A Novel Linearly Complex Extended Signed Response-Based Node Authentication Scheme for Internet of Medical Things
The Internet of Things (IoT) is considered the future of the Internet due to its immense potential. It has captured the interest of researchers who are exploring new possibilities in this field. Unlike the current internet structure, IoT involves the connection of billions of devices and entails a s...
Saved in:
| Published in | IEEE access Vol. 12; p. 1 |
|---|---|
| Main Authors | , , , |
| Format | Journal Article |
| Language | English |
| Published |
IEEE
01.01.2024
|
| Subjects | |
| Online Access | Get full text |
| ISSN | 2169-3536 2169-3536 |
| DOI | 10.1109/ACCESS.2024.3504744 |
Cover
| Abstract | The Internet of Things (IoT) is considered the future of the Internet due to its immense potential. It has captured the interest of researchers who are exploring new possibilities in this field. Unlike the current internet structure, IoT involves the connection of billions of devices and entails a significant exchange of data, diverse traffic, and resource availability. The increasing use of IoT devices in vulnerable environments has presented two major challenges for researchers: authenticating sensor nodes and ensuring secure data routing. These challenges become more difficult by the presence of wireless sensors in communication devices, where all devices are not authenticated or have up-to-date software. Among the various IoT attacks, the Sybil attack poses a significant threat to the network. Consequently, the conventional solutions used for conventional wireless networks (CWN) do not apply to wireless sensor networks due to the differences in algorithms and associated costs in terms of processing and power consumption. To address these challenges, an extended signed response-based (ESRES) solution is proposed. The proposed framework utilizes a pre-distributed key embedded in a sensor node, while the authentication process employs a dual key-based algorithm with linear complexity. In this mechanism, the node uses pre-distributed keys to respond to a random challenge number sent by the server or sink, thus proving its legitimacy. Since there are different types of IoT networks, such as hierarchical and centralized structures, the proposed authentication scheme is designed to be flexible and implementable for both types. The performance of the proposed framework is analyzed and evaluated, considering the probability of attack detection with different authentication key pool sizes for the parameters i.e., processing overhead, probability, and power consumption. |
|---|---|
| AbstractList | The Internet of Things (IoT) is considered the future of the Internet due to its immense potential. It has captured the interest of researchers who are exploring new possibilities in this field. Unlike the current internet structure, IoT involves the connection of billions of devices and entails a significant exchange of data, diverse traffic, and resource availability. The increasing use of IoT devices in vulnerable environments has presented two major challenges for researchers: authenticating sensor nodes and ensuring secure data routing. These challenges become more difficult by the presence of wireless sensors in communication devices, where all devices are not authenticated or have up-to-date software. Among the various IoT attacks, the Sybil attack poses a significant threat to the network. Consequently, the conventional solutions used for conventional wireless networks do not apply to wireless sensor networks due to the differences in algorithms and associated costs in terms of processing and power consumption. To address these challenges, an extended signed response-based (ESRES) solution is proposed. The proposed framework utilizes a pre-distributed key embedded in a sensor node, while the authentication process employs a dual key-based algorithm with linear complexity. In this mechanism, the node uses pre-distributed keys to respond to a random challenge number sent by the server or sink, thus proving its legitimacy. Since there are different types of IoT networks, such as hierarchical and centralized structures, the proposed authentication scheme is designed to be flexible and implementable for both types. The performance of the proposed framework is analyzed and evaluated, considering the probability of attack detection with different authentication key pool sizes for different parameters i.e., processing overhead, probability, and power consumption. The Internet of Things (IoT) is considered the future of the Internet due to its immense potential. It has captured the interest of researchers who are exploring new possibilities in this field. Unlike the current internet structure, IoT involves the connection of billions of devices and entails a significant exchange of data, diverse traffic, and resource availability. The increasing use of IoT devices in vulnerable environments has presented two major challenges for researchers: authenticating sensor nodes and ensuring secure data routing. These challenges become more difficult by the presence of wireless sensors in communication devices, where all devices are not authenticated or have up-to-date software. Among the various IoT attacks, the Sybil attack poses a significant threat to the network. Consequently, the conventional solutions used for conventional wireless networks (CWN) do not apply to wireless sensor networks due to the differences in algorithms and associated costs in terms of processing and power consumption. To address these challenges, an extended signed response-based (ESRES) solution is proposed. The proposed framework utilizes a pre-distributed key embedded in a sensor node, while the authentication process employs a dual key-based algorithm with linear complexity. In this mechanism, the node uses pre-distributed keys to respond to a random challenge number sent by the server or sink, thus proving its legitimacy. Since there are different types of IoT networks, such as hierarchical and centralized structures, the proposed authentication scheme is designed to be flexible and implementable for both types. The performance of the proposed framework is analyzed and evaluated, considering the probability of attack detection with different authentication key pool sizes for the parameters i.e., processing overhead, probability, and power consumption. |
| Author | Alourani, Abdullah Khan, Muhammad Saud Tahir, Muhammad Sardaraz, Muhammad |
| Author_xml | – sequence: 1 givenname: Muhammad Saud surname: Khan fullname: Khan, Muhammad Saud organization: Department of Computer Science, Air University Aerospace and Aviation Campus, Kamra, Pakistan – sequence: 2 givenname: Muhammad orcidid: 0000-0002-7169-8683 surname: Sardaraz fullname: Sardaraz, Muhammad organization: Department of Computer Science, COMSATS University, Attock Campus, Islamabad, Pakistan – sequence: 3 givenname: Muhammad orcidid: 0000-0002-7750-8959 surname: Tahir fullname: Tahir, Muhammad organization: Department of Computer Science, COMSATS University, Attock Campus, Islamabad, Pakistan – sequence: 4 givenname: Abdullah orcidid: 0000-0001-6794-3677 surname: Alourani fullname: Alourani, Abdullah organization: Department of Management Information Systems, College of Business and Economics, Qassim University, Buraydah, Saudi Arabia |
| BookMark | eNplkd1O4zAQRi3ESrAsT7B74RdIsWMnTi5LVKBSAWnbe2tqT9qg1C52-OnbYwhaIdY3Y4_mnLH0_STHzjsk5DdnE85ZfTFtmtlyOclZLieiYFJJeUROc17WmShEefzlfkLOY3xg6VSpVahT8jild_4Ze7roHELoD7Txu32Pr3T2OqCzaOmy27hU_mLcexcxu4SYnnfeIp0-DVt0Q2dg6LyjS7PFHdLWBzp3AwaHA_UtvUWbJnq62nZuE3-RHy30Ec8_6xlZXc1WzU22uL-eN9NFZoTgQ8ZtbhmTNRplORc1Y4rXspK2yitQtgSwpm6LEhkvjOCySlOlMi2Hco12Lc7IfNRaDw96H7odhIP20OmPhg8bDSH9vEfNy5YrwKQCIW3RrmuVtksjagVSrW1yydH15PZweIG-_yfkTL-HoMEYjFG_h6A_Q0iYGDETfIwB2_-oMbrv1J-R6hDxC6FKISsl3gAmtZYo |
| CODEN | IAECCG |
| Cites_doi | 10.5120/ijca2017913548 10.1109/IVCNZ.2017.8402502 10.1001/jamanetworkopen.2023.4866 10.1007/s11277-013-1501-5 10.1109/MITP.2019.2961898 10.1016/j.future.2017.08.035 10.1007/978-3-319-28658-7_12 10.1109/JIOT.2021.3080461 10.1109/BigDataSecurity-HPSC-IDS.2019.00030 10.23919/ELINFOCOM.2019.8706366 10.1007/978-3-319-57699-2 10.1016/j.tele.2018.11.006 10.17148/iarjset/nciarcse.2017.38 10.1016/j.procs.2019.09.350 10.1016/j.compmedimag.2005.02.003 10.1007/s11042-020-08801-0 10.1109/ICDCS.2011.83 10.1016/j.future.2017.08.020 10.1016/j.iot.2023.100721 10.1007/s42452-019-1685-8 10.1145/3290688.3290721 10.1016/j.adhoc.2023.103162 10.6633/IJNS.201709.19(5).01 10.1016/j.measurement.2019.02.069 10.1007/s10916-018-1121-4 10.1109/MMUL.2020.2985973 10.1016/j.eswa.2014.04.022 10.1016/j.future.2018.09.024 10.1016/j.comcom.2020.01.038 10.3390/brainsci13040683 10.1109/COMST.2015.2444095 10.1007/s13369-018-3220-4 10.1109/RACSS.2012.6212720 10.1155/2016/9783072 10.1109/ACCESS.2018.2877923 10.1016/j.procs.2015.10.117 10.1016/j.jss.2011.06.021 10.3390/healthcare7020056 10.1007/s10916-018-1007-5 10.1007/978-3-030-22277-2 10.1145/3309074.3309079 10.5120/13494-1217 10.2196/mhealth.7938 10.1016/j.compeleceng.2019.04.017 10.1016/j.procs.2016.08.143 10.1016/j.neucom.2022.05.099 10.1109/ICICV50876.2021.9388616 |
| ContentType | Journal Article |
| DBID | 97E ESBDL RIA RIE AAYXX CITATION ADTOC UNPAY DOA |
| DOI | 10.1109/ACCESS.2024.3504744 |
| DatabaseName | IEEE Xplore (IEEE) IEEE Xplore Open Access Journals IEEE All-Society Periodicals Package (ASPP) 1998–Present IEEE Electronic Library (IEL) CrossRef Unpaywall for CDI: Periodical Content Unpaywall DOAJ Directory of Open Access Journals |
| DatabaseTitle | CrossRef |
| DatabaseTitleList | |
| Database_xml | – sequence: 1 dbid: DOA name: DOAJ Directory of Open Access Journals url: https://www.doaj.org/ sourceTypes: Open Website – sequence: 2 dbid: RIE name: IEEE/IET Electronic Library url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/ sourceTypes: Publisher – sequence: 3 dbid: UNPAY name: Unpaywall url: https://proxy.k.utb.cz/login?url=https://unpaywall.org/ sourceTypes: Open Access Repository |
| DeliveryMethod | fulltext_linktorsrc |
| Discipline | Engineering |
| EISSN | 2169-3536 |
| EndPage | 1 |
| ExternalDocumentID | oai_doaj_org_article_16f17ae6e0a34d5fb971d24c397a47bd 10.1109/access.2024.3504744 10_1109_ACCESS_2024_3504744 10763487 |
| Genre | orig-research |
| GrantInformation_xml | – fundername: Deanship of Graduate Studies and Scientific Research at Qassim University grantid: QU-APC-2024-9/1 |
| GroupedDBID | 0R~ 5VS 6IK 97E AAJGR ABAZT ABVLG ACGFS ADBBV ALMA_UNASSIGNED_HOLDINGS BCNDV BEFXN BFFAM BGNUA BKEBE BPEOZ EBS ESBDL GROUPED_DOAJ IPLJI JAVBF KQ8 M43 M~E O9- OCL OK1 RIA RIE RNS 4.4 AAYXX AGSQL CITATION EJD ADTOC UNPAY |
| ID | FETCH-LOGICAL-c331t-1d2d0049ec7d113900719484d828a7d6aadc9f56e015c3148d1167cf1a6bedb3 |
| IEDL.DBID | UNPAY |
| ISSN | 2169-3536 |
| IngestDate | Fri Oct 03 12:44:47 EDT 2025 Sun Sep 07 11:00:01 EDT 2025 Wed Oct 01 03:43:29 EDT 2025 Wed Aug 27 03:03:47 EDT 2025 |
| IsDoiOpenAccess | true |
| IsOpenAccess | true |
| IsPeerReviewed | true |
| IsScholarly | true |
| Language | English |
| License | https://creativecommons.org/licenses/by/4.0/legalcode cc-by |
| LinkModel | DirectLink |
| MergedId | FETCHMERGED-LOGICAL-c331t-1d2d0049ec7d113900719484d828a7d6aadc9f56e015c3148d1167cf1a6bedb3 |
| ORCID | 0000-0002-7750-8959 0000-0001-6794-3677 0000-0002-7169-8683 |
| OpenAccessLink | https://proxy.k.utb.cz/login?url=http://doi.org/10.1109/access.2024.3504744 |
| PageCount | 1 |
| ParticipantIDs | doaj_primary_oai_doaj_org_article_16f17ae6e0a34d5fb971d24c397a47bd unpaywall_primary_10_1109_access_2024_3504744 crossref_primary_10_1109_ACCESS_2024_3504744 ieee_primary_10763487 |
| ProviderPackageCode | CITATION AAYXX |
| PublicationCentury | 2000 |
| PublicationDate | 2024-01-01 |
| PublicationDateYYYYMMDD | 2024-01-01 |
| PublicationDate_xml | – month: 01 year: 2024 text: 2024-01-01 day: 01 |
| PublicationDecade | 2020 |
| PublicationTitle | IEEE access |
| PublicationTitleAbbrev | Access |
| PublicationYear | 2024 |
| Publisher | IEEE |
| Publisher_xml | – name: IEEE |
| References | ref13 ref12 ref11 ref10 ref17 ref16 ref19 ref18 Gupta (ref14) 2020 ref46 ref45 ref48 ref47 ref42 ref41 ref44 ref43 ref49 ref8 ref7 ref9 ref4 ref3 ref6 Nagamani (ref27) 2017; 7 ref5 ref40 ref35 ref34 Salameh (ref15) 2019; 19 ref37 ref36 ref31 ref30 ref33 ref32 ref2 ref1 ref39 ref38 ref24 ref23 ref26 ref25 ref20 ref22 ref21 ref28 ref29 |
| References_xml | – ident: ref19 doi: 10.5120/ijca2017913548 – ident: ref30 doi: 10.1109/IVCNZ.2017.8402502 – ident: ref48 doi: 10.1001/jamanetworkopen.2023.4866 – ident: ref4 doi: 10.1007/s11277-013-1501-5 – ident: ref12 doi: 10.1109/MITP.2019.2961898 – ident: ref26 doi: 10.1016/j.future.2017.08.035 – ident: ref33 doi: 10.1007/978-3-319-28658-7_12 – ident: ref21 doi: 10.1109/JIOT.2021.3080461 – ident: ref45 doi: 10.1109/BigDataSecurity-HPSC-IDS.2019.00030 – volume: 7 start-page: 1186 issue: 4 year: 2017 ident: ref27 article-title: A mobile cloud based approach for secure M-Health application publication-title: Int. J. Res. Appl. Sci. Eng. Technol. – ident: ref32 doi: 10.23919/ELINFOCOM.2019.8706366 – ident: ref6 doi: 10.1007/978-3-319-57699-2 – ident: ref38 doi: 10.1016/j.tele.2018.11.006 – volume: 19 start-page: 28 issue: 4 year: 2019 ident: ref15 article-title: A new approach for securing medical images and Patient’s information by using a hybrid system publication-title: Int. J. Comp. Sci. Netw. Secur. – ident: ref1 doi: 10.17148/iarjset/nciarcse.2017.38 – ident: ref46 doi: 10.1016/j.procs.2019.09.350 – ident: ref10 doi: 10.1016/j.compmedimag.2005.02.003 – ident: ref7 doi: 10.1007/s11042-020-08801-0 – ident: ref22 doi: 10.1109/ICDCS.2011.83 – ident: ref39 doi: 10.1016/j.future.2017.08.020 – ident: ref2 doi: 10.1016/j.iot.2023.100721 – ident: ref28 doi: 10.1007/s42452-019-1685-8 – ident: ref11 doi: 10.1145/3290688.3290721 – ident: ref29 doi: 10.1016/j.adhoc.2023.103162 – ident: ref41 doi: 10.6633/IJNS.201709.19(5).01 – ident: ref16 doi: 10.1016/j.measurement.2019.02.069 – ident: ref43 doi: 10.1007/s10916-018-1121-4 – ident: ref13 doi: 10.1109/MMUL.2020.2985973 – ident: ref18 doi: 10.1016/j.eswa.2014.04.022 – ident: ref36 doi: 10.1016/j.future.2018.09.024 – ident: ref8 doi: 10.1016/j.comcom.2020.01.038 – ident: ref3 doi: 10.3390/brainsci13040683 – ident: ref5 doi: 10.1109/COMST.2015.2444095 – ident: ref35 doi: 10.1007/s13369-018-3220-4 – ident: ref34 doi: 10.1109/RACSS.2012.6212720 – ident: ref49 doi: 10.1155/2016/9783072 – ident: ref9 doi: 10.1109/ACCESS.2018.2877923 – ident: ref25 doi: 10.1016/j.procs.2015.10.117 – ident: ref17 doi: 10.1016/j.jss.2011.06.021 – ident: ref40 doi: 10.3390/healthcare7020056 – ident: ref42 doi: 10.1007/s10916-018-1007-5 – start-page: 978 volume-title: Handbook of Computer Networks and Cyber Security year: 2020 ident: ref14 doi: 10.1007/978-3-030-22277-2 – ident: ref44 doi: 10.1145/3309074.3309079 – ident: ref20 doi: 10.5120/13494-1217 – ident: ref47 doi: 10.2196/mhealth.7938 – ident: ref37 doi: 10.1016/j.compeleceng.2019.04.017 – ident: ref31 doi: 10.1016/j.procs.2016.08.143 – ident: ref23 doi: 10.1016/j.neucom.2022.05.099 – ident: ref24 doi: 10.1109/ICICV50876.2021.9388616 |
| SSID | ssj0000816957 |
| Score | 2.3025181 |
| Snippet | The Internet of Things (IoT) is considered the future of the Internet due to its immense potential. It has captured the interest of researchers who are... |
| SourceID | doaj unpaywall crossref ieee |
| SourceType | Open Website Open Access Repository Index Database Publisher |
| StartPage | 1 |
| SubjectTerms | Algorithm Algorithms Authentication Big Data Cryptography data privacy Electrocardiography Encryption Energy Efficiency Internet of Medical Things Internet of Things IoT Protocols Security Servers Wireless Network wireless networks Wireless sensor networks |
| SummonAdditionalLinks | – databaseName: DOAJ Directory of Open Access Journals dbid: DOA link: http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwrV07T8NADD6hLtAB8SiivHQDI6G55PIa26qoYuhAi9QtupzvEFJpC2p5_HvsXKhSMbCwZIjycD7nbH8-y2bsOhJFFqcAnoRA0MF6KgjAs0qn1kJAUS5VW4zi4aO8n0bT2qgvqglz7YEdcB0RW5EoExtfhRIiW2SJgEBq9KNKJgWQ9fXTrEamShucijiLkqrNkPCzTrffxy9CQhjI2zDyZSLllisqO_ZXI1aabHc9X6qvDzWb1bzN3QHbr8JE3nXiHbIdMz9izVrzwGP22uWjxbuZcaSThtoUc1rbM_PJB1Vim4-fn9CK8gdXB2u8HroswLvAcEqNUaGQy9jxMeruxXCMYLnLEZoVX1hebeNwN92zxSZ3g0l_6FUDFDwdhmLlIVBAFMDoBASGehRPZDKVgDRLJRArBTqzEWIrIh0iMQLaldFWqLgwUIQnrDFfzM0p4wk1wRFgIQpxyYMsCuQZGkMTC1YILdrs5gfKfOnaZOQlvfCz3CGfE_J5hXyb9QjuzaXU47o8gZrPK83nf2m-zVqkrNr70FYi_2ozb6O9X8KocgzlljBn_yHMOdujZ7rkzAVrrN7W5hLDlVVxVf6Z34kf5Uk priority: 102 providerName: Directory of Open Access Journals – databaseName: IEEE Electronic Library (IEL) dbid: RIE link: http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1LbxMxEB7RXqCH8ioivOQDRzbEu9519phGrSoOOdAi9bayPWOECElBGwr8embWbpSCkLisotUmGe_nxzfj8TcAr2vt22aKWBgstVxi4coSi-jCNEYsheVKtsWiOftg3l3Wl_mw-nAWhoiG5DMay8dhLx_XYSOhMh7hPBqYYe_Bnp026bDWNqAiFSTa2mZlIT1p387mc24E-4ClGVf1xFhjbq0-g0h_rqpyAHc3qyv389otlzsLzOl9WNyYlvJKPo83vR-HX3-oNv637Q_gMFNNNUt94yHcodUjONgRIHwMX2dqsf5OS8UuKYnUsZL5YUk_1EkOjqvzTx95JlbvUy4tFce87CF_C0lJeE2SjVLUT50z_l9IMQtWKc5IvVpHlbeCVKoQegQXpycX87MiF2EoQlXpvtBYorgRFCxqpovCSVozNciumrPYOIehjXVDzCtCxc4Vys5OiNo1ntBXT2B_tV7RU1BWhHQ0RqwrnjbQeM--SmB6EzFqHfQI3txg010lqY1ucFEmbZeg7ATKLkM5gmPBb_uo6GQPN_i1d3nYdbqJ2jpi61xlsI6-tdwgE5iFOWM9juBIoNr5v4TSCIptd_jLGDeUsrxlzLN__M5zuCePpZjNC9jvv23oJbOY3r8aeu9vK1Tu5g priority: 102 providerName: IEEE |
| Title | A Novel Linearly Complex Extended Signed Response-Based Node Authentication Scheme for Internet of Medical Things |
| URI | https://ieeexplore.ieee.org/document/10763487 http://doi.org/10.1109/access.2024.3504744 https://doaj.org/article/16f17ae6e0a34d5fb971d24c397a47bd |
| UnpaywallVersion | publishedVersion |
| Volume | 12 |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| journalDatabaseRights | – providerCode: PRVAFT databaseName: Open Access Digital Library customDbUrl: eissn: 2169-3536 dateEnd: 99991231 omitProxy: true ssIdentifier: ssj0000816957 issn: 2169-3536 databaseCode: KQ8 dateStart: 20130101 isFulltext: true titleUrlDefault: http://grweb.coalliance.org/oadl/oadl.html providerName: Colorado Alliance of Research Libraries – providerCode: PRVAON databaseName: DOAJ Directory of Open Access Journals customDbUrl: eissn: 2169-3536 dateEnd: 99991231 omitProxy: true ssIdentifier: ssj0000816957 issn: 2169-3536 databaseCode: DOA dateStart: 20130101 isFulltext: true titleUrlDefault: https://www.doaj.org/ providerName: Directory of Open Access Journals – providerCode: PRVHPJ databaseName: ROAD: Directory of Open Access Scholarly Resources customDbUrl: eissn: 2169-3536 dateEnd: 99991231 omitProxy: true ssIdentifier: ssj0000816957 issn: 2169-3536 databaseCode: M~E dateStart: 20130101 isFulltext: true titleUrlDefault: https://road.issn.org providerName: ISSN International Centre |
| link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV1LT9wwEB6V5QAc6AOqLpSVDxzrZZ04yea4rECoh1XFQ6KnyPbYVdXtLm2zbeHXMxMHWISE2kukRI7ieCbjbx75BmA_U7bMh4hSY6L4EKRJEpTBuGEImDDK5WqLSX5yoT9eZpcPNDnL6Xs1KA9M0zWQ3LhE99NsoAutV2A1zwh3d2D1YvJp9Jm7x6m8lGmTh9x95s5HW0_D0N-2VNmAtcXsylz_MdPp0u5y_DK2KfrVkBJyUcm3_qK2fXfzlLLxHyb-CjZbkClGUStewws_ewMbS9SDW_BjJCbz334qyBn1THIs2DJM_V9x1IbFxdnXL2SDxWmsovXykDY8pLvQCw6scZlRjPeJM5L8dy8I_4oYYfS1mAfRJoFE7A26DefHR-fjE9m2X5AuTVUtFSbIDoR3BSoCioxGSj3USE6aKTA3Bl0ZstwTonApuVXIOR0XlMmtR5u-hc5sPvPvQBRMoaMwYJaSwUBtLXkpjoBNwKCUU134cCeY6iqSbFSNczIoq9F4TJpY8UJW7UJ24ZCFdz-UGbKbCySAqv3gKpUHVRhPszOpxizYsqAX0o7wl9GFxS5ss-iXnkeWlry3Lsh7XXgymSjVR5PZ-c_xu7DOpzGK8x469c-F3yNcU9teEw_oNb8g9lrlvgVldvIs |
| linkProvider | Unpaywall |
| linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV3db9MwED_BeBh74HNoBQZ-4JGUOrGT5rGrNhUYfWBF2ltk--wJUdoNpWzw13MXe1XHhMRLFEX5OOfO9u_O598BvNHS1uUQMVOYSz6EzOQ5ZsG4YQiYM8rlbItpOfmiPpzq07RZvdsL473vks98n0-7tXxcuhWHyqiHU28ghH0X7mmllI7btdYhFa4hUesqcQvJQf1uNB5TM8gLzFW_0ANVKXVj_ulo-lNdlR3YXi3Oza9LM59vTDFHD2F6LVzMLPnWX7W2737_xdv439I_ggcJbIpRtI7HcMcvnsDOBgXhU7gYienyp58Lcko9kx0LHiHm_kocpvC4OPl6RmOx-ByzaX12QBMf0lPoBQfYON0oxv3ECVnAdy8IB4sYafStWAaRFoNErBG6C7Ojw9l4kqUyDJkrCtlmEnNkR8K7CiUBRkYltRoqJGfNVFgag64OuvSELFxB7hXy2o4L0pTWoy2ewdZiufB7ICqm0pEYUBc0cKCylrwVRwAnYJDSyR68vdZNcx7JNprOSRnUTVRlw6pskip7cMD6W9_KTNndBfrtTep4jSyDrIwn6UyhUAdbV9Qg5QiHGVVZ7MEuq2rje1FLPcjW5nBLGNMVs7whzPN_vOc1bE9mn46b4_fTjy_gPj8SIzgvYav9sfL7hGla-6qz5D_RPfIz |
| linkToUnpaywall | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV3fT9swED5BeRg8MLaBKLDJD3ucuzpxkuaxVCC0h2oaILGnyPbZE6K0bKQb8NdzFwdWhDSxl0iJbMXxXc7f_dB3AB8zZct8gCg1JoovQZokQRmMG4SACaNcrrYY50en-stZdvaXJmcxfa_65WfTdA0kNy7RvTTr60LrZVjJM8LdHVg5HX8dfufucSovZdrkIXf_MfPJ0dMw9LctVdbg1Xx6ZW7_mMlk4XQ5fB3bFF03pIRcVHLRm9e25-6eUza-YOEbsN6CTDGMWvEGlvz0LawtUA--g59DMZ799hNBzqhnkmPBlmHib8RBGxYXx-c_yAaLb7GK1st9OvCQZqEXHFjjMqMY7xPHJPlLLwj_ihhh9LWYBdEmgUTsDboJJ4cHJ6Mj2bZfkC5NVS0VJsgOhHcFKgKKjEZKPdBITpopMDcGXRmy3BOicCm5Vcg5HReUya1Hm25BZzqb-m0QBVPoKAyYpWQwUFtLXoojYBMwKOVUFz49CKa6iiQbVeOc9MtqOBqRJla8kVW7kV3YZ-E9DmWG7OYBCaBqf7hK5UEVxtPqTKoxC7Ys6IO0I_xldGGxC5ss-oX3kaUl760L8lEXni0mSvXJYnb-c_wurPJtjOLsQaf-NffvCdfU9kOr0PccI_A2 |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=A+Novel+Linearly+Complex+Extended+Signed+Response-Based+Node+Authentication+Scheme+for+Internet+of+Medical+Things&rft.jtitle=IEEE+access&rft.au=Muhammad+Saud+Khan&rft.au=Muhammad+Sardaraz&rft.au=Muhammad+Tahir&rft.au=Abdullah+Alourani&rft.date=2024-01-01&rft.pub=IEEE&rft.eissn=2169-3536&rft.volume=12&rft.spage=175790&rft.epage=175800&rft_id=info:doi/10.1109%2FACCESS.2024.3504744&rft.externalDBID=DOA&rft.externalDocID=oai_doaj_org_article_16f17ae6e0a34d5fb971d24c397a47bd |
| thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=2169-3536&client=summon |
| thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=2169-3536&client=summon |
| thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=2169-3536&client=summon |