{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,10]],"date-time":"2026-02-10T08:02:59Z","timestamp":1770710579692,"version":"3.49.0"},"reference-count":30,"publisher":"Tech Science Press","issue":"3","license":[{"start":{"date-parts":[[2025,10,26]],"date-time":"2025-10-26T00:00:00Z","timestamp":1761436800000},"content-version":"vor","delay-in-days":298,"URL":"https:\/\/doi.org\/10.32604\/TSP-CROSSMARKPOLICY"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["CMC"],"published-print":{"date-parts":[[2025]]},"DOI":"10.32604\/cmc.2025.067641","type":"journal-article","created":{"date-parts":[[2025,9,8]],"date-time":"2025-09-08T07:59:53Z","timestamp":1757318393000},"page":"5093-5116","update-policy":"https:\/\/doi.org\/10.32604\/tsp-crossmarkpolicy","source":"Crossref","is-referenced-by-count":1,"title":["LSAP-IoHT: Lightweight Secure Authentication Protocol for the Internet of Healthcare Things"],"prefix":"10.32604","volume":"85","author":[{"given":"Marwa","family":"Ahmim","sequence":"first","affiliation":[]},{"given":"Nour","family":"Ouafi","sequence":"additional","affiliation":[]},{"given":"Insaf","family":"Ullah","sequence":"additional","affiliation":[]},{"given":"Ahmed","family":"Ahmim","sequence":"additional","affiliation":[]},{"given":"Djalel","family":"Chefrour","sequence":"additional","affiliation":[]},{"given":"Reham","family":"Almukhlifi","sequence":"additional","affiliation":[]}],"member":"17807","published-online":{"date-parts":[[2025]]},"reference":[{"key":"ref1","doi-asserted-by":"crossref","first-page":"12564","DOI":"10.1109\/ACCESS.2022.3143210","article-title":"Lorena: low memory symmetric-key generation method for based on group cryptography protocol applied to the internet of healthcare things","volume":"10","author":"Coelho","year":"2022","journal-title":"IEEE Access"},{"key":"ref2","doi-asserted-by":"crossref","first-page":"5518","DOI":"10.3390\/s23125518","article-title":"Enhancing security and privacy in healthcare systems using a lightweight RFID protocol","volume":"23","author":"Khan","year":"2023","journal-title":"Sensors"},{"key":"ref3","doi-asserted-by":"crossref","first-page":"3701","DOI":"10.3390\/math11173701","article-title":"Enhancing the security: a lightweight authentication and key agreement protocol for smart medical services in the ioht","volume":"11","author":"Wu","year":"2023","journal-title":"Mathematics"},{"key":"ref4","doi-asserted-by":"crossref","first-page":"1197","DOI":"10.3390\/math11051197","article-title":"A features-based privacy preserving assessment model for authentication of internet of medical things (IoMT) devices in healthcare","volume":"11","author":"Khan","year":"2023","journal-title":"Mathematics"},{"key":"ref5","doi-asserted-by":"crossref","first-page":"119862","DOI":"10.1109\/ACCESS.2023.3327620","article-title":"Distributed denial of service attack detection for the Internet of Things using hybrid deep learning model","volume":"11","author":"Ahmim","year":"2023","journal-title":"IEEE Access"},{"key":"ref6","doi-asserted-by":"crossref","first-page":"1019","DOI":"10.1007\/s10207-022-00595-6","article-title":"Security analysis on \u201cthree-factor authentication protocol using physical unclonable function for IoV\u201d","volume":"21","author":"Ahmim","year":"2022","journal-title":"Int J Inf Secur"},{"key":"ref7","doi-asserted-by":"crossref","first-page":"105887","DOI":"10.1109\/ACCESS.2024.3435920","article-title":"FBMP-IDS: FL-based blockchain-powered lightweight MPC-secured IDS for 6G networks","volume":"12","author":"Sakraoui","year":"2024","journal-title":"IEEE Access"},{"key":"ref8","doi-asserted-by":"crossref","first-page":"1309","DOI":"10.1007\/s11277-022-10001-y","article-title":"ESIKE: an efficient and secure internet key exchange protocol","volume":"128","author":"Ahmim","year":"2023","journal-title":"Wirel Pers Commun"},{"key":"ref9","series-title":"2022 4th International Conference on Pattern Analysis and Intelligent Systems (PAIS)","first-page":"1","article-title":"Lightweight authentication protocols for internet of vehicles: network model, taxonomy and challenges","author":"Ahmim","year":"2022 Oct 12\u201313"},{"key":"ref10","doi-asserted-by":"crossref","first-page":"5401","DOI":"10.3390\/s22145401","article-title":"LAP-IoHT: a lightweight authentication protocol for the internet of health things","volume":"22","author":"Chen","year":"2022","journal-title":"Sensors"},{"key":"ref11","doi-asserted-by":"crossref","first-page":"16167","DOI":"10.1007\/s11227-022-04513-4","article-title":"RAPCHI: robust authentication protocol for IoMT-based cloud-healthcare infrastructure","volume":"78","author":"Kumar","year":"2022","journal-title":"J Supercomput"},{"key":"ref12","doi-asserted-by":"crossref","first-page":"410","DOI":"10.1016\/j.future.2019.02.020","article-title":"LACO: lightweight three-factor authentication, access control and ownership transfer scheme for e-health systems in IoT","volume":"96","author":"Aghili","year":"2019","journal-title":"Future Gener Comput Syst"},{"key":"ref13","doi-asserted-by":"crossref","first-page":"2795","DOI":"10.1109\/TIE.2017.2739683","article-title":"Privacy protection for e-health systems by means of dynamic authentication and three-factor key agreement","volume":"65","author":"Zhang","year":"2018","journal-title":"IEEE Trans Ind Electron"},{"key":"ref14","doi-asserted-by":"crossref","first-page":"105054","DOI":"10.1016\/j.cmpb.2019.105054","article-title":"An improved three-factor authentication scheme for patient monitoring using WSN in remote health-care system","volume":"182","author":"Soni","year":"2019","journal-title":"Comput Methods Programs Biomed"},{"key":"ref15","doi-asserted-by":"crossref","first-page":"534","DOI":"10.1016\/j.compeleceng.2017.08.003","article-title":"An efficient ECC-based provably secure three-factor user authentication and key agreement protocol for wireless healthcare sensor networks","volume":"69","author":"Challa","year":"2018","journal-title":"Comput Electr Eng"},{"key":"ref16","doi-asserted-by":"crossref","first-page":"1121","DOI":"10.3390\/s23031121","article-title":"Enabling secure communication in wireless body area networks with heterogeneous authentication scheme","volume":"23","author":"Ullah","year":"2023","journal-title":"Sensors"},{"key":"ref17","doi-asserted-by":"crossref","first-page":"51","DOI":"10.1007\/s10207-023-00748-1","article-title":"A full privacy-preserving distributed batch-based certificate-less aggregate signature authentication scheme for healthcare wearable wireless medical sensor networks (HWMSNs)","volume":"23","author":"Rabie","year":"2024","journal-title":"Int J Inf Secur"},{"key":"ref18","doi-asserted-by":"crossref","first-page":"5860286","DOI":"10.1155\/2019\/5860286","article-title":"CasCP: efficient and secure certificateless authentication scheme for wireless body area networks with conditional privacy-preserving","volume":"2019","author":"Xie","year":"2019","journal-title":"Secur Commun Netw"},{"key":"ref19","doi-asserted-by":"crossref","first-page":"69603","DOI":"10.1109\/ACCESS.2018.2880898","article-title":"An efficient and certificateless conditional privacy-preserving authentication scheme for wireless body area networks big data services","volume":"6","author":"Ji","year":"2018","journal-title":"IEEE Access"},{"key":"ref20","doi-asserted-by":"crossref","first-page":"114662","DOI":"10.1109\/ACCESS.2023.3325130","article-title":"An efficient lightweight provably secure authentication protocol for patient monitoring using wireless medical sensor networks","volume":"11","author":"Thakur","year":"2023","journal-title":"IEEE Access"},{"key":"ref21","doi-asserted-by":"crossref","first-page":"101753","DOI":"10.1016\/j.pmcj.2023.101753","article-title":"ECCbAS: an ECC based authentication scheme for healthcare IoT systems","volume":"90","author":"Servati","year":"2023","journal-title":"Pervasive Mob Comput"},{"key":"ref22","doi-asserted-by":"crossref","first-page":"39","DOI":"10.1109\/JSYST.2019.2899580","article-title":"A secure three-factor user authentication protocol with forward secrecy for wireless medical sensor network systems","volume":"14","author":"Li","year":"2019","journal-title":"IEEE Syst J"},{"key":"ref23","doi-asserted-by":"crossref","first-page":"58","DOI":"10.1016\/j.adhoc.2015.05.020","article-title":"A secure light weight scheme for user authentication and key agreement in multi-gateway based wireless sensor networks","volume":"36","author":"Amin","year":"2016","journal-title":"Ad Hoc Netw"},{"key":"ref24","doi-asserted-by":"crossref","first-page":"938","DOI":"10.1016\/j.future.2019.05.058","article-title":"Robust secure communication protocol for smart healthcare system with FPGA implementation","volume":"100","author":"Sureshkumar","year":"2019","journal-title":"Future Gener Comput Syst"},{"key":"ref25","doi-asserted-by":"crossref","first-page":"29","DOI":"10.1007\/s10723-022-09619-w","article-title":"An authentication-based secure data aggregation method in internet of things","volume":"20","author":"Ataei Nezhad","year":"2022","journal-title":"J Grid Comput"},{"key":"ref26","doi-asserted-by":"crossref","first-page":"11137","DOI":"10.1007\/s11042-024-19379-2","article-title":"A lightweight authentication and authorization method in IoT-based medical care","volume":"84","author":"Khajehzadeh","year":"2025","journal-title":"Multimed Tools Appl"},{"key":"ref27","doi-asserted-by":"crossref","first-page":"198","DOI":"10.1109\/TIT.1983.1056650","article-title":"On the security of public key protocols","volume":"29","author":"Dolev","year":"1983","journal-title":"IEEE Trans Inform Theory"},{"key":"ref28","first-page":"6425","article-title":"Anonymous authentication protocol based on physical unclonable function and elliptic curve cryptography for smart grid","volume":"17","author":"Ma","year":"2023","journal-title":"IEEE Syst J"},{"key":"ref29","series-title":"International Conference on Computer Aided Verification","first-page":"414","article-title":"The scyther tool: verification, falsification, and analysis of security protocols: tool paper","author":"Cremers","year":"2008"},{"key":"ref30","first-page":"1182","article-title":"CPPHA: capability-based privacy-protection handover authentication mechanism for SDN-based 5G HetNets","volume":"18","author":"Cao","year":"2019","journal-title":"IEEE Trans Depend Secure Comput"}],"container-title":["Computers, Materials &amp; Continua"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/cdn.techscience.cn\/files\/cmc\/2025\/TSP_CMC-85-3\/TSP_CMC_67641\/TSP_CMC_67641.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,17]],"date-time":"2025-11-17T02:19:27Z","timestamp":1763345967000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.techscience.com\/cmc\/v85n3\/64152"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"references-count":30,"journal-issue":{"issue":"3","published-online":{"date-parts":[[2025]]},"published-print":{"date-parts":[[2025]]}},"URL":"https:\/\/doi.org\/10.32604\/cmc.2025.067641","relation":{},"ISSN":["1546-2226"],"issn-type":[{"value":"1546-2226","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025]]},"assertion":[{"value":"2025-05-08","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2025-07-15","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2025-10-23","order":2,"name":"published","label":"Published Online","group":{"name":"publication_history","label":"Publication History"}}]}}