{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,14]],"date-time":"2026-03-14T23:20:28Z","timestamp":1773530428294,"version":"3.50.1"},"reference-count":71,"publisher":"Springer Science and Business Media LLC","issue":"5","license":[{"start":{"date-parts":[[2021,5,3]],"date-time":"2021-05-03T00:00:00Z","timestamp":1620000000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2021,5,3]],"date-time":"2021-05-03T00:00:00Z","timestamp":1620000000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Peer-to-Peer Netw. Appl."],"published-print":{"date-parts":[[2021,9]]},"DOI":"10.1007\/s12083-021-01162-x","type":"journal-article","created":{"date-parts":[[2021,5,3]],"date-time":"2021-05-03T10:02:58Z","timestamp":1620036178000},"page":"3043-3057","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":78,"title":["A robust and lightweight secure access scheme for cloud based E-healthcare services"],"prefix":"10.1007","volume":"14","author":[{"given":"Mehedi","family":"Masud","sequence":"first","affiliation":[]},{"given":"Gurjot Singh","family":"Gaba","sequence":"additional","affiliation":[]},{"given":"Karanjeet","family":"Choudhary","sequence":"additional","affiliation":[]},{"given":"Roobaea","family":"Alroobaea","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5906-9422","authenticated-orcid":false,"given":"M. Shamim","family":"Hossain","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,5,3]]},"reference":[{"issue":"3","key":"1162_CR1","doi-asserted-by":"publisher","first-page":"e35","DOI":"10.2196\/medinform.7958","volume":"5","author":"CS Kruse","year":"2017","unstructured":"Kruse CS, Mileski M, Vijaykumar AG, Viswanathan SV, Suskandla U, Chidambaram Y (2017) Impact of electronic health records on long-term care facilities: systematic review. JMIR Med Informa 5(3):e35","journal-title":"JMIR Med Informa"},{"issue":"4","key":"1162_CR2","doi-asserted-by":"publisher","first-page":"2399","DOI":"10.1109\/JIOT.2017.2772959","volume":"5","author":"MS Hossain","year":"2018","unstructured":"Hossain MS, Muhammad G (2018) Emotion-aware connected healthcare big data towards 5g. IEEE Internet of Things Journal 5(4):2399\u20132406","journal-title":"IEEE Internet of Things Journal"},{"issue":"3","key":"1162_CR3","doi-asserted-by":"publisher","first-page":"58","DOI":"10.1109\/MNET.2019.1800344","volume":"33","author":"Y Zhang","year":"2019","unstructured":"Zhang Y, et al. (2019) Edge intelligence in the cognitive internet of things: Improving sensitivity and interactivity. IEEE Netw 33(3):58\u201364","journal-title":"IEEE Netw"},{"key":"1162_CR4","doi-asserted-by":"crossref","unstructured":"Azfar A, Choo K-KR, Liu L (2016) An android social app forensics adversary model. In: 2016 49th Hawaii International Conference on System Sciences (HICSS). IEEE, pp 5597\u20135606","DOI":"10.1109\/HICSS.2016.693"},{"issue":"4","key":"1162_CR5","doi-asserted-by":"publisher","first-page":"33","DOI":"10.1109\/MCOM.2018.1700817","volume":"56","author":"A Ghoneim","year":"2018","unstructured":"Ghoneim A, Muhammad G, Amin SU, Gupta B (2018) Medical image forgery detection for smart healthcare. IEEE Commun Mag 56(4):33\u201337","journal-title":"IEEE Commun Mag"},{"key":"1162_CR6","doi-asserted-by":"publisher","first-page":"114","DOI":"10.1016\/j.comcom.2021.01.010","volume":"169","author":"GS Gaba","year":"2021","unstructured":"Gaba GS, Kumar G, Kim T-H, Monga H, Kumar P (2021) Secure device-to-device communications for 5g enabled internet of things applications. Comput Commun 169:114\u2013128","journal-title":"Comput Commun"},{"issue":"11","key":"1162_CR7","doi-asserted-by":"publisher","first-page":"14","DOI":"10.1109\/MCOM.2018.1700571","volume":"56","author":"M Chen","year":"2018","unstructured":"Chen M et al (2018) Urban Healthcare Big Data System Based on Crowdsourced and Cloud-Based Air Quality Indicators. IEEE Commun Mag 56(11):14\u201320","journal-title":"IEEE Commun Mag"},{"key":"1162_CR8","doi-asserted-by":"publisher","first-page":"132808","DOI":"10.1109\/ACCESS.2020.3010302","volume":"8","author":"GS Gaba","year":"2020","unstructured":"Gaba GS, Kumar G, Monga H, Kim T-H, Liyanage M, Kumar P (2020) Robust and lightweight key exchange (lke) protocol for industry 4.0. IEEE Access 8:132808\u2013132824","journal-title":"IEEE Access"},{"issue":"18","key":"1162_CR9","doi-asserted-by":"publisher","first-page":"5166","DOI":"10.3390\/s20185166","volume":"20","author":"K Choudhary","year":"2020","unstructured":"Choudhary K, Gaba GS, Butun I, Kumar P (2020) Make-it\u2014a lightweight mutual authentication and key exchange protocol for industrial internet of things. Sensors 20(18):5166","journal-title":"Sensors"},{"issue":"10","key":"1162_CR10","doi-asserted-by":"publisher","first-page":"1787","DOI":"10.1109\/TMM.2015.2463226","volume":"17","author":"W Min","year":"2015","unstructured":"Min W, et al. (2015) Cross-platform multi-modal topic modeling for personalized inter-platform recommendation. IEEE Trans Multimed 17(10):1787\u20131801","journal-title":"IEEE Trans Multimed"},{"key":"1162_CR11","doi-asserted-by":"crossref","unstructured":"Stergiou CL, Psannis KE, Gupta B (2020) Iot-based big data secure management in the fog over a 6g wireless network. IEEE Internet of Things Journal","DOI":"10.1109\/JIOT.2020.3033131"},{"key":"1162_CR12","doi-asserted-by":"publisher","first-page":"711","DOI":"10.1109\/ACCESS.2017.2775038","volume":"6","author":"Q Zheng","year":"2017","unstructured":"Zheng Q, Wang X, Khan MK, Zhang W, Gupta BB, Guo W (2017) A lightweight authenticated encryption scheme based on chaotic scml for railway cloud service. IEEE Access 6:711\u2013722","journal-title":"IEEE Access"},{"issue":"6","key":"1162_CR13","doi-asserted-by":"publisher","first-page":"677","DOI":"10.1007\/s00779-011-0434-9","volume":"16","author":"K Han","year":"2012","unstructured":"Han K, Mun H, Shon T, Yeun CY, Park JJJH (2012) Secure and efficient public key management in next generation mobile networks. Pers Ubiquit Comput 16(6):677\u2013685","journal-title":"Pers Ubiquit Comput"},{"key":"1162_CR14","doi-asserted-by":"crossref","unstructured":"Hiremath S, Yang G, Mankodiya K (2014) Wearable internet of things Concept, architectural components and promises for person-centered healthcare. In: 2014 4th international conference on wireless mobile communication and healthcare-transforming healthcare through innovations in mobile and wireless technologies (MOBIHEALTH). IEEE, pp 304\u2013307","DOI":"10.4108\/icst.mobihealth.2014.257440"},{"key":"1162_CR15","doi-asserted-by":"publisher","first-page":"852","DOI":"10.1016\/j.chb.2014.11.061","volume":"51","author":"A Alelaiwi","year":"2015","unstructured":"Alelaiwi A et al (2015) Enhanced engineering education using smart class environment. Comput Human Behav 51:852\u2013856","journal-title":"Comput Human Behav"},{"issue":"6","key":"1162_CR16","doi-asserted-by":"publisher","first-page":"1015","DOI":"10.1109\/TITB.2012.2202244","volume":"16","author":"M Masud","year":"2012","unstructured":"Masud M, et al. (2012) Data interoperability and multimedia content management in e-health systems. IEEE Trans Inf Technol Biomed 16(6):1015\u20131023","journal-title":"IEEE Trans Inf Technol Biomed"},{"issue":"4","key":"1162_CR17","doi-asserted-by":"publisher","first-page":"1431","DOI":"10.1109\/JBHI.2014.2300846","volume":"18","author":"A Abbas","year":"2014","unstructured":"Abbas A, Khan SU (2014) A review on the state-of-the-art privacy-preserving approaches in the e-health clouds. IEEE J Biomed Health Inform 18(4):1431\u20131441","journal-title":"IEEE J Biomed Health Inform"},{"issue":"1","key":"1162_CR18","doi-asserted-by":"publisher","first-page":"118","DOI":"10.1109\/JSYST.2015.2470644","volume":"11","author":"MS Hossain","year":"2017","unstructured":"Hossain MS (2017) Cloud-supported cyber\u2013physical localization framework for patients monitoring. IEEE Syst J 11(1):118\u2013127","journal-title":"IEEE Syst J"},{"key":"1162_CR19","doi-asserted-by":"crossref","unstructured":"Masud M, Gaba GS, Alqahtani S, Muhammad G, Gupta BB, Kumar P, Ghoneim A (2020) A lightweight and robust secure key establishment protocol for internet of medical things in covid-19 patients care. IEEE Internet of Things Journal","DOI":"10.1109\/JIOT.2020.3047662"},{"key":"1162_CR20","doi-asserted-by":"publisher","first-page":"1624","DOI":"10.1007\/s11036-018-1113-0","volume":"23","author":"M Alhussein","year":"2018","unstructured":"Alhussein M, et al. (2018) Cognitive iot-cloud integration for smart healthcare: Case study for epileptic seizure detection and monitoring. Mobile Netw Appl 23:1624\u20131635","journal-title":"Mobile Netw Appl"},{"key":"1162_CR21","doi-asserted-by":"publisher","first-page":"325","DOI":"10.1007\/s12193-015-0207-2","volume":"10","author":"MS Hossain","year":"2016","unstructured":"Hossain M.S., Muhammad G. (2016) Audio-visual emotion recognition using multi-directional regression and Ridgelet transform. J Multimodal User Interfaces 10:325\u2013333","journal-title":"J Multimodal User Interfaces"},{"key":"1162_CR22","doi-asserted-by":"publisher","first-page":"18940","DOI":"10.1109\/ACCESS.2019.2895688","volume":"7","author":"SU Amin","year":"2019","unstructured":"Amin SU, et al. (2019) Multilevel weighted feature fusion using convolutional neural networks for eeg motor imagery classification. IEEE Access 7:18940\u201318950","journal-title":"IEEE Access"},{"key":"1162_CR23","doi-asserted-by":"publisher","first-page":"1274","DOI":"10.1109\/ACCESS.2016.2548980","volume":"4","author":"H Al Osman","year":"2016","unstructured":"Al Osman H, Dong H, El Saddik A (2016) Ubiquitous biofeedback serious game for stress management. IEEE Access 4:1274\u20131286","journal-title":"IEEE Access"},{"key":"1162_CR24","doi-asserted-by":"crossref","unstructured":"AlOtaibi M, Tawalbeh Lo\u2019ai A, Jararweh Y (2016) Integrated sensors system based on iot and mobile cloud computing. In: 2016 IEEE\/ACS 13th international conference of computer systems and applications (AICCSA). IEEE, pp 1\u20135","DOI":"10.1109\/AICCSA.2016.7945812"},{"issue":"24","key":"1162_CR25","doi-asserted-by":"publisher","first-page":"11399","DOI":"10.1007\/s11042-014-2236-3","volume":"74","author":"MF Alhamid","year":"2015","unstructured":"Alhamid MF, et al. (2015) Towards context-sensitive collaborative media recommender system. Multimed Tools Appl 74(24):11399\u201311428","journal-title":"Multimed Tools Appl"},{"key":"1162_CR26","doi-asserted-by":"crossref","unstructured":"Atziori L, Iera A, Morabito G (2010) The internet of things: A survey computer networks","DOI":"10.1016\/j.comnet.2010.05.010"},{"issue":"1","key":"1162_CR27","doi-asserted-by":"publisher","first-page":"159","DOI":"10.1109\/TCSVT.2016.2539618","volume":"27","author":"K Lin","year":"2017","unstructured":"Lin K, et al. (2017) Green video transmission in the mobile cloud networks. IEEE Trans Circuits Sys Vid Technol 27(1):159\u2013169","journal-title":"IEEE Trans Circuits Sys Vid Technol"},{"key":"1162_CR28","doi-asserted-by":"crossref","unstructured":"Kumar P, Gaba GS (2020) Biometric-based robust access control model for industrial internet of things applications. IoT Security: Advances in Authentication: 133\u2013142","DOI":"10.1002\/9781119527978.ch7"},{"issue":"3","key":"1162_CR29","doi-asserted-by":"publisher","first-page":"2211","DOI":"10.1007\/s10586-017-0872-x","volume":"20","author":"EA Alkeem","year":"2017","unstructured":"Alkeem EA, Shehada D, Yeun CY, Jamal Zemerly M, Hu J (2017) New secure healthcare system using cloud of things. Clust Comput 20(3):2211\u20132229","journal-title":"Clust Comput"},{"key":"1162_CR30","doi-asserted-by":"crossref","unstructured":"Alshehri S, Radziszowski SP, Raj RK (2012) Secure access for healthcare data in the cloud using ciphertext-policy attribute-based encryption. In: 2012 IEEE 28th international conference on data engineering workshops. IEEE, pp 143\u2013146","DOI":"10.1109\/ICDEW.2012.68"},{"issue":"2","key":"1162_CR31","doi-asserted-by":"publisher","first-page":"97","DOI":"10.1016\/j.eij.2018.12.001","volume":"20","author":"NA Azeez","year":"2019","unstructured":"Azeez NA, Van der Vyver C (2019) Security and privacy issues in e-health cloud-based system: A comprehensive content analysis. Egyptian Informatics Journal 20(2):97\u2013108","journal-title":"Egyptian Informatics Journal"},{"key":"1162_CR32","doi-asserted-by":"publisher","first-page":"52625","DOI":"10.1109\/ACCESS.2018.2869848","volume":"6","author":"M Akter","year":"2018","unstructured":"Akter M, Gani A, Md OR, Hassan MM, Almogren A, Ahmad S (2018) Performance analysis of personal cloud storage services for mobile multimedia health record management. IEEE Access 6:52625\u201352638","journal-title":"IEEE Access"},{"key":"1162_CR33","doi-asserted-by":"publisher","first-page":"85","DOI":"10.1016\/j.procs.2020.03.185","volume":"167","author":"V Siddhartha","year":"2020","unstructured":"Siddhartha V, Gaba GS, Kansal L (2020) A lightweight authentication protocol using implicit certificates for securing iot systems. Procedia Computer Science 167:85\u201396","journal-title":"Procedia Computer Science"},{"key":"1162_CR34","doi-asserted-by":"publisher","first-page":"74361","DOI":"10.1109\/ACCESS.2019.2919982","volume":"7","author":"S Chenthara","year":"2019","unstructured":"Chenthara S, Ahmed K, Wang H, Whittaker F (2019) Security and privacy-preserving challenges of e-health solutions in cloud computing. IEEE access 7:74361\u201374382","journal-title":"IEEE access"},{"issue":"Suppl 1","key":"1162_CR35","first-page":"1","volume":"52","author":"Prevention Centers for D. C.","year":"2003","unstructured":"Prevention Centers for D. C., et al. (2003) Hipaa privacy rule and public health. guidance from cdc and the us department of health and human services. MMWR: Morbidity and mortality weekly report 52(Suppl 1):1\u201317","journal-title":"MMWR: Morbidity and mortality weekly report"},{"issue":"4","key":"1162_CR36","doi-asserted-by":"publisher","first-page":"33","DOI":"10.1109\/MCOM.2018.1700817","volume":"56","author":"A Ghoneim","year":"2018","unstructured":"Ghoneim A, Muhammad G, Amin SU, Gupta B (2018) Medical image forgery detection for smart healthcare. IEEE Commun Mag 56(4):33\u201337","journal-title":"IEEE Commun Mag"},{"issue":"1","key":"1162_CR37","doi-asserted-by":"publisher","first-page":"29","DOI":"10.1136\/amiajnl-2012-000936","volume":"20","author":"D McGraw","year":"2013","unstructured":"McGraw D (2013) Building public trust in uses of health insurance portability and accountability act de-identified data. J Am Med Inform Assoc 20(1):29\u201334","journal-title":"J Am Med Inform Assoc"},{"key":"1162_CR38","doi-asserted-by":"crossref","unstructured":"Azfar A, Choo K-KR, Liu L (2015) Forensic taxonomy of popular android mhealth apps. arXiv:1505.02905","DOI":"10.1111\/1556-4029.13267"},{"issue":"4","key":"1162_CR39","doi-asserted-by":"publisher","first-page":"633","DOI":"10.1109\/TDSC.2016.2596286","volume":"15","author":"D He","year":"2016","unstructured":"He D, Kumar N, Wang H, Wang L, Choo K-KR, Vinel A (2016) A provably-secure cross-domain handshake scheme with symptoms-matching for mobile healthcare social network. IEEE Trans Dependable Secure Comput 15(4):633\u2013645","journal-title":"IEEE Trans Dependable Secure Comput"},{"issue":"2","key":"1162_CR40","doi-asserted-by":"publisher","first-page":"603","DOI":"10.1109\/JSAC.2020.3020654","volume":"39","author":"G Muhammad","year":"2021","unstructured":"Muhammad G, et al. (2021) Eeg-based pathology detection for home health monitoring. IEEE J Sel Areas Commun 39(2):603\u2013610","journal-title":"IEEE J Sel Areas Commun"},{"key":"1162_CR41","doi-asserted-by":"publisher","first-page":"10332","DOI":"10.1109\/ACCESS.2018.2799879","volume":"6","author":"AAA El-Latif","year":"2018","unstructured":"El-Latif AAA, et al. (2018) Secure quantum steganography protocol for fog cloud internet of things. IEEE Access 6:10332\u201310340","journal-title":"IEEE Access"},{"issue":"9","key":"1162_CR42","doi-asserted-by":"publisher","first-page":"743","DOI":"10.1016\/j.compbiomed.2009.06.004","volume":"39","author":"Lu-Chou Huang","year":"2009","unstructured":"Huang Lu-Chou, Chu Huei-Chung, Lien Chung-Yueh, Hsiao Chia-Hung, Kao T (2009) Privacy preservation and information security protection for patients\u2019 portable electronic health records. Comput Biol Med 39(9):743\u2013750","journal-title":"Comput Biol Med"},{"key":"1162_CR43","doi-asserted-by":"publisher","first-page":"22313","DOI":"10.1109\/ACCESS.2017.2757844","volume":"5","author":"HA Al Hamid","year":"2017","unstructured":"Al Hamid HA, et al. (2017) A security model for preserving the privacy of medical big data in a healthcare cloud using a fog computing facility with pairing-based cryptography. IEEE Access 5:22313\u201322328","journal-title":"IEEE Access"},{"key":"1162_CR44","unstructured":"Alder S (2020) August 2020 healthcare data breach report"},{"issue":"4","key":"1162_CR45","first-page":"201","volume":"8","author":"O Boyinbode","year":"2015","unstructured":"Boyinbode O, Cloudemr GT (2015) A cloud based electronic medical record system. Int J Hybrid Inf Technol 8(4): 201\u2013212","journal-title":"Int J Hybrid Inf Technol"},{"issue":"1","key":"1162_CR46","doi-asserted-by":"publisher","first-page":"36","DOI":"10.1109\/JBHI.2013.2257821","volume":"18","author":"PV Gorp","year":"2013","unstructured":"Gorp PV, Comuzzi M (2013) Lifelong personal health data and application software via virtual machines in the cloud. IEEE J Biomed Health Inform 18(1):36\u201345","journal-title":"IEEE J Biomed Health Inform"},{"issue":"3","key":"1162_CR47","doi-asserted-by":"publisher","first-page":"858712","DOI":"10.1155\/2014\/858712","volume":"10","author":"MS Hossain","year":"2014","unstructured":"Hossain MS, Muhammad G (2014) Cloud-based collaborative media service framework for healthcare. Int J Distributed Sensor Netw 10(3):858712","journal-title":"Int J Distributed Sensor Netw"},{"issue":"9","key":"1162_CR48","doi-asserted-by":"publisher","first-page":"11121","DOI":"10.1007\/s11042-017-5294-5","volume":"77","author":"M Masud","year":"2018","unstructured":"Masud M, Hossain MS (2018) Secure data-exchange protocol in a cloud-based collaborative health care environment. Multimed Tools Appl 77(9):11121\u201311135","journal-title":"Multimed Tools Appl"},{"key":"1162_CR49","doi-asserted-by":"publisher","first-page":"36584","DOI":"10.1109\/ACCESS.2018.2852784","volume":"6","author":"Q Huang","year":"2018","unstructured":"Huang Q, Yue W, He Y, Yang Y (2018) Secure identity-based data sharing and profile matching for mobile healthcare social networks in cloud computing. IEEE Access 6:36584\u201336594","journal-title":"IEEE Access"},{"issue":"4","key":"1162_CR50","doi-asserted-by":"publisher","first-page":"126","DOI":"10.1109\/MNET.011.2000458","volume":"34","author":"MS Hossain","year":"2020","unstructured":"Hossain MS, Muhammad G, Guizani N (2020) Explainable ai and mass surveillance system-based healthcare framework to combat covid-i9 like pandemics. IEEE Netw 34(4):126\u2013132","journal-title":"IEEE Netw"},{"key":"1162_CR51","doi-asserted-by":"crossref","unstructured":"Vawdrey DK, Sundelin TL, Seamons KE, Knutson CD (2003) Trust negotiation for authentication and authorization in healthcare information systems. In: Proceedings of the 25th annual international conference of the IEEE engineering in medicine and biology society (IEEE Cat. No. 03CH37439), vol 2. IEEE, pp 1406\u20131409","DOI":"10.1109\/IEMBS.2003.1279579"},{"issue":"6","key":"1162_CR52","doi-asserted-by":"publisher","first-page":"67","DOI":"10.1109\/MWC.2015.7368826","volume":"22","author":"L Hu","year":"2015","unstructured":"Hu L, et al. (2015) Software defined healthcare networks. IEEE Wirel Commun 22(6):67\u201375","journal-title":"IEEE Wirel Commun"},{"key":"1162_CR53","doi-asserted-by":"crossref","unstructured":"Singh A, Chatterjee K (2017) A mutual trust based access control framework for securing electronic healthcare system. In: 2017 14th IEEE India council international conference (INDICON). IEEE, pp 1\u20136","DOI":"10.1109\/INDICON.2017.8487658"},{"key":"1162_CR54","doi-asserted-by":"crossref","unstructured":"Hatzivasilis G, Soultatos O, Ioannidis S, Verikoukis C, Demetriou G, Tsatsoulis C (2019) Review of security and privacy for the internet of medical things (iomt). In: 2019 15th international conference on distributed computing in sensor systems (DCOSS). IEEE, pp 457\u2013464","DOI":"10.1109\/DCOSS.2019.00091"},{"issue":"1","key":"1162_CR55","doi-asserted-by":"publisher","first-page":"30","DOI":"10.1109\/MPRV.2008.16","volume":"7","author":"D Halperin","year":"2008","unstructured":"Halperin D, Heydt-Benjamin TS, Fu K, Kohno T, Maisel WH (2008) Security and privacy for implantable medical devices. IEEE Pervasive Computing 7(1):30\u201339","journal-title":"IEEE Pervasive Computing"},{"key":"1162_CR56","unstructured":"Li C, Raghunathan A, Jha NK (2011) Hijacking an insulin pump: Security attacks and defenses for a diabetes therapy system. In: 2011 IEEE 13th international conference on e-health networking, applications and services. IEEE, pp 150\u2013156"},{"key":"1162_CR57","unstructured":"Daniluk K, Niewiadomska-Szynkiewicz E (2012) Energy-efficient security in implantable medical devices. In: 2012 federated conference on computer science and information systems (FedCSIS). IEEE, pp 773\u2013778"},{"key":"1162_CR58","doi-asserted-by":"publisher","first-page":"272","DOI":"10.1016\/j.jbi.2015.04.007","volume":"55","author":"C Camara","year":"2015","unstructured":"Camara C, Peris-Lopez P, Tapiador JE (2015) Security and privacy issues in implantable medical devices: A comprehensive survey. J Biomed Inform 55:272\u2013289","journal-title":"J Biomed Inform"},{"key":"1162_CR59","doi-asserted-by":"crossref","unstructured":"Stachel JR, Sejdi\u0107 E., Ogirala A, Mickle MH (2013) The impact of the internet of things on implanted medical devices including pacemakers, and icds. In: 2013 IEEE international instrumentation and measurement technology conference (I2MTC). IEEE, pp 839\u2013844","DOI":"10.1109\/I2MTC.2013.6555533"},{"key":"1162_CR60","doi-asserted-by":"crossref","unstructured":"Rajagopalan H, Rahmat-Samii Y (2010) On-body rfid tag design for human monitoring applications. In: 2010 IEEE antennas and propagation society international symposium. IEEE, pp 1\u20134","DOI":"10.1109\/APS.2010.5561752"},{"key":"1162_CR61","doi-asserted-by":"publisher","first-page":"99","DOI":"10.1016\/j.procs.2015.08.420","volume":"50","author":"V Kumar","year":"2015","unstructured":"Kumar V, et al. (2015) Ontology based public healthcare system in internet of things (iot). Procedia Computer Science 50:99\u2013102","journal-title":"Procedia Computer Science"},{"key":"1162_CR62","first-page":"7","volume":"2008","author":"M Katagi","year":"2008","unstructured":"Katagi M, Moriai S, et al. (2008) Lightweight cryptography for the internet of things. Sony Corporation 2008:7\u201310","journal-title":"Sony Corporation"},{"key":"1162_CR63","doi-asserted-by":"publisher","first-page":"69722","DOI":"10.1109\/ACCESS.2020.2986480","volume":"8","author":"GS Gaba","year":"2020","unstructured":"Gaba GS, Kumar G, Monga H, Kim T-H, Kumar P (2020) Robust and lightweight mutual authentication scheme in distributed smart environments. IEEE Access 8:69722\u201369733","journal-title":"IEEE Access"},{"key":"1162_CR64","doi-asserted-by":"crossref","unstructured":"Armando A, Basin D, Boichut Y, Chevalier Y, Compagna L, Cu\u00e9llar J, Drielsma PH, H\u00e9am P-C, Kouchnarenko O, Mantovani J, et al. (2005) The avispa tool for the automated validation of internet security protocols and applications. In: International conference on computer aided verification. Springer, pp 281\u2013285","DOI":"10.1007\/11513988_27"},{"issue":"1","key":"1162_CR65","doi-asserted-by":"publisher","first-page":"93","DOI":"10.1007\/s10916-010-9449-4","volume":"36","author":"MA Al Ameen","year":"2012","unstructured":"Al Ameen MA, Liu J, Kwak K (2012) Security and privacy issues in wireless sensor networks for healthcare applications. J Med Sys 36(1):93\u2013101","journal-title":"J Med Sys"},{"key":"1162_CR66","doi-asserted-by":"publisher","first-page":"74","DOI":"10.1016\/j.cose.2014.10.016","volume":"48","author":"Q Do","year":"2015","unstructured":"Do Q, Martini B, Choo K-KR (2015) Exfiltrating data from android devices. Computers & Security 48:74\u201391","journal-title":"Computers & Security"},{"key":"1162_CR67","first-page":"523","volume":"293","author":"CJ D\u2019Orazio","year":"2017","unstructured":"D\u2019Orazio CJ, Lu R, Choo K-KR, Vasilakos AV (2017) A markov adversary model to detect vulnerable ios devices and vulnerabilities in ios apps. Appl Math Comput 293:523\u2013544","journal-title":"Appl Math Comput"},{"issue":"4","key":"1162_CR68","doi-asserted-by":"publisher","first-page":"279","DOI":"10.1504\/IJIEM.2010.035624","volume":"6","author":"A Appari","year":"2010","unstructured":"Appari A, Johnson ME (2010) Information security and privacy in healthcare: current state of research. International Journal Of Internet and Enterprise Management 6(4):279\u2013314","journal-title":"International Journal Of Internet and Enterprise Management"},{"issue":"3","key":"1162_CR69","doi-asserted-by":"publisher","first-page":"24","DOI":"10.1109\/MWC.2009.5109461","volume":"16","author":"A Toninelli","year":"2009","unstructured":"Toninelli A, Montanari R, Corradi A (2009) Enabling secure service discovery in mobile healthcare enterprise networks. IEEE Wireless Commun 16(3):24\u201332","journal-title":"IEEE Wireless Commun"},{"issue":"2","key":"1162_CR70","doi-asserted-by":"publisher","first-page":"190813","DOI":"10.1155\/2013\/190813","volume":"9","author":"P Castillejo","year":"2013","unstructured":"Castillejo P, Mart\u00ednez J-F, L\u00f3pez L, Rubio G (2013) An internet of things approach for managing smart services provided by wearable devices. Int J Distrib Sensor Netw 9(2):190813","journal-title":"Int J Distrib Sensor Netw"},{"key":"1162_CR71","doi-asserted-by":"crossref","unstructured":"Bui N, Zorzi M (2011) Health care applications: a solution based on the internet of things. In: Proceedings of the 4th international symposium on applied sciences in biomedical and communication technologies, pp 1\u20135","DOI":"10.1145\/2093698.2093829"}],"container-title":["Peer-to-Peer Networking and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-021-01162-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s12083-021-01162-x\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-021-01162-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,4,8]],"date-time":"2025-04-08T22:46:56Z","timestamp":1744152416000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s12083-021-01162-x"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,5,3]]},"references-count":71,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2021,9]]}},"alternative-id":["1162"],"URL":"https:\/\/doi.org\/10.1007\/s12083-021-01162-x","relation":{},"ISSN":["1936-6442","1936-6450"],"issn-type":[{"value":"1936-6442","type":"print"},{"value":"1936-6450","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,5,3]]},"assertion":[{"value":"31 August 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"8 April 2021","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"3 May 2021","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}