{"id":"https://openalex.org/W4387631239","doi":"https://doi.org/10.1016/j.future.2023.09.032","title":"A scalable and lightweight group authentication framework for Internet of Medical Things using integrated blockchain and fog computing","display_name":"A scalable and lightweight group authentication framework for Internet of Medical Things using integrated blockchain and fog computing","publication_year":2023,"publication_date":"2023-10-13","ids":{"openalex":"https://openalex.org/W4387631239","doi":"https://doi.org/10.1016/j.future.2023.09.032"},"language":"en","primary_location":{"id":"doi:10.1016/j.future.2023.09.032","is_oa":true,"landing_page_url":"https://doi.org/10.1016/j.future.2023.09.032","pdf_url":null,"source":{"id":"https://openalex.org/S186357190","display_name":"Future Generation Computer Systems","issn_l":"0167-739X","issn":["0167-739X","1872-7115"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320990","host_organization_name":"Elsevier BV","host_organization_lineage":["https://openalex.org/P4310320990"],"host_organization_lineage_names":["Elsevier BV"],"type":"journal"},"license":"cc-by-nc","license_id":"https://openalex.org/licenses/cc-by-nc","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Future Generation Computer Systems","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"hybrid","oa_url":"https://doi.org/10.1016/j.future.2023.09.032","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5026637186","display_name":"Norah Alsaeed","orcid":"https://orcid.org/0000-0002-8161-7787"},"institutions":[{"id":"https://openalex.org/I185163786","display_name":"King Abdulaziz University","ror":"https://ror.org/02ma4wv74","country_code":"SA","type":"education","lineage":["https://openalex.org/I185163786"]},{"id":"https://openalex.org/I82952536","display_name":"King Khalid University","ror":"https://ror.org/052kwzs30","country_code":"SA","type":"education","lineage":["https://openalex.org/I82952536"]}],"countries":["SA"],"is_corresponding":true,"raw_author_name":"Norah Alsaeed","raw_affiliation_strings":["Department of Computer Science, The Applied College, King Khalid University, Abha, 61421, Saudi Arabia","Department of Information Systems, Faculty of Computing and Information Technology, King Abdulaziz University, Jeddah, 21589, Saudi Arabia"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, The Applied College, King Khalid University, Abha, 61421, Saudi Arabia","institution_ids":["https://openalex.org/I82952536"]},{"raw_affiliation_string":"Department of Information Systems, Faculty of Computing and Information Technology, King Abdulaziz University, Jeddah, 21589, Saudi Arabia","institution_ids":["https://openalex.org/I185163786"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5036738484","display_name":"Farrukh Nadeem","orcid":"https://orcid.org/0000-0003-2696-9736"},"institutions":[{"id":"https://openalex.org/I185163786","display_name":"King Abdulaziz University","ror":"https://ror.org/02ma4wv74","country_code":"SA","type":"education","lineage":["https://openalex.org/I185163786"]}],"countries":["SA"],"is_corresponding":false,"raw_author_name":"Farrukh Nadeem","raw_affiliation_strings":["Department of Information Systems, Faculty of Computing and Information Technology, King Abdulaziz University, Jeddah, 21589, Saudi Arabia"],"affiliations":[{"raw_affiliation_string":"Department of Information Systems, Faculty of Computing and Information Technology, King Abdulaziz University, Jeddah, 21589, Saudi Arabia","institution_ids":["https://openalex.org/I185163786"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5087536215","display_name":"Faisal Albalwy","orcid":"https://orcid.org/0000-0002-2342-2156"},"institutions":[{"id":"https://openalex.org/I23075662","display_name":"Taibah University","ror":"https://ror.org/01xv1nn60","country_code":"SA","type":"education","lineage":["https://openalex.org/I23075662"]},{"id":"https://openalex.org/I28407311","display_name":"University of Manchester","ror":"https://ror.org/027m9bs27","country_code":"GB","type":"education","lineage":["https://openalex.org/I28407311"]}],"countries":["GB","SA"],"is_corresponding":false,"raw_author_name":"Faisal Albalwy","raw_affiliation_strings":["Department of Computer Science, College of Computer Science and Engineering, Taibah University, Madinah, 42353, Saudi Arabia","Division of Informatics, Imaging and Data Sciences, School of Health Sciences, Faculty of Biology, Medicine and Health, Stopford Building, The University of Manchester, Oxford Road, M13 9PL, Manchester, 42353, UK"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, College of Computer Science and Engineering, Taibah University, Madinah, 42353, Saudi Arabia","institution_ids":["https://openalex.org/I23075662"]},{"raw_affiliation_string":"Division of Informatics, Imaging and Data Sciences, School of Health Sciences, Faculty of Biology, Medicine and Health, Stopford Building, The University of Manchester, Oxford Road, M13 9PL, Manchester, 42353, UK","institution_ids":["https://openalex.org/I28407311"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5026637186"],"corresponding_institution_ids":["https://openalex.org/I185163786","https://openalex.org/I82952536"],"apc_list":{"value":3340,"currency":"USD","value_usd":3340},"apc_paid":{"value":3340,"currency":"USD","value_usd":3340},"fwci":11.6523,"has_fulltext":false,"cited_by_count":59,"citation_normalized_percentile":{"value":0.98923072,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":99,"max":100},"biblio":{"volume":"151","issue":null,"first_page":"162","last_page":"181"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.9937999844551086,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.9937999844551086,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9908999800682068,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.9871000051498413,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8584035038948059},{"id":"https://openalex.org/keywords/scalability","display_name":"Scalability","score":0.6784621477127075},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.6029518842697144},{"id":"https://openalex.org/keywords/elliptic-curve-cryptography","display_name":"Elliptic curve cryptography","score":0.5389298796653748},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.4941723644733429},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.4538128077983856},{"id":"https://openalex.org/keywords/authentication-protocol","display_name":"Authentication protocol","score":0.4417014718055725},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.4173760712146759},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4087936580181122},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.22903233766555786},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.16205471754074097},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.1378720998764038}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8584035038948059},{"id":"https://openalex.org/C48044578","wikidata":"https://www.wikidata.org/wiki/Q727490","display_name":"Scalability","level":2,"score":0.6784621477127075},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.6029518842697144},{"id":"https://openalex.org/C167615521","wikidata":"https://www.wikidata.org/wiki/Q1048911","display_name":"Elliptic curve cryptography","level":4,"score":0.5389298796653748},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.4941723644733429},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.4538128077983856},{"id":"https://openalex.org/C21564112","wikidata":"https://www.wikidata.org/wiki/Q4825885","display_name":"Authentication protocol","level":3,"score":0.4417014718055725},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.4173760712146759},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4087936580181122},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.22903233766555786},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.16205471754074097},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.1378720998764038}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1016/j.future.2023.09.032","is_oa":true,"landing_page_url":"https://doi.org/10.1016/j.future.2023.09.032","pdf_url":null,"source":{"id":"https://openalex.org/S186357190","display_name":"Future Generation Computer Systems","issn_l":"0167-739X","issn":["0167-739X","1872-7115"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320990","host_organization_name":"Elsevier BV","host_organization_lineage":["https://openalex.org/P4310320990"],"host_organization_lineage_names":["Elsevier BV"],"type":"journal"},"license":"cc-by-nc","license_id":"https://openalex.org/licenses/cc-by-nc","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Future Generation Computer Systems","raw_type":"journal-article"},{"id":"pmh:oai:pure.atira.dk:openaire/5a015466-f45a-4b30-8166-779b326705b8","is_oa":false,"landing_page_url":"https://research.manchester.ac.uk/en/publications/5a015466-f45a-4b30-8166-779b326705b8","pdf_url":null,"source":{"id":"https://openalex.org/S4306400662","display_name":"Research Explorer (The University of Manchester)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I28407311","host_organization_name":"University of Manchester","host_organization_lineage":["https://openalex.org/I28407311"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Alsaeed, N, Nadeem, F & Albalwy, F 2024, 'A scalable and lightweight group authentication framework for Internet of Medical Things using integrated blockchain and fog computing', Future Generation Computer Systems, vol. 151, pp. 162-181. https://doi.org/10.1016/j.future.2023.09.032","raw_type":"info:eu-repo/semantics/publishedVersion"}],"best_oa_location":{"id":"doi:10.1016/j.future.2023.09.032","is_oa":true,"landing_page_url":"https://doi.org/10.1016/j.future.2023.09.032","pdf_url":null,"source":{"id":"https://openalex.org/S186357190","display_name":"Future Generation Computer Systems","issn_l":"0167-739X","issn":["0167-739X","1872-7115"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320990","host_organization_name":"Elsevier BV","host_organization_lineage":["https://openalex.org/P4310320990"],"host_organization_lineage_names":["Elsevier BV"],"type":"journal"},"license":"cc-by-nc","license_id":"https://openalex.org/licenses/cc-by-nc","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Future Generation Computer Systems","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":61,"referenced_works":["https://openalex.org/W1880212920","https://openalex.org/W2006088653","https://openalex.org/W2036378739","https://openalex.org/W2273663819","https://openalex.org/W2588724278","https://openalex.org/W2767009997","https://openalex.org/W2781808171","https://openalex.org/W2803302165","https://openalex.org/W2806285705","https://openalex.org/W2810652557","https://openalex.org/W2896430050","https://openalex.org/W2914470820","https://openalex.org/W2920720933","https://openalex.org/W2920733725","https://openalex.org/W2946404216","https://openalex.org/W2972266205","https://openalex.org/W2996789024","https://openalex.org/W3000455992","https://openalex.org/W3022168030","https://openalex.org/W3026701738","https://openalex.org/W3036907975","https://openalex.org/W3042797956","https://openalex.org/W3043570263","https://openalex.org/W3094772259","https://openalex.org/W3106916313","https://openalex.org/W3107586890","https://openalex.org/W3120131265","https://openalex.org/W3129674742","https://openalex.org/W3135560342","https://openalex.org/W3160705937","https://openalex.org/W3200511651","https://openalex.org/W4214754257","https://openalex.org/W4235502593","https://openalex.org/W4255816276","https://openalex.org/W4285199751","https://openalex.org/W4288039529","https://openalex.org/W4293189007","https://openalex.org/W4386001466","https://openalex.org/W6602349683","https://openalex.org/W6677372913","https://openalex.org/W6683991168","https://openalex.org/W6745850505","https://openalex.org/W6755849009","https://openalex.org/W6756049217","https://openalex.org/W6758248570","https://openalex.org/W6762752688","https://openalex.org/W6766123963","https://openalex.org/W6767694597","https://openalex.org/W6769749575","https://openalex.org/W6771808061","https://openalex.org/W6772481838","https://openalex.org/W6779387915","https://openalex.org/W6781112756","https://openalex.org/W6781753150","https://openalex.org/W6787866454","https://openalex.org/W6802499327","https://openalex.org/W6802753652","https://openalex.org/W6808814316","https://openalex.org/W6809684777","https://openalex.org/W6821432361","https://openalex.org/W6839770089"],"related_works":["https://openalex.org/W2034419863","https://openalex.org/W4322486674","https://openalex.org/W2296396257","https://openalex.org/W2971072696","https://openalex.org/W3007106793","https://openalex.org/W2009754599","https://openalex.org/W2132505069","https://openalex.org/W1965515427","https://openalex.org/W2547137208","https://openalex.org/W2116285675"],"abstract_inverted_index":{"The":[0,131,199,273],"Internet":[1,266],"of":[2,9,24,31,52,56,77,87,162,202,211,228,246,253,265,299,311,321],"Medical":[3],"Things":[4],"(IoMT)":[5],"is":[6,59,135,192,284],"the":[7,28,43,60,68,154,179,183,195,203,208,219,229,254,260,281,296,300,309,319,322],"network":[8],"medical":[10],"devices,":[11],"software":[12],"applications,":[13],"and":[14,22,48,82,96,106,146,152,172,186,189,218,248,269,275,286],"healthcare":[15,25],"information":[16],"systems":[17],"used":[18],"for":[19,33,112,128],"remote":[20],"monitoring":[21],"delivery":[23],"services.":[26],"Despite":[27],"several":[29],"advantages":[30],"IoMT":[32,53,57,65,115,129,213,323],"today":[34],"smart":[35],"healthcare,":[36],"security":[37,251,277],"issues":[38,101],"are":[39,80,110],"growing":[40],"due":[41],"to":[42,63,103,288],"inadequate":[44],"computation,":[45,93],"limited":[46],"storage":[47],"insufficient":[49],"self-protection":[50],"capabilities":[51],"devices.":[54],"Authentication":[55],"devices":[58,214],"main":[61],"requirement":[62],"secure":[64,285],"systems.":[66,116],"Although,":[67],"recent":[69],"authentication":[70,98,126,133,157,237],"schemes":[71],"based":[72],"on":[73],"tamper-proof":[74],"decentralized":[75],"architecture":[76],"blockchain":[78],"technology":[79],"robust":[81],"enjoy":[83],"a":[84,123,138,160,304],"high":[85,92],"level":[86],"security,":[88],"yet":[89],"they":[90],"require":[91],"more":[94],"storage,":[95],"long":[97],"time.":[99],"These":[100],"lead":[102],"reduced":[104],"scalability":[105,320],"time":[107],"efficiency,":[108],"which":[109],"necessary":[111],"large-scale,":[113],"time-sensitive":[114],"To":[117,148],"this":[118,120],"end,":[119],"paper":[121],"proposes":[122],"novel":[124],"group":[125,132,156],"framework":[127,158,181,205,256,283,302],"Systems.":[130],"scheme":[134],"implemented":[136],"through":[137,182],"four-phase":[139],"process,":[140],"including":[141],"setup,":[142],"registration,":[143],"secret":[144,168],"construction,":[145],"authentication.":[147],"enhance":[149],"both":[150],"efficiency":[151],"scalability,":[153],"proposed":[155,180,204,230,255,282,301],"employs":[159],"combination":[161],"elliptic":[163],"curve":[164],"cryptography":[165],"(ECC),":[166],"Shamir\u2019s":[167],"sharing":[169],"(SSS)":[170],"algorithm,":[171],"blockchain-based":[173,236],"fog":[174],"computing":[175],"technologies.":[176],"We":[177,292],"simulated":[178],"Ethereum":[184],"platform":[185],"Solidity":[187],"language":[188],"its":[190],"performance":[191,232],"evaluated":[193],"using":[194,259],"Hyperledger":[196],"Caliper":[197],"tool.":[198,272],"simulation":[200],"experiments":[201],"showed":[206,239],"that":[207,240,280,295,316],"average":[209,297],"latency":[210,247,298],"authenticating":[212],"was":[215,221,257],"0.5":[216],"second":[217],"throughput":[220],"400":[222],"transactions":[223,313],"per":[224],"second.":[225],"Our":[226],"analysis":[227,252,278],"framework\u2019s":[231],"against":[233],"other":[234],"cutting-edge":[235],"techniques":[238],"it":[241,317],"outperformed":[242],"them":[243],"in":[244],"terms":[245],"throughput.":[249],"A":[250],"conducted":[258],"widely":[261],"accepted":[262],"Automated":[263],"Validation":[264],"Security":[267],"Protocols":[268],"Applications":[270],"(AVISPA)":[271],"formal":[274],"informal":[276],"demonstrated":[279],"resistant":[287],"potential":[289],"authentication-related":[290],"attacks.":[291],"also":[293],"noted":[294],"maintains":[303],"fairly":[305],"narrow":[306],"range":[307],"when":[308],"number":[310],"submitted":[312],"rises,":[314],"indicating":[315],"supports":[318],"system.":[324]},"counts_by_year":[{"year":2026,"cited_by_count":7},{"year":2025,"cited_by_count":35},{"year":2024,"cited_by_count":17}],"updated_date":"2026-04-20T07:46:08.049788","created_date":"2025-10-10T00:00:00"}
