{"id":"https://openalex.org/W4285199751","doi":"https://doi.org/10.1109/jiot.2022.3181609","title":"A Blockchain-Assisted Privacy-Aware Authentication Scheme for Internet of Medical Things","display_name":"A Blockchain-Assisted Privacy-Aware Authentication Scheme for Internet of Medical Things","publication_year":2022,"publication_date":"2022-06-09","ids":{"openalex":"https://openalex.org/W4285199751","doi":"https://doi.org/10.1109/jiot.2022.3181609"},"language":"en","primary_location":{"id":"doi:10.1109/jiot.2022.3181609","is_oa":false,"landing_page_url":"https://doi.org/10.1109/jiot.2022.3181609","pdf_url":null,"source":{"id":"https://openalex.org/S2480266640","display_name":"IEEE Internet of Things Journal","issn_l":"2327-4662","issn":["2327-4662","2372-2541"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Internet of Things Journal","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5029404256","display_name":"Xiaoying Jia","orcid":"https://orcid.org/0000-0003-4873-7258"},"institutions":[{"id":"https://openalex.org/I145897649","display_name":"Minzu University of China","ror":"https://ror.org/0044e2g62","country_code":"CN","type":"education","lineage":["https://openalex.org/I145897649"]},{"id":"https://openalex.org/I82880672","display_name":"Beihang University","ror":"https://ror.org/00wk2mp56","country_code":"CN","type":"education","lineage":["https://openalex.org/I82880672"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Xiaoying Jia","raw_affiliation_strings":["School of Mathematics and Statistics, South-Central Minzu University, Wuhan, China","Hangzhou Innovation Institute, Beihang University, Hangzhou, China"],"affiliations":[{"raw_affiliation_string":"School of Mathematics and Statistics, South-Central Minzu University, Wuhan, China","institution_ids":["https://openalex.org/I145897649"]},{"raw_affiliation_string":"Hangzhou Innovation Institute, Beihang University, Hangzhou, China","institution_ids":["https://openalex.org/I82880672"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5088264677","display_name":"Min Luo","orcid":"https://orcid.org/0000-0002-1819-9332"},"institutions":[{"id":"https://openalex.org/I152269853","display_name":"Qilu University of Technology","ror":"https://ror.org/04hyzq608","country_code":"CN","type":"education","lineage":["https://openalex.org/I152269853"]},{"id":"https://openalex.org/I37461747","display_name":"Wuhan University","ror":"https://ror.org/033vjfk17","country_code":"CN","type":"education","lineage":["https://openalex.org/I37461747"]},{"id":"https://openalex.org/I4210142748","display_name":"Shandong Academy of Sciences","ror":"https://ror.org/04y8d6y55","country_code":"CN","type":"education","lineage":["https://openalex.org/I4210142748"]},{"id":"https://openalex.org/I5343935","display_name":"Guilin University of Electronic Technology","ror":"https://ror.org/05arjae42","country_code":"CN","type":"education","lineage":["https://openalex.org/I5343935"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Min Luo","raw_affiliation_strings":["Shandong Provincial Key Laboratory of Computer Networks, Qilu University of Technology (Shandong Academy of Sciences), Jinan, China","Guangxi Key Laboratory of Trusted Software, Guilin University of Electronic Technology, Guilin, China","School of Cyber Science and Engineering, Wuhan University, Wuhan, China"],"affiliations":[{"raw_affiliation_string":"Shandong Provincial Key Laboratory of Computer Networks, Qilu University of Technology (Shandong Academy of Sciences), Jinan, China","institution_ids":["https://openalex.org/I4210142748","https://openalex.org/I152269853"]},{"raw_affiliation_string":"Guangxi Key Laboratory of Trusted Software, Guilin University of Electronic Technology, Guilin, China","institution_ids":["https://openalex.org/I5343935"]},{"raw_affiliation_string":"School of Cyber Science and Engineering, Wuhan University, Wuhan, China","institution_ids":["https://openalex.org/I37461747"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5082859576","display_name":"Huaqun Wang","orcid":"https://orcid.org/0000-0001-7254-6465"},"institutions":[{"id":"https://openalex.org/I192209268","display_name":"Shaoxing University","ror":"https://ror.org/0435tej63","country_code":"CN","type":"education","lineage":["https://openalex.org/I192209268"]},{"id":"https://openalex.org/I41198531","display_name":"Nanjing University of Posts and Telecommunications","ror":"https://ror.org/043bpky34","country_code":"CN","type":"education","lineage":["https://openalex.org/I41198531"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Huaqun Wang","raw_affiliation_strings":["Jiangsu Key Laboratory of Big Data Security and Intelligent Processing, School of Computer Science, Nanjing University of Posts and Telecommunications, Nanjing, China","Department of Computer Science and Engineering, Shaoxing University, Shaoxing, China"],"affiliations":[{"raw_affiliation_string":"Jiangsu Key Laboratory of Big Data Security and Intelligent Processing, School of Computer Science, Nanjing University of Posts and Telecommunications, Nanjing, China","institution_ids":["https://openalex.org/I41198531"]},{"raw_affiliation_string":"Department of Computer Science and Engineering, Shaoxing University, Shaoxing, China","institution_ids":["https://openalex.org/I192209268"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100766011","display_name":"Jian Shen","orcid":"https://orcid.org/0000-0003-0519-9058"},"institutions":[{"id":"https://openalex.org/I200845125","display_name":"Nanjing University of Information Science and Technology","ror":"https://ror.org/02y0rxk19","country_code":"CN","type":"education","lineage":["https://openalex.org/I200845125"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jian Shen","raw_affiliation_strings":["School of Computer and Software, Nanjing University of Information Science and Technology, Nanjing, China"],"affiliations":[{"raw_affiliation_string":"School of Computer and Software, Nanjing University of Information Science and Technology, Nanjing, China","institution_ids":["https://openalex.org/I200845125"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5025668908","display_name":"Debiao He","orcid":"https://orcid.org/0000-0002-2446-7436"},"institutions":[{"id":"https://openalex.org/I37461747","display_name":"Wuhan University","ror":"https://ror.org/033vjfk17","country_code":"CN","type":"education","lineage":["https://openalex.org/I37461747"]},{"id":"https://openalex.org/I4210136793","display_name":"Peng Cheng Laboratory","ror":"https://ror.org/03qdqbt06","country_code":"CN","type":"facility","lineage":["https://openalex.org/I4210136793"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Debiao He","raw_affiliation_strings":["School of Cyber Science and Engineering, Wuhan University, Wuhan, China","Shanghai Key Laboratory of Privacy-Preserving Computation, MatrixElements Technologies, Shanghai, China","Peng Cheng Laboratory, Institute of Network System and Security, Shenzhen, China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Science and Engineering, Wuhan University, Wuhan, China","institution_ids":["https://openalex.org/I37461747"]},{"raw_affiliation_string":"Shanghai Key Laboratory of Privacy-Preserving Computation, MatrixElements Technologies, Shanghai, China","institution_ids":[]},{"raw_affiliation_string":"Peng Cheng Laboratory, Institute of Network System and Security, Shenzhen, China","institution_ids":["https://openalex.org/I4210136793"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5029404256"],"corresponding_institution_ids":["https://openalex.org/I145897649","https://openalex.org/I82880672"],"apc_list":null,"apc_paid":null,"fwci":23.2226,"has_fulltext":false,"cited_by_count":80,"citation_normalized_percentile":{"value":0.99549127,"is_in_top_1_percent":true,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":96,"max":100},"biblio":{"volume":"9","issue":"21","first_page":"21838","last_page":"21850"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.9984999895095825,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.9984999895095825,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9872999787330627,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10273","display_name":"IoT and Edge/Fog Computing","score":0.984000027179718,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8250612020492554},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6401867270469666},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.6189489364624023},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.5911198854446411},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.48667627573013306},{"id":"https://openalex.org/keywords/elliptic-curve-cryptography","display_name":"Elliptic curve cryptography","score":0.4592542350292206},{"id":"https://openalex.org/keywords/anonymity","display_name":"Anonymity","score":0.4587744474411011},{"id":"https://openalex.org/keywords/information-privacy","display_name":"Information privacy","score":0.43965595960617065},{"id":"https://openalex.org/keywords/security-analysis","display_name":"Security analysis","score":0.4322529733181},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.35286375880241394},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.34330517053604126},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.3247101306915283},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.17819589376449585},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.13876572251319885}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8250612020492554},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6401867270469666},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.6189489364624023},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.5911198854446411},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.48667627573013306},{"id":"https://openalex.org/C167615521","wikidata":"https://www.wikidata.org/wiki/Q1048911","display_name":"Elliptic curve cryptography","level":4,"score":0.4592542350292206},{"id":"https://openalex.org/C178005623","wikidata":"https://www.wikidata.org/wiki/Q308859","display_name":"Anonymity","level":2,"score":0.4587744474411011},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.43965595960617065},{"id":"https://openalex.org/C38369872","wikidata":"https://www.wikidata.org/wiki/Q7445009","display_name":"Security analysis","level":2,"score":0.4322529733181},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.35286375880241394},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.34330517053604126},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.3247101306915283},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.17819589376449585},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.13876572251319885}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/jiot.2022.3181609","is_oa":false,"landing_page_url":"https://doi.org/10.1109/jiot.2022.3181609","pdf_url":null,"source":{"id":"https://openalex.org/S2480266640","display_name":"IEEE Internet of Things Journal","issn_l":"2327-4662","issn":["2327-4662","2372-2541"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Internet of Things Journal","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G1403926747","display_name":null,"funder_award_id":"2020CXGC010107","funder_id":"https://openalex.org/F4320329857","funder_display_name":"Major Scientific and Technological Innovation Project of Shandong Province"},{"id":"https://openalex.org/G170587851","display_name":null,"funder_award_id":"2020CXGC010115","funder_id":"https://openalex.org/F4320329857","funder_display_name":"Major Scientific and Technological Innovation Project of Shandong Province"},{"id":"https://openalex.org/G3423709866","display_name":null,"funder_award_id":"61932016","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G375515342","display_name":null,"funder_award_id":"PCL2021A02","funder_id":"https://openalex.org/F4320318558","funder_display_name":"Peng Cheng Laboratory"},{"id":"https://openalex.org/G4117558629","display_name":null,"funder_award_id":"U21A20466","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G4190834028","display_name":null,"funder_award_id":"62172307","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G5449561768","display_name":null,"funder_award_id":"2020CFA052","funder_id":"https://openalex.org/F4320322186","funder_display_name":"Natural Science Foundation of Hubei Province"},{"id":"https://openalex.org/G5497752695","display_name":null,"funder_award_id":"2021YFA1000600","funder_id":"https://openalex.org/F4320335777","funder_display_name":"National Key Research and Development Program of China"},{"id":"https://openalex.org/G6286192115","display_name":null,"funder_award_id":"61972294","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G8837115174","display_name":null,"funder_award_id":"2020-Y10-A-019","funder_id":"https://openalex.org/F4320321125","funder_display_name":"Beihang University"}],"funders":[{"id":"https://openalex.org/F4320318558","display_name":"Peng Cheng Laboratory","ror":"https://ror.org/03qdqbt06"},{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320321125","display_name":"Beihang University","ror":"https://ror.org/00wk2mp56"},{"id":"https://openalex.org/F4320322186","display_name":"Natural Science Foundation of Hubei Province","ror":null},{"id":"https://openalex.org/F4320329857","display_name":"Major Scientific and Technological Innovation Project of Shandong Province","ror":null},{"id":"https://openalex.org/F4320335777","display_name":"National Key Research and Development Program of China","ror":null}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":25,"referenced_works":["https://openalex.org/W236568224","https://openalex.org/W2114623221","https://openalex.org/W2262390119","https://openalex.org/W2397275348","https://openalex.org/W2483049553","https://openalex.org/W2497816424","https://openalex.org/W2604813584","https://openalex.org/W2753968620","https://openalex.org/W2801678809","https://openalex.org/W2805182940","https://openalex.org/W2889895053","https://openalex.org/W2893109375","https://openalex.org/W2910735050","https://openalex.org/W2969883781","https://openalex.org/W2971282859","https://openalex.org/W3000455992","https://openalex.org/W3010858269","https://openalex.org/W3011575542","https://openalex.org/W3036530244","https://openalex.org/W3036617119","https://openalex.org/W3045356871","https://openalex.org/W3092333758","https://openalex.org/W3119336689","https://openalex.org/W3136108810","https://openalex.org/W6712371521"],"related_works":["https://openalex.org/W1966494590","https://openalex.org/W4226182343","https://openalex.org/W2182490965","https://openalex.org/W1556944867","https://openalex.org/W2164478452","https://openalex.org/W2235903869","https://openalex.org/W1956043843","https://openalex.org/W1590958755","https://openalex.org/W4300630816","https://openalex.org/W1974088066"],"abstract_inverted_index":{"Benefiting":[0],"from":[1],"the":[2,38,41,75,84,102,128,145],"progress":[3],"of":[4,6,26,40,59,86,127,130],"Internet":[5,25],"Things":[7,28],"(IoT)":[8],"technology,":[9],"medical":[10],"devices,":[11],"wearables,":[12],"sensors,":[13],"and":[14,36,51,54,71,119,135,151],"users":[15],"can":[16],"be":[17],"connected":[18],"with":[19,141],"each":[20],"other":[21],"to":[22,67],"form":[23],"an":[24],"Medical":[27],"(IoMT)":[29],"ecosystem.":[30,77],"IoMT":[31,47,76,99],"improves":[32],"efficiency,":[33],"increases":[34],"accuracy,":[35],"reduces":[37],"costs":[39,153],"traditional":[42],"healthcare":[43],"system.":[44],"However,":[45],"since":[46],"involves":[48],"different":[49],"entities":[50],"heterogeneous":[52],"networks":[53],"carries":[55],"a":[56,64,94],"large":[57],"amount":[58],"private":[60],"information,":[61],"it":[62],"is":[63],"challenging":[65],"task":[66],"ensure":[68],"data":[69],"security":[70,157],"protect":[72],"privacy":[73],"in":[74,101,125],"In":[78],"this":[79],"article,":[80],"we":[81,107],"focus":[82],"on":[83,114],"issue":[85],"privacy-aware":[87],"authentication":[88,96,111],"between":[89],"entities.":[90,132],"We":[91],"first":[92],"propose":[93],"blockchain-assisted":[95],"framework":[97],"for":[98],"applications":[100],"fog":[103],"computing":[104],"paradigm.":[105],"Furthermore,":[106],"present":[108],"two":[109],"privacy-preserving":[110],"protocols":[112,147],"based":[113],"elliptic":[115],"curve":[116],"cryptography":[117],"(ECC)":[118],"physically":[120],"unclonable":[121],"functions":[122],"(PUFs),":[123],"respectively,":[124],"terms":[126],"capacity":[129],"involved":[131],"Security":[133],"analysis":[134],"performance":[136],"evaluation":[137],"demonstrate":[138],"that":[139],"compared":[140],"several":[142],"previous":[143],"protocols,":[144],"proposed":[146],"have":[148],"competitive":[149],"computation":[150],"communication":[152],"while":[154],"achieving":[155],"expected":[156],"requirements.":[158]},"counts_by_year":[{"year":2026,"cited_by_count":7},{"year":2025,"cited_by_count":28},{"year":2024,"cited_by_count":24},{"year":2023,"cited_by_count":18},{"year":2022,"cited_by_count":3}],"updated_date":"2026-03-27T14:29:43.386196","created_date":"2025-10-10T00:00:00"}
