{"id":"https://openalex.org/W4408017143","doi":"https://doi.org/10.1109/jiot.2025.3543488","title":"PLAKA-MD: PUF-Based Lightweight Authentication and Key Agreement Scheme for Medical Devices in IoHT","display_name":"PLAKA-MD: PUF-Based Lightweight Authentication and Key Agreement Scheme for Medical Devices in IoHT","publication_year":2025,"publication_date":"2025-02-27","ids":{"openalex":"https://openalex.org/W4408017143","doi":"https://doi.org/10.1109/jiot.2025.3543488"},"language":"en","primary_location":{"id":"doi:10.1109/jiot.2025.3543488","is_oa":false,"landing_page_url":"https://doi.org/10.1109/jiot.2025.3543488","pdf_url":null,"source":{"id":"https://openalex.org/S2480266640","display_name":"IEEE Internet of Things Journal","issn_l":"2327-4662","issn":["2327-4662","2372-2541"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Internet of Things Journal","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5012835384","display_name":"Changui Lee","orcid":null},"institutions":[{"id":"https://openalex.org/I52010207","display_name":"Keimyung University","ror":"https://ror.org/00tjv0s33","country_code":"KR","type":"education","lineage":["https://openalex.org/I52010207"]}],"countries":["KR"],"is_corresponding":true,"raw_author_name":"Changui Lee","raw_affiliation_strings":["School of Computer Engineering, Keimyung University, Daegu, South Korea"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"School of Computer Engineering, Keimyung University, Daegu, South Korea","institution_ids":["https://openalex.org/I52010207"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5112354408","display_name":"Myeongjun Oh","orcid":null},"institutions":[{"id":"https://openalex.org/I52010207","display_name":"Keimyung University","ror":"https://ror.org/00tjv0s33","country_code":"KR","type":"education","lineage":["https://openalex.org/I52010207"]}],"countries":["KR"],"is_corresponding":false,"raw_author_name":"Mingyu Oh","raw_affiliation_strings":["School of Computer Engineering, Keimyung University, Daegu, South Korea"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"School of Computer Engineering, Keimyung University, Daegu, South Korea","institution_ids":["https://openalex.org/I52010207"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5018787410","display_name":"Deokkyu Kwon","orcid":"https://orcid.org/0000-0003-0014-1965"},"institutions":[{"id":"https://openalex.org/I31419693","display_name":"Kyungpook National University","ror":"https://ror.org/040c17130","country_code":"KR","type":"education","lineage":["https://openalex.org/I31419693"]}],"countries":["KR"],"is_corresponding":false,"raw_author_name":"Deokkyu Kwon","raw_affiliation_strings":["School of Electronic and Electrical Engineering, Kyungpook National University, Daegu, South Korea"],"raw_orcid":"https://orcid.org/0000-0003-0014-1965","affiliations":[{"raw_affiliation_string":"School of Electronic and Electrical Engineering, Kyungpook National University, Daegu, South Korea","institution_ids":["https://openalex.org/I31419693"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100650746","display_name":"Youngho Park","orcid":"https://orcid.org/0000-0002-0406-6547"},"institutions":[{"id":"https://openalex.org/I31419693","display_name":"Kyungpook National University","ror":"https://ror.org/040c17130","country_code":"KR","type":"education","lineage":["https://openalex.org/I31419693"]},{"id":"https://openalex.org/I52010207","display_name":"Keimyung University","ror":"https://ror.org/00tjv0s33","country_code":"KR","type":"education","lineage":["https://openalex.org/I52010207"]}],"countries":["KR"],"is_corresponding":false,"raw_author_name":"Youngho Park","raw_affiliation_strings":["School of Computer Engineering, Keimyung University, Daegu, South Korea","School of Electronic and Electrical Engineering, Kyungpook National University, Daegu, South Korea"],"raw_orcid":"https://orcid.org/0000-0002-0406-6547","affiliations":[{"raw_affiliation_string":"School of Computer Engineering, Keimyung University, Daegu, South Korea","institution_ids":["https://openalex.org/I52010207"]},{"raw_affiliation_string":"School of Electronic and Electrical Engineering, Kyungpook National University, Daegu, South Korea","institution_ids":["https://openalex.org/I31419693"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5049037742","display_name":"Yohan Park","orcid":null},"institutions":[{"id":"https://openalex.org/I31419693","display_name":"Kyungpook National University","ror":"https://ror.org/040c17130","country_code":"KR","type":"education","lineage":["https://openalex.org/I31419693"]},{"id":"https://openalex.org/I52010207","display_name":"Keimyung University","ror":"https://ror.org/00tjv0s33","country_code":"KR","type":"education","lineage":["https://openalex.org/I52010207"]}],"countries":["KR"],"is_corresponding":false,"raw_author_name":"Yohan Park","raw_affiliation_strings":["School of Computer Engineering, Keimyung University, Daegu, South Korea","School of Electronic and Electrical Engineering, Kyungpook National University, Daegu, South Korea"],"raw_orcid":"https://orcid.org/0000-0002-9011-8410","affiliations":[{"raw_affiliation_string":"School of Computer Engineering, Keimyung University, Daegu, South Korea","institution_ids":["https://openalex.org/I52010207"]},{"raw_affiliation_string":"School of Electronic and Electrical Engineering, Kyungpook National University, Daegu, South Korea","institution_ids":["https://openalex.org/I31419693"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5012835384"],"corresponding_institution_ids":["https://openalex.org/I52010207"],"apc_list":null,"apc_paid":null,"fwci":12.9278,"has_fulltext":false,"cited_by_count":6,"citation_normalized_percentile":{"value":0.98467866,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":96,"max":98},"biblio":{"volume":"12","issue":"12","first_page":"19338","last_page":"19353"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.978600025177002,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.978600025177002,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9078999757766724,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9075999855995178,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7302747964859009},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.595005214214325},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.5734929442405701},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.5563708543777466},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.4432871639728546},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.3526797294616699},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.23989132046699524}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7302747964859009},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.595005214214325},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.5734929442405701},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.5563708543777466},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.4432871639728546},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.3526797294616699},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.23989132046699524},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/jiot.2025.3543488","is_oa":false,"landing_page_url":"https://doi.org/10.1109/jiot.2025.3543488","pdf_url":null,"source":{"id":"https://openalex.org/S2480266640","display_name":"IEEE Internet of Things Journal","issn_l":"2327-4662","issn":["2327-4662","2372-2541"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Internet of Things Journal","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":45,"referenced_works":["https://openalex.org/W203500824","https://openalex.org/W1526070463","https://openalex.org/W1561441787","https://openalex.org/W2010939995","https://openalex.org/W2029693536","https://openalex.org/W2088455835","https://openalex.org/W2091299352","https://openalex.org/W2570008916","https://openalex.org/W2734150319","https://openalex.org/W2749503685","https://openalex.org/W2775758566","https://openalex.org/W2896670520","https://openalex.org/W2943373652","https://openalex.org/W2954313299","https://openalex.org/W2970575882","https://openalex.org/W3000552727","https://openalex.org/W3009564320","https://openalex.org/W3116843489","https://openalex.org/W3162134103","https://openalex.org/W3163508094","https://openalex.org/W3174018948","https://openalex.org/W3185951729","https://openalex.org/W3202030867","https://openalex.org/W3215412311","https://openalex.org/W3216403547","https://openalex.org/W4206784086","https://openalex.org/W4210587267","https://openalex.org/W4214542240","https://openalex.org/W4220982221","https://openalex.org/W4281293626","https://openalex.org/W4286208748","https://openalex.org/W4286655454","https://openalex.org/W4292002597","https://openalex.org/W4310043621","https://openalex.org/W4318464969","https://openalex.org/W4320494778","https://openalex.org/W4353046955","https://openalex.org/W4380682691","https://openalex.org/W4386219768","https://openalex.org/W4387546383","https://openalex.org/W4389542900","https://openalex.org/W4391547675","https://openalex.org/W4399616344","https://openalex.org/W4401246817","https://openalex.org/W4405914515"],"related_works":["https://openalex.org/W1975289146","https://openalex.org/W2140798747","https://openalex.org/W2105887828","https://openalex.org/W2948169060","https://openalex.org/W2122599759","https://openalex.org/W4236520801","https://openalex.org/W2730112582","https://openalex.org/W2110696645","https://openalex.org/W2358580169","https://openalex.org/W2242172122"],"abstract_inverted_index":{"Internet":[0,9,181],"of":[1,10,17,21,28,52,170,180,200,208,231],"Health":[2],"Things":[3,11],"(IoHT)":[4],"integrates":[5],"medical":[6,34],"services":[7],"and":[8,19,38,48,78,114,142,154,163,184,191,211,215,233],"(IoT)":[12],"to":[13,45,62,66,100,157],"improve":[14],"the":[15,26,50,132,167,171,187,198,201,205,213,227],"accessibility":[16],"healthcare":[18,60],"accuracy":[20],"diagnosis.":[22],"In":[23],"IoHT":[24,85,128],"environments,":[25],"transmission":[27],"sensitive":[29],"data,":[30],"such":[31],"as":[32,135],"patient":[33,67],"records,":[35],"physical":[36,112,150],"characteristics,":[37],"genetic":[39],"information,":[40,149],"necessitates":[41],"robust":[42],"security":[43,159,168,232],"mechanisms":[44],"protect":[46],"privacy":[47],"ensure":[49],"integrity":[51],"real-time":[53],"communication.":[54],"Moreover,":[55],"it":[56],"is":[57,82],"essential":[58],"for":[59,69,84,127,160],"professionals":[61],"have":[63,91],"seamless":[64],"access":[65],"data":[68],"accurate":[70],"diagnoses.":[71],"To":[72,117],"address":[73],"these":[74,119],"demands,":[75],"a":[76,123,136],"lightweight":[77,137],"secure":[79],"authentication":[80,89,125],"protocol":[81,126,134,173,202,225],"critical":[83],"environments.":[86,129],"Although":[87],"some":[88],"protocols":[90],"been":[92],"recently":[93],"proposed":[94,133,172],"in":[95],"IoHT,":[96],"they":[97],"are":[98],"susceptible":[99],"user":[101],"insiders,":[102,104,111],"privileged":[103],"stolen":[105],"verifiers,":[106],"ephemeral":[107],"key":[108],"leakage,":[109],"sensor":[110],"attacks,":[113],"lack":[115],"traceability.":[116],"overcome":[118],"vulnerabilities,":[120],"we":[121,146,196],"propose":[122],"mutual":[124],"We":[130,165],"design":[131],"using":[138],"only":[139],"hash":[140],"functions":[141,152],"exclusive-OR":[143],"operators.":[144],"Furthermore,":[145],"utilized":[147],"biometric":[148],"unclonable":[151],"(PUFs),":[153],"fuzzy":[155],"extractors":[156],"strengthen":[158],"both":[161],"users":[162],"sensors.":[164],"validate":[166],"robustness":[169],"through":[174],"formal":[175],"analyses,":[176],"including":[177],"Automated":[178],"Validation":[179],"Security":[182],"Protocols":[183],"Applications":[185],"(AVISPAs),":[186],"Real-or-Random":[188],"(RoR)":[189],"model,":[190],"Burrows-Abadi-Needham":[192],"(BAN)":[193],"logic.":[194],"Additionally,":[195],"evaluate":[197],"performance":[199],"by":[203],"measuring":[204],"execution":[206],"time":[207],"cryptographic":[209],"primitives":[210],"comparing":[212],"computational":[214],"communication":[216],"overheads":[217],"with":[218],"existing":[219],"protocols.":[220],"Results":[221],"demonstrate":[222],"that":[223],"our":[224],"provides":[226],"most":[228],"various":[229],"kinds":[230],"functional":[234],"features":[235],"while":[236],"maintaining":[237],"similar":[238],"efficiency":[239],"than":[240],"competing":[241],"schemes.":[242]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":5}],"updated_date":"2025-12-28T23:10:05.387466","created_date":"2025-10-10T00:00:00"}
