{"id":"https://openalex.org/W3158559568","doi":"https://doi.org/10.1109/jsyst.2021.3073537","title":"Security Analysis on \u201cA Secure Three-Factor User Authentication Protocol With Forward Secrecy for Wireless Medical Sensor Network Systems\u201d","display_name":"Security Analysis on \u201cA Secure Three-Factor User Authentication Protocol With Forward Secrecy for Wireless Medical Sensor Network Systems\u201d","publication_year":2021,"publication_date":"2021-05-05","ids":{"openalex":"https://openalex.org/W3158559568","doi":"https://doi.org/10.1109/jsyst.2021.3073537","mag":"3158559568"},"language":"en","primary_location":{"id":"doi:10.1109/jsyst.2021.3073537","is_oa":false,"landing_page_url":"https://doi.org/10.1109/jsyst.2021.3073537","pdf_url":null,"source":{"id":"https://openalex.org/S95999327","display_name":"IEEE Systems Journal","issn_l":"1932-8184","issn":["1932-8184","1937-9234","2373-7816"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Systems Journal","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5035264127","display_name":"Muhammad Asad Saleem","orcid":"https://orcid.org/0009-0001-0308-601X"},"institutions":[{"id":"https://openalex.org/I16076960","display_name":"COMSATS University Islamabad","ror":"https://ror.org/00nqqvk19","country_code":"PK","type":"education","lineage":["https://openalex.org/I16076960"]}],"countries":["PK"],"is_corresponding":true,"raw_author_name":"Muhammad Asad Saleem","raw_affiliation_strings":["Department of Computer Science, COMSATS University Islamabad, Sahiwal Campus, Sahiwal, Pakistan"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Department of Computer Science, COMSATS University Islamabad, Sahiwal Campus, Sahiwal, Pakistan","institution_ids":["https://openalex.org/I16076960"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5017367371","display_name":"Salman Shamshad","orcid":"https://orcid.org/0000-0002-8984-3199"},"institutions":[{"id":"https://openalex.org/I16076960","display_name":"COMSATS University Islamabad","ror":"https://ror.org/00nqqvk19","country_code":"PK","type":"education","lineage":["https://openalex.org/I16076960"]}],"countries":["PK"],"is_corresponding":false,"raw_author_name":"Salman Shamshad","raw_affiliation_strings":["Department of Computer Science, COMSATS University Islamabad, Sahiwal Campus, Sahiwal, Pakistan"],"raw_orcid":"https://orcid.org/0000-0002-8984-3199","affiliations":[{"raw_affiliation_string":"Department of Computer Science, COMSATS University Islamabad, Sahiwal Campus, Sahiwal, Pakistan","institution_ids":["https://openalex.org/I16076960"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5079811333","display_name":"Shafiq Ahmed","orcid":"https://orcid.org/0000-0001-9599-1887"},"institutions":[{"id":"https://openalex.org/I59225215","display_name":"Bahria University","ror":"https://ror.org/02v8d7770","country_code":"PK","type":"education","lineage":["https://openalex.org/I59225215"]}],"countries":["PK"],"is_corresponding":false,"raw_author_name":"Shafiq Ahmed","raw_affiliation_strings":["Department of Computer Science, Bahria University, Lahore, Pakistan"],"raw_orcid":"https://orcid.org/0000-0001-9599-1887","affiliations":[{"raw_affiliation_string":"Department of Computer Science, Bahria University, Lahore, Pakistan","institution_ids":["https://openalex.org/I59225215"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5013439403","display_name":"Zahid Ghaffar","orcid":"https://orcid.org/0000-0002-5546-2689"},"institutions":[{"id":"https://openalex.org/I16076960","display_name":"COMSATS University Islamabad","ror":"https://ror.org/00nqqvk19","country_code":"PK","type":"education","lineage":["https://openalex.org/I16076960"]}],"countries":["PK"],"is_corresponding":false,"raw_author_name":"Zahid Ghaffar","raw_affiliation_strings":["Department of Computer Science, COMSATS University Islamabad, Sahiwal Campus, Sahiwal, Pakistan"],"raw_orcid":"https://orcid.org/0000-0002-5546-2689","affiliations":[{"raw_affiliation_string":"Department of Computer Science, COMSATS University Islamabad, Sahiwal Campus, Sahiwal, Pakistan","institution_ids":["https://openalex.org/I16076960"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5023371922","display_name":"Khalid Mahmood","orcid":"https://orcid.org/0000-0001-5046-7766"},"institutions":[{"id":"https://openalex.org/I16076960","display_name":"COMSATS University Islamabad","ror":"https://ror.org/00nqqvk19","country_code":"PK","type":"education","lineage":["https://openalex.org/I16076960"]}],"countries":["PK"],"is_corresponding":false,"raw_author_name":"Khalid Mahmood","raw_affiliation_strings":["Department of Computer Science, COMSATS University Islamabad, Sahiwal Campus, Sahiwal, Pakistan"],"raw_orcid":"https://orcid.org/0000-0001-5046-7766","affiliations":[{"raw_affiliation_string":"Department of Computer Science, COMSATS University Islamabad, Sahiwal Campus, Sahiwal, Pakistan","institution_ids":["https://openalex.org/I16076960"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5035264127"],"corresponding_institution_ids":["https://openalex.org/I16076960"],"apc_list":null,"apc_paid":null,"fwci":4.1633,"has_fulltext":false,"cited_by_count":36,"citation_normalized_percentile":{"value":0.94097581,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":97,"max":99},"biblio":{"volume":"15","issue":"4","first_page":"5557","last_page":"5559"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.9973999857902527,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.9973999857902527,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10273","display_name":"IoT and Edge/Fog Computing","score":0.9955999851226807,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9944000244140625,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7250041365623474},{"id":"https://openalex.org/keywords/wireless-sensor-network","display_name":"Wireless sensor network","score":0.662803053855896},{"id":"https://openalex.org/keywords/anonymity","display_name":"Anonymity","score":0.5925371646881104},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.5891292095184326},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.5838040709495544},{"id":"https://openalex.org/keywords/node","display_name":"Node (physics)","score":0.5295938849449158},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.49659138917922974},{"id":"https://openalex.org/keywords/protocol","display_name":"Protocol (science)","score":0.48022252321243286},{"id":"https://openalex.org/keywords/cryptographic-protocol","display_name":"Cryptographic protocol","score":0.45456862449645996},{"id":"https://openalex.org/keywords/secrecy","display_name":"Secrecy","score":0.42108798027038574},{"id":"https://openalex.org/keywords/information-leakage","display_name":"Information leakage","score":0.4172510802745819},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.38116806745529175},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.12208279967308044}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7250041365623474},{"id":"https://openalex.org/C24590314","wikidata":"https://www.wikidata.org/wiki/Q336038","display_name":"Wireless sensor network","level":2,"score":0.662803053855896},{"id":"https://openalex.org/C178005623","wikidata":"https://www.wikidata.org/wiki/Q308859","display_name":"Anonymity","level":2,"score":0.5925371646881104},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.5891292095184326},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.5838040709495544},{"id":"https://openalex.org/C62611344","wikidata":"https://www.wikidata.org/wiki/Q1062658","display_name":"Node (physics)","level":2,"score":0.5295938849449158},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.49659138917922974},{"id":"https://openalex.org/C2780385302","wikidata":"https://www.wikidata.org/wiki/Q367158","display_name":"Protocol (science)","level":3,"score":0.48022252321243286},{"id":"https://openalex.org/C33884865","wikidata":"https://www.wikidata.org/wiki/Q1254335","display_name":"Cryptographic protocol","level":3,"score":0.45456862449645996},{"id":"https://openalex.org/C2776452267","wikidata":"https://www.wikidata.org/wiki/Q1503443","display_name":"Secrecy","level":2,"score":0.42108798027038574},{"id":"https://openalex.org/C2779201187","wikidata":"https://www.wikidata.org/wiki/Q2775060","display_name":"Information leakage","level":2,"score":0.4172510802745819},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.38116806745529175},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.12208279967308044},{"id":"https://openalex.org/C71924100","wikidata":"https://www.wikidata.org/wiki/Q11190","display_name":"Medicine","level":0,"score":0.0},{"id":"https://openalex.org/C204787440","wikidata":"https://www.wikidata.org/wiki/Q188504","display_name":"Alternative medicine","level":2,"score":0.0},{"id":"https://openalex.org/C142724271","wikidata":"https://www.wikidata.org/wiki/Q7208","display_name":"Pathology","level":1,"score":0.0},{"id":"https://openalex.org/C66938386","wikidata":"https://www.wikidata.org/wiki/Q633538","display_name":"Structural engineering","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/jsyst.2021.3073537","is_oa":false,"landing_page_url":"https://doi.org/10.1109/jsyst.2021.3073537","pdf_url":null,"source":{"id":"https://openalex.org/S95999327","display_name":"IEEE Systems Journal","issn_l":"1932-8184","issn":["1932-8184","1937-9234","2373-7816"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Systems Journal","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/9","score":0.44999998807907104,"display_name":"Industry, innovation and infrastructure"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":10,"referenced_works":["https://openalex.org/W2019956102","https://openalex.org/W2170577408","https://openalex.org/W2259959024","https://openalex.org/W2344941367","https://openalex.org/W2522903812","https://openalex.org/W2563009067","https://openalex.org/W2596636257","https://openalex.org/W2923796516","https://openalex.org/W3000164966","https://openalex.org/W3008280541"],"related_works":["https://openalex.org/W2107199751","https://openalex.org/W565335793","https://openalex.org/W2363071176","https://openalex.org/W4300441478","https://openalex.org/W2062965938","https://openalex.org/W4243812570","https://openalex.org/W2493929861","https://openalex.org/W2787252914","https://openalex.org/W4386057510","https://openalex.org/W2583477080"],"abstract_inverted_index":{"The":[0],"Internet":[1],"of":[2,30,39,64,82,91,106,119,175],"Things":[3],"(IoT)":[4],"facilitates":[5],"different":[6],"devices":[7],"and":[8,57,66,77,195],"objects":[9],"to":[10,19,61,114,189,209],"get":[11],"connected":[12],"with":[13],"the":[14,28,40,42,73,88,92,95,116,171,202,206,211],"Internet.":[15],"This":[16],"connectivity":[17],"helps":[18],"switch":[20],"data":[21,74],"via":[22],"various":[23,51,99],"emerging":[24],"technologies,":[25],"which":[26,183],"shapes":[27],"vision":[29],"intelligent":[31],"identification":[32],"into":[33],"reality.":[34],"As":[35],"a":[36,140],"foremost":[37],"base":[38],"IoT,":[41],"wireless":[43,67],"sensor":[44,69,162,191],"networks":[45,70],"(WSNs)":[46],"have":[47,85,97,108],"been":[48],"practiced":[49],"in":[50,214],"fields,":[52],"such":[53,79],"as":[54,80],"smart":[55,58],"transportation":[56],"healthcare.":[59],"Due":[60],"rapid":[62],"development":[63],"WSNs":[65],"medical":[68],"(WMSNs),":[71],"etc.,":[72],"security":[75,110,117,173],"issues":[76],"challenges,":[78],"leakage":[81],"secret":[83],"data,":[84],"also":[86,160],"gained":[87],"serious":[89,109],"attention":[90],"researchers.":[93],"Recently,":[94],"researchers":[96],"devised":[98],"authentication":[100,143],"protocols":[101],"for":[102,145],"WMSNs,":[103],"but":[104,159],"many":[105],"them":[107],"flaws.":[111],"In":[112,166],"order":[113],"overcome":[115,210],"flaws":[118],"recently":[120],"designed":[121],"protocols,":[122],"Li":[123,176,215],"<italic":[124,177,216],"xmlns:mml=\"http://www.w3.org/1998/Math/MathML\"":[125,178,217],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">et":[126,179,218],"al.</i>":[127,180,219],"(IEEE":[128],"Syst.":[129],"J.,":[130],"vol.":[131],"14,":[132],"no.":[133],"1,":[134],"pp.":[135],"39\u201350,":[136],"Mar.":[137],"2020)":[138],"presented":[139],"three-factor":[141],"user":[142,157,199],"protocol":[144,153,187],"WMSN.":[146],"Their":[147],"work":[148],"claimed":[149],"that":[150,185],"their":[151,186],"proposed":[152],"not":[154,197],"only":[155],"offers":[156],"anonymity":[158],"prevents":[161],"node":[163,192],"impersonation":[164,193],"attack.":[165],"this":[167],"paper,":[168],"we":[169,204],"present":[170,213],"detailed":[172],"analysis":[174],"\u2019s":[181,220],"protocol,":[182],"shows":[184],"fails":[188],"resist":[190],"attack":[194],"does":[196],"offer":[198],"anonymity.":[200],"At":[201],"end,":[203],"suggest":[205],"suitable":[207],"remedy":[208],"deficiencies":[212],"protocol.":[221]},"counts_by_year":[{"year":2026,"cited_by_count":3},{"year":2025,"cited_by_count":7},{"year":2024,"cited_by_count":10},{"year":2023,"cited_by_count":7},{"year":2022,"cited_by_count":4},{"year":2021,"cited_by_count":5}],"updated_date":"2025-12-21T01:58:51.020947","created_date":"2025-10-10T00:00:00"}
