{"id":"https://openalex.org/W7141576234","doi":"https://doi.org/10.1504/ijahuc.2026.152540","title":"Lightweight and resilient blockchain-enabled mutual authentication and key establishment protocol for smart health devices in IoMT","display_name":"Lightweight and resilient blockchain-enabled mutual authentication and key establishment protocol for smart health devices in IoMT","publication_year":2026,"publication_date":"2026-01-01","ids":{"openalex":"https://openalex.org/W7141576234","doi":"https://doi.org/10.1504/ijahuc.2026.152540"},"language":"en","primary_location":{"id":"doi:10.1504/ijahuc.2026.152540","is_oa":false,"landing_page_url":"https://doi.org/10.1504/ijahuc.2026.152540","pdf_url":null,"source":{"id":"https://openalex.org/S97070762","display_name":"International Journal of Ad Hoc and Ubiquitous Computing","issn_l":"1743-8225","issn":["1743-8225","1743-8233"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Ad Hoc and Ubiquitous Computing","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5030199602","display_name":"Rachida Hireche","orcid":null},"institutions":[{"id":"https://openalex.org/I40193446","display_name":"University Ferhat Abbas of Setif","ror":"https://ror.org/02rzqza52","country_code":"DZ","type":"education","lineage":["https://openalex.org/I40193446"]}],"countries":["DZ"],"is_corresponding":true,"raw_author_name":"Rachida Hireche","raw_affiliation_strings":["LRSD Laboratory, Ferhat Abbas University Setif 1, Setif, Algeria"],"affiliations":[{"raw_affiliation_string":"LRSD Laboratory, Ferhat Abbas University Setif 1, Setif, Algeria","institution_ids":["https://openalex.org/I40193446"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5060291905","display_name":"Houssem Mansouri","orcid":null},"institutions":[{"id":"https://openalex.org/I40193446","display_name":"University Ferhat Abbas of Setif","ror":"https://ror.org/02rzqza52","country_code":"DZ","type":"education","lineage":["https://openalex.org/I40193446"]}],"countries":["DZ"],"is_corresponding":false,"raw_author_name":"Houssem Mansouri","raw_affiliation_strings":["LRSD Laboratory, Ferhat Abbas University Setif 1, Setif, Algeria"],"affiliations":[{"raw_affiliation_string":"LRSD Laboratory, Ferhat Abbas University Setif 1, Setif, Algeria","institution_ids":["https://openalex.org/I40193446"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5005025214","display_name":"Yasmine Harbi","orcid":"https://orcid.org/0000-0001-6731-7895"},"institutions":[{"id":"https://openalex.org/I40193446","display_name":"University Ferhat Abbas of Setif","ror":"https://ror.org/02rzqza52","country_code":"DZ","type":"education","lineage":["https://openalex.org/I40193446"]}],"countries":["DZ"],"is_corresponding":false,"raw_author_name":"Yasmine Harbi","raw_affiliation_strings":["LRSD Laboratory, Ferhat Abbas University Setif 1, Setif, Algeria"],"affiliations":[{"raw_affiliation_string":"LRSD Laboratory, Ferhat Abbas University Setif 1, Setif, Algeria","institution_ids":["https://openalex.org/I40193446"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5125328775","display_name":"Al Sakib Khan Pathan","orcid":null},"institutions":[{"id":"https://openalex.org/I63169043","display_name":"United International University","ror":"https://ror.org/01tqv1p28","country_code":"BD","type":"education","lineage":["https://openalex.org/I63169043"]}],"countries":["BD"],"is_corresponding":false,"raw_author_name":"Al Sakib Khan Pathan","raw_affiliation_strings":["Department of Computer Science and Engineering, United International University, Dhaka, 1212, Bangladesh"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Engineering, United International University, Dhaka, 1212, Bangladesh","institution_ids":["https://openalex.org/I63169043"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5030199602"],"corresponding_institution_ids":["https://openalex.org/I40193446"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.94521489,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":null,"biblio":{"volume":"51","issue":"3","first_page":"159","last_page":"187"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.6789000034332275,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.6789000034332275,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":0.1501999944448471,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.034299999475479126,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/mutual-authentication","display_name":"Mutual authentication","score":0.6977999806404114},{"id":"https://openalex.org/keywords/key-management","display_name":"Key management","score":0.58160001039505},{"id":"https://openalex.org/keywords/scalability","display_name":"Scalability","score":0.5318999886512756},{"id":"https://openalex.org/keywords/hash-function","display_name":"Hash function","score":0.4754999876022339},{"id":"https://openalex.org/keywords/cryptographic-protocol","display_name":"Cryptographic protocol","score":0.46380001306533813},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.45899999141693115},{"id":"https://openalex.org/keywords/protocol","display_name":"Protocol (science)","score":0.4555000066757202},{"id":"https://openalex.org/keywords/authentication-protocol","display_name":"Authentication protocol","score":0.4449000060558319},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.42719998955726624},{"id":"https://openalex.org/keywords/security-analysis","display_name":"Security analysis","score":0.424699991941452}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8755000233650208},{"id":"https://openalex.org/C2781221063","wikidata":"https://www.wikidata.org/wiki/Q6944186","display_name":"Mutual authentication","level":3,"score":0.6977999806404114},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.5931000113487244},{"id":"https://openalex.org/C17886624","wikidata":"https://www.wikidata.org/wiki/Q1320561","display_name":"Key management","level":3,"score":0.58160001039505},{"id":"https://openalex.org/C48044578","wikidata":"https://www.wikidata.org/wiki/Q727490","display_name":"Scalability","level":2,"score":0.5318999886512756},{"id":"https://openalex.org/C99138194","wikidata":"https://www.wikidata.org/wiki/Q183427","display_name":"Hash function","level":2,"score":0.4754999876022339},{"id":"https://openalex.org/C33884865","wikidata":"https://www.wikidata.org/wiki/Q1254335","display_name":"Cryptographic protocol","level":3,"score":0.46380001306533813},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.45899999141693115},{"id":"https://openalex.org/C2780385302","wikidata":"https://www.wikidata.org/wiki/Q367158","display_name":"Protocol (science)","level":3,"score":0.4555000066757202},{"id":"https://openalex.org/C21564112","wikidata":"https://www.wikidata.org/wiki/Q4825885","display_name":"Authentication protocol","level":3,"score":0.4449000060558319},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.44209998846054077},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.42719998955726624},{"id":"https://openalex.org/C38369872","wikidata":"https://www.wikidata.org/wiki/Q7445009","display_name":"Security analysis","level":2,"score":0.424699991941452},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.39980000257492065},{"id":"https://openalex.org/C135530808","wikidata":"https://www.wikidata.org/wiki/Q3306713","display_name":"Key-agreement protocol","level":5,"score":0.39649999141693115},{"id":"https://openalex.org/C167615521","wikidata":"https://www.wikidata.org/wiki/Q1048911","display_name":"Elliptic curve cryptography","level":4,"score":0.37610000371932983},{"id":"https://openalex.org/C2775892892","wikidata":"https://www.wikidata.org/wiki/Q6509517","display_name":"Revocation","level":3,"score":0.3707999885082245},{"id":"https://openalex.org/C155527597","wikidata":"https://www.wikidata.org/wiki/Q1727777","display_name":"Signcryption","level":4,"score":0.3409000039100647},{"id":"https://openalex.org/C43214815","wikidata":"https://www.wikidata.org/wiki/Q7310987","display_name":"Reliability (semiconductor)","level":3,"score":0.3400999903678894},{"id":"https://openalex.org/C46637626","wikidata":"https://www.wikidata.org/wiki/Q6693015","display_name":"Low latency (capital markets)","level":2,"score":0.33980000019073486},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.33660000562667847},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.3303000032901764},{"id":"https://openalex.org/C109297577","wikidata":"https://www.wikidata.org/wiki/Q161157","display_name":"Password","level":2,"score":0.3239000141620636},{"id":"https://openalex.org/C7608002","wikidata":"https://www.wikidata.org/wiki/Q477202","display_name":"Cryptographic hash function","level":3,"score":0.32170000672340393},{"id":"https://openalex.org/C65302260","wikidata":"https://www.wikidata.org/wiki/Q327675","display_name":"Symmetric-key algorithm","level":4,"score":0.3149999976158142},{"id":"https://openalex.org/C82876162","wikidata":"https://www.wikidata.org/wiki/Q17096504","display_name":"Latency (audio)","level":2,"score":0.31290000677108765},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.31049999594688416},{"id":"https://openalex.org/C9661340","wikidata":"https://www.wikidata.org/wiki/Q257799","display_name":"Secure Hash Algorithm","level":5,"score":0.3084999918937683},{"id":"https://openalex.org/C24590314","wikidata":"https://www.wikidata.org/wiki/Q336038","display_name":"Wireless sensor network","level":2,"score":0.3028999865055084},{"id":"https://openalex.org/C104954878","wikidata":"https://www.wikidata.org/wiki/Q1648707","display_name":"Routing protocol","level":3,"score":0.29739999771118164},{"id":"https://openalex.org/C100485629","wikidata":"https://www.wikidata.org/wiki/Q1669397","display_name":"Hash-based message authentication code","level":4,"score":0.29670000076293945},{"id":"https://openalex.org/C99674996","wikidata":"https://www.wikidata.org/wiki/Q1414155","display_name":"Key exchange","level":4,"score":0.2912999987602234},{"id":"https://openalex.org/C39217717","wikidata":"https://www.wikidata.org/wiki/Q1432354","display_name":"Hardware security module","level":3,"score":0.2888999879360199},{"id":"https://openalex.org/C15927051","wikidata":"https://www.wikidata.org/wiki/Q246593","display_name":"Cryptographic primitive","level":4,"score":0.2784000039100647},{"id":"https://openalex.org/C12269588","wikidata":"https://www.wikidata.org/wiki/Q132364","display_name":"Communications protocol","level":2,"score":0.26930001378059387},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.26840001344680786},{"id":"https://openalex.org/C141492731","wikidata":"https://www.wikidata.org/wiki/Q1052621","display_name":"Message authentication code","level":3,"score":0.26440000534057617},{"id":"https://openalex.org/C110406131","wikidata":"https://www.wikidata.org/wiki/Q41349","display_name":"Smart card","level":2,"score":0.26350000500679016},{"id":"https://openalex.org/C93996380","wikidata":"https://www.wikidata.org/wiki/Q44127","display_name":"Server","level":2,"score":0.2565999925136566},{"id":"https://openalex.org/C186967261","wikidata":"https://www.wikidata.org/wiki/Q5082128","display_name":"Mobile device","level":2,"score":0.25589999556541443}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1504/ijahuc.2026.152540","is_oa":false,"landing_page_url":"https://doi.org/10.1504/ijahuc.2026.152540","pdf_url":null,"source":{"id":"https://openalex.org/S97070762","display_name":"International Journal of Ad Hoc and Ubiquitous Computing","issn_l":"1743-8225","issn":["1743-8225","1743-8233"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Ad Hoc and Ubiquitous Computing","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/10","score":0.5386355519294739,"display_name":"Reduced inequalities"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":[],"abstract_inverted_index":{"Rapid":[0],"expansion":[1],"of":[2,56,136],"wireless":[3],"body":[4],"area":[5],"networks":[6],"(WBANs)":[7],"has":[8],"advanced":[9],"the":[10,53,65,100,114],"healthcare":[11],"services.":[12],"However,":[13],"open":[14],"communication":[15],"channels":[16],"pose":[17],"significant":[18],"security":[19,139],"challenges.":[20],"This":[21],"study":[22],"presents":[23],"a":[24],"lightweight":[25,90],"mutual":[26],"authentication":[27],"and":[28,43,77,89,99,117,124,138,145],"key":[29],"agreement":[30],"protocol":[31],"for":[32],"blockchain-enabled":[33],"internet-of-medical-things":[34],"(IoMT)":[35],"systems.":[36],"The":[37],"scheme":[38],"integrates":[39],"biometric-based":[40],"sensor":[41],"management":[42],"employs":[44],"smart":[45],"contracts":[46],"with":[47,63,130],"system":[48],"revocation":[49],"lists":[50],"to":[51,106],"ensure":[52],"timely":[54],"exclusion":[55],"compromised":[57],"entities.":[58],"By":[59],"combining":[60],"fog":[61],"computing":[62],"blockchain,":[64],"framework":[66],"offloads":[67],"intensive":[68],"computations":[69],"from":[70],"IoMT":[71],"devices,":[72],"thereby":[73],"enhancing":[74],"their":[75],"scalability":[76],"efficiency.":[78],"Security":[79],"is":[80],"strengthened":[81],"through":[82],"elliptic":[83],"curve":[84],"cryptography,":[85],"cryptographic":[86],"hash":[87],"functions,":[88],"primitives,":[91],"while":[92],"formal":[93],"validation":[94],"using":[95,113,119],"Burrows-Abadi-Needham":[96],"(BAN)":[97],"logic":[98],"automated-validation-of-internet-security":[101],"(AVISPA)":[102],"tools":[103],"confirms":[104],"resistance":[105],"adversarial":[107],"attacks.":[108],"Moreover,":[109],"it":[110],"was":[111],"implemented":[112],"Ethereum":[115],"platform":[116],"evaluated":[118],"Hyperledger-Caliper,":[120],"demonstrating":[121],"lower":[122],"latency":[123],"higher":[125],"throughput.":[126],"A":[127],"comparative":[128],"analysis":[129],"relevant":[131],"recent":[132],"works":[133],"in":[134],"terms":[135],"performance":[137],"requirements":[140],"also":[141],"proves":[142],"its":[143],"reliability":[144],"robustness.":[146]},"counts_by_year":[],"updated_date":"2026-03-29T06:01:01.467347","created_date":"2026-03-28T00:00:00"}
