{"id":"https://openalex.org/W4384945976","doi":"https://doi.org/10.1109/iwcmc58020.2023.10182468","title":"Embattle The Security of E-Health System Through A Secure Authentication and Key Agreement Protocol","display_name":"Embattle The Security of E-Health System Through A Secure Authentication and Key Agreement Protocol","publication_year":2023,"publication_date":"2023-06-19","ids":{"openalex":"https://openalex.org/W4384945976","doi":"https://doi.org/10.1109/iwcmc58020.2023.10182468"},"language":"en","primary_location":{"id":"doi:10.1109/iwcmc58020.2023.10182468","is_oa":false,"landing_page_url":"http://dx.doi.org/10.1109/iwcmc58020.2023.10182468","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2023 International Wireless Communications and Mobile Computing (IWCMC)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100854504","display_name":"Darshan Singh","orcid":null},"institutions":[{"id":"https://openalex.org/I60054993","display_name":"Graphic Era University","ror":"https://ror.org/03wqgqd89","country_code":"IN","type":"education","lineage":["https://openalex.org/I60054993"]}],"countries":["IN"],"is_corresponding":true,"raw_author_name":"Darshan Singh","raw_affiliation_strings":["Graphic Era Deemed to be University,Department of Computer Science and Engineering,Dehradun,India,248 002"],"affiliations":[{"raw_affiliation_string":"Graphic Era Deemed to be University,Department of Computer Science and Engineering,Dehradun,India,248 002","institution_ids":["https://openalex.org/I60054993"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5004320904","display_name":"Mohammad Wazid","orcid":"https://orcid.org/0000-0001-9898-0921"},"institutions":[{"id":"https://openalex.org/I60054993","display_name":"Graphic Era University","ror":"https://ror.org/03wqgqd89","country_code":"IN","type":"education","lineage":["https://openalex.org/I60054993"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Mohammad Wazid","raw_affiliation_strings":["Graphic Era Deemed to be University,Department of Computer Science and Engineering,Dehradun,India,248 002"],"affiliations":[{"raw_affiliation_string":"Graphic Era Deemed to be University,Department of Computer Science and Engineering,Dehradun,India,248 002","institution_ids":["https://openalex.org/I60054993"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5023978018","display_name":"D. Singh","orcid":"https://orcid.org/0000-0003-3242-2059"},"institutions":[{"id":"https://openalex.org/I60054993","display_name":"Graphic Era University","ror":"https://ror.org/03wqgqd89","country_code":"IN","type":"education","lineage":["https://openalex.org/I60054993"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"D. P. Singh","raw_affiliation_strings":["Graphic Era Deemed to be University,Department of Computer Science and Engineering,Dehradun,India,248 002"],"affiliations":[{"raw_affiliation_string":"Graphic Era Deemed to be University,Department of Computer Science and Engineering,Dehradun,India,248 002","institution_ids":["https://openalex.org/I60054993"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5066981564","display_name":"Ashok Kumar Das","orcid":"https://orcid.org/0000-0003-1770-1885"},"institutions":[{"id":"https://openalex.org/I188963388","display_name":"International Institute of Information Technology","ror":"https://ror.org/02dernx73","country_code":"IN","type":"education","lineage":["https://openalex.org/I188963388"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Ashok Kumar Das","raw_affiliation_strings":["International Institute of Information Technology,Center for Security, Theory and Algorithmic Research,Hyderabad,India,500 032"],"affiliations":[{"raw_affiliation_string":"International Institute of Information Technology,Center for Security, Theory and Algorithmic Research,Hyderabad,India,500 032","institution_ids":["https://openalex.org/I188963388"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5048843646","display_name":"R. C.","orcid":null},"institutions":[{"id":"https://openalex.org/I4210162190","display_name":"China University of Petroleum, East China","ror":"https://ror.org/05gbn2817","country_code":"CN","type":"education","lineage":["https://openalex.org/I4210162190"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Rodrigues Joel J. P. C.","raw_affiliation_strings":["China University of Petroleum (East China),College of Computer Science and Technology,Qingdao,China,266555"],"affiliations":[{"raw_affiliation_string":"China University of Petroleum (East China),College of Computer Science and Technology,Qingdao,China,266555","institution_ids":["https://openalex.org/I4210162190"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5100854504"],"corresponding_institution_ids":["https://openalex.org/I60054993"],"apc_list":null,"apc_paid":null,"fwci":0.4119,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.60459423,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"1130","last_page":"1135"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9973000288009644,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11932","display_name":"Wireless Body Area Networks","score":0.9797999858856201,"subfield":{"id":"https://openalex.org/subfields/2204","display_name":"Biomedical Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.767026424407959},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6969456076622009},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.5602806210517883},{"id":"https://openalex.org/keywords/server","display_name":"Server","score":0.5286983251571655},{"id":"https://openalex.org/keywords/session-key","display_name":"Session key","score":0.51123046875},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.4560638666152954},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.4508233070373535},{"id":"https://openalex.org/keywords/mutual-authentication","display_name":"Mutual authentication","score":0.4163099229335785},{"id":"https://openalex.org/keywords/security-analysis","display_name":"Security analysis","score":0.4131864905357361},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.3317674398422241},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.29326868057250977},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.16012030839920044},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.12080752849578857}],"concepts":[{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.767026424407959},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6969456076622009},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.5602806210517883},{"id":"https://openalex.org/C93996380","wikidata":"https://www.wikidata.org/wiki/Q44127","display_name":"Server","level":2,"score":0.5286983251571655},{"id":"https://openalex.org/C191197275","wikidata":"https://www.wikidata.org/wiki/Q1755775","display_name":"Session key","level":3,"score":0.51123046875},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.4560638666152954},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.4508233070373535},{"id":"https://openalex.org/C2781221063","wikidata":"https://www.wikidata.org/wiki/Q6944186","display_name":"Mutual authentication","level":3,"score":0.4163099229335785},{"id":"https://openalex.org/C38369872","wikidata":"https://www.wikidata.org/wiki/Q7445009","display_name":"Security analysis","level":2,"score":0.4131864905357361},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.3317674398422241},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.29326868057250977},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.16012030839920044},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.12080752849578857}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/iwcmc58020.2023.10182468","is_oa":false,"landing_page_url":"http://dx.doi.org/10.1109/iwcmc58020.2023.10182468","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2023 International Wireless Communications and Mobile Computing (IWCMC)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/9","score":0.6000000238418579,"display_name":"Industry, innovation and infrastructure"}],"awards":[],"funders":[{"id":"https://openalex.org/F4320337504","display_name":"Research and Development","ror":"https://ror.org/027s68j25"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":24,"referenced_works":["https://openalex.org/W1561441787","https://openalex.org/W2013956457","https://openalex.org/W2029693536","https://openalex.org/W2087837462","https://openalex.org/W2105114022","https://openalex.org/W2168204607","https://openalex.org/W2408677707","https://openalex.org/W2729021829","https://openalex.org/W2748361805","https://openalex.org/W2790487176","https://openalex.org/W2792581847","https://openalex.org/W2884070533","https://openalex.org/W2890187623","https://openalex.org/W2941876624","https://openalex.org/W2966895506","https://openalex.org/W2979646594","https://openalex.org/W3012254913","https://openalex.org/W3083894623","https://openalex.org/W3089076483","https://openalex.org/W3156359488","https://openalex.org/W4206388446","https://openalex.org/W4221046479","https://openalex.org/W4311081064","https://openalex.org/W4312554849"],"related_works":["https://openalex.org/W2140125353","https://openalex.org/W2559950795","https://openalex.org/W2167743049","https://openalex.org/W211083189","https://openalex.org/W1542859216","https://openalex.org/W2016145875","https://openalex.org/W1966132871","https://openalex.org/W2970982858","https://openalex.org/W2410215724","https://openalex.org/W2953410103"],"abstract_inverted_index":{"There":[0],"has":[1],"been":[2],"exponential":[3],"growth":[4],"in":[5,22,102,125,143,178,229],"the":[6,37,74,75,79,118,123,155,167,207,221,265],"field":[7],"of":[8,10,40,73,88,108,223,237,249,256],"Internet":[9,87],"Things":[11,90],"(IoT)-enabled":[12],"e-health":[13,144,224],"domain,":[14],"where":[15],"several":[16],"technologies":[17],"are":[18,97,149,199],"interconnected":[19],"with":[20],"each":[21],"order":[23],"to":[24,30,47,66,78,115,120,133,152,159,165,181,201,219],"provide":[25,67],"low-cost":[26],"and":[27,43,58,71,100,104,163,215,252],"efficient":[28],"services":[29],"users.":[31,81],"The":[32,53,233,245],"smart":[33,54,135],"healthcare":[34,55,76,136],"devices":[35,185],"monitor":[36],"physiological":[38],"conditions":[39],"a":[41,117,129,140,172,193,203],"patient":[42],"then":[44],"send":[45],"data":[46,77,110],"connected":[48],"servers":[49,57],"(i.e.,":[50],"health":[51],"server).":[52],"devices,":[56,137],"associated":[59],"software":[60],"applications":[61],"come":[62],"under":[63],"one":[64],"umbrella":[65],"live":[68],"tracking,":[69],"monitoring":[70],"analysis":[72,236,248],"concerned":[80],"It":[82],"is":[83,128,139,171,231,262],"also":[84],"considered":[85,98],"as":[86,227],"Medical":[89],"(IoMT)":[91],"communication":[92,222],"environment.":[93],"All":[94],"medical":[95,109],"records":[96],"critical":[99],"sensitive":[101],"nature":[103],"therefore":[105],"any":[106,187],"leakage":[107],"could":[111],"potentially":[112],"turn":[113],"out":[114],"be":[116],"lethal":[119],"patients.":[121],"With":[122],"innovation":[124],"technology,":[126],"there":[127,170],"constant":[130],"security":[131,177,235,241],"threat":[132,147],"all":[134,183],"which":[138],"main":[141],"issue":[142],"system.":[145],"Cyber":[146],"actors":[148],"actively":[150],"trying":[151],"break":[153],"into":[154],"system":[156,225,258],"or":[157],"network":[158],"gain":[160],"unauthorized":[161],"access":[162],"privileges":[164],"manipulate":[166],"data.":[168],"Therefore,":[169],"strong":[173],"urge":[174],"for":[175],"cyber":[176],"this":[179,211],"domain":[180],"secure":[182,194,204,220],"computing":[184],"from":[186],"computer":[188],"attack.":[189],"Proper":[190],"authentication,":[191],"authorization,":[192],"session":[195],"key":[196,216],"exchanges,":[197],"etc.,":[198],"required":[200],"create":[202],"channel":[205],"among":[206],"communicating":[208],"devices.":[209],"In":[210],"paper,":[212],"an":[213],"authentication":[214],"agreement":[217],"scheme":[218],"(named":[226],"ASKA-EH,":[228],"short)":[230],"proposed.":[232],"provided":[234],"ASKA-EH":[238,251,261],"proves":[239],"its":[240],"against":[242],"various":[243],"attacks.":[244],"comparative":[246],"performance":[247],"proposed":[250],"other":[253],"existing":[254,266],"schemes":[255],"ehealth":[257],"reveals":[259],"that":[260],"superior":[263],"than":[264],"schemes.":[267]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2023,"cited_by_count":1}],"updated_date":"2025-12-21T23:12:01.093139","created_date":"2025-10-10T00:00:00"}
