","author":"Dolev","year":"1983","journal-title":"IEEE Transactions on Information Theory"},{"issue":"1","key":"10.3233\/IDT-220132_ref7","doi-asserted-by":"crossref","first-page":"21","DOI":"10.1016\/S1386-5056(99)00056-8","article-title":"Mobile information and communication tools in the hospital","volume":"57","author":"Ammenwerth","year":"2000","journal-title":"International Journal of Medical Informatics"},{"issue":"1","key":"10.3233\/IDT-220132_ref8","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1186\/1475-925X-10-24","article-title":"How smartphones are changing the face of mobile and participatory healthcare: an overview, with example from eCAALYX","volume":"10","author":"Boulos","year":"2011","journal-title":"Biomedical Engineering Online"},{"issue":"1","key":"10.3233\/IDT-220132_ref9","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1186\/s12911-021-01563-1","article-title":"Usefulness of smartphone use among surgeons in clinical practice during the pandemic of COVID-19: a cross-sectional study","volume":"21","author":"Buabbas","year":"2021","journal-title":"BMC Medical Informatics and Decision Making"},{"issue":"1","key":"10.3233\/IDT-220132_ref10","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1186\/s13584-016-0082-7","article-title":"Designing online health services for patients","volume":"5","author":"Crotty","year":"2016","journal-title":"Israel journal of health policy research"},{"issue":"4","key":"10.3233\/IDT-220132_ref11","doi-asserted-by":"crossref","first-page":"2046","DOI":"10.1109\/SURV.2013.031413.00127","article-title":"A survey of defense mechanisms against distributed denial of service (DDoS) flooding attacks","volume":"15","author":"Zargar","year":"2013","journal-title":"IEEE communications surveys & tutorials"},{"issue":"1","key":"10.3233\/IDT-220132_ref12","doi-asserted-by":"crossref","first-page":"501","DOI":"10.1007\/s10586-020-03133-y","article-title":"SNORT based early DDoS detection system using Opendaylight and open networking operating system in software defined networking","volume":"24","author":"Badotra","year":"2021","journal-title":"Cluster Computing"},{"key":"10.3233\/IDT-220132_ref13","doi-asserted-by":"crossref","unstructured":"Chhabra M, Gupta B, Almomani A. A novel solution to handle DDOS attack in MANET. 2013.","DOI":"10.4236\/jis.2013.43019"},{"key":"10.3233\/IDT-220132_ref14","first-page":"5321","article-title":"An effective secure storage of data in cloud using ISSE encryption technique","author":"Sindhura","year":"2021","journal-title":"Annals of the Romanian Society for Cell Biology"},{"key":"10.3233\/IDT-220132_ref15","doi-asserted-by":"crossref","first-page":"193","DOI":"10.1109\/DANCE.2002.1003493","article-title":"Active network based DDoS defense","author":"Sterne","year":"2002","journal-title":"Proceedings DARPA Active Networks Conference and Exposition"},{"key":"10.3233\/IDT-220132_ref16","first-page":"580","article-title":"Online health care","author":"Anjum","year":"2018","journal-title":"2018 IEEE 8th Annual Computing and Communication Workshop and Conference (CCWC)"},{"issue":"5","key":"10.3233\/IDT-220132_ref17","first-page":"356","article-title":"Mobile devices and apps for health care professionals: uses and benefits","volume":"39","author":"Ventola","year":"2014","journal-title":"Pharmacy and Therapeutics"},{"key":"10.3233\/IDT-220132_ref18","doi-asserted-by":"crossref","first-page":"489","DOI":"10.1145\/1523103.1523200","article-title":"Detection of DDoS attack and defense against IP spoofing","author":"Mopari","year":"2009","journal-title":"Proceedings of the International Conference on Advances in Computing, Communication and Control"},{"key":"10.3233\/IDT-220132_ref19","doi-asserted-by":"crossref","first-page":"371","DOI":"10.1145\/1229285.1229331","article-title":"Non-intrusive IP traceback for DDoS attacks","author":"Thing","year":"2007","journal-title":"Proceedings of the 2nd ACM symposium on Information, computer and communications security"},{"issue":"1","key":"10.3233\/IDT-220132_ref20","doi-asserted-by":"crossref","first-page":"36","DOI":"10.1007\/s102070100002","article-title":"The elliptic curve digital signature algorithm (ECDSA)","volume":"1","author":"Johnson","year":"2001","journal-title":"International Journal of Information Security"},{"issue":"4","key":"10.3233\/IDT-220132_ref21","doi-asserted-by":"crossref","first-page":"3129","DOI":"10.1109\/TNSE.2021.3104499","article-title":"Fault-resilience for bandwidth management in industrial software-defined networks","volume":"8","author":"Jhaveri","year":"2021","journal-title":"IEEE Transactions on Network Science and Engineering"},{"issue":"1","key":"10.3233\/IDT-220132_ref22","doi-asserted-by":"crossref","first-page":"18","DOI":"10.1109\/MCE.2017.2755378","article-title":"Everything you wanted to know about smart health care: Evaluating the different technologies and components of the internet of things for better health","volume":"7","author":"Sundaravadivel","year":"2017","journal-title":"IEEE Consumer Electronics Magazine"},{"key":"10.3233\/IDT-220132_ref23","first-page":"337","article-title":"Universally composable notions of key exchange and secure channels","author":"Canetti","year":"2002","journal-title":"International Conference on the Theory and Applications of Cryptographic Techniques"},{"key":"10.3233\/IDT-220132_ref24","unstructured":"Automated validation of internet security protocols. Accessed: 2016-08-02. Available from: http:\/\/www.avispa-project.org\/\/web-interface\/basic.php."},{"key":"10.3233\/IDT-220132_ref25","doi-asserted-by":"crossref","first-page":"281","DOI":"10.1007\/11513988_27","article-title":"The AVISPA tool for the automated validation of internet security protocols and applications","author":"Armando","year":"2005","journal-title":"International Conference on Computer Aided Verification"},{"key":"10.3233\/IDT-220132_ref26","unstructured":"AVISPA Team. AVISPA v1.0 User Manual. 2006."},{"key":"10.3233\/IDT-220132_ref27","unstructured":"HLSPL Tutorial. A Beginner\u2019s Guide to Modelling and Analysing Internet Security Protocols. 2009. Available at [AH-03]."},{"key":"10.3233\/IDT-220132_ref28","doi-asserted-by":"crossref","first-page":"61","DOI":"10.1016\/j.entcs.2005.11.052","article-title":"Automated security protocol analysis with the AVISPA tool","volume":"155","author":"Vigan\u00f2","year":"2006","journal-title":"Electronic Notes in Theoretical Computer Science"},{"key":"10.3233\/IDT-220132_ref29","doi-asserted-by":"crossref","first-page":"152","DOI":"10.1016\/j.adhoc.2015.05.014","article-title":"An efficient user authentication and key agreement scheme for heterogeneous wireless sensor network tailored for the Internet of Things environment","volume":"36","author":"Farash","year":"2016","journal-title":"Ad Hoc Networks"},{"key":"10.3233\/IDT-220132_ref30","doi-asserted-by":"crossref","first-page":"3028","DOI":"10.1109\/ACCESS.2017.2676119","article-title":"Secure signature-based authenticated key establishment scheme for future IoT applications","volume":"5","author":"Challa","year":"2017","journal-title":"IEEE Access"},{"issue":"1","key":"10.3233\/IDT-220132_ref31","doi-asserted-by":"crossref","first-page":"619","DOI":"10.1007\/s40998-018-0146-5","article-title":"A lightweight user authentication scheme for cloud-IoT based healthcare services","volume":"43","author":"Sharma","year":"2019","journal-title":"Iranian Journal of Science and Technology, Transactions of Electrical Engineering"},{"key":"10.3233\/IDT-220132_ref32","doi-asserted-by":"crossref","first-page":"108158","DOI":"10.1016\/j.compeleceng.2022.108158","article-title":"A tree classifier based network intrusion detection model for Internet of Medical Things","volume":"102","author":"Gupta","year":"2022","journal-title":"Computers and Electrical Engineering"},{"key":"10.3233\/IDT-220132_ref33","doi-asserted-by":"crossref","unstructured":"Zhou L, Li X, Yeh KH, Su C, Chiu W. Lightweight IoT-based authentication scheme in cloud computing circumstance. Future Generation Computer Systems. 2019;91:244-51.","DOI":"10.1016\/j.future.2018.08.038"},{"key":"10.3233\/IDT-220132_ref34","first-page":"1","article-title":"SPCS-IoTEH: Secure Privacy-Preserving Communication Scheme for IoT-Enabled e-Health Applications.","author":"Garg","year":"2021","journal-title":"ICC 2021-IEEE International Conference on Communications"},{"issue":"4","key":"10.3233\/IDT-220132_ref35","doi-asserted-by":"crossref","first-page":"1292","DOI":"10.1016\/j.jnca.2011.02.004","article-title":"Using one-time passwords to prevent password phishing attacks","volume":"34","author":"Huang","year":"2011","journal-title":"Journal of Network and Computer Applications"},{"key":"10.3233\/IDT-220132_ref36","first-page":"58","article-title":"Dynamic pharming attacks and locked same-origin policies for web browsers","author":"Karlof","year":"2007","journal-title":"Proceedings of the 14th ACM Conference on Computer and Communications Security"},{"key":"10.3233\/IDT-220132_ref37","first-page":"1","article-title":"Design of Security Training System for Individual Users","author":"Lim","year":"2016","journal-title":"Wireless Personal Communications"},{"key":"10.3233\/IDT-220132_ref38","doi-asserted-by":"crossref","first-page":"231","DOI":"10.1016\/j.eswa.2016.01.028","article-title":"New rule-based phishing detection method","volume":"53","author":"Moghimi","year":"2016","journal-title":"Expert systems with applications"},{"key":"10.3233\/IDT-220132_ref39","doi-asserted-by":"crossref","unstructured":"Gupta M, Thakur N, Bansal D, Chaudhary G, Davaasambuu B, Hua Q. CNN-LSTM hybrid real-time IoT-based cognitive approaches for ISLR with WebRTC: auditory impaired assistive technology. Journal of Healthcare Engineering. 2022; 2022.","DOI":"10.1155\/2022\/3978627"},{"issue":"6","key":"10.3233\/IDT-220132_ref40","doi-asserted-by":"crossref","first-page":"953","DOI":"10.1080\/09720529.2019.1632024","article-title":"An efficient and secure identity based multiple signatures scheme based on RSA","volume":"22","author":"Tanwar","year":"2019","journal-title":"Journal of Discrete Mathematical Sciences and Cryptography"},{"key":"10.3233\/IDT-220132_ref41","first-page":"e12997","article-title":"Effective energy usage and data compression approach using data mining algorithms for IoT data","author":"Karupusamy","year":"2022","journal-title":"Expert Systems"},{"issue":"3","key":"10.3233\/IDT-220132_ref42","doi-asserted-by":"crossref","first-page":"1","DOI":"10.4018\/IJISP.2017070101","article-title":"A proposed scheme for remedy of man-in-the-middle attack on certificate authority","volume":"11","author":"Tanwar","year":"2017","journal-title":"International Journal of Information Security and Privacy (IJISP)"},{"key":"10.3233\/IDT-220132_ref43","doi-asserted-by":"crossref","unstructured":"Khan MAR, Shavkatovich SN, Nagpal B, Kumar A, Haq MA, Tharini VJ, et\u00a0al. Optimizing Hybrid Metaheuristic Algorithm with Cluster Head to Improve Performance Metrics On The IOT. Theoretical Computer Science. 2022.","DOI":"10.1016\/j.tcs.2022.05.031"},{"issue":"1","key":"10.3233\/IDT-220132_ref44","doi-asserted-by":"crossref","first-page":"48","DOI":"10.1049\/iet-cdt.2012.0073","article-title":"Three-factor control protocol based on elliptic curve cryptosystem for universal serial bus mass storage devices","volume":"7","author":"Lee","year":"2013","journal-title":"IET Computers & Digital Techniques"},{"issue":"12","key":"10.3233\/IDT-220132_ref45","doi-asserted-by":"crossref","first-page":"2681","DOI":"10.1109\/TIFS.2015.2473820","article-title":"An efficient identity-based conditional privacy-preserving authentication scheme for vehicular ad hoc networks","volume":"10","author":"He","year":"2015","journal-title":"IEEE Transactions on Information Forensics and Security"},{"key":"10.3233\/IDT-220132_ref46","first-page":"530","article-title":"Insider and flooding attack in cloud: A discussion","author":"Gupta","year":"2016","journal-title":"2016 3rd International Conference on Computing for Sustainable Global Development (INDIACom)"}],"container-title":["Intelligent Decision Technologies"],"original-title":[],"link":[{"URL":"https:\/\/content.iospress.com\/download?id=10.3233\/IDT-220132","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,10]],"date-time":"2025-03-10T13:00:47Z","timestamp":1741611647000},"score":1,"resource":{"primary":{"URL":"https:\/\/journals.sagepub.com\/doi\/full\/10.3233\/IDT-220132"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,5,15]]},"references-count":46,"journal-issue":{"issue":"2"},"URL":"https:\/\/doi.org\/10.3233\/idt-220132","relation":{},"ISSN":["1872-4981","1875-8843"],"issn-type":[{"type":"print","value":"1872-4981"},{"type":"electronic","value":"1875-8843"}],"subject":[],"published":{"date-parts":[[2023,5,15]]}}}