{"id":"https://openalex.org/W4417002687","doi":"https://doi.org/10.1109/jiot.2025.3640270","title":"ZTS-CIoHT-PPRF: Zero Trust Security-Based Mutual Authentication Scheme for Cloud-Assisted IoHT Using Puncturable Pseudorandom Function","display_name":"ZTS-CIoHT-PPRF: Zero Trust Security-Based Mutual Authentication Scheme for Cloud-Assisted IoHT Using Puncturable Pseudorandom Function","publication_year":2025,"publication_date":"2025-12-04","ids":{"openalex":"https://openalex.org/W4417002687","doi":"https://doi.org/10.1109/jiot.2025.3640270"},"language":null,"primary_location":{"id":"doi:10.1109/jiot.2025.3640270","is_oa":false,"landing_page_url":"https://doi.org/10.1109/jiot.2025.3640270","pdf_url":null,"source":{"id":"https://openalex.org/S2480266640","display_name":"IEEE Internet of Things Journal","issn_l":"2327-4662","issn":["2327-4662","2372-2541"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Internet of Things Journal","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5101500041","display_name":"Priyanka Das","orcid":"https://orcid.org/0000-0002-7630-1323"},"institutions":[{"id":"https://openalex.org/I101326570","display_name":"National Institute of Technology Sikkim","ror":"https://ror.org/04pam3b03","country_code":"IN","type":"education","lineage":["https://openalex.org/I101326570"]}],"countries":["IN"],"is_corresponding":true,"raw_author_name":"Priyanka Das","raw_affiliation_strings":["Department of Computer Science and Engineering, National Institute of Technology Sikkim, Ravangla, Sikkim, India","Department of Computer Science and Engineering, National Institute of Technology Sikkim, India"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Engineering, National Institute of Technology Sikkim, Ravangla, Sikkim, India","institution_ids":["https://openalex.org/I101326570"]},{"raw_affiliation_string":"Department of Computer Science and Engineering, National Institute of Technology Sikkim, India","institution_ids":["https://openalex.org/I101326570"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5045477456","display_name":"Sangram Ray","orcid":"https://orcid.org/0000-0002-1920-4172"},"institutions":[{"id":"https://openalex.org/I101326570","display_name":"National Institute of Technology Sikkim","ror":"https://ror.org/04pam3b03","country_code":"IN","type":"education","lineage":["https://openalex.org/I101326570"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Sangram Ray","raw_affiliation_strings":["Department of Computer Science and Engineering, National Institute of Technology Sikkim, Ravangla, Sikkim, India","Department of Computer Science and Engineering, National Institute of Technology Sikkim, India"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Engineering, National Institute of Technology Sikkim, Ravangla, Sikkim, India","institution_ids":["https://openalex.org/I101326570"]},{"raw_affiliation_string":"Department of Computer Science and Engineering, National Institute of Technology Sikkim, India","institution_ids":["https://openalex.org/I101326570"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5033009171","display_name":"Mou Dasgupta","orcid":"https://orcid.org/0000-0002-9948-6041"},"institutions":[{"id":"https://openalex.org/I38335241","display_name":"National Institute of Technology Raipur","ror":"https://ror.org/02y553197","country_code":"IN","type":"education","lineage":["https://openalex.org/I38335241"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Mou Dasgupta","raw_affiliation_strings":["Department of Computer Application, National Institute of Technology Raipur, Raipur, Chattishgar, India","Department of Computer Application, National Institute of Technology Raipur, India"],"affiliations":[{"raw_affiliation_string":"Department of Computer Application, National Institute of Technology Raipur, Raipur, Chattishgar, India","institution_ids":["https://openalex.org/I38335241"]},{"raw_affiliation_string":"Department of Computer Application, National Institute of Technology Raipur, India","institution_ids":["https://openalex.org/I38335241"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5011213078","display_name":"Ashok Kumar Das","orcid":"https://orcid.org/0000-0002-5196-9589"},"institutions":[{"id":"https://openalex.org/I64189192","display_name":"International Institute of Information Technology, Hyderabad","ror":"https://ror.org/05f11g639","country_code":"IN","type":"education","lineage":["https://openalex.org/I64189192"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Ashok Kumar Das","raw_affiliation_strings":["Center for Security, Theory and Algorithmic Research, International Institute of Information Technology, Hyderabad, India"],"affiliations":[{"raw_affiliation_string":"Center for Security, Theory and Algorithmic Research, International Institute of Information Technology, Hyderabad, India","institution_ids":["https://openalex.org/I64189192"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100650746","display_name":"Youngho Park","orcid":"https://orcid.org/0000-0002-0406-6547"},"institutions":[{"id":"https://openalex.org/I31419693","display_name":"Kyungpook National University","ror":"https://ror.org/040c17130","country_code":"KR","type":"education","lineage":["https://openalex.org/I31419693"]}],"countries":["KR"],"is_corresponding":false,"raw_author_name":"Youngho Park","raw_affiliation_strings":["School of Electronics Engineering, Kyungpook National University, Daegu, South Korea"],"affiliations":[{"raw_affiliation_string":"School of Electronics Engineering, Kyungpook National University, Daegu, South Korea","institution_ids":["https://openalex.org/I31419693"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5019871206","display_name":"Mahesh Chandra Govil","orcid":"https://orcid.org/0000-0002-4707-0693"},"institutions":[{"id":"https://openalex.org/I101326570","display_name":"National Institute of Technology Sikkim","ror":"https://ror.org/04pam3b03","country_code":"IN","type":"education","lineage":["https://openalex.org/I101326570"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Mahesh Chandra Govil","raw_affiliation_strings":["Department of Computer Science and Engineering, National Institute of Technology Sikkim, Ravangla, Sikkim, India","Department of Computer Science and Engineering, National Institute of Technology Sikkim, India"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Engineering, National Institute of Technology Sikkim, Ravangla, Sikkim, India","institution_ids":["https://openalex.org/I101326570"]},{"raw_affiliation_string":"Department of Computer Science and Engineering, National Institute of Technology Sikkim, India","institution_ids":["https://openalex.org/I101326570"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5101500041"],"corresponding_institution_ids":["https://openalex.org/I101326570"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.45983006,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"13","issue":"4","first_page":"7403","last_page":"7416"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.5651000142097473,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.5651000142097473,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.08250000327825546,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10273","display_name":"IoT and Edge/Fog Computing","score":0.07819999754428864,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/mutual-authentication","display_name":"Mutual authentication","score":0.7253000140190125},{"id":"https://openalex.org/keywords/security-analysis","display_name":"Security analysis","score":0.5259000062942505},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.519599974155426},{"id":"https://openalex.org/keywords/forward-secrecy","display_name":"Forward secrecy","score":0.4878000020980835},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.4708999991416931},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.4650000035762787},{"id":"https://openalex.org/keywords/pseudorandom-function-family","display_name":"Pseudorandom function family","score":0.43799999356269836},{"id":"https://openalex.org/keywords/pseudorandom-number-generator","display_name":"Pseudorandom number generator","score":0.4343999922275543},{"id":"https://openalex.org/keywords/cloud-computing-security","display_name":"Cloud computing security","score":0.430400013923645},{"id":"https://openalex.org/keywords/flexibility","display_name":"Flexibility (engineering)","score":0.42480000853538513}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7993999719619751},{"id":"https://openalex.org/C2781221063","wikidata":"https://www.wikidata.org/wiki/Q6944186","display_name":"Mutual authentication","level":3,"score":0.7253000140190125},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5860999822616577},{"id":"https://openalex.org/C38369872","wikidata":"https://www.wikidata.org/wiki/Q7445009","display_name":"Security analysis","level":2,"score":0.5259000062942505},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.519599974155426},{"id":"https://openalex.org/C205009425","wikidata":"https://www.wikidata.org/wiki/Q935662","display_name":"Forward secrecy","level":4,"score":0.4878000020980835},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.4708999991416931},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.4650000035762787},{"id":"https://openalex.org/C178774983","wikidata":"https://www.wikidata.org/wiki/Q734896","display_name":"Pseudorandom function family","level":3,"score":0.43799999356269836},{"id":"https://openalex.org/C140642157","wikidata":"https://www.wikidata.org/wiki/Q1623338","display_name":"Pseudorandom number generator","level":2,"score":0.4343999922275543},{"id":"https://openalex.org/C184842701","wikidata":"https://www.wikidata.org/wiki/Q370563","display_name":"Cloud computing security","level":3,"score":0.430400013923645},{"id":"https://openalex.org/C2780598303","wikidata":"https://www.wikidata.org/wiki/Q65921492","display_name":"Flexibility (engineering)","level":2,"score":0.42480000853538513},{"id":"https://openalex.org/C22111027","wikidata":"https://www.wikidata.org/wiki/Q1070427","display_name":"Internet security","level":4,"score":0.42320001125335693},{"id":"https://openalex.org/C131672422","wikidata":"https://www.wikidata.org/wiki/Q852594","display_name":"Provable security","level":3,"score":0.4007999897003174},{"id":"https://openalex.org/C121822524","wikidata":"https://www.wikidata.org/wiki/Q5157582","display_name":"Computer security model","level":2,"score":0.39899998903274536},{"id":"https://openalex.org/C141492731","wikidata":"https://www.wikidata.org/wiki/Q1052621","display_name":"Message authentication code","level":3,"score":0.39579999446868896},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.3822999894618988},{"id":"https://openalex.org/C131129157","wikidata":"https://www.wikidata.org/wiki/Q1059963","display_name":"Challenge\u2013response authentication","level":4,"score":0.35120001435279846},{"id":"https://openalex.org/C91399829","wikidata":"https://www.wikidata.org/wiki/Q1115684","display_name":"Commitment scheme","level":3,"score":0.334199994802475},{"id":"https://openalex.org/C21564112","wikidata":"https://www.wikidata.org/wiki/Q4825885","display_name":"Authentication protocol","level":3,"score":0.3246000111103058},{"id":"https://openalex.org/C94284585","wikidata":"https://www.wikidata.org/wiki/Q228184","display_name":"Random oracle","level":4,"score":0.3059000074863434},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.30390000343322754},{"id":"https://openalex.org/C2777059624","wikidata":"https://www.wikidata.org/wiki/Q914359","display_name":"Cloud storage","level":3,"score":0.29660001397132874},{"id":"https://openalex.org/C510870077","wikidata":"https://www.wikidata.org/wiki/Q7444868","display_name":"Secure communication","level":3,"score":0.29100000858306885},{"id":"https://openalex.org/C168970074","wikidata":"https://www.wikidata.org/wiki/Q5227146","display_name":"Data Authentication Algorithm","level":4,"score":0.2896000146865845},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.2872999906539917},{"id":"https://openalex.org/C45374587","wikidata":"https://www.wikidata.org/wiki/Q12525525","display_name":"Computation","level":2,"score":0.273499995470047},{"id":"https://openalex.org/C10511746","wikidata":"https://www.wikidata.org/wiki/Q899388","display_name":"Data security","level":3,"score":0.26820001006126404},{"id":"https://openalex.org/C33884865","wikidata":"https://www.wikidata.org/wiki/Q1254335","display_name":"Cryptographic protocol","level":3,"score":0.26589998602867126},{"id":"https://openalex.org/C29983905","wikidata":"https://www.wikidata.org/wiki/Q7445066","display_name":"Security service","level":3,"score":0.2639999985694885},{"id":"https://openalex.org/C527648132","wikidata":"https://www.wikidata.org/wiki/Q189900","display_name":"Information security","level":2,"score":0.2632000148296356},{"id":"https://openalex.org/C2780264999","wikidata":"https://www.wikidata.org/wiki/Q7445032","display_name":"Security domain","level":2,"score":0.2619999945163727},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.25780001282691956}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/jiot.2025.3640270","is_oa":false,"landing_page_url":"https://doi.org/10.1109/jiot.2025.3640270","pdf_url":null,"source":{"id":"https://openalex.org/S2480266640","display_name":"IEEE Internet of Things Journal","issn_l":"2327-4662","issn":["2327-4662","2372-2541"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Internet of Things Journal","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":33,"referenced_works":["https://openalex.org/W2037092970","https://openalex.org/W2275530856","https://openalex.org/W2591789642","https://openalex.org/W2748361805","https://openalex.org/W2805161995","https://openalex.org/W2914424007","https://openalex.org/W2920780305","https://openalex.org/W2921986961","https://openalex.org/W2999802385","https://openalex.org/W3000338372","https://openalex.org/W3016235592","https://openalex.org/W3084272429","https://openalex.org/W3094556797","https://openalex.org/W3127920551","https://openalex.org/W3187293024","https://openalex.org/W4200182742","https://openalex.org/W4206509676","https://openalex.org/W4210917888","https://openalex.org/W4281782330","https://openalex.org/W4285176818","https://openalex.org/W4297088059","https://openalex.org/W4366378550","https://openalex.org/W4368232621","https://openalex.org/W4381232941","https://openalex.org/W4386857748","https://openalex.org/W4393185182","https://openalex.org/W4393253086","https://openalex.org/W4396853094","https://openalex.org/W4396853161","https://openalex.org/W4399380619","https://openalex.org/W4404563176","https://openalex.org/W4407168464","https://openalex.org/W4411143604"],"related_works":[],"abstract_inverted_index":{"The":[0,177],"incorporation":[1],"of":[2,6,19,35,55],"cloud":[3,79],"to":[4,11,31,43,60,70,83,122,220],"Internet":[5],"Health":[7],"Things":[8],"(IoHT)":[9],"referred":[10],"as":[12],"Cloud-assisted":[13],"IoHT":[14],"(CIoHT)":[15],"assures":[16],"efficient":[17],"storage":[18],"the":[20,32,36,48,56,77,86,115,140,143,165,196,212,221,234,237,241],"sensitive":[21],"health":[22],"data":[23],"with":[24,92],"better":[25],"flexibility":[26],"and":[27,183,187,229],"scalability.":[28],"However,":[29,104],"owing":[30],"openness":[33],"nature":[34],"CIoHT":[37,57,166,209,252],"infrastructure,":[38],"it":[39,65,110],"is":[40,51,66,99,111,199],"often":[41],"susceptible":[42],"several":[44],"security":[45,50,63,88,124,141,179,185,189],"threats.":[46],"On":[47],"contrary,":[49],"an":[52],"essential":[53,87],"aspect":[54,145],"infrastructure.":[58,210,253],"Thus,":[59,151,232],"address":[61],"these":[62,97,135],"concerns,":[64],"a":[67,72,101,106,155,169,208],"common":[68],"practice":[69],"establish":[71],"mutual":[73,161],"authentication":[74,117,162],"scheme":[75,163,198,225,239],"among":[76,96],"communicating":[78],"entities":[80,98],"that":[81,113,195,217],"ensures":[82,194],"satisfy":[84],"all":[85,114],"requirements.":[89],"In":[90],"line":[91],"this,":[93],"establishing":[94],"trust":[95,144],"also":[100],"significant":[102],"prerequisite.":[103],"after":[105],"rigorous":[107],"literature":[108,223],"survey,":[109],"found":[112],"existing":[116,235],"schemes":[118,136],"are":[119],"either":[120,138],"vulnerable":[121],"various":[123,203],"threats":[125],"or":[126,142],"bear":[127],"higher":[128,227],"computation":[129,228],"and/or":[130],"communication":[131,230],"overheads.":[132],"Above":[133],"all,":[134],"have":[137,153],"taken":[139],"into":[146],"consideration,":[147],"but":[148],"not":[149],"both.":[150],"we":[152],"proposed":[154,197,238],"Zero":[156],"Trust":[157],"Security":[158],"(ZTS)":[159],"based":[160],"for":[164,248],"infrastructure":[167],"using":[168,181,191],"Puncturable":[170],"Pseudorandom":[171],"Function":[172],"(PPRF)":[173],"in":[174,207,218,250],"this":[175],"paper.":[176],"detailed":[178],"analysis":[180,215],"informal":[182],"formal":[184,188],"analysis,":[186],"verification":[190],"AVISPA":[192],"tool":[193],"highly":[200],"robust":[201],"against":[202],"known":[204],"attacks":[205],"needed":[206],"Moreover,":[211],"comprehensive":[213],"comparative":[214],"exhibit":[216],"comparison":[219],"related":[222],"our":[224],"provides":[226],"efficiency.":[231],"unlike":[233],"schemes,":[236],"satisfies":[240],"vital":[242],"security-trust-efficiency":[243],"traid;":[244],"ensuring":[245],"its":[246],"feasibility":[247],"implementation":[249],"real-world":[251]},"counts_by_year":[],"updated_date":"2026-03-07T16:01:11.037858","created_date":"2025-12-04T00:00:00"}
