{"id":"https://openalex.org/W4415820872","doi":"https://doi.org/10.1109/jiot.2025.3628187","title":"A Lightweight Authentication Scheme for Securing Patient Information in the Internet of Medical Things Environment","display_name":"A Lightweight Authentication Scheme for Securing Patient Information in the Internet of Medical Things Environment","publication_year":2025,"publication_date":"2025-11-03","ids":{"openalex":"https://openalex.org/W4415820872","doi":"https://doi.org/10.1109/jiot.2025.3628187"},"language":null,"primary_location":{"id":"doi:10.1109/jiot.2025.3628187","is_oa":false,"landing_page_url":"https://doi.org/10.1109/jiot.2025.3628187","pdf_url":null,"source":{"id":"https://openalex.org/S2480266640","display_name":"IEEE Internet of Things Journal","issn_l":"2327-4662","issn":["2327-4662","2372-2541"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Internet of Things Journal","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5109037137","display_name":"Wen\u2010Chung Kuo","orcid":"https://orcid.org/0000-0003-0408-8663"},"institutions":[{"id":"https://openalex.org/I75357094","display_name":"National Yunlin University of Science and Technology","ror":"https://ror.org/04qkq2m54","country_code":"TW","type":"education","lineage":["https://openalex.org/I75357094"]}],"countries":["TW"],"is_corresponding":true,"raw_author_name":"Wen-Chung Kuo","raw_affiliation_strings":["Department of Computer Science and Information Engineering, National Yunlin University of Science and Technology, Douliu, Taiwan"],"raw_orcid":"https://orcid.org/0000-0003-0408-8663","affiliations":[{"raw_affiliation_string":"Department of Computer Science and Information Engineering, National Yunlin University of Science and Technology, Douliu, Taiwan","institution_ids":["https://openalex.org/I75357094"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5013439403","display_name":"Zahid Ghaffar","orcid":"https://orcid.org/0000-0002-5546-2689"},"institutions":[{"id":"https://openalex.org/I75357094","display_name":"National Yunlin University of Science and Technology","ror":"https://ror.org/04qkq2m54","country_code":"TW","type":"education","lineage":["https://openalex.org/I75357094"]}],"countries":["TW"],"is_corresponding":false,"raw_author_name":"Zahid Ghaffar","raw_affiliation_strings":["Graduate School of Engineering Science and Technology, National Yunlin University of Science and Technology, Douliu, Taiwan","Graduate School of Engineering Science and Technology, National Yunlin University of Science and Technology, Douliu, Yunlin, Taiwan"],"raw_orcid":"https://orcid.org/0000-0002-5546-2689","affiliations":[{"raw_affiliation_string":"Graduate School of Engineering Science and Technology, National Yunlin University of Science and Technology, Douliu, Taiwan","institution_ids":["https://openalex.org/I75357094"]},{"raw_affiliation_string":"Graduate School of Engineering Science and Technology, National Yunlin University of Science and Technology, Douliu, Yunlin, Taiwan","institution_ids":["https://openalex.org/I75357094"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5023371922","display_name":"Khalid Mahmood","orcid":"https://orcid.org/0000-0001-5046-7766"},"institutions":[{"id":"https://openalex.org/I75357094","display_name":"National Yunlin University of Science and Technology","ror":"https://ror.org/04qkq2m54","country_code":"TW","type":"education","lineage":["https://openalex.org/I75357094"]}],"countries":["TW"],"is_corresponding":false,"raw_author_name":"Khalid Mahmood","raw_affiliation_strings":["Graduate School of Intelligent Data Science, National Yunlin University of Science and Technology, Douliu, Taiwan","Graduate School of Intelligent Data Science, National Yunlin University of Science and Technology, Douliu, Yunlin, Taiwan"],"raw_orcid":"https://orcid.org/0000-0001-5046-7766","affiliations":[{"raw_affiliation_string":"Graduate School of Intelligent Data Science, National Yunlin University of Science and Technology, Douliu, Taiwan","institution_ids":["https://openalex.org/I75357094"]},{"raw_affiliation_string":"Graduate School of Intelligent Data Science, National Yunlin University of Science and Technology, Douliu, Yunlin, Taiwan","institution_ids":["https://openalex.org/I75357094"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5027986369","display_name":"Tayyaba Tariq","orcid":"https://orcid.org/0000-0003-1555-0147"},"institutions":[{"id":"https://openalex.org/I75357094","display_name":"National Yunlin University of Science and Technology","ror":"https://ror.org/04qkq2m54","country_code":"TW","type":"education","lineage":["https://openalex.org/I75357094"]}],"countries":["TW"],"is_corresponding":false,"raw_author_name":"Tayyaba Tariq","raw_affiliation_strings":["Graduate School of Engineering Science and Technology, National Yunlin University of Science and Technology, Douliu, Taiwan","Graduate School of Engineering Science and Technology, National Yunlin University of Science and Technology, Douliu, Yunlin, Taiwan"],"raw_orcid":"https://orcid.org/0000-0003-1555-0147","affiliations":[{"raw_affiliation_string":"Graduate School of Engineering Science and Technology, National Yunlin University of Science and Technology, Douliu, Taiwan","institution_ids":["https://openalex.org/I75357094"]},{"raw_affiliation_string":"Graduate School of Engineering Science and Technology, National Yunlin University of Science and Technology, Douliu, Yunlin, Taiwan","institution_ids":["https://openalex.org/I75357094"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5017367371","display_name":"Salman Shamshad","orcid":"https://orcid.org/0000-0002-8984-3199"},"institutions":[{"id":"https://openalex.org/I142204992","display_name":"University of Lahore","ror":"https://ror.org/051jrjw38","country_code":"PK","type":"education","lineage":["https://openalex.org/I142204992"]}],"countries":["PK"],"is_corresponding":false,"raw_author_name":"Salman Shamshad","raw_affiliation_strings":["Department of Software Engineering, The University of Lahore, Lahore, Pakistan"],"raw_orcid":"https://orcid.org/0000-0002-8984-3199","affiliations":[{"raw_affiliation_string":"Department of Software Engineering, The University of Lahore, Lahore, Pakistan","institution_ids":["https://openalex.org/I142204992"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5011213078","display_name":"Ashok Kumar Das","orcid":"https://orcid.org/0000-0002-5196-9589"},"institutions":[{"id":"https://openalex.org/I64189192","display_name":"International Institute of Information Technology, Hyderabad","ror":"https://ror.org/05f11g639","country_code":"IN","type":"education","lineage":["https://openalex.org/I64189192"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Ashok Kumar Das","raw_affiliation_strings":["Center for Security, Theory and Algorithmic Research, International Institute of Information Technology, Hyderabad, India"],"raw_orcid":"https://orcid.org/0000-0002-5196-9589","affiliations":[{"raw_affiliation_string":"Center for Security, Theory and Algorithmic Research, International Institute of Information Technology, Hyderabad, India","institution_ids":["https://openalex.org/I64189192"]}]}],"institutions":[],"countries_distinct_count":3,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5109037137"],"corresponding_institution_ids":["https://openalex.org/I75357094"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.36046221,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"13","issue":"1","first_page":"1208","last_page":"1215"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.8208000063896179,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.8208000063896179,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.07320000231266022,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.027000000700354576,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.619700014591217},{"id":"https://openalex.org/keywords/wearable-computer","display_name":"Wearable computer","score":0.5827999711036682},{"id":"https://openalex.org/keywords/mutual-authentication","display_name":"Mutual authentication","score":0.5536999702453613},{"id":"https://openalex.org/keywords/session-key","display_name":"Session key","score":0.5393000245094299},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.4796000123023987},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.47440001368522644},{"id":"https://openalex.org/keywords/elliptic-curve-cryptography","display_name":"Elliptic curve cryptography","score":0.46779999136924744},{"id":"https://openalex.org/keywords/reliability","display_name":"Reliability (semiconductor)","score":0.45509999990463257},{"id":"https://openalex.org/keywords/security-analysis","display_name":"Security analysis","score":0.4456999897956848},{"id":"https://openalex.org/keywords/anonymity","display_name":"Anonymity","score":0.4047999978065491}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8216000199317932},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.619700014591217},{"id":"https://openalex.org/C150594956","wikidata":"https://www.wikidata.org/wiki/Q1334829","display_name":"Wearable computer","level":2,"score":0.5827999711036682},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5823000073432922},{"id":"https://openalex.org/C2781221063","wikidata":"https://www.wikidata.org/wiki/Q6944186","display_name":"Mutual authentication","level":3,"score":0.5536999702453613},{"id":"https://openalex.org/C191197275","wikidata":"https://www.wikidata.org/wiki/Q1755775","display_name":"Session key","level":3,"score":0.5393000245094299},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.4796000123023987},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.47440001368522644},{"id":"https://openalex.org/C167615521","wikidata":"https://www.wikidata.org/wiki/Q1048911","display_name":"Elliptic curve cryptography","level":4,"score":0.46779999136924744},{"id":"https://openalex.org/C43214815","wikidata":"https://www.wikidata.org/wiki/Q7310987","display_name":"Reliability (semiconductor)","level":3,"score":0.45509999990463257},{"id":"https://openalex.org/C38369872","wikidata":"https://www.wikidata.org/wiki/Q7445009","display_name":"Security analysis","level":2,"score":0.4456999897956848},{"id":"https://openalex.org/C178005623","wikidata":"https://www.wikidata.org/wiki/Q308859","display_name":"Anonymity","level":2,"score":0.4047999978065491},{"id":"https://openalex.org/C21564112","wikidata":"https://www.wikidata.org/wiki/Q4825885","display_name":"Authentication protocol","level":3,"score":0.3991999924182892},{"id":"https://openalex.org/C54290928","wikidata":"https://www.wikidata.org/wiki/Q4845080","display_name":"Wearable technology","level":3,"score":0.3880000114440918},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.38499999046325684},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.3741999864578247},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.36910000443458557},{"id":"https://openalex.org/C8643368","wikidata":"https://www.wikidata.org/wiki/Q4046262","display_name":"Physical unclonable function","level":3,"score":0.35350000858306885},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.34279999136924744},{"id":"https://openalex.org/C141492731","wikidata":"https://www.wikidata.org/wiki/Q1052621","display_name":"Message authentication code","level":3,"score":0.3393999934196472},{"id":"https://openalex.org/C81860439","wikidata":"https://www.wikidata.org/wiki/Q251212","display_name":"Internet of Things","level":2,"score":0.3321000039577484},{"id":"https://openalex.org/C111498074","wikidata":"https://www.wikidata.org/wiki/Q173326","display_name":"Formal verification","level":2,"score":0.31459999084472656},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.3100000023841858},{"id":"https://openalex.org/C22111027","wikidata":"https://www.wikidata.org/wiki/Q1070427","display_name":"Internet security","level":4,"score":0.30889999866485596},{"id":"https://openalex.org/C194699767","wikidata":"https://www.wikidata.org/wiki/Q7878662","display_name":"Multi-factor authentication","level":4,"score":0.28540000319480896},{"id":"https://openalex.org/C118463975","wikidata":"https://www.wikidata.org/wiki/Q220849","display_name":"Digital signature","level":3,"score":0.26179999113082886},{"id":"https://openalex.org/C93996380","wikidata":"https://www.wikidata.org/wiki/Q44127","display_name":"Server","level":2,"score":0.2612999975681305},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.25920000672340393},{"id":"https://openalex.org/C19163912","wikidata":"https://www.wikidata.org/wiki/Q7681779","display_name":"Tamper resistance","level":2,"score":0.25850000977516174},{"id":"https://openalex.org/C76763059","wikidata":"https://www.wikidata.org/wiki/Q251072","display_name":"Machine to machine","level":3,"score":0.25780001282691956},{"id":"https://openalex.org/C33884865","wikidata":"https://www.wikidata.org/wiki/Q1254335","display_name":"Cryptographic protocol","level":3,"score":0.2506999969482422}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/jiot.2025.3628187","is_oa":false,"landing_page_url":"https://doi.org/10.1109/jiot.2025.3628187","pdf_url":null,"source":{"id":"https://openalex.org/S2480266640","display_name":"IEEE Internet of Things Journal","issn_l":"2327-4662","issn":["2327-4662","2372-2541"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Internet of Things Journal","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":19,"referenced_works":["https://openalex.org/W1526070463","https://openalex.org/W2029693536","https://openalex.org/W2153281696","https://openalex.org/W2898274421","https://openalex.org/W2901126201","https://openalex.org/W2914062206","https://openalex.org/W2995573806","https://openalex.org/W2999924839","https://openalex.org/W3087879921","https://openalex.org/W3113092866","https://openalex.org/W3127490805","https://openalex.org/W3179046031","https://openalex.org/W3189386369","https://openalex.org/W4206975148","https://openalex.org/W4285205233","https://openalex.org/W4318014836","https://openalex.org/W4392620279","https://openalex.org/W4409473745","https://openalex.org/W4409536920"],"related_works":[],"abstract_inverted_index":{"The":[0],"Internet":[1,42],"of":[2,14,35,43,120,148,189,221,235],"Things":[3,45],"(IoT)":[4],"is":[5,18,40],"an":[6,232],"evolving":[7],"paradigm":[8],"expected":[9],"to":[10,30,84,116,133,156,170],"permeate":[11],"every":[12],"aspect":[13],"human":[15],"existence.":[16],"IoT":[17],"a":[19,49,98,104,141,152],"growing":[20],"trend":[21],"in":[22,239],"which":[23,47,225],"numerous":[24],"devices":[25,67],"interconnect":[26],"with":[27],"each":[28],"other":[29],"transmit":[31],"sensitive":[32],"data.":[33],"One":[34],"its":[36],"significant":[37],"application":[38],"areas":[39],"the":[41,118,146,164,185,190,202,215,219,222,228],"Medical":[44],"(IoMT),":[46],"promises":[48],"contemporary":[50],"healthcare":[51],"environment":[52],"via":[53],"linked":[54],"sensors,":[55],"clinical":[56],"systems,":[57],"and":[58,74,87,112,179,187,195,237,241],"wearable":[59,125],"medical":[60,126],"devices.":[61,127],"However,":[62],"public":[63],"communication":[64,242],"among":[65],"these":[66,94,212],"faces":[68],"challenges":[69,95],"like":[70],"security,":[71],"privacy,":[72],"authentication,":[73],"machine":[75,121,135],"learning/modeling":[76,122,136],"attacks.":[77,89,137,162,182],"Additionally,":[78],"most":[79],"existing":[80],"schemes":[81],"are":[82],"vulnerable":[83],"impersonation,":[85,171],"denial-of-service,":[86],"machine-learning/modeling":[88],"Therefore,":[90],"this":[91],"article":[92],"addresses":[93],"by":[96],"designing":[97],"lightweight":[99],"authentication":[100,149],"scheme":[101,166,192,203,230],"that":[102,144,201,227],"utilizes":[103],"one-time":[105],"physical":[106],"unclonable":[107],"function":[108],"(<italic":[109],"xmlns:mml=\"http://www.w3.org/1998/Math/MathML\"":[110,131],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">OPUF</i>)":[111],"elliptic":[113],"curve":[114],"cryptography":[115],"reduce":[117],"likelihood":[119],"attacks":[123],"on":[124],"We":[128,138,183],"utilize":[129],"<italic":[130],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">OPUF</i>":[132],"resist":[134],"also":[139,167],"employ":[140],"rate-limiting":[142],"mechanism":[143],"restricts":[145],"number":[147],"requests":[150],"within":[151],"specific":[153],"time":[154],"window":[155],"enhance":[157],"resistance":[158,169],"against":[159],"denial-of-service":[160],"(DoS)":[161],"Moreover,":[163],"devised":[165,191,229],"offers":[168,204],"session":[172],"key":[173],"leakage,":[174,177],"ephemeral":[175],"secret":[176],"desynchronization,":[178],"ML-based":[180],"modeling":[181],"analyze":[184],"security":[186,206],"reliability":[188],"using":[193],"informal":[194],"formal":[196,209],"analysis.":[197],"Informal":[198],"analysis":[199,210],"indicates":[200],"essential":[205],"features,":[207],"while":[208],"substantiates":[211],"findings.":[213],"In":[214],"end,":[216],"we":[217],"present":[218],"results":[220],"performance":[223],"analysis,":[224],"show":[226],"achieves":[231],"average":[233],"reduction":[234],"26.92%":[236],"21.53%":[238],"computational":[240],"costs,":[243],"respectively.":[244]},"counts_by_year":[],"updated_date":"2025-12-24T23:09:58.560324","created_date":"2025-11-03T00:00:00"}
