{"id":"https://openalex.org/W4416286349","doi":"https://doi.org/10.1109/jiot.2025.3633318","title":"Digital Twin-Enabled Context-Aware Authentication Protocol for IoT-Based Healthcare Applications","display_name":"Digital Twin-Enabled Context-Aware Authentication Protocol for IoT-Based Healthcare Applications","publication_year":2025,"publication_date":"2025-11-17","ids":{"openalex":"https://openalex.org/W4416286349","doi":"https://doi.org/10.1109/jiot.2025.3633318"},"language":null,"primary_location":{"id":"doi:10.1109/jiot.2025.3633318","is_oa":false,"landing_page_url":"https://doi.org/10.1109/jiot.2025.3633318","pdf_url":null,"source":{"id":"https://openalex.org/S2480266640","display_name":"IEEE Internet of Things Journal","issn_l":"2327-4662","issn":["2327-4662","2372-2541"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Internet of Things Journal","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5035264127","display_name":"Muhammad Asad Saleem","orcid":"https://orcid.org/0009-0001-0308-601X"},"institutions":[{"id":"https://openalex.org/I150229711","display_name":"University of Electronic Science and Technology of China","ror":"https://ror.org/04qr3zq92","country_code":"CN","type":"education","lineage":["https://openalex.org/I150229711"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Muhammad Asad Saleem","raw_affiliation_strings":["School of Computer Science and Engineering, University of Electronic Science and Technology of China, Chengdu, Sichuan, China"],"raw_orcid":"https://orcid.org/0009-0001-0308-601X","affiliations":[{"raw_affiliation_string":"School of Computer Science and Engineering, University of Electronic Science and Technology of China, Chengdu, Sichuan, China","institution_ids":["https://openalex.org/I150229711"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100335132","display_name":"Xiong Li","orcid":"https://orcid.org/0000-0001-6619-554X"},"institutions":[{"id":"https://openalex.org/I150229711","display_name":"University of Electronic Science and Technology of China","ror":"https://ror.org/04qr3zq92","country_code":"CN","type":"education","lineage":["https://openalex.org/I150229711"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xiong Li","raw_affiliation_strings":["School of Computer Science and Engineering, University of Electronic Science and Technology of China, Chengdu, Sichuan, China"],"raw_orcid":"https://orcid.org/0000-0001-6619-554X","affiliations":[{"raw_affiliation_string":"School of Computer Science and Engineering, University of Electronic Science and Technology of China, Chengdu, Sichuan, China","institution_ids":["https://openalex.org/I150229711"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5023371922","display_name":"Khalid Mahmood","orcid":"https://orcid.org/0000-0001-5046-7766"},"institutions":[{"id":"https://openalex.org/I75357094","display_name":"National Yunlin University of Science and Technology","ror":"https://ror.org/04qkq2m54","country_code":"TW","type":"education","lineage":["https://openalex.org/I75357094"]}],"countries":["TW"],"is_corresponding":false,"raw_author_name":"Khalid Mahmood","raw_affiliation_strings":["Graduate School of Intelligent Data Science, National Yunlin University of Science and Technology, Douliu, Taiwan"],"raw_orcid":"https://orcid.org/0000-0001-5046-7766","affiliations":[{"raw_affiliation_string":"Graduate School of Intelligent Data Science, National Yunlin University of Science and Technology, Douliu, Taiwan","institution_ids":["https://openalex.org/I75357094"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5017367371","display_name":"Salman Shamshad","orcid":"https://orcid.org/0000-0002-8984-3199"},"institutions":[{"id":"https://openalex.org/I142204992","display_name":"University of Lahore","ror":"https://ror.org/051jrjw38","country_code":"PK","type":"education","lineage":["https://openalex.org/I142204992"]}],"countries":["PK"],"is_corresponding":false,"raw_author_name":"Salman Shamshad","raw_affiliation_strings":["Department of Software Engineering, The University of Lahore, Lahore, Pakistan"],"raw_orcid":"https://orcid.org/0000-0002-8984-3199","affiliations":[{"raw_affiliation_string":"Department of Software Engineering, The University of Lahore, Lahore, Pakistan","institution_ids":["https://openalex.org/I142204992"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5013439403","display_name":"Zahid Ghaffar","orcid":"https://orcid.org/0000-0002-5546-2689"},"institutions":[{"id":"https://openalex.org/I75357094","display_name":"National Yunlin University of Science and Technology","ror":"https://ror.org/04qkq2m54","country_code":"TW","type":"education","lineage":["https://openalex.org/I75357094"]}],"countries":["TW"],"is_corresponding":false,"raw_author_name":"Zahid Ghaffar","raw_affiliation_strings":["Graduate School of Engineering Science and Technology, National Yunlin University of Science and Technology, Douliu, Yunlin, Taiwan"],"raw_orcid":"https://orcid.org/0000-0002-5546-2689","affiliations":[{"raw_affiliation_string":"Graduate School of Engineering Science and Technology, National Yunlin University of Science and Technology, Douliu, Yunlin, Taiwan","institution_ids":["https://openalex.org/I75357094"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5003735433","display_name":"Guijuan Wang","orcid":"https://orcid.org/0000-0002-5930-9809"},"institutions":[{"id":"https://openalex.org/I152269853","display_name":"Qilu University of Technology","ror":"https://ror.org/04hyzq608","country_code":"CN","type":"education","lineage":["https://openalex.org/I152269853"]},{"id":"https://openalex.org/I4210142748","display_name":"Shandong Academy of Sciences","ror":"https://ror.org/04y8d6y55","country_code":"CN","type":"education","lineage":["https://openalex.org/I4210142748"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Guijuan Wang","raw_affiliation_strings":["Key Laboratory of Computing Power Network and Information Security, Ministry of Education, Shandong Computer Science Center, Qilu University of Technology (Shandong Academy of Sciences), Jinan, China","Ministry of Education, Shandong Computer Science Center, Key Laboratory of Computing Power Network and Information Security, Qilu University of Technology (Shandong Academy of Sciences), Jinan, China"],"raw_orcid":"https://orcid.org/0000-0002-5930-9809","affiliations":[{"raw_affiliation_string":"Key Laboratory of Computing Power Network and Information Security, Ministry of Education, Shandong Computer Science Center, Qilu University of Technology (Shandong Academy of Sciences), Jinan, China","institution_ids":["https://openalex.org/I152269853","https://openalex.org/I4210142748"]},{"raw_affiliation_string":"Ministry of Education, Shandong Computer Science Center, Key Laboratory of Computing Power Network and Information Security, Qilu University of Technology (Shandong Academy of Sciences), Jinan, China","institution_ids":["https://openalex.org/I152269853","https://openalex.org/I4210142748"]}]}],"institutions":[],"countries_distinct_count":3,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5035264127"],"corresponding_institution_ids":["https://openalex.org/I150229711"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.38378101,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"13","issue":"2","first_page":"3408","last_page":"3417"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10273","display_name":"IoT and Edge/Fog Computing","score":0.41370001435279846,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10273","display_name":"IoT and Edge/Fog Computing","score":0.41370001435279846,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.2353000044822693,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.05660000070929527,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/mutual-authentication","display_name":"Mutual authentication","score":0.5958999991416931},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.504800021648407},{"id":"https://openalex.org/keywords/cryptographic-protocol","display_name":"Cryptographic protocol","score":0.5044000148773193},{"id":"https://openalex.org/keywords/authentication-protocol","display_name":"Authentication protocol","score":0.4894999861717224},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.47029998898506165},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.45350000262260437},{"id":"https://openalex.org/keywords/information-privacy","display_name":"Information privacy","score":0.3944999873638153},{"id":"https://openalex.org/keywords/data-integrity","display_name":"Data integrity","score":0.38339999318122864},{"id":"https://openalex.org/keywords/protocol","display_name":"Protocol (science)","score":0.36910000443458557}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8341000080108643},{"id":"https://openalex.org/C2781221063","wikidata":"https://www.wikidata.org/wiki/Q6944186","display_name":"Mutual authentication","level":3,"score":0.5958999991416931},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5605000257492065},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.504800021648407},{"id":"https://openalex.org/C33884865","wikidata":"https://www.wikidata.org/wiki/Q1254335","display_name":"Cryptographic protocol","level":3,"score":0.5044000148773193},{"id":"https://openalex.org/C21564112","wikidata":"https://www.wikidata.org/wiki/Q4825885","display_name":"Authentication protocol","level":3,"score":0.4894999861717224},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.47029998898506165},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.45649999380111694},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.45350000262260437},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.3944999873638153},{"id":"https://openalex.org/C33762810","wikidata":"https://www.wikidata.org/wiki/Q461671","display_name":"Data integrity","level":2,"score":0.38339999318122864},{"id":"https://openalex.org/C2780385302","wikidata":"https://www.wikidata.org/wiki/Q367158","display_name":"Protocol (science)","level":3,"score":0.36910000443458557},{"id":"https://openalex.org/C93996380","wikidata":"https://www.wikidata.org/wiki/Q44127","display_name":"Server","level":2,"score":0.3580000102519989},{"id":"https://openalex.org/C2779960059","wikidata":"https://www.wikidata.org/wiki/Q7113681","display_name":"Overhead (engineering)","level":2,"score":0.34850001335144043},{"id":"https://openalex.org/C141492731","wikidata":"https://www.wikidata.org/wiki/Q1052621","display_name":"Message authentication code","level":3,"score":0.3409000039100647},{"id":"https://openalex.org/C2779343474","wikidata":"https://www.wikidata.org/wiki/Q3109175","display_name":"Context (archaeology)","level":2,"score":0.335999995470047},{"id":"https://openalex.org/C15927051","wikidata":"https://www.wikidata.org/wiki/Q246593","display_name":"Cryptographic primitive","level":4,"score":0.3199999928474426},{"id":"https://openalex.org/C99138194","wikidata":"https://www.wikidata.org/wiki/Q183427","display_name":"Hash function","level":2,"score":0.3127000033855438},{"id":"https://openalex.org/C38369872","wikidata":"https://www.wikidata.org/wiki/Q7445009","display_name":"Security analysis","level":2,"score":0.30140000581741333},{"id":"https://openalex.org/C118463975","wikidata":"https://www.wikidata.org/wiki/Q220849","display_name":"Digital signature","level":3,"score":0.2969000041484833},{"id":"https://openalex.org/C155527597","wikidata":"https://www.wikidata.org/wiki/Q1727777","display_name":"Signcryption","level":4,"score":0.29330000281333923},{"id":"https://openalex.org/C7608002","wikidata":"https://www.wikidata.org/wiki/Q477202","display_name":"Cryptographic hash function","level":3,"score":0.28949999809265137},{"id":"https://openalex.org/C163173736","wikidata":"https://www.wikidata.org/wiki/Q3308558","display_name":"Key generation","level":3,"score":0.27559998631477356},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.2745000123977661},{"id":"https://openalex.org/C2778000800","wikidata":"https://www.wikidata.org/wiki/Q830043","display_name":"Handshake","level":3,"score":0.2734000086784363},{"id":"https://openalex.org/C10511746","wikidata":"https://www.wikidata.org/wiki/Q899388","display_name":"Data security","level":3,"score":0.26989999413490295},{"id":"https://openalex.org/C2777331311","wikidata":"https://www.wikidata.org/wiki/Q784561","display_name":"Authentication server","level":3,"score":0.26750001311302185},{"id":"https://openalex.org/C71745522","wikidata":"https://www.wikidata.org/wiki/Q2476929","display_name":"Confidentiality","level":2,"score":0.2540999948978424}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/jiot.2025.3633318","is_oa":false,"landing_page_url":"https://doi.org/10.1109/jiot.2025.3633318","pdf_url":null,"source":{"id":"https://openalex.org/S2480266640","display_name":"IEEE Internet of Things Journal","issn_l":"2327-4662","issn":["2327-4662","2372-2541"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Internet of Things Journal","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G3431386612","display_name":null,"funder_award_id":"62332018","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G5055587113","display_name":null,"funder_award_id":"2024JDJH10","funder_id":"https://openalex.org/F4320317778","funder_display_name":"Sichuan\u00a0Provincial\u00a0Postdoctoral\u00a0Science Foundation"},{"id":"https://openalex.org/G5763297898","display_name":null,"funder_award_id":"2025ZNSFSC0497","funder_id":"https://openalex.org/F4320317778","funder_display_name":"Sichuan\u00a0Provincial\u00a0Postdoctoral\u00a0Science Foundation"},{"id":"https://openalex.org/G7001977797","display_name":null,"funder_award_id":"U25A20429","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320317778","display_name":"Sichuan\u00a0Provincial\u00a0Postdoctoral\u00a0Science Foundation","ror":null},{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":23,"referenced_works":["https://openalex.org/W1561441787","https://openalex.org/W2029693536","https://openalex.org/W2531556919","https://openalex.org/W2794230447","https://openalex.org/W2912019491","https://openalex.org/W3136108810","https://openalex.org/W3158559568","https://openalex.org/W3201909053","https://openalex.org/W4284704402","https://openalex.org/W4285205233","https://openalex.org/W4292002597","https://openalex.org/W4318014836","https://openalex.org/W4386280880","https://openalex.org/W4391697037","https://openalex.org/W4392620279","https://openalex.org/W4393185182","https://openalex.org/W4396853161","https://openalex.org/W4405878093","https://openalex.org/W4405934652","https://openalex.org/W4408017143","https://openalex.org/W4408323732","https://openalex.org/W4409473745","https://openalex.org/W4409536920"],"related_works":[],"abstract_inverted_index":{"The":[0,81],"convergence":[1],"of":[2,9,28,115,135,165],"Digital":[3],"Twin":[4],"(DT)":[5],"technology":[6],"with":[7,65],"Internet":[8],"Things":[10],"(IoT)-based":[11],"healthcare":[12,199],"systems":[13,200],"offers":[14],"promising":[15],"capabilities":[16],"for":[17,195],"real-time":[18,198],"monitoring,":[19],"personalized":[20],"treatment,":[21],"and":[22,32,39,46,73,86,94,101,105,163,177],"predictive":[23],"diagnostics.":[24],"However,":[25],"the":[26,151,156,192],"integration":[27],"context-aware":[29,59],"data":[30,103,137],"flows":[31],"dynamic":[33],"device":[34,99,127],"interactions":[35],"introduces":[36],"critical":[37],"security":[38],"privacy":[40],"challenges":[41],"such":[42],"as":[43],"impersonation,":[44,160],"desynchronization,":[45,161],"physical":[47],"tampering":[48],"attacks.":[49],"To":[50],"address":[51],"these":[52],"concerns,":[53],"this":[54,116],"paper":[55],"proposes":[56],"a":[57,78,171,178],"lightweight,":[58],"authentication":[60,85],"protocol":[61,82],"using":[62],"Authenticated":[63],"Encryption":[64],"Associated":[66],"Data":[67],"(AEAD),":[68],"Physical":[69],"Unclonable":[70],"Functions":[71],"(PUFs),":[72],"cryptographic":[74],"hash":[75],"functions":[76],"within":[77],"DT-enabled":[79,202],"framework.":[80],"supports":[83],"mutual":[84],"secure":[87],"key":[88,113],"establishment":[89],"among":[90],"sensing":[91,126],"devices,":[92],"gateways,":[93],"medical":[95],"servers,":[96],"while":[97],"protecting":[98],"identities":[100],"ensuring":[102],"confidentiality":[104],"integrity":[106],"without":[107],"relying":[108],"on":[109],"stored":[110],"credentials.":[111],"A":[112],"innovation":[114],"work":[117],"is":[118,128],"context":[119],"enforcement":[120],"through":[121],"data-type":[122],"authorization,":[123],"where":[124],"each":[125],"restricted":[129],"to":[130,159,185],"transmit":[131],"only":[132],"predefined":[133],"categories":[134],"physiological":[136],"(e.g.,":[138],"temperature,":[139],"oxygen":[140],"saturation),":[141],"thereby":[142],"achieving":[143],"fine-grained,":[144],"semantics-driven":[145],"access":[146],"control.":[147],"Security":[148],"analysis":[149],"under":[150],"Real-Or-Random":[152],"(ROR)":[153],"model":[154],"confirms":[155],"protocol\u2019s":[157,193],"resistance":[158],"replay,":[162],"leakage":[164],"ephemeral":[166],"secrets.":[167],"Performance":[168],"evaluation":[169],"demonstrates":[170],"25.85%":[172],"reduction":[173,180],"in":[174,181,201],"computational":[175],"overhead":[176],"31.59%":[179],"communication":[182],"cost":[183],"compared":[184],"relevant":[186],"baseline":[187],"protocols.":[188],"These":[189],"results":[190],"validate":[191],"effectiveness":[194],"securing":[196],"resource-constrained,":[197],"IoT":[203],"environments.":[204]},"counts_by_year":[],"updated_date":"2026-03-27T05:58:40.876381","created_date":"2025-11-17T00:00:00"}
