{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,7]],"date-time":"2026-03-07T18:30:40Z","timestamp":1772908240663,"version":"3.50.1"},"reference-count":40,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2022,3,1]],"date-time":"2022-03-01T00:00:00Z","timestamp":1646092800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2022,3,1]],"date-time":"2022-03-01T00:00:00Z","timestamp":1646092800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/legal\/tdmrep-license"},{"start":{"date-parts":[[2022,3,1]],"date-time":"2022-03-01T00:00:00Z","timestamp":1646092800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-017"},{"start":{"date-parts":[[2022,3,1]],"date-time":"2022-03-01T00:00:00Z","timestamp":1646092800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"},{"start":{"date-parts":[[2022,3,1]],"date-time":"2022-03-01T00:00:00Z","timestamp":1646092800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-012"},{"start":{"date-parts":[[2022,3,1]],"date-time":"2022-03-01T00:00:00Z","timestamp":1646092800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,3,1]],"date-time":"2022-03-01T00:00:00Z","timestamp":1646092800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-004"}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Computer Communications"],"published-print":{"date-parts":[[2022,3]]},"DOI":"10.1016\/j.comcom.2022.01.014","type":"journal-article","created":{"date-parts":[[2022,2,2]],"date-time":"2022-02-02T17:31:25Z","timestamp":1643823085000},"page":"121-132","update-policy":"https:\/\/doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":35,"special_numbering":"C","title":["A new RFID ultra-lightweight authentication protocol for medical privacy protection in smart living"],"prefix":"10.1016","volume":"186","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-3692-7065","authenticated-orcid":false,"given":"Xingmiao","family":"Wang","sequence":"first","affiliation":[]},{"given":"Kai","family":"Fan","sequence":"additional","affiliation":[]},{"given":"Kan","family":"Yang","sequence":"additional","affiliation":[]},{"given":"Xiaochun","family":"Cheng","sequence":"additional","affiliation":[]},{"given":"Qingkuan","family":"Dong","sequence":"additional","affiliation":[]},{"given":"Hui","family":"Li","sequence":"additional","affiliation":[]},{"given":"Yintang","family":"Yang","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"issue":"5","key":"10.1016\/j.comcom.2022.01.014_b1","doi-asserted-by":"crossref","first-page":"1276","DOI":"10.1109\/TMM.2018.2877127","article-title":"Adaptive semi-supervised feature selection for cross-modal retrieval","volume":"21","author":"Yu","year":"2019","journal-title":"IEEE Trans. Multimed."},{"key":"10.1016\/j.comcom.2022.01.014_b2","doi-asserted-by":"crossref","first-page":"595","DOI":"10.1016\/j.patcog.2018.12.010","article-title":"Zero-shot event detection via event-adaptive concept relevance mining","volume":"88","author":"Li","year":"2019","journal-title":"Pattern Recognit."},{"issue":"4","key":"10.1016\/j.comcom.2022.01.014_b3","first-page":"76:1","article-title":"A comprehensive survey of neural architecture search: Challenges and solutions","volume":"54","author":"Ren","year":"2021","journal-title":"ACM Comput. Surv."},{"key":"10.1016\/j.comcom.2022.01.014_b4","doi-asserted-by":"crossref","first-page":"678","DOI":"10.1109\/ACCESS.2015.2437951","article-title":"The internet of things for health care: A comprehensive survey","volume":"3","author":"Islam","year":"2015","journal-title":"IEEE Access"},{"issue":"1","key":"10.1016\/j.comcom.2022.01.014_b5","doi-asserted-by":"crossref","first-page":"456","DOI":"10.1109\/JSYST.2018.2866067","article-title":"Secure-anonymous user authentication scheme for e-healthcare application using wireless medical sensor networks","volume":"13","author":"Ever","year":"2019","journal-title":"IEEE Syst. J."},{"key":"10.1016\/j.comcom.2022.01.014_b6","first-page":"1","article-title":"Energy efficient dynamic offloading in mobile edge computing for internet of things","author":"Chen","year":"2019","journal-title":"IEEE Trans. Cloud Comput."},{"key":"10.1016\/j.comcom.2022.01.014_b7","doi-asserted-by":"crossref","first-page":"151054","DOI":"10.1109\/ACCESS.2019.2947723","article-title":"Review on security of internet of things authentication mechanism","volume":"7","author":"Nandy","year":"2017","journal-title":"IEEE Access"},{"issue":"3","key":"10.1016\/j.comcom.2022.01.014_b8","doi-asserted-by":"crossref","first-page":"281","DOI":"10.1016\/j.dcan.2020.07.003","article-title":"Security and privacy in 6G networks: New areas and new challenges","volume":"6","author":"Wang","year":"2020","journal-title":"Digit. Commun. Netw."},{"issue":"2","key":"10.1016\/j.comcom.2022.01.014_b9","doi-asserted-by":"crossref","first-page":"44","DOI":"10.1109\/MNET.2019.1800225","article-title":"A lightweight authentication scheme for cloud-based RFID healthcare systems","volume":"33","author":"Fan","year":"2019","journal-title":"IEEE Netw."},{"issue":"2","key":"10.1016\/j.comcom.2022.01.014_b10","doi-asserted-by":"crossref","first-page":"195","DOI":"10.1007\/s00530-015-0476-3","article-title":"An improved and anonymous two-factor authentication protocol for health-care applications with wireless medical sensor networks","volume":"23","author":"Wu","year":"2017","journal-title":"Multimed. Syst."},{"issue":"1","key":"10.1016\/j.comcom.2022.01.014_b11","doi-asserted-by":"crossref","first-page":"96","DOI":"10.4018\/IJACI.2019010106","article-title":"A secure remote user authentication protocol for healthcare monitoring using wireless medical sensor networks","volume":"10","author":"Chandrakar","year":"2019","journal-title":"Int. J. Ambient Comput. Intell."},{"key":"10.1016\/j.comcom.2022.01.014_b12","doi-asserted-by":"crossref","first-page":"3376","DOI":"10.1109\/ACCESS.2017.2673239","article-title":"Lightweight three-factor authentication and key agreement protocol for internet-integrated wireless sensor networks","volume":"5","author":"Jiang","year":"2017","journal-title":"IEEE Access"},{"key":"10.1016\/j.comcom.2022.01.014_b13","article-title":"Cloud-based RFID mutual authentication scheme for efficient privacy preserving in IoV","author":"Fan","year":"2019","journal-title":"J. Franklin Inst."},{"issue":"1","key":"10.1016\/j.comcom.2022.01.014_b14","doi-asserted-by":"crossref","first-page":"137","DOI":"10.1109\/TMC.2015.2412933","article-title":"EPC Gen2v2 RFID standard authentication and ownership management protocol","volume":"15","author":"Niu","year":"2015","journal-title":"IEEE Trans. Mob. Comput."},{"key":"10.1016\/j.comcom.2022.01.014_b15","doi-asserted-by":"crossref","unstructured":"A. Juels, S.A. Weis, Authenticating pervasive devices with human protocols, in: Annual International Cryptology Conference, 2005, pp. 293\u2013308.","DOI":"10.1007\/11535218_18"},{"key":"10.1016\/j.comcom.2022.01.014_b16","doi-asserted-by":"crossref","unstructured":"P. Peris-Lopez, J.C. Hernandez-Castro, J.M. Est\u00e9vez-Tapiador, A. Ribagorda, LMAP: A real lightweight mutual authentication protocol for low-cost RFID tags, in: Proc. Of 2nd Workshop On RFID Security, vol. 6, 2006, pp. 6\u201317.","DOI":"10.1007\/11833529_93"},{"key":"10.1016\/j.comcom.2022.01.014_b17","doi-asserted-by":"crossref","unstructured":"P. Peris-Lopez, J.C. Hernandez-Castro, J.M. Estevez-Tapiador, A. Ribagorda, EMAP: An efficient mutual-authentication protocol for low-cost RFID tags, in: OTM Confederated International Conferences\u201c On The Move to Meaningful Internet Systems\u201d, 2006, pp. 352\u2013361.","DOI":"10.1007\/11915034_59"},{"key":"10.1016\/j.comcom.2022.01.014_b18","doi-asserted-by":"crossref","unstructured":"P. Peris-Lopez, J.C. Hernandez-Castro, J.M. Estevez-Tapiador, A. Ribagorda, M 2 AP: a minimalist mutual-authentication protocol for low-cost RFID tags, in: International Conference On Ubiquitous Intelligence And Computing, 2006, pp. 912\u2013923.","DOI":"10.1007\/11833529_93"},{"key":"10.1016\/j.comcom.2022.01.014_b19","doi-asserted-by":"crossref","first-page":"83","DOI":"10.1145\/1278901.1278916","article-title":"Security of ultra-lightweight RFID authentication protocols and its improvements","volume":"41","author":"Chien","year":"2007","journal-title":"Oper. Syst. Rev."},{"key":"10.1016\/j.comcom.2022.01.014_b20","doi-asserted-by":"crossref","unstructured":"T. Li, G. Wang, Security analysis of two ultra-lightweight RFID authentication protocols, in: IFIP International Information Security Conference, 2007, pp. 109\u2013120.","DOI":"10.1007\/978-0-387-72367-9_10"},{"issue":"4","key":"10.1016\/j.comcom.2022.01.014_b21","doi-asserted-by":"crossref","first-page":"337","DOI":"10.1109\/TDSC.2007.70226","article-title":"SASI: A new ultralightweight RFID authentication protocol providing strong authentication and strong integrity","volume":"4","author":"Chien","year":"2007","journal-title":"IEEE Trans. Dependable Secur. Comput."},{"issue":"4","key":"10.1016\/j.comcom.2022.01.014_b22","doi-asserted-by":"crossref","first-page":"316","DOI":"10.1109\/TDSC.2008.33","article-title":"Cryptanalysis of a new ultralightweight RFID authentication protocol-SASI","volume":"6","author":"Phan","year":"2008","journal-title":"IEEE Trans. Dependable Secur. Comput."},{"issue":"1","key":"10.1016\/j.comcom.2022.01.014_b23","first-page":"73","article-title":"Security analysis of the SASI protocol","volume":"6","author":"Cao","year":"2008","journal-title":"IEEE Trans. Dependable Secur. Comput."},{"key":"10.1016\/j.comcom.2022.01.014_b24","doi-asserted-by":"crossref","unstructured":"P. Peris-Lopez, J.C. Hernandez-Castro, J.M. Tapiador, A. Ribagorda, Advances in ultralightweight cryptography for low-cost RFID tags: Gossamer protocol, in: International Workshop On Information Security Applications, 2008, pp. 56\u201368.","DOI":"10.1007\/978-3-642-00306-6_5"},{"key":"10.1016\/j.comcom.2022.01.014_b25","doi-asserted-by":"crossref","unstructured":"Z. Bilal, A. Masood, F. Kausar, Security analysis of ultra-lightweight cryptographic protocol for low-cost RFID tags: Gossamer protocol, in: 2009 International Conference On Network-Based Information Systems, 2009, pp. 260\u2013267.","DOI":"10.1109\/NBiS.2009.9"},{"key":"10.1016\/j.comcom.2022.01.014_b26","doi-asserted-by":"crossref","first-page":"702","DOI":"10.1109\/LCOMM.2012.031212.120237","article-title":"A new ultralightweight RFID authentication protocol with permutation","volume":"16","author":"Tian","year":"2012","journal-title":"IEEE Commun. Lett."},{"key":"10.1016\/j.comcom.2022.01.014_b27","series-title":"Security analysis of RAPP an RFID authentication protocol based on permutation","author":"Shao-hui","year":"2012"},{"key":"10.1016\/j.comcom.2022.01.014_b28","doi-asserted-by":"crossref","DOI":"10.1155\/2015\/642180","article-title":"RCIA: A new ultralightweight RFID authentication protocol using recursive hash","volume":"11","author":"Mujahid","year":"2015","journal-title":"Int. J. Distrib. Sens. Netw."},{"key":"10.1016\/j.comcom.2022.01.014_b29","first-page":"905","article-title":"Generalized desynchronization attack on UMAP: Application to RCIA, KMAP, SLAP and SASI+ protocols","volume":"2016","author":"Safkhani","year":"2016","journal-title":"IACR Cryptol. ePrint Arch."},{"key":"10.1016\/j.comcom.2022.01.014_b30","series-title":"2016 IEEE Trustcom\/BigDataSE\/ISPA","first-page":"332","article-title":"A cloud-based RFID authentication protocol with insecure communication channels","author":"Xiao","year":"2016"},{"issue":"4","key":"10.1016\/j.comcom.2022.01.014_b31","doi-asserted-by":"crossref","first-page":"1656","DOI":"10.1109\/TII.2018.2794996","article-title":"Lightweight RFID protocol for medical privacy protection in IoT","volume":"14","author":"Fan","year":"2018","journal-title":"IEEE Trans. Ind. Inform."},{"key":"10.1016\/j.comcom.2022.01.014_b32","doi-asserted-by":"crossref","first-page":"621","DOI":"10.1016\/j.future.2019.07.004","article-title":"Seclap: Secure and lightweight rfid authentication protocol for medical iot","volume":"101","author":"Aghili","year":"2019","journal-title":"Future Gener. Comput. Syst."},{"key":"10.1016\/j.comcom.2022.01.014_b33","doi-asserted-by":"crossref","DOI":"10.1016\/j.comnet.2020.107558","article-title":"IoT in medical & pharmaceutical: Designing lightweight RFID security protocols for ensuring supply chain integrity","volume":"181","author":"Safkhani","year":"2020","journal-title":"Comput. Netw."},{"key":"10.1016\/j.comcom.2022.01.014_b34","doi-asserted-by":"crossref","DOI":"10.1016\/j.comnet.2021.107833","article-title":"LAPCHS: A lightweight authentication protocol for cloud-based health-care systems","volume":"187","author":"Nikkhah","year":"2021","journal-title":"Comput. Netw."},{"key":"10.1016\/j.comcom.2022.01.014_b35","doi-asserted-by":"crossref","first-page":"606","DOI":"10.1016\/j.future.2018.05.015","article-title":"Toward integrated Cloud\u2013Fog networks for efficient IoT provisioning: Key challenges and solutions","volume":"88","author":"Peng","year":"2018","journal-title":"Future Gener. Comput. Syst."},{"issue":"1","key":"10.1016\/j.comcom.2022.01.014_b36","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1109\/TII.2020.2998479","article-title":"Blockchain for cybersecurity in smart grid: A comprehensive survey","volume":"17","author":"Zhuang","year":"2020","journal-title":"IEEE Trans. Ind. Inform."},{"issue":"1","key":"10.1016\/j.comcom.2022.01.014_b37","first-page":"65","article-title":"Study on RFID authentication protocol theory","volume":"8","author":"Qi","year":"2011","journal-title":"China Commun."},{"issue":"1","key":"10.1016\/j.comcom.2022.01.014_b38","doi-asserted-by":"crossref","first-page":"2","DOI":"10.1587\/transinf.E95.D.2","article-title":"A survey on privacy frameworks for RFID authentication","volume":"95","author":"Su","year":"2012","journal-title":"IEICE Trans. Inf. Syst."},{"issue":"1871","key":"10.1016\/j.comcom.2022.01.014_b39","first-page":"233","article-title":"A logic of authentication","volume":"426","author":"Burrows","year":"1989","journal-title":"Proc. R. Soc. A"},{"key":"10.1016\/j.comcom.2022.01.014_b40","doi-asserted-by":"crossref","DOI":"10.1142\/S021812661650078X","article-title":"Efficient hardware implementation of ultralightweight RFID mutual authentication protocol","volume":"25","author":"Mujahid","year":"2016","journal-title":"J. Circuits Syst. Comput."}],"container-title":["Computer Communications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0140366422000202?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0140366422000202?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2025,9,25]],"date-time":"2025-09-25T23:36:35Z","timestamp":1758843395000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0140366422000202"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,3]]},"references-count":40,"alternative-id":["S0140366422000202"],"URL":"https:\/\/doi.org\/10.1016\/j.comcom.2022.01.014","relation":{},"ISSN":["0140-3664"],"issn-type":[{"value":"0140-3664","type":"print"}],"subject":[],"published":{"date-parts":[[2022,3]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"A new RFID ultra-lightweight authentication protocol for medical privacy protection in smart living","name":"articletitle","label":"Article Title"},{"value":"Computer Communications","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.comcom.2022.01.014","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2022 Elsevier B.V. All rights reserved.","name":"copyright","label":"Copyright"}]}}