{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,4]],"date-time":"2025-12-04T07:01:11Z","timestamp":1764831671666,"version":"3.46.0"},"reference-count":183,"publisher":"Tech Science Press","issue":"2","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["CMC"],"published-print":{"date-parts":[[2025]]},"DOI":"10.32604\/cmc.2025.066579","type":"journal-article","created":{"date-parts":[[2025,8,25]],"date-time":"2025-08-25T08:44:43Z","timestamp":1756111483000},"page":"2305-2345","source":"Crossref","is-referenced-by-count":0,"title":["Security Challenges and Analysis Tools in Internet of Health Things: A Comprehensive Review"],"prefix":"10.32604","volume":"85","author":[{"given":"Enas W.","family":"Abood","sequence":"first","affiliation":[]},{"given":"Ali A.","family":"Yassin","sequence":"additional","affiliation":[]},{"given":"Zaid Ameen","family":"Abduljabbar","sequence":"additional","affiliation":[]},{"given":"Vincent Omollo","family":"Nyangaresi","sequence":"additional","affiliation":[]},{"given":"Iman Qays","family":"Abduljaleel","sequence":"additional","affiliation":[]},{"given":"Abdulla J. Y.","family":"Aldarwish","sequence":"additional","affiliation":[]},{"given":"Husam A.","family":"Neamah","sequence":"additional","affiliation":[]}],"member":"17807","published-online":{"date-parts":[[2025]]},"reference":[{"key":"ref1","doi-asserted-by":"crossref","first-page":"100610","DOI":"10.1016\/j.iot.2022.100610","article-title":"Intelligent authentication of 5G healthcare devices: a survey","volume":"20","author":"Sodhro","year":"2022","journal-title":"Internet Things"},{"key":"ref2","doi-asserted-by":"crossref","first-page":"3970","DOI":"10.1109\/JSYST.2017.2773633","article-title":"5G D2D networks: techniques, challenges, and future prospects","volume":"12","author":"Ansari","year":"2018","journal-title":"IEEE Syst J"},{"key":"ref3","series-title":"2016 IEEE International Conference on Signal Processing, Communications and Computing (ICSPCC)","article-title":"Secure and efficient e-health scheme based on the internet of things","author":"Hussien","year":"2016"},{"key":"ref4","doi-asserted-by":"crossref","first-page":"571","DOI":"10.1016\/j.icte.2023.02.007","article-title":"Digitization of healthcare sector: a study on privacy and security concerns","volume":"9","author":"Paul","year":"2023","journal-title":"ICT Express"},{"key":"ref5","first-page":"1","article-title":"Comprehensive survey on AI-based technologies for enhancing IoT privacy and security: trends, challenges, and solutions","volume":"13","author":"Castro","year":"2023","journal-title":"Hum Centric Comput Inf Sci"},{"key":"ref6","doi-asserted-by":"crossref","first-page":"581","DOI":"10.1016\/j.future.2019.12.028","article-title":"Securing medical things systems: limitations, issues and recommendations","volume":"105","author":"Yaacoub","year":"2020","journal-title":"Future Gener Comput Syst"},{"key":"ref7","doi-asserted-by":"crossref","first-page":"785","DOI":"10.1109\/TSE.2024.3363611","article-title":"A systematic review of IoT systems testing: objectives, approaches, tools, and challenges","volume":"50","author":"Minani","year":"2024","journal-title":"IEEE Trans Softw Eng"},{"key":"ref8","series-title":"Proceedings of the 24th European Conference on Pattern Languages of Programs","article-title":"Testing and deployment patterns for the internet-of-things","author":"Dias","year":"2019 Jul 3\u20137"},{"key":"ref9","doi-asserted-by":"crossref","first-page":"9957888","DOI":"10.1155\/2022\/9957888","article-title":"Blockchain and fog computing in IoT-driven healthcare services for smart cities","volume":"2022","author":"Kamruzzaman","year":"2022","journal-title":"J Healthc Eng"},{"key":"ref10","doi-asserted-by":"crossref","first-page":"3680","DOI":"10.1109\/TII.2019.2903342","article-title":"Towards secure industrial IoT: blockchain system with credit-based consensus mechanism","volume":"15","author":"Huang","year":"2019","journal-title":"IEEE Trans Industr Inform"},{"key":"ref11","doi-asserted-by":"crossref","first-page":"162","DOI":"10.1016\/j.future.2023.09.032","article-title":"A scalable and lightweight group authentication framework for Internet of Medical Things using integrated blockchain and fog computing","volume":"151","author":"Alsaeed","year":"2024","journal-title":"Future Gener Comput Syst"},{"key":"ref12","doi-asserted-by":"crossref","first-page":"329","DOI":"10.1016\/j.eij.2022.02.004","article-title":"BlockMedCare: a healthcare system based on IoT, Blockchain and IPFS for data management security","volume":"23","author":"Azbeg","year":"2022","journal-title":"Egypt Inform J"},{"key":"ref13","doi-asserted-by":"crossref","first-page":"200","DOI":"10.1186\/s12913-021-06215-8","article-title":"Learning health systems using data to drive healthcare improvement and impact: a systematic review","volume":"21","author":"Enticott","year":"2021","journal-title":"BMC Health Serv Res"},{"key":"ref14","doi-asserted-by":"crossref","first-page":"101351","DOI":"10.1016\/j.iot.2024.101351","article-title":"CICIoMT2024: a benchmark dataset for multi-protocol security assessment in IoMT","volume":"28","author":"Dadkhah","year":"2024","journal-title":"Internet Things"},{"key":"ref15","doi-asserted-by":"crossref","first-page":"12233","DOI":"10.1038\/s41598-024-62066-3","article-title":"Modeling security evaluation framework for IoHT-driven systems using integrated decision-making methodology","volume":"14","author":"Khan","year":"2024","journal-title":"Sci Rep"},{"key":"ref16","doi-asserted-by":"crossref","first-page":"100190","DOI":"10.1016\/j.smhl.2021.100190","article-title":"AC-AC: dynamic revocable access control for acute care teams to access medical records","volume":"20","author":"de Oliveira","year":"2021","journal-title":"Smart Health"},{"key":"ref17","doi-asserted-by":"crossref","first-page":"7916","DOI":"10.1007\/s11227-020-03570-x","article-title":"Towards design and implementation of security and privacy framework for internet of medical things (IoMT) by leveraging blockchain and IPFS technology","volume":"77","author":"Kumar","year":"2021","journal-title":"J Supercomput"},{"key":"ref18","doi-asserted-by":"crossref","first-page":"107630","DOI":"10.1016\/j.compbiomed.2023.107630","article-title":"A blockchain-based federated learning mechanism for privacy preservation of healthcare IoT data","volume":"167","author":"Moulahi","year":"2023","journal-title":"Comput Biol Med"},{"key":"ref19","doi-asserted-by":"crossref","first-page":"311","DOI":"10.1016\/j.comcom.2020.02.018","article-title":"An exhaustive survey on security and privacy issues in Healthcare 4.0","volume":"153","author":"Hathaliya","year":"2020","journal-title":"Comput Commun"},{"key":"ref20","doi-asserted-by":"crossref","first-page":"2893","DOI":"10.1109\/JIOT.2021.3112686","article-title":"Privacy-aware access control in IoT-enabled healthcare: a federated deep learning approach","volume":"10","author":"Lin","year":"2023","journal-title":"IEEE Internet Things J"},{"key":"ref21","doi-asserted-by":"crossref","first-page":"9074","DOI":"10.3390\/s22239074","article-title":"A machine-learning-blockchain-based authentication using smart contracts for an IoHT system","volume":"22","author":"Gaur","year":"2022","journal-title":"Sensors"},{"key":"ref22","unstructured":"Censys. [cited 2025 Jul 1]. Available from: https:\/\/censys.com\/state-of-internet-of-healthcare-things\/."},{"key":"ref23","doi-asserted-by":"crossref","first-page":"1337","DOI":"10.1002\/spe.3319","article-title":"Blockchain and explainable AI for enhanced decision making in cyber threat detection","volume":"54","author":"Kumar","year":"2024","journal-title":"Softw Pract Exp"},{"key":"ref24","doi-asserted-by":"crossref","first-page":"2294875","DOI":"10.1080\/23311975.2023.2294875","article-title":"Towards a comprehensive understanding of blockchain technology adoption in various industries in developing and emerging economies: a systematic review","volume":"11","author":"Al-Sulami","year":"2024","journal-title":"Cogent Bus Manag"},{"key":"ref25","series-title":"2006 22nd Annual Computer Security Applications Conference (ACSAC\u201906)","first-page":"175","article-title":"A study of access control requirements for healthcare systems based on audit trails from access logs","author":"Rostad","year":"2006 Dec 11\u201315"},{"key":"ref26","doi-asserted-by":"crossref","first-page":"103522","DOI":"10.1016\/j.csi.2021.103522","article-title":"Privacy preservation of electronic health records with adversarial attacks identification in hybrid cloud","volume":"78","author":"Kanwal","year":"2021","journal-title":"Comput Stand Interfaces"},{"key":"ref27","doi-asserted-by":"crossref","first-page":"102481","DOI":"10.1016\/j.jnca.2019.102481","article-title":"A comprehensive survey on attacks, security issues and blockchain solutions for IoT and IIoT","volume":"149","author":"Sengupta","year":"2020","journal-title":"J Netw Comput Appl"},{"key":"ref28","doi-asserted-by":"crossref","first-page":"1200390","DOI":"10.3389\/fdata.2023.1200390","article-title":"Authentication, access, and monitoring system for critical areas with the use of artificial intelligence integrated into perimeter security in a data center","volume":"6","author":"Villegas-Ch","year":"2023","journal-title":"Front Big Data"},{"key":"ref29","doi-asserted-by":"crossref","unstructured":"Guo H, Li W, Nejad M, Shen CC. Access control for electronic health records with hybrid blockchain-edge architecture. arXiv:1906.01188. 2019.","DOI":"10.1109\/Blockchain.2019.00015"},{"key":"ref30","series-title":"2018 4th International Conference on Cloud Computing Technologies and Applications (Cloudtech)","article-title":"Blockchain and IoT for security and privacy: a platform for diabetes self-management","author":"Azbeg","year":"2018 Nov 26\u201328"},{"key":"ref31","doi-asserted-by":"crossref","first-page":"434","DOI":"10.1016\/j.future.2018.09.024","article-title":"An approach to develop the smart health using internet of things and authentication based on biometric technology","volume":"91","author":"Hamidi","year":"2019","journal-title":"Future Gener Comput Syst"},{"journal-title":"A comprehensive analysis of high-impact cybersecurity incidents: case studies and implications [master\u2019s thesis]","year":"2023","author":"Petru-Cristian","key":"ref32"},{"key":"ref33","doi-asserted-by":"crossref","first-page":"24","DOI":"10.1109\/MNET.011.1900276","article-title":"Fast authentication and progressive authorization in large-scale IoT: how to leverage AI for security enhancement","volume":"34","author":"Fang","year":"2020","journal-title":"IEEE Netw"},{"key":"ref34","first-page":"87","author":"Devi","year":"2022","journal-title":"Machine learning for biometrics"},{"key":"ref35","doi-asserted-by":"crossref","first-page":"100099","DOI":"10.1016\/j.teler.2023.100099","article-title":"Using an extended technology acceptance model to investigate facial authentication","volume":"12","author":"Nakisa","year":"2023","journal-title":"Telemat Inform Rep"},{"key":"ref36","series-title":"IEEE 21st Mediterranean Electrotechnical Conference (MELECON); 2022 Jun 14\u201316","first-page":"726","article-title":"Biometric-based packet validation scheme for body area network smart healthcare devices","author":"Nyangaresi"},{"key":"ref37","doi-asserted-by":"crossref","first-page":"100042","DOI":"10.1016\/j.array.2020.100042","article-title":"An investigation of biometric authentication in the healthcare environment","volume":"8","author":"Mason","year":"2020","journal-title":"Array"},{"key":"ref38","first-page":"1051","author":"Chenchev","year":"2021","journal-title":"Intelligent computing"},{"key":"ref39","doi-asserted-by":"crossref","first-page":"139","DOI":"10.1007\/s42452-019-1925-y","article-title":"Challenges and opportunities in IoT healthcare systems: a systematic review","volume":"2","author":"Selvaraj","year":"2019","journal-title":"SN Appl Sci"},{"key":"ref40","doi-asserted-by":"crossref","first-page":"172004","DOI":"10.1109\/ACCESS.2019.2956480","article-title":"Artificial intelligence-based security authentication: applications in wireless multimedia networks","volume":"7","author":"Qiu","year":"2019","journal-title":"IEEE Access"},{"key":"ref41","doi-asserted-by":"crossref","first-page":"48360","DOI":"10.1109\/ACCESS.2018.2867556","article-title":"A master attack methodology for an AI-based automated attack planner for smart cities","volume":"6","author":"Falco","year":"2018","journal-title":"IEEE Access"},{"key":"ref42","first-page":"354","author":"Galinkin","year":"2021","journal-title":"Evaluating attacker risk behavior in an internet of things ecosystem. In: Decision and game theory for security"},{"key":"ref43","series-title":"2022 International Conference on Machine Learning, Big Data, Cloud and Parallel Computing (COM-IT-CON)","first-page":"545","article-title":"AI-enabled IoT based multimodal authentication system for securing the hardware and software clients","author":"Shelke","year":"2022 May 26\u201327"},{"key":"ref44","doi-asserted-by":"crossref","first-page":"1398","DOI":"10.1177\/1460458218769699","article-title":"A framework for secure and decentralized sharing of medical imaging data via blockchain consensus","volume":"25","author":"Patel","year":"2019","journal-title":"Health Inform J"},{"key":"ref45","doi-asserted-by":"crossref","first-page":"103083","DOI":"10.1016\/j.scs.2021.103083","article-title":"A secure, private, and explainable IoHT framework to support sustainable health monitoring in a smart city","volume":"72","author":"Rahman","year":"2021","journal-title":"Sustain Cities Soc"},{"key":"ref46","doi-asserted-by":"crossref","first-page":"1271","DOI":"10.3390\/s22031271","article-title":"A consortium blockchain-based secure and trusted electronic portfolio management scheme","volume":"22","author":"Merlec","year":"2022","journal-title":"Sensors"},{"key":"ref47","first-page":"7","article-title":"Scalability performance analysis of blockchain using hierarchical model in healthcare","volume":"7","author":"Sadath","year":"2024","journal-title":"Blockchain Heal Today"},{"key":"ref48","doi-asserted-by":"crossref","first-page":"22","DOI":"10.1016\/j.jss.2019.04.050","article-title":"FogBus: a blockchain-based lightweight framework for edge and fog computing","volume":"154","author":"Tuli","year":"2019","journal-title":"J Syst Softw"},{"key":"ref49","doi-asserted-by":"crossref","first-page":"100517","DOI":"10.1016\/j.measen.2022.100517","article-title":"Industrial quality healthcare services using Internet of things and fog computing approach","volume":"24","author":"Gowda","year":"2022","journal-title":"Meas Sens"},{"key":"ref50","first-page":"292","article-title":"Integration of blockchain with fog computing to improvise security & privacy issues","volume":"8","author":"Meenu","year":"2024","journal-title":"Int J Eng Technol Manag Sci"},{"key":"ref51","doi-asserted-by":"crossref","first-page":"100549","DOI":"10.1016\/j.cosrev.2023.100549","article-title":"Fog computing for next-generation internet of things: fundamental, state-of-the-art and research challenges","volume":"48","author":"Hazra","year":"2023","journal-title":"Comput Sci Rev"},{"key":"ref52","doi-asserted-by":"crossref","first-page":"e4049","DOI":"10.1002\/ett.4049","article-title":"A survey on security threats and countermeasures in Internet of Medical Things (IoMT)","volume":"33","author":"Papaioannou","year":"2022","journal-title":"Trans Emerg Telecommun Technol"},{"key":"ref53","doi-asserted-by":"crossref","first-page":"7725","DOI":"10.1109\/TII.2021.3049405","article-title":"Enabling secure authentication in industrial IoT with transfer learning empowered blockchain","volume":"17","author":"Wang","year":"2021","journal-title":"IEEE Trans Industr Inform"},{"key":"ref54","doi-asserted-by":"crossref","first-page":"10091","DOI":"10.1109\/JIOT.2020.3003528","article-title":"Landscape of architecture and design patterns for IoT systems","volume":"7","author":"Washizaki","year":"2020","journal-title":"IEEE Internet Things J"},{"key":"ref55","article-title":"A review paper on the internet of things (IoT) and its architecture; 2022","author":"Dattani","year":"2025 Jul 1]","journal-title":"[cited"},{"key":"ref56","unstructured":"Sikder AK, Petracca G, Aksu H, Jaeger T, Uluagac AS. A survey on sensor-based threats to internet-of-things (IoT) devices and applications. arXiv:1802.02041. 2018."},{"key":"ref57","doi-asserted-by":"crossref","first-page":"201071","DOI":"10.1109\/ACCESS.2020.3035849","article-title":"The use of MQTT in M2M and IoT systems: a survey","volume":"8","author":"Mishra","year":"2020","journal-title":"IEEE Access"},{"key":"ref58","doi-asserted-by":"crossref","first-page":"103632","DOI":"10.1016\/j.cose.2023.103632","article-title":"A privacy preserving four-factor authentication protocol for internet of medical things","volume":"137","author":"Guo","year":"2024","journal-title":"Comput Secur"},{"key":"ref59","series-title":"2024 10th International Conference on Control, Decision and Information Technologies (CoDIT)","first-page":"2253","article-title":"IoHT system authentication through the blockchain technology: a review","author":"Jawad","year":"2024 Jul 1\u20134"},{"key":"ref60","doi-asserted-by":"crossref","first-page":"20552076231177144","DOI":"10.1177\/20552076231177144","article-title":"A review of multi-factor authentication in the internet of healthcare things","volume":"9","author":"Suleski","year":"2023","journal-title":"Digit Health"},{"key":"ref61","doi-asserted-by":"crossref","first-page":"237","DOI":"10.1016\/j.comnet.2016.11.007","article-title":"Access control in the internet of things: big challenges and new opportunities","volume":"112","author":"Ouaddah","year":"2017","journal-title":"Comput Netw"},{"key":"ref62","doi-asserted-by":"crossref","first-page":"1343","DOI":"10.1109\/TII.2022.3194956","article-title":"An EAP-based mutual authentication protocol for WLAN-connected IoT devices","volume":"19","author":"Yadav","year":"2022","journal-title":"IEEE Trans Ind Inform"},{"key":"ref63","doi-asserted-by":"crossref","first-page":"117836","DOI":"10.1109\/ACCESS.2022.3217201","article-title":"SmartAccess: attribute-based access control system for medical records based on smart contracts","volume":"10","author":"Tuler De Oliveira","year":"2022","journal-title":"IEEE Access"},{"key":"ref64","first-page":"1520","article-title":"Internet of things: security requirements, attacks and counter measures","volume":"18","author":"Imdad","year":"2020","journal-title":"Indones J Electr Eng Comput Sci"},{"key":"ref65","first-page":"282","article-title":"Non-repudiation-based network security system using multiparty computation","volume":"13","author":"Divya","year":"2022","journal-title":"Int J Adv Comput Sci Appl"},{"key":"ref66","doi-asserted-by":"crossref","first-page":"143734","DOI":"10.1109\/ACCESS.2020.3014565","article-title":"A consent model for blockchain-based health data sharing platforms","volume":"8","author":"Jaiman","year":"2020","journal-title":"IEEE Access"},{"key":"ref67","doi-asserted-by":"crossref","first-page":"10264","DOI":"10.3390\/su151310264","article-title":"Elliptic curve cryptography-based scheme for secure signaling and data exchanges in precision agriculture","volume":"15","author":"Abduljabbar","year":"2023","journal-title":"Sustainability"},{"key":"ref68","doi-asserted-by":"crossref","first-page":"55","DOI":"10.3390\/jsan11030055","article-title":"Session-dependent token-based payload enciphering scheme for integrity enhancements in wireless networks","volume":"11","author":"Abduljabbar","year":"2022","journal-title":"J Sens Actuator Netw"},{"key":"ref69","doi-asserted-by":"crossref","first-page":"103633","DOI":"10.1016\/j.jnca.2023.103633","article-title":"Blockchain for healthcare systems: architecture, security challenges, trends and future directions","volume":"215","author":"Andrew","year":"2023","journal-title":"J Netw Comput Appl"},{"key":"ref70","doi-asserted-by":"crossref","first-page":"252","DOI":"10.1109\/TSC.2019.2949801","article-title":"Groupchain: towards a scalable public blockchain in fog computing of IoT services computing","volume":"13","author":"Lei","year":"2020","journal-title":"IEEE Trans Serv Comput"},{"key":"ref71","series-title":"2016 3rd International Conference on Electronic Design (ICED)","article-title":"Internet of things (IoT): taxonomy of security attacks","author":"Nawir","year":"2016 Aug 11\u201312"},{"key":"ref72","doi-asserted-by":"crossref","first-page":"3688","DOI":"10.3390\/electronics12173688","article-title":"A symmetric key and elliptic curve cryptography-based protocol for message encryption in unmanned aerial vehicles","volume":"12","author":"Nyangaresi","year":"2023","journal-title":"Electronics"},{"key":"ref73","doi-asserted-by":"crossref","first-page":"6445","DOI":"10.1109\/TII.2021.3140109","article-title":"A counter-eavesdropping technique for optimized privacy of wireless industrial IoT communications","volume":"18","author":"Anajemba","year":"2022","journal-title":"IEEE Trans Ind Inform"},{"key":"ref74","doi-asserted-by":"crossref","first-page":"1669","DOI":"10.1109\/TIFS.2022.3170276","article-title":"Towards spoofing resistant next generation IoT networks","volume":"17","author":"Nosouhi","year":"2022","journal-title":"IEEE Trans Inform Forensic Secur"},{"key":"ref75","unstructured":"Mohammadnia H. IoT-NETZ: spoofing attack mitigation in IoT network [dissertation]. Stockholm, Sweden: KTH Royal Institute of Technology; 2019."},{"key":"ref76","doi-asserted-by":"crossref","first-page":"26","DOI":"10.1016\/j.compeleceng.2018.09.001","article-title":"Defense mechanisms against distributed denial of service attacks: a survey","volume":"72","author":"Manavi","year":"2018","journal-title":"Comput Electr Eng"},{"key":"ref77","doi-asserted-by":"crossref","first-page":"103096","DOI":"10.1016\/j.cose.2023.103096","article-title":"A comprehensive study of DDoS attacks over IoT network and their countermeasures","volume":"127","author":"Kumari","year":"2023","journal-title":"Comput Secur"},{"key":"ref78","series-title":"IEEE International Conference on Control, Electronics and Computer Technology (ICCECT)","first-page":"986","article-title":"Defense against sybil attack in blockchain based on improved consensus algorithm","author":"Wang","year":"2023 Apr 28\u201330"},{"key":"ref79","doi-asserted-by":"crossref","first-page":"61642","DOI":"10.1109\/ACCESS.2024.3393567","article-title":"A survey on key agreement and authentication protocol for internet of things application","volume":"12","author":"Hasan","year":"2024","journal-title":"IEEE Access"},{"key":"ref80","doi-asserted-by":"crossref","first-page":"3181","DOI":"10.1007\/s11227-015-1435-7","article-title":"Maximizing destructiveness of node capture attack in wireless sensor networks","volume":"71","author":"Lin","year":"2015","journal-title":"J Supercomput"},{"key":"ref81","article-title":"Matrix based optimal solution for node capture attack to enhance the attacking efficiency of attacker","author":"Bathla","year":"2023","journal-title":"Res Sq Forthcoming"},{"key":"ref82","series-title":"2017 6th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions) (ICRITO)","first-page":"462","article-title":"Timing attack analysis on AES on modern processors","author":"Kaushik","year":"2017 Sep 20\u201322"},{"key":"ref83","doi-asserted-by":"crossref","first-page":"2894","DOI":"10.3390\/app13052894","article-title":"Classification and analysis of malicious code detection techniques based on the APT attack","volume":"13","author":"Lee","year":"2023","journal-title":"Appl Sci"},{"key":"ref84","doi-asserted-by":"crossref","first-page":"6167","DOI":"10.3934\/mbe.2024271","article-title":"An anti-impersonation attack electronic health record sharing scheme based on proxy re-encryption and blockchain","volume":"21","author":"Zhang","year":"2024","journal-title":"Math Biosci Eng"},{"key":"ref85","doi-asserted-by":"crossref","first-page":"691","DOI":"10.3390\/app13020691","article-title":"Lightweight integrity preserving scheme for secure data exchange in cloud-based IoT systems","volume":"13","author":"Hussien","year":"2023","journal-title":"Appl Sci"},{"key":"ref86","doi-asserted-by":"crossref","first-page":"406","DOI":"10.1016\/j.comcom.2020.02.008","article-title":"Machine learning models for secure data analytics: a taxonomy and threat model","volume":"153","author":"Gupta","year":"2020","journal-title":"Comput Commun"},{"key":"ref87","doi-asserted-by":"crossref","first-page":"108802","DOI":"10.1016\/j.comnet.2022.108802","article-title":"A comprehensive survey of vulnerability and information security in SDN","volume":"206","author":"Deb","year":"2022","journal-title":"Comput Netw"},{"key":"ref88","series-title":"2022 3rd International Conference on Computer Vision, Image and Deep Learning & International Conference on Computer Engineering and Applications (CVIDL & ICCEA)","first-page":"278","article-title":"Research of the 51% attack based on blockchain","author":"Hao","year":"2022 May 20\u201322"},{"key":"ref89","doi-asserted-by":"crossref","first-page":"47","DOI":"10.1016\/j.acra.2019.06.025","article-title":"School of block-review of blockchain for the radiologists","volume":"27","author":"Abdullah","year":"2020","journal-title":"Acad Radiol"},{"key":"ref90","doi-asserted-by":"crossref","first-page":"1508","DOI":"10.3390\/app8091508","article-title":"A lightweight scheme to authenticate and secure the communication in smart grids","volume":"8","author":"Aziz","year":"2018","journal-title":"Appl Sci"},{"key":"ref91","doi-asserted-by":"crossref","first-page":"1044282","DOI":"10.1155\/2023\/1044282","article-title":"A lightweight three-party mutual authentication protocol for internet of health things systems","volume":"2023","author":"Wang","year":"2023","journal-title":"J Healthc Eng"},{"key":"ref92","doi-asserted-by":"crossref","first-page":"1709","DOI":"10.1049\/iet-com.2018.6069","article-title":"Survey of cross-technology communication for IoT heterogeneous devices","volume":"13","author":"Chen","year":"2019","journal-title":"IET Commun"},{"key":"ref93","doi-asserted-by":"crossref","first-page":"41","DOI":"10.3390\/computers13020041","article-title":"Security and privacy of technologies in health information systems: a systematic literature review","volume":"13","author":"Shojaei","year":"2024","journal-title":"Computers"},{"key":"ref94","doi-asserted-by":"crossref","first-page":"89","DOI":"10.1016\/j.jpdc.2022.01.015","article-title":"Machine learning and the internet of things security: solutions and open challenges","volume":"162","author":"Farooq","year":"2022","journal-title":"J Parallel Distrib Comput"},{"key":"ref95","doi-asserted-by":"crossref","first-page":"8229","DOI":"10.1109\/JIOT.2022.3150363","article-title":"Recent advances on federated learning for cybersecurity and cybersecurity for federated learning for Internet of things","volume":"9","author":"Ghimire","year":"2022","journal-title":"IEEE Internet Things J"},{"key":"ref96","doi-asserted-by":"crossref","first-page":"119271","DOI":"10.1016\/j.eswa.2022.119271","article-title":"AC-ABAC: attribute-based access control for electronic medical records during acute care","volume":"213","author":"de Oliveira","year":"2023","journal-title":"Expert Syst Appl"},{"key":"ref97","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.ijmedinf.2019.01.014","article-title":"Understanding the patient privacy perspective on health information exchange: a systematic review","volume":"125","author":"Shen","year":"2019","journal-title":"Int J Med Inform"},{"key":"ref98","doi-asserted-by":"crossref","first-page":"107817","DOI":"10.1016\/j.compeleceng.2022.107817","article-title":"Deep learning-based continuous authentication for an IoT-enabled healthcare service","volume":"99","author":"Sahu","year":"2022","journal-title":"Comput Electr Eng"},{"key":"ref99","doi-asserted-by":"crossref","first-page":"101921","DOI":"10.1016\/j.cose.2020.101921","article-title":"A survey of machine learning-based solutions to protect privacy in the internet of things","volume":"96","author":"Amiri-Zarandi","year":"2020","journal-title":"Comput Secur"},{"key":"ref100","doi-asserted-by":"crossref","first-page":"102491","DOI":"10.1016\/j.cose.2021.102491","article-title":"Authentication and identity management of IoHT devices: achievements, challenges, and future directions","volume":"111","author":"Mamdouh","year":"2021","journal-title":"Comput Secur"},{"key":"ref101","doi-asserted-by":"crossref","first-page":"197","DOI":"10.1007\/s10586-022-03582-7","article-title":"Blockchain for deep learning: review and open challenges","volume":"26","author":"Shafay","year":"2023","journal-title":"Cluster Comput"},{"key":"ref102","doi-asserted-by":"crossref","first-page":"101552","DOI":"10.1016\/j.imu.2024.101552","article-title":"Access control solutions in electronic health record systems: a systematic review","volume":"49","author":"Cobrado","year":"2024","journal-title":"Inform Med Unlocked"},{"key":"ref103","doi-asserted-by":"crossref","first-page":"308","DOI":"10.1109\/TNSM.2019.2941214","article-title":"SDN-based security enforcement framework for data sharing systems of smart healthcare","volume":"17","author":"Meng","year":"2020","journal-title":"IEEE Trans Netw Serv Manag"},{"key":"ref104","doi-asserted-by":"crossref","first-page":"109","DOI":"10.1016\/j.comcom.2020.09.006","article-title":"A survey on continuous authentication methods in internet of things environment","volume":"163","author":"Al-Naji","year":"2020","journal-title":"Comput Commun"},{"key":"ref105","doi-asserted-by":"crossref","first-page":"145","DOI":"10.1016\/j.procs.2017.06.021","article-title":"An authentication and authorization mechanism for long-term electronic health records management","volume":"111","author":"Lo","year":"2017","journal-title":"Procedia Comput Sci"},{"key":"ref106","doi-asserted-by":"crossref","first-page":"3223","DOI":"10.3390\/electronics11193223","article-title":"A systematic literature review of enabling IoT in healthcare: motivations, challenges, and recommendations","volume":"11","author":"Mohamad Jawad","year":"2022","journal-title":"Electronics"},{"key":"ref107","doi-asserted-by":"crossref","first-page":"192177","DOI":"10.1109\/ACCESS.2020.3032680","article-title":"Design of secure authentication protocol for cloud-assisted telecare medical information system using blockchain","volume":"8","author":"Son","year":"2020","journal-title":"IEEE Access"},{"key":"ref108","first-page":"6","article-title":"Enhancing healthcare data security: a two-step authentication scheme with cloud technology and blockchain","volume":"6","author":"Ussatova","year":"2023","journal-title":"East Eur J Enterp Technol"},{"key":"ref109","first-page":"5914","article-title":"A smart-contract-based access control framework for cloud smart healthcare system","volume":"8","author":"Saini","year":"2020","journal-title":"IEEE Int Things J"},{"key":"ref110","first-page":"710","article-title":"Proposed authentication protocol for IoT using blockchain and fog nodes","volume":"11","author":"Ahmed","year":"2020","journal-title":"Int J Adv Comput Sci Appl"},{"key":"ref111","first-page":"397","author":"Hankerson","year":"2011","journal-title":"Elliptic curve discrete logarithm problem. In: Encyclopedia of cryptography and security"},{"journal-title":"Cybernetics and control theory in systems","year":"2024","author":"Jawad","key":"ref112"},{"key":"ref113","doi-asserted-by":"crossref","first-page":"100254","DOI":"10.1016\/j.iot.2020.100254","article-title":"Designing a SHA-256 processor for blockchain-based IoT applications","volume":"11","author":"Martino","year":"2020","journal-title":"Int Things"},{"key":"ref114","first-page":"102869","article-title":"Collusion resistant secret sharing scheme for secure data storage and processing over cloud","volume":"60","author":"Lakshmi","year":"2021","journal-title":"J Inf Secur Appl"},{"journal-title":"Advanced Encryption Standard (AES)","year":"2001","key":"ref115"},{"key":"ref116","series-title":"2022 4th Global Power, Energy and Communication Conference (GPECOM)","first-page":"569","article-title":"Verifiable security and privacy provisioning protocol for high reliability in smart healthcare communication environment","author":"Nyangaresi","year":"2022 Jun 14\u201317"},{"key":"ref117","doi-asserted-by":"crossref","first-page":"100438","DOI":"10.1016\/j.cosrev.2021.100438","article-title":"A survey of lattice based expressive attribute based encryption","volume":"43","author":"Fu","year":"2022","journal-title":"Comput Sci Rev"},{"key":"ref118","article-title":"HarmonicCrypt: a waveform-based encryption paradigm","author":"Jones","year":"2025","journal-title":"OSF Preprints Forthcoming"},{"key":"ref119","unstructured":"Shuriya B, Kumar SV, Bagyalakshmi K. Noise-resilient homomorphic encryption: a framework for secure data processing in health care domain. arXiv:2412.11474. 2024."},{"key":"ref120","doi-asserted-by":"crossref","first-page":"167","DOI":"10.1016\/j.iotcps.2023.12.003","article-title":"Machine learning techniques for IoT security: current research and future vision with generative AI and large language models","volume":"4","author":"Alwahedi","year":"2024","journal-title":"Int Things Cyber-Phys Syst"},{"key":"ref121","doi-asserted-by":"crossref","first-page":"726","DOI":"10.3390\/sym16060726","article-title":"Effective identification and authentication of healthcare IoT using fog computing with hybrid cryptographic algorithm","volume":"16","author":"Corthis","year":"2024","journal-title":"Symmetry"},{"key":"ref122","doi-asserted-by":"crossref","first-page":"41","DOI":"10.1109\/MSP.2018.2825478","article-title":"IoT security techniques based on machine learning: how do IoT devices use AI to enhance security?","volume":"35","author":"Xiao","year":"2018","journal-title":"IEEE Signal Process Mag"},{"key":"ref123","doi-asserted-by":"crossref","first-page":"10687","DOI":"10.1109\/JIOT.2023.3240289","article-title":"A deep-learning-based solution for securing the power grid against load altering threats by IoT-enabled devices","volume":"10","author":"Jahangir","year":"2023","journal-title":"IEEE Internet Things J"},{"key":"ref124","doi-asserted-by":"crossref","first-page":"111445","DOI":"10.1016\/j.measurement.2022.111445","article-title":"Human activity recognition in IoHT applications using arithmetic optimization algorithm and deep learning","volume":"199","author":"Dahou","year":"2022","journal-title":"Measurement"},{"key":"ref125","first-page":"5389","article-title":"A blockchain-based architecture for securing industrial IoTs data in electric smart grid","volume":"74","author":"Umran","year":"2023","journal-title":"Comput Mater Contin"},{"key":"ref126","first-page":"6","article-title":"Blockchain technology predictions 2024: transformations in healthcare, patient identity, and public health","volume":"6","author":"De Novi","year":"2023","journal-title":"Blockchain Healthc Today"},{"key":"ref127","doi-asserted-by":"crossref","first-page":"158367","DOI":"10.1109\/ACCESS.2021.3129284","article-title":"Survey of interoperability in electronic health records management and proposed blockchain based framework: MyBlockEHR","volume":"9","author":"Sonkamble","year":"2021","journal-title":"IEEE Access"},{"key":"ref128","first-page":"5663","article-title":"Improving secure routing in IoMT: enhanced blockchain cybersecurity scheme using hyperledger fabric","volume":"102","author":"Alkhdour","year":"2024","journal-title":"J Theor Appl Inf Technol"},{"key":"ref129","doi-asserted-by":"crossref","first-page":"3","DOI":"10.3390\/cryptography3010003","article-title":"Applications of blockchain technology in medicine and healthcare: challenges and future perspectives","volume":"3","author":"Ali Siyal","year":"2019","journal-title":"Cryptography"},{"key":"ref130","doi-asserted-by":"crossref","first-page":"1448","DOI":"10.3390\/s22041448","article-title":"A novel hybrid trustworthy decentralized authentication and data preservation model for digital healthcare IoT based CPS","volume":"22","author":"Almaiah","year":"2022","journal-title":"Sensors"},{"key":"ref131","doi-asserted-by":"crossref","first-page":"16","DOI":"10.56714\/bjrs.50.1.23","article-title":"Adoption of bloom filter and firebase framework to enhance authentication time for healthcare systems based on blockchain technology","volume":"50","author":"Al-ali","year":"2024","journal-title":"J Basrah Res"},{"key":"ref132","doi-asserted-by":"crossref","first-page":"1","DOI":"10.14445\/22315381\/IJETT-V72I4P101","article-title":"Blockchain and cryptocurrency security from a new layered perspective and a novel MITRE ATT&CK-based approach for understanding cyberattacks and mitigating their impacts","volume":"72","author":"Barj","year":"2024","journal-title":"Int J Eng Trends Technol"},{"key":"ref133","doi-asserted-by":"crossref","first-page":"189","DOI":"10.30954\/2322-0465.2.2021.7","article-title":"Blockchain technology and its types\u2014a short review","volume":"9","author":"Paul","year":"2021","journal-title":"Int J Appl Sci Eng"},{"key":"ref134","first-page":"43","article-title":"Blockchain-enabled cybersecurity provision for scalable heterogeneous network: a comprehensive survey","volume":"138","author":"Islam","year":"2024","journal-title":"Comput Model Eng Sci"},{"key":"ref135","doi-asserted-by":"crossref","first-page":"100194","DOI":"10.1016\/j.bcra.2024.100194","article-title":"Partial pre-image attack on proof-of-work based blockchains","volume":"5","author":"Baniata","year":"2024","journal-title":"Blockchain Res Appl"},{"key":"ref136","doi-asserted-by":"crossref","first-page":"66611","DOI":"10.1109\/ACCESS.2022.3184799","article-title":"Introduction of formal methods in blockchain consensus mechanism and its associated protocols","volume":"10","author":"Verma","year":"2022","journal-title":"IEEE Access"},{"key":"ref137","series-title":"2024 10th International Conference on Control, Decision and Information Technologies (CoDIT)","first-page":"2247","article-title":"Development anonymous authentication maria et al.\u2019s scheme of VANETs using blockchain and fog computing with QR code technique","author":"Alzaidi","year":"2024 Jul 1\u20134"},{"key":"ref138","doi-asserted-by":"crossref","first-page":"3805","DOI":"10.1007\/s40747-021-00582-9","article-title":"Smart healthcare IoT applications based on fog computing: architecture, applications and challenges","volume":"8","author":"Quy","year":"2022","journal-title":"Complex Intell Systems"},{"key":"ref139","series-title":"2019 IEEE Global Communications Conference (GLOBECOM)","article-title":"A resources representation for resource allocation in fog computing networks","author":"Abouaomar","year":"2019 Dec 9\u201313"},{"key":"ref140","first-page":"103","author":"Mahmud","year":"2017","journal-title":"Internet of everything: algorithms, methodologies, technologies and perspectives"},{"key":"ref141","first-page":"564","article-title":"A review of fog computing concept, architecture, application, parameters and challenges","volume":"8","author":"Ghani","year":"2024","journal-title":"Int J Inform Vis"},{"key":"ref142","doi-asserted-by":"crossref","first-page":"69105","DOI":"10.1109\/ACCESS.2020.2983253","article-title":"Fog computing: a comprehensive architectural survey","volume":"8","author":"Habibi","year":"2020","journal-title":"IEEE Access"},{"key":"ref143","doi-asserted-by":"crossref","first-page":"80","DOI":"10.1186\/s13677-022-00353-y","article-title":"A systematic review of the purposes of Blockchain and fog computing integration: classification and open issues","volume":"11","author":"Alzoubi","year":"2022","journal-title":"J Cloud Comput"},{"key":"ref144","doi-asserted-by":"crossref","first-page":"317","DOI":"10.3390\/info15060317","article-title":"Reliablity and security for fog computing systems","volume":"15","author":"Shiriaev","year":"2024","journal-title":"Information"},{"key":"ref145","first-page":"1","author":"Fan","year":"2019","journal-title":"Smart blockchain"},{"key":"ref146","first-page":"e21378","article-title":"Using ethereum smart contracts to store and share COVID-19 patient data","volume":"14","author":"Batchu","year":"2022","journal-title":"Cureus"},{"key":"ref147","doi-asserted-by":"crossref","first-page":"6605","DOI":"10.1109\/ACCESS.2021.3140091","article-title":"Systematic review of security vulnerabilities in ethereum blockchain smart contract","volume":"10","author":"Kushwaha","year":"2022","journal-title":"IEEE Access"},{"key":"ref148","unstructured":"Ethereum.org. [cited 2025 Jul 1]. Available from: https:\/\/ethereum.org\/en\/."},{"key":"ref149","doi-asserted-by":"crossref","first-page":"9031","DOI":"10.3390\/s23229031","article-title":"Governance of a blockchain-enabled IoT ecosystem: a variable geometry approach","volume":"23","author":"Ullah","year":"2023","journal-title":"Sensors"},{"key":"ref150","series-title":"17th International Symposium Infoteh-JAHORINA (INFOTEH)","article-title":"Blockchain technology, Bitcoin, and ethereum: a brief overview","author":"Vuji\u010di\u0107","year":"2018 Mar 21\u201323"},{"key":"ref151","unstructured":"REMIX_Solidity compiler. [cited 2025 Jul 1]. Available from: https:\/\/remix-ide.readthedocs.io\/en\/latest\/compile.html."},{"key":"ref152","doi-asserted-by":"crossref","first-page":"147","DOI":"10.1007\/978-981-15-3643-4_10","author":"Chopra","year":"2020","journal-title":"Decision analytics applications in industry"},{"key":"ref153","unstructured":"Run JavaScript Everywhere. [cited 2025 Jul 1]. Available from: https:\/\/nodejs.org\/en."},{"key":"ref154","doi-asserted-by":"crossref","first-page":"11","DOI":"10.1007\/978-1-4842-6975-6_2","author":"Duldulao","year":"2021","journal-title":"Practical enterprise react"},{"key":"ref155","unstructured":"Blockchain-council page. [cited 2025 Jul 1]. Available from: https:\/\/www.blockchain-council.org\/."},{"key":"ref156","first-page":"395","article-title":"GANACHE: a robust framework for efficient and secure storage of data on private ethereum blockchains","volume":"82","author":"Mathur","year":"2023","journal-title":"Res Sq Forthcoming"},{"key":"ref157","series-title":"2018 IEEE 31st Computer Security Foundations Symposium (CSF); 2018 Jul 9\u201312","first-page":"344","article-title":"A little more conversation, a little less action, a lot more satisfaction: global states in ProVerif","author":"Cheval"},{"key":"ref158","doi-asserted-by":"crossref","first-page":"1754","DOI":"10.1093\/rfs\/hhz007","article-title":"Blockchain disruption and smart contracts","volume":"32","author":"Cong","year":"2019","journal-title":"Rev Financ Stud"},{"key":"ref159","doi-asserted-by":"crossref","first-page":"1608","DOI":"10.3390\/electronics10131608","article-title":"Formal verification of authentication and service authorization protocols in 5G-enabled device-to-device communications using ProVerif","volume":"10","author":"Edris","year":"2021","journal-title":"Electronics"},{"key":"ref160","doi-asserted-by":"crossref","first-page":"012057","DOI":"10.1088\/1757-899X\/1077\/1\/012057","article-title":"Formal verification of the authentication and voice communication protocol security on device X using scyther tool","volume":"1077","author":"Al Fikri","year":"2021","journal-title":"IOP Conf Ser Mater Sci Eng"},{"key":"ref161","doi-asserted-by":"crossref","first-page":"61","DOI":"10.1016\/j.entcs.2005.11.052","article-title":"Automated security protocol analysis with the AVISPA tool","volume":"155","author":"Vigan\u00f2","year":"2006","journal-title":"Electron Notes Theor Comput Sci"},{"key":"ref162","doi-asserted-by":"crossref","first-page":"86","DOI":"10.3390\/info9040086","article-title":"An improved two-way security authentication protocol for RFID system","volume":"9","author":"Liu","year":"2018","journal-title":"Information"},{"key":"ref163","doi-asserted-by":"crossref","first-page":"173","DOI":"10.1007\/978-3-030-11039-0_9","author":"Becerra","year":"2019","journal-title":"E-business and telecommunications"},{"key":"ref164","doi-asserted-by":"crossref","first-page":"12557","DOI":"10.1109\/ACCESS.2019.2893185","article-title":"A secure authentication protocol for multi-server-based E-healthcare using a fuzzy commitment scheme","volume":"7","author":"Barman","year":"2019","journal-title":"IEEE Access"},{"key":"ref165","doi-asserted-by":"crossref","first-page":"274","DOI":"10.1109\/TSE.1987.233151","article-title":"The interrogator: protocol secuity analysis","volume":"SE-13","author":"Millen","year":"1987","journal-title":"IEEE Trans Softw Eng"},{"article-title":"Automated verification tools for cryptographic protocols","series-title":"2021 International Conference on Promising Electronic Technologies (ICPET); 2021 Nov 17\u201318","author":"Hassan","key":"ref166"},{"article-title":"A rewriting-based inference system for the NRL protocol analyzer: grammar generation","series-title":"Proceedings of the 2005 ACM Workshop on Formal Methods in Security Engineering; 2005 Nov 11","author":"Escobar","key":"ref167"},{"key":"ref168","doi-asserted-by":"crossref","first-page":"2181","DOI":"10.1109\/JSEN.2019.2949717","article-title":"Lightweight collaborative authentication with key protection for smart electronic health record system","volume":"20","author":"Feng","year":"2020","journal-title":"IEEE Sens J"},{"key":"ref169","doi-asserted-by":"crossref","first-page":"3701","DOI":"10.3390\/math11173701","article-title":"Enhancing the security: a lightweight authentication and key agreement protocol for smart medical services in the IoHT","volume":"11","author":"Wu","year":"2023","journal-title":"Mathematics"},{"key":"ref170","doi-asserted-by":"crossref","first-page":"134","DOI":"10.1109\/JSYST.2020.2968614","article-title":"BLWN: blockchain-based lightweight simplified payment verification in IoT-assisted e-healthcare","volume":"15","author":"Ray","year":"2021","journal-title":"IEEE Syst J"},{"key":"ref171","doi-asserted-by":"crossref","first-page":"118093","DOI":"10.1109\/ACCESS.2022.3219837","article-title":"Blockchain-based processing of health insurance claims for prescription drugs","volume":"10","author":"Alnuaimi","year":"2022","journal-title":"IEEE Access"},{"key":"ref172","doi-asserted-by":"crossref","first-page":"170","DOI":"10.3390\/healthcare11020170","article-title":"Sharing health information using a blockchain","volume":"11","author":"Elvas","year":"2023","journal-title":"Healthcare"},{"key":"ref173","doi-asserted-by":"crossref","first-page":"57","DOI":"10.21015\/vtse.v11i4.1656","article-title":"Securing electronic health records using blockchain","volume":"11","author":"Agha","year":"2023","journal-title":"VFAST Trans Softw Eng"},{"key":"ref174","doi-asserted-by":"crossref","first-page":"15","DOI":"10.31026\/j.eng.2023.03.02","article-title":"An authentication and access control model for healthcare based cloud services","volume":"29","author":"Qadir","year":"2023","journal-title":"J Eng"},{"key":"ref175","doi-asserted-by":"crossref","first-page":"e0294429","DOI":"10.1371\/journal.pone.0294429","article-title":"A lightweight and robust authentication scheme for the healthcare system using public cloud server","volume":"19","author":"Abbasi","year":"2024","journal-title":"PLoS One"},{"key":"ref176","doi-asserted-by":"crossref","first-page":"30","DOI":"10.1016\/j.infsof.2017.09.012","article-title":"Authentication schemes and methods: a systematic literature review","volume":"94","author":"Vel\u00e1squez","year":"2018","journal-title":"Inf Softw Technol"},{"key":"ref177","doi-asserted-by":"crossref","first-page":"9089","DOI":"10.3390\/s22239089","article-title":"A survey of authentication in internet of things-enabled healthcare systems","volume":"22","author":"Khan","year":"2022","journal-title":"Sensors"},{"key":"ref178","first-page":"45","author":"Shankar","year":"2021","journal-title":"Artificial intelligence for the internet of health things"},{"article-title":"A survey on authentication techniques for the Internet of things","series-title":"2019 International Conference on Computer and Information Sciences (ICCIS); 2019 Apr 3\u20134","author":"Albalawi","key":"ref179"},{"key":"ref180","doi-asserted-by":"crossref","first-page":"410","DOI":"10.1016\/j.future.2019.02.020","article-title":"LACO: lightweight three-factor authentication, access control and ownership transfer scheme for e-health systems in IoT","volume":"96","author":"Aghili","year":"2019","journal-title":"Future Gener Comput Syst"},{"key":"ref181","doi-asserted-by":"crossref","first-page":"101601","DOI":"10.1016\/j.jksuci.2023.101601","article-title":"Bandwidth and power efficient lightweight authentication scheme for healthcare system","volume":"35","author":"Jan","year":"2023","journal-title":"J King Saud Univ Comput Inf Sci"},{"key":"ref182","doi-asserted-by":"crossref","first-page":"36868","DOI":"10.1109\/ACCESS.2021.3059863","article-title":"Blockchain-based IoT access control system: towards security, lightweight, and cross-domain","volume":"9","author":"Sun","year":"2021","journal-title":"IEEE Access"},{"key":"ref183","doi-asserted-by":"crossref","first-page":"358","DOI":"10.1016\/j.dcan.2022.11.001","article-title":"EBAKE-SE: a novel ECC-based authenticated key exchange between industrial IoT devices using secure element","volume":"9","author":"Patel","year":"2023","journal-title":"Digit Commun Netw"}],"container-title":["Computers, Materials &amp; Continua"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/cdn.techscience.cn\/files\/cmc\/2025\/TSP_CMC-85-2\/TSP_CMC_66579\/TSP_CMC_66579.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,12,4]],"date-time":"2025-12-04T05:35:32Z","timestamp":1764826532000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.techscience.com\/cmc\/v85n2\/63796"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"references-count":183,"journal-issue":{"issue":"2","published-online":{"date-parts":[[2025]]},"published-print":{"date-parts":[[2025]]}},"URL":"https:\/\/doi.org\/10.32604\/cmc.2025.066579","relation":{},"ISSN":["1546-2226"],"issn-type":[{"type":"electronic","value":"1546-2226"}],"subject":[],"published":{"date-parts":[[2025]]}}}