{"id":"https://openalex.org/W4414070041","doi":"https://doi.org/10.32604/cmc.2025.067641","title":"LSAP-IoHT: Lightweight Secure Authentication Protocol for the Internet of Healthcare Things","display_name":"LSAP-IoHT: Lightweight Secure Authentication Protocol for the Internet of Healthcare Things","publication_year":2025,"publication_date":"2025-01-01","ids":{"openalex":"https://openalex.org/W4414070041","doi":"https://doi.org/10.32604/cmc.2025.067641"},"language":"en","primary_location":{"id":"doi:10.32604/cmc.2025.067641","is_oa":true,"landing_page_url":"https://doi.org/10.32604/cmc.2025.067641","pdf_url":null,"source":{"id":"https://openalex.org/S4210191605","display_name":"Computers, materials & continua/Computers, materials & continua (Print)","issn_l":"1546-2218","issn":["1546-2218","1546-2226"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Computers, Materials &amp; Continua","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"diamond","oa_url":"https://doi.org/10.32604/cmc.2025.067641","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5079215353","display_name":"Marwa Ahmim","orcid":"https://orcid.org/0000-0003-3983-9711"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Marwa Ahmim","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5119571819","display_name":"Nour Ouafi","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Nour Ouafi","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5118267303","display_name":"Insaf Ullah","orcid":"https://orcid.org/0009-0008-7095-3831"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Insaf Ullah","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5067011495","display_name":"Ahmed Ahmim","orcid":"https://orcid.org/0000-0001-5519-8868"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Ahmed Ahmim","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5084433229","display_name":"Djalel Chefrour","orcid":"https://orcid.org/0000-0001-7931-2354"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Djalel Chefrour","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"last","author":{"id":"https://openalex.org/A5088422973","display_name":"Reham Almukhlifi","orcid":"https://orcid.org/0000-0002-7041-6461"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Reham Almukhlifi","raw_affiliation_strings":[],"affiliations":[]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5079215353"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":1.6666,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.88137439,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":97,"max":99},"biblio":{"volume":"85","issue":"3","first_page":"5093","last_page":"5116"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.8400999903678894,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.8400999903678894,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10273","display_name":"IoT and Edge/Fog Computing","score":0.7876999974250793,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11932","display_name":"Wireless Body Area Networks","score":0.7074999809265137,"subfield":{"id":"https://openalex.org/subfields/2204","display_name":"Biomedical Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.5698000192642212},{"id":"https://openalex.org/keywords/authentication-protocol","display_name":"Authentication protocol","score":0.5565000176429749},{"id":"https://openalex.org/keywords/replay-attack","display_name":"Replay attack","score":0.5098999738693237},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.4569999873638153},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.4408000111579895},{"id":"https://openalex.org/keywords/insider","display_name":"Insider","score":0.41920000314712524},{"id":"https://openalex.org/keywords/protocol","display_name":"Protocol (science)","score":0.4027999937534332},{"id":"https://openalex.org/keywords/anonymity","display_name":"Anonymity","score":0.39590001106262207},{"id":"https://openalex.org/keywords/confidentiality","display_name":"Confidentiality","score":0.3939000070095062},{"id":"https://openalex.org/keywords/cryptographic-protocol","display_name":"Cryptographic protocol","score":0.3939000070095062}],"concepts":[{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.7906000018119812},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6711000204086304},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.5698000192642212},{"id":"https://openalex.org/C21564112","wikidata":"https://www.wikidata.org/wiki/Q4825885","display_name":"Authentication protocol","level":3,"score":0.5565000176429749},{"id":"https://openalex.org/C11560541","wikidata":"https://www.wikidata.org/wiki/Q1756025","display_name":"Replay attack","level":3,"score":0.5098999738693237},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.49390000104904175},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.4569999873638153},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.4408000111579895},{"id":"https://openalex.org/C2778971194","wikidata":"https://www.wikidata.org/wiki/Q1664551","display_name":"Insider","level":2,"score":0.41920000314712524},{"id":"https://openalex.org/C2780385302","wikidata":"https://www.wikidata.org/wiki/Q367158","display_name":"Protocol (science)","level":3,"score":0.4027999937534332},{"id":"https://openalex.org/C178005623","wikidata":"https://www.wikidata.org/wiki/Q308859","display_name":"Anonymity","level":2,"score":0.39590001106262207},{"id":"https://openalex.org/C33884865","wikidata":"https://www.wikidata.org/wiki/Q1254335","display_name":"Cryptographic protocol","level":3,"score":0.3939000070095062},{"id":"https://openalex.org/C71745522","wikidata":"https://www.wikidata.org/wiki/Q2476929","display_name":"Confidentiality","level":2,"score":0.3939000070095062},{"id":"https://openalex.org/C38369872","wikidata":"https://www.wikidata.org/wiki/Q7445009","display_name":"Security analysis","level":2,"score":0.36329999566078186},{"id":"https://openalex.org/C22111027","wikidata":"https://www.wikidata.org/wiki/Q1070427","display_name":"Internet security","level":4,"score":0.359499990940094},{"id":"https://openalex.org/C160735492","wikidata":"https://www.wikidata.org/wiki/Q31207","display_name":"Health care","level":2,"score":0.34310001134872437},{"id":"https://openalex.org/C167615521","wikidata":"https://www.wikidata.org/wiki/Q1048911","display_name":"Elliptic curve cryptography","level":4,"score":0.3179999887943268},{"id":"https://openalex.org/C41065033","wikidata":"https://www.wikidata.org/wiki/Q2825412","display_name":"Adversary","level":2,"score":0.31369999051094055},{"id":"https://openalex.org/C81860439","wikidata":"https://www.wikidata.org/wiki/Q251212","display_name":"Internet of Things","level":2,"score":0.3073999881744385},{"id":"https://openalex.org/C105339364","wikidata":"https://www.wikidata.org/wiki/Q2297740","display_name":"Software deployment","level":2,"score":0.30000001192092896},{"id":"https://openalex.org/C522325796","wikidata":"https://www.wikidata.org/wiki/Q471880","display_name":"Identity theft","level":2,"score":0.2808000147342682},{"id":"https://openalex.org/C83860907","wikidata":"https://www.wikidata.org/wiki/Q135005","display_name":"Phishing","level":3,"score":0.273499995470047},{"id":"https://openalex.org/C2778355321","wikidata":"https://www.wikidata.org/wiki/Q17079427","display_name":"Identity (music)","level":2,"score":0.27160000801086426},{"id":"https://openalex.org/C140547941","wikidata":"https://www.wikidata.org/wiki/Q7797194","display_name":"Threat model","level":2,"score":0.2651999890804291},{"id":"https://openalex.org/C207828512","wikidata":"https://www.wikidata.org/wiki/Q1060131","display_name":"Challenge-Handshake Authentication Protocol","level":4,"score":0.26190000772476196},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.26019999384880066},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.2587999999523163},{"id":"https://openalex.org/C131129157","wikidata":"https://www.wikidata.org/wiki/Q1059963","display_name":"Challenge\u2013response authentication","level":4,"score":0.2565999925136566},{"id":"https://openalex.org/C2781221063","wikidata":"https://www.wikidata.org/wiki/Q6944186","display_name":"Mutual authentication","level":3,"score":0.2556000053882599},{"id":"https://openalex.org/C204222849","wikidata":"https://www.wikidata.org/wiki/Q104954","display_name":"Radio-frequency identification","level":2,"score":0.2547999918460846},{"id":"https://openalex.org/C9996903","wikidata":"https://www.wikidata.org/wiki/Q1749235","display_name":"Cryptographic nonce","level":3,"score":0.2533999979496002}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.32604/cmc.2025.067641","is_oa":true,"landing_page_url":"https://doi.org/10.32604/cmc.2025.067641","pdf_url":null,"source":{"id":"https://openalex.org/S4210191605","display_name":"Computers, materials & continua/Computers, materials & continua (Print)","issn_l":"1546-2218","issn":["1546-2218","1546-2226"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Computers, Materials &amp; Continua","raw_type":"journal-article"}],"best_oa_location":{"id":"doi:10.32604/cmc.2025.067641","is_oa":true,"landing_page_url":"https://doi.org/10.32604/cmc.2025.067641","pdf_url":null,"source":{"id":"https://openalex.org/S4210191605","display_name":"Computers, materials & continua/Computers, materials & continua (Print)","issn_l":"1546-2218","issn":["1546-2218","1546-2226"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Computers, Materials &amp; Continua","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":26,"referenced_works":["https://openalex.org/W590625283","https://openalex.org/W2029693536","https://openalex.org/W2748361805","https://openalex.org/W2749503685","https://openalex.org/W2901425569","https://openalex.org/W2915099783","https://openalex.org/W2923796516","https://openalex.org/W2948014426","https://openalex.org/W2948287656","https://openalex.org/W2970575882","https://openalex.org/W4205553398","https://openalex.org/W4225270244","https://openalex.org/W4229050425","https://openalex.org/W4286208748","https://openalex.org/W4291900448","https://openalex.org/W4297899700","https://openalex.org/W4317398999","https://openalex.org/W4318014836","https://openalex.org/W4322742975","https://openalex.org/W4380631641","https://openalex.org/W4386219768","https://openalex.org/W4387682116","https://openalex.org/W4388274259","https://openalex.org/W4388830376","https://openalex.org/W4398174228","https://openalex.org/W4401109663"],"related_works":["https://openalex.org/W2034419863","https://openalex.org/W2296396257","https://openalex.org/W3007106793","https://openalex.org/W2132505069","https://openalex.org/W2054202867","https://openalex.org/W1965515427","https://openalex.org/W2116285675","https://openalex.org/W2109882692","https://openalex.org/W2547137208","https://openalex.org/W2061637199"],"abstract_inverted_index":{"The":[0,187],"Internet":[1,104,147],"of":[2,18,28,35,52,73,81,93,105,148],"Healthcare":[3,106,149],"Things":[4,107,150],"(IoHT)":[5],"marks":[6],"a":[7,15,42,139],"significant":[8],"breakthrough":[9],"in":[10,103,114],"modern":[11],"medicine":[12],"by":[13],"enabling":[14],"new":[16],"era":[17],"healthcare":[19],"services.":[20],"IoHT":[21,40],"supports":[22],"real-time,":[23],"continuous,":[24],"and":[25,49,69,79,128,141,163,175,182,204,211],"personalized":[26],"monitoring":[27],"patients\u2019":[29],"health":[30],"conditions.":[31],"However,":[32],"the":[33,46,77,115,146,179,183],"security":[34,91,168],"sensitive":[36],"data":[37,67,70],"exchanged":[38],"within":[39],"remains":[41],"major":[43],"concern,":[44],"as":[45],"widespread":[47],"connectivity":[48],"wireless":[50],"nature":[51],"these":[53,134],"systems":[54],"expose":[55],"them":[56],"to":[57,99,121],"various":[58,123],"vulnerabilities.":[59],"Potential":[60],"threats":[61],"include":[62],"unauthorized":[63],"access,":[64],"device":[65,202],"compromise,":[66],"breaches,":[68],"alteration,":[71],"all":[72],"which":[74],"may":[75],"compromise":[76],"confidentiality":[78],"integrity":[80],"patient":[82],"information.":[83],"In":[84],"this":[85],"paper,":[86],"we":[87,136],"provide":[88],"an":[89,95],"in-depth":[90],"analysis":[92,110,174],"LAP-IoHT,":[94],"authentication":[96,143],"scheme":[97],"designed":[98],"ensure":[100],"secure":[101,140],"communication":[102,212],"environments.":[108],"This":[109,152],"reveals":[111],"several":[112],"vulnerabilities":[113],"LAP-IoHT":[116],"protocol,":[117],"namely":[118],"its":[119],"inability":[120],"resist":[122],"attacks,":[124,195,197,203],"including":[125],"user":[126],"impersonation":[127],"privileged":[129],"insider":[130,205],"threats.":[131],"To":[132],"address":[133],"issues,":[135],"introduce":[137],"LSAP-IoHT,":[138],"lightweight":[142],"protocol":[144,153],"for":[145],"(IoHT).":[151],"leverages":[154],"Elliptic":[155],"Curve":[156],"Cryptography":[157],"(ECC),":[158],"Physical":[159],"Unclonable":[160],"Functions":[161],"(PUFs),":[162],"Three-Factor":[164],"Authentication":[165],"(3FA).":[166],"Its":[167],"is":[169],"validated":[170],"through":[171],"both":[172],"informal":[173],"formal":[176],"verification":[177],"using":[178],"Scyther":[180],"tool":[181],"Real-Or-Random":[184],"(ROR)":[185],"model.":[186],"results":[188],"demonstrate":[189],"strong":[190],"resistance":[191],"against":[192],"man-in-the-middle":[193],"(MITM)":[194],"replay":[196],"identity":[198],"spoofing,":[199],"stolen":[200],"smart":[201],"threats,":[206],"while":[207],"maintaining":[208],"low":[209],"computational":[210],"costs.":[213]},"counts_by_year":[{"year":2026,"cited_by_count":1}],"updated_date":"2026-03-07T16:01:11.037858","created_date":"2025-10-10T00:00:00"}
