{"id":"https://openalex.org/W4320029360","doi":"https://doi.org/10.1109/globecom48099.2022.10001262","title":"RAKI:A Robust ECC Based Three-party Authentication and Key Agreement Scheme for Medical IoT","display_name":"RAKI:A Robust ECC Based Three-party Authentication and Key Agreement Scheme for Medical IoT","publication_year":2022,"publication_date":"2022-12-04","ids":{"openalex":"https://openalex.org/W4320029360","doi":"https://doi.org/10.1109/globecom48099.2022.10001262"},"language":"en","primary_location":{"id":"doi:10.1109/globecom48099.2022.10001262","is_oa":false,"landing_page_url":"https://doi.org/10.1109/globecom48099.2022.10001262","pdf_url":null,"source":{"id":"https://openalex.org/S4363607705","display_name":"GLOBECOM 2022 - 2022 IEEE Global Communications Conference","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"GLOBECOM 2022 - 2022 IEEE Global Communications Conference","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5039860133","display_name":"Yousheng Zhou","orcid":"https://orcid.org/0000-0003-0638-452X"},"institutions":[{"id":"https://openalex.org/I10535382","display_name":"Chongqing University of Posts and Telecommunications","ror":"https://ror.org/03dgaqz26","country_code":"CN","type":"education","lineage":["https://openalex.org/I10535382"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Yousheng Zhou","raw_affiliation_strings":["School of Cyber Security and Information Law Chongqing University of Posts and Telecommunications,Chongqing,China","School of Cyber Security and Information Law Chongqing University of Posts and Telecommunications, Chongqing, China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Security and Information Law Chongqing University of Posts and Telecommunications,Chongqing,China","institution_ids":["https://openalex.org/I10535382"]},{"raw_affiliation_string":"School of Cyber Security and Information Law Chongqing University of Posts and Telecommunications, Chongqing, China","institution_ids":["https://openalex.org/I10535382"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5082234228","display_name":"Lunhao Li","orcid":"https://orcid.org/0000-0001-7473-5331"},"institutions":[{"id":"https://openalex.org/I10535382","display_name":"Chongqing University of Posts and Telecommunications","ror":"https://ror.org/03dgaqz26","country_code":"CN","type":"education","lineage":["https://openalex.org/I10535382"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Lunhao Li","raw_affiliation_strings":["School of Cyber Security and Information Law Chongqing University of Posts and Telecommunications,Chongqing,China","School of Cyber Security and Information Law Chongqing University of Posts and Telecommunications, Chongqing, China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Security and Information Law Chongqing University of Posts and Telecommunications,Chongqing,China","institution_ids":["https://openalex.org/I10535382"]},{"raw_affiliation_string":"School of Cyber Security and Information Law Chongqing University of Posts and Telecommunications, Chongqing, China","institution_ids":["https://openalex.org/I10535382"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5051195514","display_name":"Mohammad S. Obaidat","orcid":"https://orcid.org/0000-0002-1569-9657"},"institutions":[{"id":"https://openalex.org/I114972647","display_name":"University of Jordan","ror":"https://ror.org/05k89ew48","country_code":"JO","type":"education","lineage":["https://openalex.org/I114972647"]},{"id":"https://openalex.org/I189109744","display_name":"Indian Institute of Technology Dhanbad","ror":"https://ror.org/013v3cc28","country_code":"IN","type":"education","lineage":["https://openalex.org/I189109744"]},{"id":"https://openalex.org/I92403157","display_name":"University of Science and Technology Beijing","ror":"https://ror.org/02egmk993","country_code":"CN","type":"education","lineage":["https://openalex.org/I92403157"]}],"countries":["CN","IN","JO"],"is_corresponding":false,"raw_author_name":"Mohammad S. Obaidat","raw_affiliation_strings":["Indian Institute of Technology,Department of Computer Science and Engineering,Dhanbad,India,826004","School of Computer and Communication Engineering University of Science and Technology Beijing, Beijing, China","King Abdullah II School of Information Technology, University of Jordan, Amman, Jordan"],"affiliations":[{"raw_affiliation_string":"Indian Institute of Technology,Department of Computer Science and Engineering,Dhanbad,India,826004","institution_ids":["https://openalex.org/I189109744"]},{"raw_affiliation_string":"School of Computer and Communication Engineering University of Science and Technology Beijing, Beijing, China","institution_ids":["https://openalex.org/I92403157"]},{"raw_affiliation_string":"King Abdullah II School of Information Technology, University of Jordan, Amman, Jordan","institution_ids":["https://openalex.org/I114972647"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5021396791","display_name":"Yuanni Liu","orcid":"https://orcid.org/0000-0002-9305-3405"},"institutions":[{"id":"https://openalex.org/I10535382","display_name":"Chongqing University of Posts and Telecommunications","ror":"https://ror.org/03dgaqz26","country_code":"CN","type":"education","lineage":["https://openalex.org/I10535382"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yuanni Liu","raw_affiliation_strings":["School of Cyber Security and Information Law Chongqing University of Posts and Telecommunications,Chongqing,China","School of Cyber Security and Information Law Chongqing University of Posts and Telecommunications, Chongqing, China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Security and Information Law Chongqing University of Posts and Telecommunications,Chongqing,China","institution_ids":["https://openalex.org/I10535382"]},{"raw_affiliation_string":"School of Cyber Security and Information Law Chongqing University of Posts and Telecommunications, Chongqing, China","institution_ids":["https://openalex.org/I10535382"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5028044712","display_name":"Pandi Vijayakumar","orcid":"https://orcid.org/0000-0001-5451-8946"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"P. Vijayakumar","raw_affiliation_strings":["University College of Engineering Tindivanam,Department of Computer Science &#x0026; Engineering,Tindivanam,India"],"affiliations":[{"raw_affiliation_string":"University College of Engineering Tindivanam,Department of Computer Science &#x0026; Engineering,Tindivanam,India","institution_ids":[]}]},{"author_position":"last","author":{"id":null,"display_name":"Kuei-Fang Hsiao","orcid":null},"institutions":[{"id":"https://openalex.org/I29891158","display_name":"University of Sharjah","ror":"https://ror.org/00engpz63","country_code":"AE","type":"education","lineage":["https://openalex.org/I29891158"]}],"countries":["AE"],"is_corresponding":false,"raw_author_name":"Kuei-Fang Hsiao","raw_affiliation_strings":["University of Sharjah,Information Systems Department,Shrajah,UAE,27272"],"affiliations":[{"raw_affiliation_string":"University of Sharjah,Information Systems Department,Shrajah,UAE,27272","institution_ids":["https://openalex.org/I29891158"]}]}],"institutions":[],"countries_distinct_count":4,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5039860133"],"corresponding_institution_ids":["https://openalex.org/I10535382"],"apc_list":null,"apc_paid":null,"fwci":1.7171,"has_fulltext":false,"cited_by_count":8,"citation_normalized_percentile":{"value":0.85739972,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":91,"max":98},"biblio":{"volume":null,"issue":null,"first_page":"1175","last_page":"1180"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9970999956130981,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11932","display_name":"Wireless Body Area Networks","score":0.9832000136375427,"subfield":{"id":"https://openalex.org/subfields/2204","display_name":"Biomedical Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.745352029800415},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6558258533477783},{"id":"https://openalex.org/keywords/random-oracle","display_name":"Random oracle","score":0.6488486528396606},{"id":"https://openalex.org/keywords/password","display_name":"Password","score":0.5906357765197754},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.5780962705612183},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.5088086724281311},{"id":"https://openalex.org/keywords/internet-of-things","display_name":"Internet of Things","score":0.4858388602733612},{"id":"https://openalex.org/keywords/password-cracking","display_name":"Password cracking","score":0.4526965916156769},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.4519030451774597},{"id":"https://openalex.org/keywords/gateway","display_name":"Gateway (web page)","score":0.43324369192123413},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.41651594638824463},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.2798156142234802},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.20690658688545227},{"id":"https://openalex.org/keywords/authentication-protocol","display_name":"Authentication protocol","score":0.1662316918373108},{"id":"https://openalex.org/keywords/challenge\u2013response-authentication","display_name":"Challenge\u2013response authentication","score":0.12959051132202148},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.09709042310714722}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.745352029800415},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6558258533477783},{"id":"https://openalex.org/C94284585","wikidata":"https://www.wikidata.org/wiki/Q228184","display_name":"Random oracle","level":4,"score":0.6488486528396606},{"id":"https://openalex.org/C109297577","wikidata":"https://www.wikidata.org/wiki/Q161157","display_name":"Password","level":2,"score":0.5906357765197754},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.5780962705612183},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.5088086724281311},{"id":"https://openalex.org/C81860439","wikidata":"https://www.wikidata.org/wiki/Q251212","display_name":"Internet of Things","level":2,"score":0.4858388602733612},{"id":"https://openalex.org/C3847113","wikidata":"https://www.wikidata.org/wiki/Q2746524","display_name":"Password cracking","level":5,"score":0.4526965916156769},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.4519030451774597},{"id":"https://openalex.org/C2777710495","wikidata":"https://www.wikidata.org/wiki/Q5527195","display_name":"Gateway (web page)","level":2,"score":0.43324369192123413},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.41651594638824463},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.2798156142234802},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.20690658688545227},{"id":"https://openalex.org/C21564112","wikidata":"https://www.wikidata.org/wiki/Q4825885","display_name":"Authentication protocol","level":3,"score":0.1662316918373108},{"id":"https://openalex.org/C131129157","wikidata":"https://www.wikidata.org/wiki/Q1059963","display_name":"Challenge\u2013response authentication","level":4,"score":0.12959051132202148},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.09709042310714722},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/globecom48099.2022.10001262","is_oa":false,"landing_page_url":"https://doi.org/10.1109/globecom48099.2022.10001262","pdf_url":null,"source":{"id":"https://openalex.org/S4363607705","display_name":"GLOBECOM 2022 - 2022 IEEE Global Communications Conference","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"GLOBECOM 2022 - 2022 IEEE Global Communications Conference","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.75,"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":18,"referenced_works":["https://openalex.org/W1992007967","https://openalex.org/W2007287631","https://openalex.org/W2053249018","https://openalex.org/W2055473620","https://openalex.org/W2080601557","https://openalex.org/W2093397575","https://openalex.org/W2116392345","https://openalex.org/W2141446237","https://openalex.org/W2281830773","https://openalex.org/W2528101580","https://openalex.org/W2769200374","https://openalex.org/W2805161995","https://openalex.org/W2883922809","https://openalex.org/W2999802385","https://openalex.org/W3039416669","https://openalex.org/W3132951757","https://openalex.org/W3168209556","https://openalex.org/W3213700687"],"related_works":["https://openalex.org/W137322897","https://openalex.org/W2989690789","https://openalex.org/W2555472429","https://openalex.org/W2054626033","https://openalex.org/W3031972324","https://openalex.org/W3048720371","https://openalex.org/W4245269869","https://openalex.org/W2906808255","https://openalex.org/W3018598733","https://openalex.org/W3131491961"],"abstract_inverted_index":{"With":[0],"its":[1],"advantages":[2],"are":[3,78,95],"gradually":[4],"emerging,":[5],"the":[6,14,31,40,47,55,102,108,136,163,168],"Internet":[7],"of":[8,50,57,66,104,111],"Things":[9],"(IoT)":[10],"is":[11,26,62,117,156,180],"profoundly":[12],"changing":[13],"way":[15],"people":[16],"work":[17],"and":[18,54,72,94,107,145,162],"live.":[19],"Among":[20],"all":[21],"IoT":[22,25,61,84,129],"applications,":[23],"medical":[24,37,60,83,99,114,150,183],"partic-ularly":[27],"important,":[28],"in":[29,127],"which":[30,155],"user":[32],"can":[33],"communicate":[34],"with":[35,131,158],"smart":[36,52],"device":[38],"through":[39],"hospital":[41],"gateway":[42],"node.":[43],"However,":[44],"due":[45],"to":[46,64,121],"inherent":[48],"defects":[49],"these":[51],"devices":[53],"openness":[56],"wireless":[58],"networks,":[59],"vulnerable":[63],"kinds":[65],"attacks,":[67],"such":[68],"as":[69],"impersonation":[70],"attack":[71],"password":[73],"guessing":[74],"attack.":[75],"Unfortunately,":[76],"there":[77,116],"few":[79],"authentication":[80,125,144],"schemes":[81,90,175],"for":[82,98,149,182],"at":[85],"present,":[86],"while":[87],"existing":[88,172],"three-party":[89,143,174],"have":[91],"various":[92],"weakness":[93],"not":[96],"suitable":[97,124],"IoT.":[100,184],"Given":[101],"sensitivity":[103],"patient":[105],"data":[106],"deadly":[109],"consequences":[110],"attacks":[112],"on":[113],"devices,":[115],"an":[118],"urgent":[119],"need":[120],"develop":[122],"a":[123,139],"scheme":[126,148,179],"Medical":[128],"Network":[130],"high":[132],"security.":[133],"To":[134],"alleviate":[135],"above":[137],"problems,":[138],"robust":[140],"ECC":[141],"based":[142],"key":[146],"agreement":[147],"IoT(RAKI)":[151],"has":[152],"been":[153],"proposed,":[154],"secure":[157],"random":[159],"oracle":[160],"model":[161],"informal":[164],"security":[165],"analysis.":[166],"Besides,":[167],"performance":[169],"comparisons":[170],"against":[171],"competing":[173],"indicate":[176],"that":[177],"our":[178],"efficient":[181]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":4},{"year":2023,"cited_by_count":3}],"updated_date":"2026-04-16T08:26:57.006410","created_date":"2025-10-10T00:00:00"}
