{"id":"https://openalex.org/W4406892328","doi":"https://doi.org/10.1109/csnet64211.2024.10851748","title":"A Robust Anonymous Authentication Scheme for Securing IoT-Enabled Healthcare Services","display_name":"A Robust Anonymous Authentication Scheme for Securing IoT-Enabled Healthcare Services","publication_year":2024,"publication_date":"2024-12-04","ids":{"openalex":"https://openalex.org/W4406892328","doi":"https://doi.org/10.1109/csnet64211.2024.10851748"},"language":"en","primary_location":{"id":"doi:10.1109/csnet64211.2024.10851748","is_oa":false,"landing_page_url":"https://doi.org/10.1109/csnet64211.2024.10851748","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2024 8th Cyber Security in Networking Conference (CSNet)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5101689078","display_name":"Sana Ullah","orcid":"https://orcid.org/0000-0002-2200-2897"},"institutions":[{"id":"https://openalex.org/I2802623135","display_name":"Enterprise Ireland","ror":"https://ror.org/023z51242","country_code":"IE","type":"government","lineage":["https://openalex.org/I2802623135"]},{"id":"https://openalex.org/I4387152698","display_name":"Atlantic Technological University","ror":"https://ror.org/0458dap48","country_code":null,"type":"education","lineage":["https://openalex.org/I4387152698"]}],"countries":["IE"],"is_corresponding":true,"raw_author_name":"Sana Ullah","raw_affiliation_strings":["Atlantic Technological University,Department of Enterprise and Technology,Galway,Ireland"],"affiliations":[{"raw_affiliation_string":"Atlantic Technological University,Department of Enterprise and Technology,Galway,Ireland","institution_ids":["https://openalex.org/I2802623135","https://openalex.org/I4387152698"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5040007583","display_name":"Shanshan Tu","orcid":"https://orcid.org/0000-0002-6220-4119"},"institutions":[{"id":"https://openalex.org/I37796252","display_name":"Beijing University of Technology","ror":"https://ror.org/037b1pp87","country_code":"CN","type":"education","lineage":["https://openalex.org/I37796252"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Shanshan Tu","raw_affiliation_strings":["College of Computer Science, Beijing University of Technology,Beijing,China,100124"],"affiliations":[{"raw_affiliation_string":"College of Computer Science, Beijing University of Technology,Beijing,China,100124","institution_ids":["https://openalex.org/I37796252"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5000485488","display_name":"Akhtar Badshah","orcid":"https://orcid.org/0000-0001-7867-2657"},"institutions":[{"id":"https://openalex.org/I68649149","display_name":"University of Malakand","ror":"https://ror.org/012xdha97","country_code":"PK","type":"education","lineage":["https://openalex.org/I68649149"]}],"countries":["PK"],"is_corresponding":false,"raw_author_name":"Akhtar Badshah","raw_affiliation_strings":["University of Malakand,Faculty of Engineering,Department of Software Engineering,Dir Lower,Pakistan,18800"],"affiliations":[{"raw_affiliation_string":"University of Malakand,Faculty of Engineering,Department of Software Engineering,Dir Lower,Pakistan,18800","institution_ids":["https://openalex.org/I68649149"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5086533220","display_name":"Muhammad Waqas","orcid":"https://orcid.org/0000-0003-0814-7544"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Muhammad Waqas","raw_affiliation_strings":["School of Computing and Mathematical Sciences, University of Greenwich,Faculty of Engineering and Science,U.K"],"affiliations":[{"raw_affiliation_string":"School of Computing and Mathematical Sciences, University of Greenwich,Faculty of Engineering and Science,U.K","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":3,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5101689078"],"corresponding_institution_ids":["https://openalex.org/I2802623135","https://openalex.org/I4387152698"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.31361093,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.9883000254631042,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.9883000254631042,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9761999845504761,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6994124054908752},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6953529715538025},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.6884810924530029},{"id":"https://openalex.org/keywords/internet-of-things","display_name":"Internet of Things","score":0.6717073917388916},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.6253654956817627},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.5199629068374634},{"id":"https://openalex.org/keywords/health-care","display_name":"Health care","score":0.5198348164558411},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.3575153946876526}],"concepts":[{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6994124054908752},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6953529715538025},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.6884810924530029},{"id":"https://openalex.org/C81860439","wikidata":"https://www.wikidata.org/wiki/Q251212","display_name":"Internet of Things","level":2,"score":0.6717073917388916},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.6253654956817627},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.5199629068374634},{"id":"https://openalex.org/C160735492","wikidata":"https://www.wikidata.org/wiki/Q31207","display_name":"Health care","level":2,"score":0.5198348164558411},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.3575153946876526},{"id":"https://openalex.org/C162324750","wikidata":"https://www.wikidata.org/wiki/Q8134","display_name":"Economics","level":0,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C50522688","wikidata":"https://www.wikidata.org/wiki/Q189833","display_name":"Economic growth","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/csnet64211.2024.10851748","is_oa":false,"landing_page_url":"https://doi.org/10.1109/csnet64211.2024.10851748","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2024 8th Cyber Security in Networking Conference (CSNet)","raw_type":"proceedings-article"},{"id":"pmh:oai:gala.gre.ac.uk:49199","is_oa":false,"landing_page_url":"https://orcid.org/0000-0003-0814-7544","pdf_url":null,"source":{"id":"https://openalex.org/S4306401244","display_name":"Greenwich Academic Literature Archive (University of Greenwich)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I55060895","host_organization_name":"University of Greenwich","host_organization_lineage":["https://openalex.org/I55060895"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"acceptedVersion","is_accepted":true,"is_published":false,"raw_source_name":null,"raw_type":"PeerReviewed"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":16,"referenced_works":["https://openalex.org/W1561441787","https://openalex.org/W2029693536","https://openalex.org/W2105114022","https://openalex.org/W2408677707","https://openalex.org/W2803406207","https://openalex.org/W2884070533","https://openalex.org/W2955419213","https://openalex.org/W3156033593","https://openalex.org/W3163508094","https://openalex.org/W3189386369","https://openalex.org/W3198489069","https://openalex.org/W4224301602","https://openalex.org/W4285255160","https://openalex.org/W4313149364","https://openalex.org/W4385154266","https://openalex.org/W4391547640"],"related_works":["https://openalex.org/W4245926026","https://openalex.org/W4311097251","https://openalex.org/W2586548817","https://openalex.org/W2625093826","https://openalex.org/W4200598720","https://openalex.org/W2921026492","https://openalex.org/W4247463117","https://openalex.org/W4361251261","https://openalex.org/W3031181660","https://openalex.org/W2242172122"],"abstract_inverted_index":{"Smart":[0],"wearables":[1],"and":[2,9,28,54,79,88,98,132,148,157,165,193],"body":[3],"implanted":[4],"IoT":[5],"devices":[6,123],"continuously":[7],"track":[8],"transmit":[10],"health":[11],"metrics":[12],"wirelessly":[13],"to":[14],"a":[15,20,39,63,95,199],"central":[16],"controller,":[17],"such":[18],"as":[19,198],"personal":[21],"server,":[22],"enabling":[23],"real-time":[24],"monitoring,":[25],"proactive":[26],"treatment":[27],"timely":[29],"assistance.":[30],"However,":[31],"the":[32,43,51,91,115,137,146,151,163,175],"security":[33,56,117,143,159,192],"of":[34,45,111,118,150,167,174,190],"IoT-enabled":[35,58,106,138,205],"healthcare":[36,59,107,139,169,206],"systems":[37],"remains":[38],"concern,":[40],"particularly":[41],"regarding":[42],"protection":[44],"sensitive":[46,168],"patient":[47],"data.":[48,170],"To":[49],"address":[50],"aforementioned":[52],"issue":[53],"enhance":[55],"in":[57,68,105,188,204],"services,":[60],"we":[61],"propose":[62],"robust":[64],"anonymous":[65],"authentication":[66,97,203],"scheme":[67,93,153,177,184],"this":[69],"work.":[70],"By":[71],"leveraging":[72],"lightweight":[73],"cryptographic":[74],"primitives":[75],"including":[76,128],"hash":[77],"functions":[78,86],"XOR":[80],"operations":[81],"coupled":[82],"with":[83,178],"physical":[84,116,130],"unclonable":[85],"(PUFs)":[87],"fuzzy":[89],"extractors,":[90],"proposed":[92,152,176],"introduces":[94],"novel":[96],"key":[99],"agreement":[100],"mechanism":[101],"for":[102,202],"secure":[103],"communication":[104],"systems.":[108],"The":[109],"integration":[110],"PUF":[112],"technology":[113],"ensure":[114,162],"resource":[119],"constrained":[120],"implantable":[121],"medical":[122],"(IMDs)":[124],"against":[125,154],"various":[126,155],"attacks":[127,134],"device":[129],"capture":[131],"impersonation":[133],"that":[135,182],"compromise":[136],"operations.":[140],"A":[141],"thorough":[142],"analysis":[144,173],"demonstrated":[145],"robustness":[147],"resilience":[149],"active":[156],"pas-sive":[158],"attacks,":[160],"thus":[161],"integrity":[164],"confidentiality":[166],"Finally,":[171],"comparative":[172],"other":[179,186],"state-of-the-art":[180],"highlighted":[181],"our":[183],"outperformed":[185],"approaches":[187],"terms":[189],"providing":[191],"additional":[194],"features,":[195],"positioning":[196],"it":[197],"comprehensive":[200],"solution":[201],"services.":[207]},"counts_by_year":[],"updated_date":"2026-03-10T16:38:18.471706","created_date":"2025-10-10T00:00:00"}
