{"id":"https://openalex.org/W4406110386","doi":"https://doi.org/10.1109/tmc.2025.3526076","title":"An Improved Ultra-Lightweight Anonymous Authenticated Key Agreement Protocol for Wearable Devices","display_name":"An Improved Ultra-Lightweight Anonymous Authenticated Key Agreement Protocol for Wearable Devices","publication_year":2025,"publication_date":"2025-01-06","ids":{"openalex":"https://openalex.org/W4406110386","doi":"https://doi.org/10.1109/tmc.2025.3526076"},"language":"en","primary_location":{"id":"doi:10.1109/tmc.2025.3526076","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tmc.2025.3526076","pdf_url":null,"source":{"id":"https://openalex.org/S69141925","display_name":"IEEE Transactions on Mobile Computing","issn_l":"1536-1233","issn":["1536-1233","1558-0660","2161-9875"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320439","host_organization_name":"IEEE Computer Society","host_organization_lineage":["https://openalex.org/P4310320439","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Computer Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Mobile Computing","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"http://gala.gre.ac.uk/id/eprint/49194/7/49194%20WAQAS_An_Improved_Ultra-Lightweight_Anonymous_Authenticated_Key_Agreement_Protocol_For_Wearable_Devices_%28AAM%29_2024.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5083255529","display_name":"Xin Ai","orcid":"https://orcid.org/0009-0001-3431-6033"},"institutions":[{"id":"https://openalex.org/I37796252","display_name":"Beijing University of Technology","ror":"https://ror.org/037b1pp87","country_code":"CN","type":"education","lineage":["https://openalex.org/I37796252"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Xin Ai","raw_affiliation_strings":["College of Computer Science, Beijing University of Technology, Beijing, China"],"affiliations":[{"raw_affiliation_string":"College of Computer Science, Beijing University of Technology, Beijing, China","institution_ids":["https://openalex.org/I37796252"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5000485488","display_name":"Akhtar Badshah","orcid":"https://orcid.org/0000-0001-7867-2657"},"institutions":[{"id":"https://openalex.org/I68649149","display_name":"University of Malakand","ror":"https://ror.org/012xdha97","country_code":"PK","type":"education","lineage":["https://openalex.org/I68649149"]}],"countries":["PK"],"is_corresponding":false,"raw_author_name":"Akhtar Badshah","raw_affiliation_strings":["Department of Software Engineering, University of Malakand, Dir Lower, KPK, Pakistan","Department of Software Engineering, University of Malakand, Dir Lower, Pakistan"],"affiliations":[{"raw_affiliation_string":"Department of Software Engineering, University of Malakand, Dir Lower, KPK, Pakistan","institution_ids":["https://openalex.org/I68649149"]},{"raw_affiliation_string":"Department of Software Engineering, University of Malakand, Dir Lower, Pakistan","institution_ids":["https://openalex.org/I68649149"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5040007583","display_name":"Shanshan Tu","orcid":"https://orcid.org/0000-0002-6220-4119"},"institutions":[{"id":"https://openalex.org/I37796252","display_name":"Beijing University of Technology","ror":"https://ror.org/037b1pp87","country_code":"CN","type":"education","lineage":["https://openalex.org/I37796252"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Shanshan Tu","raw_affiliation_strings":["College of Computer Science, Beijing University of Technology, Beijing, China"],"affiliations":[{"raw_affiliation_string":"College of Computer Science, Beijing University of Technology, Beijing, China","institution_ids":["https://openalex.org/I37796252"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5086533220","display_name":"Muhammad Waqas","orcid":"https://orcid.org/0000-0003-0814-7544"},"institutions":[{"id":"https://openalex.org/I12079687","display_name":"Edith Cowan University","ror":"https://ror.org/05jhnwe22","country_code":"AU","type":"education","lineage":["https://openalex.org/I12079687"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Muhammad Waqas","raw_affiliation_strings":["Centre for Sustainable Cyber Security, School of Computing and Mathematical Sciences, Faculty of Engineering and Science, University of Greenwich, London, U.K","Centre for Sustainable Cyber Security, School of Computing and Mathematical Sciences, Faculty of Engineering and Science, University of Greenwich, U.K","School of Engineering, Edith Cowan University, Perth, Australia"],"affiliations":[{"raw_affiliation_string":"Centre for Sustainable Cyber Security, School of Computing and Mathematical Sciences, Faculty of Engineering and Science, University of Greenwich, London, U.K","institution_ids":[]},{"raw_affiliation_string":"Centre for Sustainable Cyber Security, School of Computing and Mathematical Sciences, Faculty of Engineering and Science, University of Greenwich, U.K","institution_ids":[]},{"raw_affiliation_string":"School of Engineering, Edith Cowan University, Perth, Australia","institution_ids":["https://openalex.org/I12079687"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5058433531","display_name":"Iftekhar Ahmad","orcid":"https://orcid.org/0000-0003-4441-9631"},"institutions":[{"id":"https://openalex.org/I12079687","display_name":"Edith Cowan University","ror":"https://ror.org/05jhnwe22","country_code":"AU","type":"education","lineage":["https://openalex.org/I12079687"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Iftekhar Ahmad","raw_affiliation_strings":["School of Engineering, Edith Cowan University, Perth, WA, Australia","School of Engineering, Edith Cowan University, Perth, Australia"],"affiliations":[{"raw_affiliation_string":"School of Engineering, Edith Cowan University, Perth, WA, Australia","institution_ids":["https://openalex.org/I12079687"]},{"raw_affiliation_string":"School of Engineering, Edith Cowan University, Perth, Australia","institution_ids":["https://openalex.org/I12079687"]}]}],"institutions":[],"countries_distinct_count":3,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5083255529"],"corresponding_institution_ids":["https://openalex.org/I37796252"],"apc_list":null,"apc_paid":null,"fwci":11.6662,"has_fulltext":true,"cited_by_count":7,"citation_normalized_percentile":{"value":0.98078549,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":97,"max":99},"biblio":{"volume":"24","issue":"5","first_page":"4543","last_page":"4557"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.9975000023841858,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.9975000023841858,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9941999912261963,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":0.968500018119812,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7947022914886475},{"id":"https://openalex.org/keywords/wearable-computer","display_name":"Wearable computer","score":0.6242152452468872},{"id":"https://openalex.org/keywords/key-agreement-protocol","display_name":"Key-agreement protocol","score":0.6147246956825256},{"id":"https://openalex.org/keywords/protocol","display_name":"Protocol (science)","score":0.5965284109115601},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.555294394493103},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.46838241815567017},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.44449177384376526},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.2929558753967285},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.18958541750907898},{"id":"https://openalex.org/keywords/key-distribution","display_name":"Key distribution","score":0.11376696825027466},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.11026054620742798}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7947022914886475},{"id":"https://openalex.org/C150594956","wikidata":"https://www.wikidata.org/wiki/Q1334829","display_name":"Wearable computer","level":2,"score":0.6242152452468872},{"id":"https://openalex.org/C135530808","wikidata":"https://www.wikidata.org/wiki/Q3306713","display_name":"Key-agreement protocol","level":5,"score":0.6147246956825256},{"id":"https://openalex.org/C2780385302","wikidata":"https://www.wikidata.org/wiki/Q367158","display_name":"Protocol (science)","level":3,"score":0.5965284109115601},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.555294394493103},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.46838241815567017},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.44449177384376526},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.2929558753967285},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.18958541750907898},{"id":"https://openalex.org/C160333310","wikidata":"https://www.wikidata.org/wiki/Q6398153","display_name":"Key distribution","level":4,"score":0.11376696825027466},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.11026054620742798},{"id":"https://openalex.org/C142724271","wikidata":"https://www.wikidata.org/wiki/Q7208","display_name":"Pathology","level":1,"score":0.0},{"id":"https://openalex.org/C71924100","wikidata":"https://www.wikidata.org/wiki/Q11190","display_name":"Medicine","level":0,"score":0.0},{"id":"https://openalex.org/C204787440","wikidata":"https://www.wikidata.org/wiki/Q188504","display_name":"Alternative medicine","level":2,"score":0.0}],"mesh":[],"locations_count":3,"locations":[{"id":"doi:10.1109/tmc.2025.3526076","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tmc.2025.3526076","pdf_url":null,"source":{"id":"https://openalex.org/S69141925","display_name":"IEEE Transactions on Mobile Computing","issn_l":"1536-1233","issn":["1536-1233","1558-0660","2161-9875"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320439","host_organization_name":"IEEE Computer Society","host_organization_lineage":["https://openalex.org/P4310320439","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Computer Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Mobile Computing","raw_type":"journal-article"},{"id":"pmh:oai:gala.gre.ac.uk:49194","is_oa":true,"landing_page_url":"https://orcid.org/0000-0003-0814-7544","pdf_url":"http://gala.gre.ac.uk/id/eprint/49194/7/49194%20WAQAS_An_Improved_Ultra-Lightweight_Anonymous_Authenticated_Key_Agreement_Protocol_For_Wearable_Devices_%28AAM%29_2024.pdf","source":{"id":"https://openalex.org/S4306401244","display_name":"Greenwich Academic Literature Archive (University of Greenwich)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I55060895","host_organization_name":"University of Greenwich","host_organization_lineage":["https://openalex.org/I55060895"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"PeerReviewed"},{"id":"pmh:oai:ro.ecu.edu.au:ecuworks2022-2026-6795","is_oa":true,"landing_page_url":"https://ro.ecu.edu.au/ecuworks2022-2026/5794","pdf_url":null,"source":{"id":"https://openalex.org/S2765015692","display_name":"Australasian Journal of Paramedicine","issn_l":"2202-7270","issn":["2202-7270"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by-nd","license_id":"https://openalex.org/licenses/cc-by-nd","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Research outputs 2022 to 2026","raw_type":"text"}],"best_oa_location":{"id":"pmh:oai:gala.gre.ac.uk:49194","is_oa":true,"landing_page_url":"https://orcid.org/0000-0003-0814-7544","pdf_url":"http://gala.gre.ac.uk/id/eprint/49194/7/49194%20WAQAS_An_Improved_Ultra-Lightweight_Anonymous_Authenticated_Key_Agreement_Protocol_For_Wearable_Devices_%28AAM%29_2024.pdf","source":{"id":"https://openalex.org/S4306401244","display_name":"Greenwich Academic Literature Archive (University of Greenwich)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I55060895","host_organization_name":"University of Greenwich","host_organization_lineage":["https://openalex.org/I55060895"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"PeerReviewed"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4406110386.pdf","grobid_xml":"https://content.openalex.org/works/W4406110386.grobid-xml"},"referenced_works_count":49,"referenced_works":["https://openalex.org/W1512241012","https://openalex.org/W1526070463","https://openalex.org/W1561441787","https://openalex.org/W2029693536","https://openalex.org/W2039043123","https://openalex.org/W2131789459","https://openalex.org/W2212111137","https://openalex.org/W2412908136","https://openalex.org/W2474348401","https://openalex.org/W2748361805","https://openalex.org/W2749503685","https://openalex.org/W2753121224","https://openalex.org/W2756359791","https://openalex.org/W2766472919","https://openalex.org/W2789827290","https://openalex.org/W2800426337","https://openalex.org/W2883088980","https://openalex.org/W2884963646","https://openalex.org/W2900980153","https://openalex.org/W2913533279","https://openalex.org/W2923796516","https://openalex.org/W3110603219","https://openalex.org/W3113296961","https://openalex.org/W3120149407","https://openalex.org/W3158559568","https://openalex.org/W3163508094","https://openalex.org/W3201909053","https://openalex.org/W4207001703","https://openalex.org/W4210895381","https://openalex.org/W4224301602","https://openalex.org/W4285212114","https://openalex.org/W4285231429","https://openalex.org/W4285291244","https://openalex.org/W4293704646","https://openalex.org/W4311081064","https://openalex.org/W4312543987","https://openalex.org/W4313149364","https://openalex.org/W4313406111","https://openalex.org/W4367665438","https://openalex.org/W4368232621","https://openalex.org/W4382468020","https://openalex.org/W4385154266","https://openalex.org/W4386265488","https://openalex.org/W4387682116","https://openalex.org/W4391758729","https://openalex.org/W4398240059","https://openalex.org/W4399618667","https://openalex.org/W4400679715","https://openalex.org/W6632414769"],"related_works":["https://openalex.org/W2294565841","https://openalex.org/W3204276839","https://openalex.org/W2140798747","https://openalex.org/W4229671472","https://openalex.org/W2513792068","https://openalex.org/W2948169060","https://openalex.org/W2519522639","https://openalex.org/W4293469093","https://openalex.org/W1837027913","https://openalex.org/W4312674866"],"abstract_inverted_index":{"For":[0],"wearable":[1,85,151],"devices":[2],"with":[3,113],"constrained":[4],"computational":[5],"resources,":[6],"it":[7],"is":[8,51,96],"typically":[9],"required":[10],"to":[11,15,24,30,98,111,142],"offload":[12],"processing":[13],"tasks":[14],"more":[16],"capable":[17],"servers.":[18],"However,":[19,105],"this":[20],"practice":[21],"introduces":[22],"vulnerabilities":[23],"data":[25,63,148],"confidentiality":[26],"and":[27,37,48,61,78,145,158,167],"integrity":[28],"due":[29],"potential":[31],"malicious":[32],"network":[33],"attacks,":[34],"unreliable":[35],"servers,":[36],"insecure":[38],"communication":[39,125],"channels.":[40],"A":[41],"robust":[42],"mechanism":[43],"that":[44],"ensures":[45],"anonymous":[46,74],"authentication":[47,75,144],"key":[49,76],"agreement":[50,77],"therefore":[52],"imperative":[53],"for":[54,84],"safeguarding":[55],"the":[56,91,118,160],"authenticity":[57,114],"of":[58,93,102,120],"computing":[59],"entities":[60],"securing":[62],"during":[64,147],"transmission.":[65],"Recently,":[66],"Guo":[67],"<italic":[68],"xmlns:mml=\"http://www.w3.org/1998/Math/MathML\"":[69],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">et":[70],"al.</i>":[71],"proposed":[72,161],"an":[73,132],"group":[79],"proof":[80],"protocol":[81,109,135,162],"specifically":[82],"designed":[83,97],"devices.":[86,152],"This":[87],"protocol,":[88],"benefiting":[89],"from":[90],"strengths":[92],"previous":[94],"research,":[95],"thwart":[99],"a":[100,170],"variety":[101],"cyber":[103],"threats.":[104],"inaccuracies":[106],"in":[107,150],"their":[108],"lead":[110],"issues":[112],"verification,":[115],"ultimately":[116],"preventing":[117],"establishment":[119],"secure":[121],"session":[122],"keys":[123],"between":[124],"entities.":[126],"To":[127],"address":[128],"these":[129],"design":[130],"flaws,":[131],"improved":[133],"ultra-lightweight":[134],"was":[136],"proposed,":[137],"employing":[138],"cryptographic":[139],"hash":[140],"functions":[141],"ensure":[143],"privacy":[146],"transmission":[149],"Supported":[153],"by":[154],"rigorous":[155],"security":[156,166],"validations":[157],"analyses,":[159],"significantly":[163],"boosts":[164],"both":[165],"efficiency,":[168],"marking":[169],"substantial":[171],"advancement":[172],"over":[173],"prior":[174],"methodologies.":[175]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":6}],"updated_date":"2026-03-07T16:01:11.037858","created_date":"2025-10-10T00:00:00"}
