A Novel Linearly Complex Extended Signed Response-Based Node Authentication Scheme for Internet of Medical Things

The Internet of Things (IoT) is considered the future of the Internet due to its immense potential. It has captured the interest of researchers who are exploring new possibilities in this field. Unlike the current internet structure, IoT involves the connection of billions of devices and entails a s...

Full description

Saved in:
Bibliographic Details
Published inIEEE access Vol. 12; p. 1
Main Authors Khan, Muhammad Saud, Sardaraz, Muhammad, Tahir, Muhammad, Alourani, Abdullah
Format Journal Article
LanguageEnglish
Published IEEE 01.01.2024
Subjects
Online AccessGet full text
ISSN2169-3536
2169-3536
DOI10.1109/ACCESS.2024.3504744

Cover

Abstract The Internet of Things (IoT) is considered the future of the Internet due to its immense potential. It has captured the interest of researchers who are exploring new possibilities in this field. Unlike the current internet structure, IoT involves the connection of billions of devices and entails a significant exchange of data, diverse traffic, and resource availability. The increasing use of IoT devices in vulnerable environments has presented two major challenges for researchers: authenticating sensor nodes and ensuring secure data routing. These challenges become more difficult by the presence of wireless sensors in communication devices, where all devices are not authenticated or have up-to-date software. Among the various IoT attacks, the Sybil attack poses a significant threat to the network. Consequently, the conventional solutions used for conventional wireless networks (CWN) do not apply to wireless sensor networks due to the differences in algorithms and associated costs in terms of processing and power consumption. To address these challenges, an extended signed response-based (ESRES) solution is proposed. The proposed framework utilizes a pre-distributed key embedded in a sensor node, while the authentication process employs a dual key-based algorithm with linear complexity. In this mechanism, the node uses pre-distributed keys to respond to a random challenge number sent by the server or sink, thus proving its legitimacy. Since there are different types of IoT networks, such as hierarchical and centralized structures, the proposed authentication scheme is designed to be flexible and implementable for both types. The performance of the proposed framework is analyzed and evaluated, considering the probability of attack detection with different authentication key pool sizes for the parameters i.e., processing overhead, probability, and power consumption.
AbstractList The Internet of Things (IoT) is considered the future of the Internet due to its immense potential. It has captured the interest of researchers who are exploring new possibilities in this field. Unlike the current internet structure, IoT involves the connection of billions of devices and entails a significant exchange of data, diverse traffic, and resource availability. The increasing use of IoT devices in vulnerable environments has presented two major challenges for researchers: authenticating sensor nodes and ensuring secure data routing. These challenges become more difficult by the presence of wireless sensors in communication devices, where all devices are not authenticated or have up-to-date software. Among the various IoT attacks, the Sybil attack poses a significant threat to the network. Consequently, the conventional solutions used for conventional wireless networks do not apply to wireless sensor networks due to the differences in algorithms and associated costs in terms of processing and power consumption. To address these challenges, an extended signed response-based (ESRES) solution is proposed. The proposed framework utilizes a pre-distributed key embedded in a sensor node, while the authentication process employs a dual key-based algorithm with linear complexity. In this mechanism, the node uses pre-distributed keys to respond to a random challenge number sent by the server or sink, thus proving its legitimacy. Since there are different types of IoT networks, such as hierarchical and centralized structures, the proposed authentication scheme is designed to be flexible and implementable for both types. The performance of the proposed framework is analyzed and evaluated, considering the probability of attack detection with different authentication key pool sizes for different parameters i.e., processing overhead, probability, and power consumption.
The Internet of Things (IoT) is considered the future of the Internet due to its immense potential. It has captured the interest of researchers who are exploring new possibilities in this field. Unlike the current internet structure, IoT involves the connection of billions of devices and entails a significant exchange of data, diverse traffic, and resource availability. The increasing use of IoT devices in vulnerable environments has presented two major challenges for researchers: authenticating sensor nodes and ensuring secure data routing. These challenges become more difficult by the presence of wireless sensors in communication devices, where all devices are not authenticated or have up-to-date software. Among the various IoT attacks, the Sybil attack poses a significant threat to the network. Consequently, the conventional solutions used for conventional wireless networks (CWN) do not apply to wireless sensor networks due to the differences in algorithms and associated costs in terms of processing and power consumption. To address these challenges, an extended signed response-based (ESRES) solution is proposed. The proposed framework utilizes a pre-distributed key embedded in a sensor node, while the authentication process employs a dual key-based algorithm with linear complexity. In this mechanism, the node uses pre-distributed keys to respond to a random challenge number sent by the server or sink, thus proving its legitimacy. Since there are different types of IoT networks, such as hierarchical and centralized structures, the proposed authentication scheme is designed to be flexible and implementable for both types. The performance of the proposed framework is analyzed and evaluated, considering the probability of attack detection with different authentication key pool sizes for the parameters i.e., processing overhead, probability, and power consumption.
Author Alourani, Abdullah
Khan, Muhammad Saud
Tahir, Muhammad
Sardaraz, Muhammad
Author_xml – sequence: 1
  givenname: Muhammad Saud
  surname: Khan
  fullname: Khan, Muhammad Saud
  organization: Department of Computer Science, Air University Aerospace and Aviation Campus, Kamra, Pakistan
– sequence: 2
  givenname: Muhammad
  orcidid: 0000-0002-7169-8683
  surname: Sardaraz
  fullname: Sardaraz, Muhammad
  organization: Department of Computer Science, COMSATS University, Attock Campus, Islamabad, Pakistan
– sequence: 3
  givenname: Muhammad
  orcidid: 0000-0002-7750-8959
  surname: Tahir
  fullname: Tahir, Muhammad
  organization: Department of Computer Science, COMSATS University, Attock Campus, Islamabad, Pakistan
– sequence: 4
  givenname: Abdullah
  orcidid: 0000-0001-6794-3677
  surname: Alourani
  fullname: Alourani, Abdullah
  organization: Department of Management Information Systems, College of Business and Economics, Qassim University, Buraydah, Saudi Arabia
BookMark eNplkd1O4zAQRi3ESrAsT7B74RdIsWMnTi5LVKBSAWnbe2tqT9qg1C52-OnbYwhaIdY3Y4_mnLH0_STHzjsk5DdnE85ZfTFtmtlyOclZLieiYFJJeUROc17WmShEefzlfkLOY3xg6VSpVahT8jild_4Ze7roHELoD7Txu32Pr3T2OqCzaOmy27hU_mLcexcxu4SYnnfeIp0-DVt0Q2dg6LyjS7PFHdLWBzp3AwaHA_UtvUWbJnq62nZuE3-RHy30Ec8_6xlZXc1WzU22uL-eN9NFZoTgQ8ZtbhmTNRplORc1Y4rXspK2yitQtgSwpm6LEhkvjOCySlOlMi2Hco12Lc7IfNRaDw96H7odhIP20OmPhg8bDSH9vEfNy5YrwKQCIW3RrmuVtksjagVSrW1yydH15PZweIG-_yfkTL-HoMEYjFG_h6A_Q0iYGDETfIwB2_-oMbrv1J-R6hDxC6FKISsl3gAmtZYo
CODEN IAECCG
Cites_doi 10.5120/ijca2017913548
10.1109/IVCNZ.2017.8402502
10.1001/jamanetworkopen.2023.4866
10.1007/s11277-013-1501-5
10.1109/MITP.2019.2961898
10.1016/j.future.2017.08.035
10.1007/978-3-319-28658-7_12
10.1109/JIOT.2021.3080461
10.1109/BigDataSecurity-HPSC-IDS.2019.00030
10.23919/ELINFOCOM.2019.8706366
10.1007/978-3-319-57699-2
10.1016/j.tele.2018.11.006
10.17148/iarjset/nciarcse.2017.38
10.1016/j.procs.2019.09.350
10.1016/j.compmedimag.2005.02.003
10.1007/s11042-020-08801-0
10.1109/ICDCS.2011.83
10.1016/j.future.2017.08.020
10.1016/j.iot.2023.100721
10.1007/s42452-019-1685-8
10.1145/3290688.3290721
10.1016/j.adhoc.2023.103162
10.6633/IJNS.201709.19(5).01
10.1016/j.measurement.2019.02.069
10.1007/s10916-018-1121-4
10.1109/MMUL.2020.2985973
10.1016/j.eswa.2014.04.022
10.1016/j.future.2018.09.024
10.1016/j.comcom.2020.01.038
10.3390/brainsci13040683
10.1109/COMST.2015.2444095
10.1007/s13369-018-3220-4
10.1109/RACSS.2012.6212720
10.1155/2016/9783072
10.1109/ACCESS.2018.2877923
10.1016/j.procs.2015.10.117
10.1016/j.jss.2011.06.021
10.3390/healthcare7020056
10.1007/s10916-018-1007-5
10.1007/978-3-030-22277-2
10.1145/3309074.3309079
10.5120/13494-1217
10.2196/mhealth.7938
10.1016/j.compeleceng.2019.04.017
10.1016/j.procs.2016.08.143
10.1016/j.neucom.2022.05.099
10.1109/ICICV50876.2021.9388616
ContentType Journal Article
DBID 97E
ESBDL
RIA
RIE
AAYXX
CITATION
ADTOC
UNPAY
DOA
DOI 10.1109/ACCESS.2024.3504744
DatabaseName IEEE Xplore (IEEE)
IEEE Xplore Open Access Journals
IEEE All-Society Periodicals Package (ASPP) 1998–Present
IEEE Electronic Library (IEL)
CrossRef
Unpaywall for CDI: Periodical Content
Unpaywall
DOAJ Directory of Open Access Journals
DatabaseTitle CrossRef
DatabaseTitleList

Database_xml – sequence: 1
  dbid: DOA
  name: DOAJ Directory of Open Access Journals
  url: https://www.doaj.org/
  sourceTypes: Open Website
– sequence: 2
  dbid: RIE
  name: IEEE/IET Electronic Library
  url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/
  sourceTypes: Publisher
– sequence: 3
  dbid: UNPAY
  name: Unpaywall
  url: https://proxy.k.utb.cz/login?url=https://unpaywall.org/
  sourceTypes: Open Access Repository
DeliveryMethod fulltext_linktorsrc
Discipline Engineering
EISSN 2169-3536
EndPage 1
ExternalDocumentID oai_doaj_org_article_16f17ae6e0a34d5fb971d24c397a47bd
10.1109/access.2024.3504744
10_1109_ACCESS_2024_3504744
10763487
Genre orig-research
GrantInformation_xml – fundername: Deanship of Graduate Studies and Scientific Research at Qassim University
  grantid: QU-APC-2024-9/1
GroupedDBID 0R~
5VS
6IK
97E
AAJGR
ABAZT
ABVLG
ACGFS
ADBBV
ALMA_UNASSIGNED_HOLDINGS
BCNDV
BEFXN
BFFAM
BGNUA
BKEBE
BPEOZ
EBS
ESBDL
GROUPED_DOAJ
IPLJI
JAVBF
KQ8
M43
M~E
O9-
OCL
OK1
RIA
RIE
RNS
4.4
AAYXX
AGSQL
CITATION
EJD
ADTOC
UNPAY
ID FETCH-LOGICAL-c331t-1d2d0049ec7d113900719484d828a7d6aadc9f56e015c3148d1167cf1a6bedb3
IEDL.DBID UNPAY
ISSN 2169-3536
IngestDate Fri Oct 03 12:44:47 EDT 2025
Sun Sep 07 11:00:01 EDT 2025
Wed Oct 01 03:43:29 EDT 2025
Wed Aug 27 03:03:47 EDT 2025
IsDoiOpenAccess true
IsOpenAccess true
IsPeerReviewed true
IsScholarly true
Language English
License https://creativecommons.org/licenses/by/4.0/legalcode
cc-by
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c331t-1d2d0049ec7d113900719484d828a7d6aadc9f56e015c3148d1167cf1a6bedb3
ORCID 0000-0002-7750-8959
0000-0001-6794-3677
0000-0002-7169-8683
OpenAccessLink https://proxy.k.utb.cz/login?url=http://doi.org/10.1109/access.2024.3504744
PageCount 1
ParticipantIDs doaj_primary_oai_doaj_org_article_16f17ae6e0a34d5fb971d24c397a47bd
unpaywall_primary_10_1109_access_2024_3504744
crossref_primary_10_1109_ACCESS_2024_3504744
ieee_primary_10763487
ProviderPackageCode CITATION
AAYXX
PublicationCentury 2000
PublicationDate 2024-01-01
PublicationDateYYYYMMDD 2024-01-01
PublicationDate_xml – month: 01
  year: 2024
  text: 2024-01-01
  day: 01
PublicationDecade 2020
PublicationTitle IEEE access
PublicationTitleAbbrev Access
PublicationYear 2024
Publisher IEEE
Publisher_xml – name: IEEE
References ref13
ref12
ref11
ref10
ref17
ref16
ref19
ref18
Gupta (ref14) 2020
ref46
ref45
ref48
ref47
ref42
ref41
ref44
ref43
ref49
ref8
ref7
ref9
ref4
ref3
ref6
Nagamani (ref27) 2017; 7
ref5
ref40
ref35
ref34
Salameh (ref15) 2019; 19
ref37
ref36
ref31
ref30
ref33
ref32
ref2
ref1
ref39
ref38
ref24
ref23
ref26
ref25
ref20
ref22
ref21
ref28
ref29
References_xml – ident: ref19
  doi: 10.5120/ijca2017913548
– ident: ref30
  doi: 10.1109/IVCNZ.2017.8402502
– ident: ref48
  doi: 10.1001/jamanetworkopen.2023.4866
– ident: ref4
  doi: 10.1007/s11277-013-1501-5
– ident: ref12
  doi: 10.1109/MITP.2019.2961898
– ident: ref26
  doi: 10.1016/j.future.2017.08.035
– ident: ref33
  doi: 10.1007/978-3-319-28658-7_12
– ident: ref21
  doi: 10.1109/JIOT.2021.3080461
– ident: ref45
  doi: 10.1109/BigDataSecurity-HPSC-IDS.2019.00030
– volume: 7
  start-page: 1186
  issue: 4
  year: 2017
  ident: ref27
  article-title: A mobile cloud based approach for secure M-Health application
  publication-title: Int. J. Res. Appl. Sci. Eng. Technol.
– ident: ref32
  doi: 10.23919/ELINFOCOM.2019.8706366
– ident: ref6
  doi: 10.1007/978-3-319-57699-2
– ident: ref38
  doi: 10.1016/j.tele.2018.11.006
– volume: 19
  start-page: 28
  issue: 4
  year: 2019
  ident: ref15
  article-title: A new approach for securing medical images and Patient’s information by using a hybrid system
  publication-title: Int. J. Comp. Sci. Netw. Secur.
– ident: ref1
  doi: 10.17148/iarjset/nciarcse.2017.38
– ident: ref46
  doi: 10.1016/j.procs.2019.09.350
– ident: ref10
  doi: 10.1016/j.compmedimag.2005.02.003
– ident: ref7
  doi: 10.1007/s11042-020-08801-0
– ident: ref22
  doi: 10.1109/ICDCS.2011.83
– ident: ref39
  doi: 10.1016/j.future.2017.08.020
– ident: ref2
  doi: 10.1016/j.iot.2023.100721
– ident: ref28
  doi: 10.1007/s42452-019-1685-8
– ident: ref11
  doi: 10.1145/3290688.3290721
– ident: ref29
  doi: 10.1016/j.adhoc.2023.103162
– ident: ref41
  doi: 10.6633/IJNS.201709.19(5).01
– ident: ref16
  doi: 10.1016/j.measurement.2019.02.069
– ident: ref43
  doi: 10.1007/s10916-018-1121-4
– ident: ref13
  doi: 10.1109/MMUL.2020.2985973
– ident: ref18
  doi: 10.1016/j.eswa.2014.04.022
– ident: ref36
  doi: 10.1016/j.future.2018.09.024
– ident: ref8
  doi: 10.1016/j.comcom.2020.01.038
– ident: ref3
  doi: 10.3390/brainsci13040683
– ident: ref5
  doi: 10.1109/COMST.2015.2444095
– ident: ref35
  doi: 10.1007/s13369-018-3220-4
– ident: ref34
  doi: 10.1109/RACSS.2012.6212720
– ident: ref49
  doi: 10.1155/2016/9783072
– ident: ref9
  doi: 10.1109/ACCESS.2018.2877923
– ident: ref25
  doi: 10.1016/j.procs.2015.10.117
– ident: ref17
  doi: 10.1016/j.jss.2011.06.021
– ident: ref40
  doi: 10.3390/healthcare7020056
– ident: ref42
  doi: 10.1007/s10916-018-1007-5
– start-page: 978
  volume-title: Handbook of Computer Networks and Cyber Security
  year: 2020
  ident: ref14
  doi: 10.1007/978-3-030-22277-2
– ident: ref44
  doi: 10.1145/3309074.3309079
– ident: ref20
  doi: 10.5120/13494-1217
– ident: ref47
  doi: 10.2196/mhealth.7938
– ident: ref37
  doi: 10.1016/j.compeleceng.2019.04.017
– ident: ref31
  doi: 10.1016/j.procs.2016.08.143
– ident: ref23
  doi: 10.1016/j.neucom.2022.05.099
– ident: ref24
  doi: 10.1109/ICICV50876.2021.9388616
SSID ssj0000816957
Score 2.3025181
Snippet The Internet of Things (IoT) is considered the future of the Internet due to its immense potential. It has captured the interest of researchers who are...
SourceID doaj
unpaywall
crossref
ieee
SourceType Open Website
Open Access Repository
Index Database
Publisher
StartPage 1
SubjectTerms Algorithm
Algorithms
Authentication
Big Data
Cryptography
data privacy
Electrocardiography
Encryption
Energy Efficiency
Internet of Medical Things
Internet of Things
IoT
Protocols
Security
Servers
Wireless Network
wireless networks
Wireless sensor networks
SummonAdditionalLinks – databaseName: DOAJ Directory of Open Access Journals
  dbid: DOA
  link: http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwrV07T8NADD6hLtAB8SiivHQDI6G55PIa26qoYuhAi9QtupzvEFJpC2p5_HvsXKhSMbCwZIjycD7nbH8-y2bsOhJFFqcAnoRA0MF6KgjAs0qn1kJAUS5VW4zi4aO8n0bT2qgvqglz7YEdcB0RW5EoExtfhRIiW2SJgEBq9KNKJgWQ9fXTrEamShucijiLkqrNkPCzTrffxy9CQhjI2zDyZSLllisqO_ZXI1aabHc9X6qvDzWb1bzN3QHbr8JE3nXiHbIdMz9izVrzwGP22uWjxbuZcaSThtoUc1rbM_PJB1Vim4-fn9CK8gdXB2u8HroswLvAcEqNUaGQy9jxMeruxXCMYLnLEZoVX1hebeNwN92zxSZ3g0l_6FUDFDwdhmLlIVBAFMDoBASGehRPZDKVgDRLJRArBTqzEWIrIh0iMQLaldFWqLgwUIQnrDFfzM0p4wk1wRFgIQpxyYMsCuQZGkMTC1YILdrs5gfKfOnaZOQlvfCz3CGfE_J5hXyb9QjuzaXU47o8gZrPK83nf2m-zVqkrNr70FYi_2ozb6O9X8KocgzlljBn_yHMOdujZ7rkzAVrrN7W5hLDlVVxVf6Z34kf5Uk
  priority: 102
  providerName: Directory of Open Access Journals
– databaseName: IEEE Electronic Library (IEL)
  dbid: RIE
  link: http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1LbxMxEB7RXqCH8ioivOQDRzbEu9519phGrSoOOdAi9bayPWOECElBGwr8embWbpSCkLisotUmGe_nxzfj8TcAr2vt22aKWBgstVxi4coSi-jCNEYsheVKtsWiOftg3l3Wl_mw-nAWhoiG5DMay8dhLx_XYSOhMh7hPBqYYe_Bnp026bDWNqAiFSTa2mZlIT1p387mc24E-4ClGVf1xFhjbq0-g0h_rqpyAHc3qyv389otlzsLzOl9WNyYlvJKPo83vR-HX3-oNv637Q_gMFNNNUt94yHcodUjONgRIHwMX2dqsf5OS8UuKYnUsZL5YUk_1EkOjqvzTx95JlbvUy4tFce87CF_C0lJeE2SjVLUT50z_l9IMQtWKc5IvVpHlbeCVKoQegQXpycX87MiF2EoQlXpvtBYorgRFCxqpovCSVozNciumrPYOIehjXVDzCtCxc4Vys5OiNo1ntBXT2B_tV7RU1BWhHQ0RqwrnjbQeM--SmB6EzFqHfQI3txg010lqY1ucFEmbZeg7ATKLkM5gmPBb_uo6GQPN_i1d3nYdbqJ2jpi61xlsI6-tdwgE5iFOWM9juBIoNr5v4TSCIptd_jLGDeUsrxlzLN__M5zuCePpZjNC9jvv23oJbOY3r8aeu9vK1Tu5g
  priority: 102
  providerName: IEEE
Title A Novel Linearly Complex Extended Signed Response-Based Node Authentication Scheme for Internet of Medical Things
URI https://ieeexplore.ieee.org/document/10763487
http://doi.org/10.1109/access.2024.3504744
https://doaj.org/article/16f17ae6e0a34d5fb971d24c397a47bd
UnpaywallVersion publishedVersion
Volume 12
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
journalDatabaseRights – providerCode: PRVAFT
  databaseName: Open Access Digital Library
  customDbUrl:
  eissn: 2169-3536
  dateEnd: 99991231
  omitProxy: true
  ssIdentifier: ssj0000816957
  issn: 2169-3536
  databaseCode: KQ8
  dateStart: 20130101
  isFulltext: true
  titleUrlDefault: http://grweb.coalliance.org/oadl/oadl.html
  providerName: Colorado Alliance of Research Libraries
– providerCode: PRVAON
  databaseName: DOAJ Directory of Open Access Journals
  customDbUrl:
  eissn: 2169-3536
  dateEnd: 99991231
  omitProxy: true
  ssIdentifier: ssj0000816957
  issn: 2169-3536
  databaseCode: DOA
  dateStart: 20130101
  isFulltext: true
  titleUrlDefault: https://www.doaj.org/
  providerName: Directory of Open Access Journals
– providerCode: PRVHPJ
  databaseName: ROAD: Directory of Open Access Scholarly Resources
  customDbUrl:
  eissn: 2169-3536
  dateEnd: 99991231
  omitProxy: true
  ssIdentifier: ssj0000816957
  issn: 2169-3536
  databaseCode: M~E
  dateStart: 20130101
  isFulltext: true
  titleUrlDefault: https://road.issn.org
  providerName: ISSN International Centre
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV1LT9wwEB6V5QAc6AOqLpSVDxzrZZ04yea4rECoh1XFQ6KnyPbYVdXtLm2zbeHXMxMHWISE2kukRI7ieCbjbx75BmA_U7bMh4hSY6L4EKRJEpTBuGEImDDK5WqLSX5yoT9eZpcPNDnL6Xs1KA9M0zWQ3LhE99NsoAutV2A1zwh3d2D1YvJp9Jm7x6m8lGmTh9x95s5HW0_D0N-2VNmAtcXsylz_MdPp0u5y_DK2KfrVkBJyUcm3_qK2fXfzlLLxHyb-CjZbkClGUStewws_ewMbS9SDW_BjJCbz334qyBn1THIs2DJM_V9x1IbFxdnXL2SDxWmsovXykDY8pLvQCw6scZlRjPeJM5L8dy8I_4oYYfS1mAfRJoFE7A26DefHR-fjE9m2X5AuTVUtFSbIDoR3BSoCioxGSj3USE6aKTA3Bl0ZstwTonApuVXIOR0XlMmtR5u-hc5sPvPvQBRMoaMwYJaSwUBtLXkpjoBNwKCUU134cCeY6iqSbFSNczIoq9F4TJpY8UJW7UJ24ZCFdz-UGbKbCySAqv3gKpUHVRhPszOpxizYsqAX0o7wl9GFxS5ss-iXnkeWlry3Lsh7XXgymSjVR5PZ-c_xu7DOpzGK8x469c-F3yNcU9teEw_oNb8g9lrlvgVldvIs
linkProvider Unpaywall
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV3db9MwED_BeBh74HNoBQZ-4JGUOrGT5rGrNhUYfWBF2ltk--wJUdoNpWzw13MXe1XHhMRLFEX5OOfO9u_O598BvNHS1uUQMVOYSz6EzOQ5ZsG4YQiYM8rlbItpOfmiPpzq07RZvdsL473vks98n0-7tXxcuhWHyqiHU28ghH0X7mmllI7btdYhFa4hUesqcQvJQf1uNB5TM8gLzFW_0ANVKXVj_ulo-lNdlR3YXi3Oza9LM59vTDFHD2F6LVzMLPnWX7W2737_xdv439I_ggcJbIpRtI7HcMcvnsDOBgXhU7gYienyp58Lcko9kx0LHiHm_kocpvC4OPl6RmOx-ByzaX12QBMf0lPoBQfYON0oxv3ECVnAdy8IB4sYafStWAaRFoNErBG6C7Ojw9l4kqUyDJkrCtlmEnNkR8K7CiUBRkYltRoqJGfNVFgag64OuvSELFxB7hXy2o4L0pTWoy2ewdZiufB7ICqm0pEYUBc0cKCylrwVRwAnYJDSyR68vdZNcx7JNprOSRnUTVRlw6pskip7cMD6W9_KTNndBfrtTep4jSyDrIwn6UyhUAdbV9Qg5QiHGVVZ7MEuq2rje1FLPcjW5nBLGNMVs7whzPN_vOc1bE9mn46b4_fTjy_gPj8SIzgvYav9sfL7hGla-6qz5D_RPfIz
linkToUnpaywall http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV3fT9swED5BeRg8MLaBKLDJD3ucuzpxkuaxVCC0h2oaILGnyPbZE6K0bKQb8NdzFwdWhDSxl0iJbMXxXc7f_dB3AB8zZct8gCg1JoovQZokQRmMG4SACaNcrrYY50en-stZdvaXJmcxfa_65WfTdA0kNy7RvTTr60LrZVjJM8LdHVg5HX8dfufucSovZdrkIXf_MfPJ0dMw9LctVdbg1Xx6ZW7_mMlk4XQ5fB3bFF03pIRcVHLRm9e25-6eUza-YOEbsN6CTDGMWvEGlvz0LawtUA--g59DMZ799hNBzqhnkmPBlmHib8RBGxYXx-c_yAaLb7GK1st9OvCQZqEXHFjjMqMY7xPHJPlLLwj_ihhh9LWYBdEmgUTsDboJJ4cHJ6Mj2bZfkC5NVS0VJsgOhHcFKgKKjEZKPdBITpopMDcGXRmy3BOicCm5Vcg5HReUya1Hm25BZzqb-m0QBVPoKAyYpWQwUFtLXoojYBMwKOVUFz49CKa6iiQbVeOc9MtqOBqRJla8kVW7kV3YZ-E9DmWG7OYBCaBqf7hK5UEVxtPqTKoxC7Ys6IO0I_xldGGxC5ss-oX3kaUl760L8lEXni0mSvXJYnb-c_wurPJtjOLsQaf-NffvCdfU9kOr0PccI_A2
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=A+Novel+Linearly+Complex+Extended+Signed+Response-Based+Node+Authentication+Scheme+for+Internet+of+Medical+Things&rft.jtitle=IEEE+access&rft.au=Muhammad+Saud+Khan&rft.au=Muhammad+Sardaraz&rft.au=Muhammad+Tahir&rft.au=Abdullah+Alourani&rft.date=2024-01-01&rft.pub=IEEE&rft.eissn=2169-3536&rft.volume=12&rft.spage=175790&rft.epage=175800&rft_id=info:doi/10.1109%2FACCESS.2024.3504744&rft.externalDBID=DOA&rft.externalDocID=oai_doaj_org_article_16f17ae6e0a34d5fb971d24c397a47bd
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=2169-3536&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=2169-3536&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=2169-3536&client=summon