Enhancing the Security: A Lightweight Authentication and Key Agreement Protocol for Smart Medical Services in the IoHT
Abstract
:1. Introduction
- (1)
- We conducted a thorough review of Amintoosi et al.’s protocol and identified certain security weaknesses, particularly PI attacks.
- (2)
- In response to the identified weaknesses, we propose an enhanced AKA protocol for smart medical services in the IoHT. Our protocol utilizes lightweight primitives and facilitates the establishment of session keys between doctors and sensor nodes with the assistance of gateways, ensuring secure communication.
- (3)
- To validate the security of our proposed protocol, we conducted a rigorous analysis using the Real-Or-Random (ROR) model, informal security analysis, and the automated validation of Internet security protocols and applications (AVISPA) tool.
- (4)
- Finally, we compare the performance and security of our proposed protocol with existing protocols. The comparison results demonstrate that our proposed protocol offers sufficient security with comparable performance to other protocols in the IoHT environment.
2. Review and Cryptanalysis of Amintoosi et al.’s Protocol [29]
2.1. Review of Amintoosi et al.’s Protocol [29]
2.1.1. Registration
- (1)
- User chooses , , and , and calculates = . Next, sends to via a secure channel.
- (2)
- On receiving the , firstly searches for the stored in the database. If the exists, the should be asked to send a new . Otherwise, selects to compute , , , , , and . Then, stores in smart card, and stores in its database. Finally, transmits smart card to .
- (3)
- When receives the smart card, is added to it.
- (1)
- Sensor selects and to calculate = , and sends to via secure channel.
- (2)
- When receives the , it computes , and . Then, stores in database, and transmits to .
- (3)
- receives the , and stores in its memory.
2.1.2. Login and Authentication Phase
- (1)
- First, inputs , , computes , , , , and checks . If it holds, chooses and to compute , . Finally, transmits message to via public channel.
- (2)
- After receives , it verifies freshness of by calculating . Then, computes , , and checks . If the two values do not correspond, the authentication process is suspended. Otherwise, selects , and calculates , . Finally, retrieves and transmits the message to .
- (3)
- On receiving the , it first verifies . Next, computes and checks . If the two values are equal, chooses , and computes , , . At last, transmits the message to .
- (4)
- verifies the after receiving the . Next, computes , , , and checks . If the two values are equal, the selects a timestamp and computes , , . Next, transmits message to .
- (5)
- verifies the after receiving the . If it is fresh, computes and checks . If the two values are equal, computes , , and then computes .
2.2. Cryptanalysis of Amintoosi et al.’s Protocol
- (1)
- possesses the capability to intercept, monitor, and manipulate messages that are transmitted through the public channel.
- (2)
- The medical server may have a malicious insider named who can acquire data from the database.
- (3)
- can utilize power analysis to obtain the data in the user’s smart card or smart device.
- (4)
- can obtain temporary information value and long-term key.
2.2.1. Privileged Insider Attacks
- (1)
- can eavesdrop on the messages , and on public channel.
- (2)
- Next, can compute and , respectively.
- (3)
- At last, can compute .
2.2.2. Incorrectness of
3. The Proposed Protocol
3.1. Initialization and Registration Phases
3.1.1. Initialization Phase
- (1)
- chooses its and a random number , and sends to via a secure channel.
- (2)
- When receives the , it calculates , . Then, stores in its database. Finally, transmits to .
- (3)
- On receiving , computes . Next, stores } in its memory.
3.1.2. Doctor Registration Phase
- (1)
- First, chooses , , , and calculates = . Next, transmits to via secure channel.
- (2)
- When receives the , it chooses to compute , . Then stores in database, and transmits to .
- (3)
- On receiving , calculates , , , . Finally, stores } in smart device.
3.2. Login and Authentication Phase
- (1)
- First, inputs , , and calculates , , , . Then, checks . If it is not equal, login fails. Otherwise, computes , and chooses and its . Next, calculates , , , and retrieves the to compute . Finally, sends message to via public channel.
- (2)
- Following the receipt of message , initially verifies that timestamp is fresh. Next, retrieves from the database using and calculates , , , , and checks . If they are equal, retrieves according to and computes , . At last, retrieves the current timestamp to compute and transmits message to .
- (3)
- When receives the , it checks freshness of by computing . Then, calculates , , and checks . If it holds, chooses to calculate , , . Finally, retrieves to compute and transmits message to .
- (4)
- When receives the , it verifies the freshness of . Next, computes , and checks . If , computes and retrieves current timestamp to calculate . Finally, sends message to .
- (5)
- verifies freshness of the after receiving . Then, computes , and checks . If it holds, computes , which means that the and successfully establish a with the assistance of the .
4. Security Analysis
4.1. Formal Security Analysis
4.1.1. Security Model
- (1)
- : This query means that can intercept messages on the public channel, where .
- (2)
- : is able to acquire the response from subsequent to transmitting message to .
- (3)
- : may enter a to obtain its hash value by performing this query.
- (4)
- : This query gives access to the long-term key or temporary information of .
- (5)
- : The would verify the validity of the by flipping a coin c. When , obtains the . Otherwise, obtains the random string.
4.1.2. Security Proof
4.2. Informal Security Analysis
4.2.1. Perfect Forward Secrecy (PFS)
- (1)
- First, the composition of the session key requires variables , where . Based on the rules of Ge et al. [45], we add these variables around and use arrows to point to . Then, we proceed step by step to analyze the newly added variables. For example, the composition of requires or or .
- (2)
- Then, coloring is employed to denote nodes that involve long-term secrets or are transmitted over public channels. These nodes are , which means that can obtain these variables.
- (3)
- Finally, we remove the incoming edges of all colored nodes, and judge whether the proposed protocol ensures PFS through the remaining nodes. From Figure 9, we can see that the does not have the required variables to compute the .
4.2.2. Privileged Insider (PI) Attacks
4.2.3. Sensor Node Capture (SNC) Attacks
4.2.4. Offline Password Guessing (OPG) Attacks
4.2.5. Session Key Disclosure (SKD) Attacks
4.2.6. Correctness of
4.2.7. Man-In-The-Middle (MITM) Attacks
4.2.8. Mutual Authentication
4.3. AVISPA
5. Security and Performance Comparisons
5.1. Security Comparisons
5.2. Performance Comparisons
5.2.1. Computational Cost Comparisons
5.2.2. Communication Cost Comparisons
5.2.3. Storage Cost Comparisons
- Security comparison: Our proposed protocol, along with Wu et al.’s protocol, demonstrates the ability to withstand all known attacks. In contrast, other protocols in the comparison exhibit varying degrees of vulnerability to certain attacks.
- Performance comparison: Despite having the same security level of as Wu et al.’s protocol, our protocol outperforms theirs in terms of computational and storage costs, while also possessing scalability. Additionally, while our computational cost is slightly higher compared to Amintoosi et al.’s protocol, our communication and storage costs are lower than theirs.
6. Conclusions
Author Contributions
Funding
Data Availability Statement
Conflicts of Interest
Abbreviations
IoT | Internet of Things |
IoHT | Internet Health of Things |
ROR | Real-Or-Random |
MITM | Man-in-the-middle |
AKA | Authentication and key agreement |
ECC | Elliptic curve cryptography |
PFS | Perfect forward secrecy |
OPG | Offline password guessing |
SNC | Sensor node capture |
PI | Privileged insider |
KSSTI | Known session specific temporary information |
MIoT | Medical Internet of Things |
SKD | Session key disclosure |
AVISPA | Automated validation of internet security protocols and applications |
HLPSL | High-Level Protocol Specification Language |
OFMC | On-the-Fly Model-Checker |
CL-AtSe | Constraint Logic-based Attack Searcher |
References
- Shen, S.; Yang, Y.; Liu, X. Toward data privacy preservation with ciphertext update and key rotation for IoT. Concurr. Comput. Pract. Exp. 2021, 35, e6729. [Google Scholar] [CrossRef]
- Huang, X.; Xiong, H.; Chen, J.; Yang, M. Efficient revocable storage attribute-based encryption with arithmetic span programs in cloud-assisted internet of things. IEEE Trans. Cloud Comput. 2023, 11, 1273–1285. [Google Scholar] [CrossRef]
- Guezzaz, A.; Benkirane, S.; Azrour, M. A novel anomaly network intrusion detection system for internet of things security. In IoT and Smart Devices for Sustainable Environment; Springer: Berlin/Heidelberg, Germany, 2022; pp. 129–138. [Google Scholar] [CrossRef]
- Wu, T.Y.; Meng, Q.; Chen, Y.C.; Kumari, S.; Chen, C.M. Toward a Secure Smart-Home IoT Access Control Scheme Based on Home Registration Approach. Mathematics 2023, 11, 2123. [Google Scholar] [CrossRef]
- Luo, Y.; Zheng, W.m.; Chen, Y.C. An anonymous authentication and key exchange protocol in smart grid. J. Netw. Intell. 2021, 6, 206–215. [Google Scholar]
- Chaudhry, S.A. Combating identity de-synchronization: An improved lightweight symmetric key based authentication scheme for IoV. J. Netw. Intell. 2021, 6, 12. [Google Scholar]
- Xiong, H.; Chen, J.; Mei, Q.; Zhao, Y. Conditional privacy-preserving authentication protocol with dynamic membership updating for VANETs. IEEE Trans. Dependable Secur. Comput. 2022, 19, 2089–2104. [Google Scholar] [CrossRef]
- Xue, X.; Chen, J. Matching biomedical ontologies through compact differential evolution algorithm with compact adaption schemes on control parameters. Neurocomputing 2021, 458, 526–534. [Google Scholar] [CrossRef]
- Xue, X.; Huang, Q. Generative adversarial learning for optimizing ontology alignment. Expert Syst. 2023, 40, e12936. [Google Scholar] [CrossRef]
- Xiong, H.; Qin, Z. Revocable and scalable certificateless remote authentication protocol with anonymity for wireless body area networks. IEEE Trans. Inf. Forensics Secur. 2015, 10, 1442–1455. [Google Scholar] [CrossRef]
- Si-Ahmed, A.; Al-Garadi, M.A.; Boustia, N. Survey of Machine Learning based intrusion detection methods for Internet of Medical Things. Appl. Soft Comput. 2023, 140, 110227. [Google Scholar] [CrossRef]
- Singh, A.; Chatterjee, K.; Satapathy, S.C. TrIDS: An intelligent behavioural trust based IDS for smart healthcare system. Clust. Comput. 2023, 26, 903–925. [Google Scholar] [CrossRef]
- Nikkhah, F.; Safkhani, M. LAPCHS: A lightweight authentication protocol for cloud-based health-care systems. Comput. Netw. 2021, 187, 107833. [Google Scholar] [CrossRef]
- Gupta, S.; Arya, P.K.; Sharma, H.K. User anonymity-based secure authentication protocol for telemedical server systems. Int. J. Inf. Comput. Secur. 2023, 20, 199–219. [Google Scholar] [CrossRef]
- Safkhani, M.; Vasilakos, A. A new secure authentication protocol for telecare medicine information system and smart campus. IEEE Access 2019, 7, 23514–23526. [Google Scholar] [CrossRef]
- Alzahrani, B.A.; Irshad, A.; Albeshri, A.; Alsubhi, K. A provably secure and lightweight patient-healthcare authentication protocol in wireless body area networks. Wirel. Pers. Commun. 2021, 117, 47–69. [Google Scholar] [CrossRef]
- Yu, S.; Park, K. SALS-TMIS: Secure, Anonymous and Lightweight Privacy-Preserving Scheme for IoMT-Enabled TMIS Environments. IEEE Access 2022, 10, 60534–60549. [Google Scholar] [CrossRef]
- Lee, J.; Oh, J.; Park, Y. A secure and anonymous authentication protocol based on three-factor wireless medical sensor networks. Electronics 2023, 12, 1368. [Google Scholar] [CrossRef]
- Li, J.; Su, Z.; Guo, D.; Choo, K.K.R.; Ji, Y. PSL-MAAKA: Provably secure and lightweight mutual authentication and key agreement protocol for fully public channels in internet of medical things. IEEE Internet Things J. 2021, 8, 13183–13195. [Google Scholar] [CrossRef]
- Shamshad, S.; Ayub, M.F.; Mahmood, K.; Kumari, S.; Chaudhry, S.A.; Chen, C.M. An enhanced scheme for mutual authentication for healthcare services. Digit. Commun. Netw. 2022, 8, 150–161. [Google Scholar] [CrossRef]
- Diffie, W.; Van Oorschot, P.C.; Wiener, M.J. Authentication and authenticated key exchanges. Des. Codes Cryptogr. 1992, 2, 107–125. [Google Scholar] [CrossRef]
- Challa, S.; Das, A.K.; Odelu, V.; Kumar, N.; Kumari, S.; Khan, M.K.; Vasilakos, A.V. An efficient ECC-based provably secure three-factor user authentication and key agreement protocol for wireless healthcare sensor networks. Comput. Electr. Eng. 2018, 69, 534–554. [Google Scholar] [CrossRef]
- Soni, P.; Pal, A.K.; Islam, S.H. An improved three-factor authentication scheme for patient monitoring using WSN in remote health-care system. Comput. Methods Programs Biomed. 2019, 182, 105054. [Google Scholar] [CrossRef] [PubMed]
- Xu, G.; Wang, F.; Zhang, M.; Peng, J. Efficient and provably secure anonymous user authentication scheme for patient monitoring using wireless medical sensor networks. IEEE Access 2020, 8, 47282–47294. [Google Scholar] [CrossRef]
- Qiu, S.; Xu, G.; Ahmad, H.; Wang, L. A Robust Mutual Authentication Scheme Based on Elliptic Curve Cryptography for Telecare Medical Information Systems. IEEE Access 2018, 6, 7452–7463. [Google Scholar] [CrossRef]
- Sharma, G.; Kalra, S. A lightweight user authentication scheme for cloud-IoT based healthcare services. Iran. J. Sci. Technol. Trans. Electr. Eng. 2019, 43, 619–636. [Google Scholar] [CrossRef]
- Azrour, M.; Mabrouki, J.; Chaganti, R. New efficient and secured authentication protocol for remote healthcare systems in cloud-iot. Secur. Commun. Netw. 2021, 2021, 5546334. [Google Scholar] [CrossRef]
- Aghili, S.F.; Mala, H.; Shojafar, M.; Peris-Lopez, P. LACO: Lightweight three-factor authentication, access control and ownership transfer scheme for e-health systems in IoT. Future Gener. Comput. Syst. 2019, 96, 410–424. [Google Scholar] [CrossRef]
- Amintoosi, H.; Nikooghadam, M.; Shojafar, M.; Kumari, S.; Alazab, M. Slight: A lightweight authentication scheme for smart healthcare services. Comput. Electr. Eng. 2022, 99, 107803. [Google Scholar] [CrossRef]
- Merabet, F.; Cherif, A.; Belkadi, M.; Blazy, O.; Conchon, E.; Sauveron, D. New efficient M2C and M2M mutual authentication protocols for IoT-based healthcare applications. Peer-to-Peer Netw. Appl. 2020, 13, 439–474. [Google Scholar] [CrossRef]
- Kumari, A.; Kumar, V.; Abbasi, M.Y.; Kumari, S.; Chaudhary, P.; Chen, C.M. Csef: Cloud-based secure and efficient framework for smart medical system using ecc. IEEE Access 2020, 8, 107838–107852. [Google Scholar] [CrossRef]
- Wu, T.Y.; Yang, L.; Luo, J.N.; Ming-Tai Wu, J. A provably secure authentication and key agreement protocol in cloud-based smart healthcare environments. Secur. Commun. Netw. 2021, 2021, 2299632. [Google Scholar] [CrossRef]
- Hajian, R.; ZakeriKia, S.; Erfani, S.H.; Mirabi, M. SHAPARAK: Scalable healthcare authentication protocol with attack-resilience and anonymous key-agreement. Comput. Netw. 2020, 183, 107567. [Google Scholar] [CrossRef]
- Alladi, T.; Chamola, V. HARCI: A two-way authentication protocol for three entity healthcare IoT networks. IEEE J. Sel. Areas Commun. 2020, 39, 361–369. [Google Scholar] [CrossRef]
- Shuai, M.; Yu, N.; Wang, H.; Xiong, L.; Li, Y. A lightweight three-factor Anonymous authentication scheme with privacy protection for personalized healthcare applications. J. Organ. End User Comput. (JOEUC) 2021, 33, 1–18. [Google Scholar] [CrossRef]
- Xie, Q.; Ding, Z.; Hu, B. A secure and privacy-preserving three-factor anonymous authentication scheme for wireless sensor networks in Internet of Things. Secur. Commun. Netw. 2021, 2021, 4799223. [Google Scholar] [CrossRef]
- Agrahari, A.K.; Varma, S.; Venkatesan, S. Two factor authentication protocol for IoT based healthcare monitoring system. J. Ambient. Intell. Humaniz. Comput. 2022, 1–18. [Google Scholar] [CrossRef] [PubMed]
- Al-Saggaf, A.A.; Sheltami, T.; Alkhzaimi, H.; Ahmed, G. Lightweight two-factor-based user authentication protocol for iot-enabled healthcare ecosystem in quantum computing. Arab. J. Sci. Eng. 2023, 48, 2347–2357. [Google Scholar] [CrossRef] [PubMed]
- Dolev, D.; Yao, A. On the security of public key protocols. IEEE Trans. Inf. Theory 1983, 29, 198–208. [Google Scholar] [CrossRef]
- Canetti, R.; Krawczyk, H. Analysis of key-exchange protocols and their use for building secure channels. In International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings of the EUROCRYPT 2001: Advances in Cryptology—EUROCRYPT 2001, Innsbruck, Austria, 6–10 May 2001; Springer: Berlin/Heidelberg, Germany, 2001; Volume 2045, pp. 453–474. [Google Scholar]
- Abdalla, M.; Fouque, P.A.; Pointcheval, D. Password-based authenticated key exchange in the three-party setting. In Public Key Cryptography-PKC 2005, Proceedings of the 8th International Workshop on Theory and Practice in Public Key Cryptography, Les Diablerets, Switzerland, 23–26 January 2005; Springer: Berlin/Heidelberg, Germany, 2005; Volume 3386, pp. 65–84. [Google Scholar]
- Li, X.; Liu, S.; Kumari, S.; Chen, C.M. PSAP-WSN: A Provably Secure Authentication Protocol for 5G-Based Wireless Sensor Networks. CMES-Comput. Model. Eng. Sci. 2023, 135, 711–732. [Google Scholar] [CrossRef]
- Chen, C.M.; Liu, S.; Li, X.; Islam, S.H.; Das, A.K. A provably-secure authenticated key agreement protocol for remote patient monitoring IoMT. J. Syst. Archit. 2023, 136, 102831. [Google Scholar] [CrossRef]
- Wang, D.; Cheng, H.; Wang, P.; Huang, X.; Jian, G. Zipf’s law in passwords. IEEE Trans. Inf. Forensics Secur. 2017, 12, 2776–2791. [Google Scholar] [CrossRef]
- Ge, M.; Kumari, S.; Chen, C.M. AuthPFS: A Method to Verify Perfect Forward Secrecy in Authentication Protocols. J. Netw. Intell. 2022, 7, 734–750. [Google Scholar]
- Armando, A.; Basin, D.; Boichut, Y.; Chevalier, Y.; Compagna, L.; Cuéllar, J.; Drielsma, P.H.; Héam, P.C.; Kouchnarenko, O.; Mantovani, J.; et al. The AVISPA tool for the automated validation of internet security protocols and applications. In Proceedings of the Computer Aided Verification: 17th International Conference, CAV 2005, Edinburgh, UK, 6–10 July 2005; Springer: Berlin/Heidelberg, Germany, 2005; pp. 281–285. [Google Scholar]
- Wu, T.Y.; Meng, Q.; Yang, L.; Kumari, S.; Pirouz, M. Amassing the Security: An Enhanced Authentication and Key AgreementProtocol for Remote Surgery in Healthcare Environment. CMES-Comput. Model. Eng. Sci. 2023, 134, 317–341. [Google Scholar] [CrossRef]
- De Caro, A.; Iovino, V. jPBC: Java pairing based cryptography. In Proceedings of the 2011 IEEE Symposium on Computers and Communications (ISCC), Kerkyra, Greece, 28 June–1 July 2011; pp. 850–855. [Google Scholar] [CrossRef]
Notations | Description |
---|---|
i-th user | |
’s identity and pseudo-identity | |
Password of | |
Medical server | |
’s identity | |
s | Private key of |
Gateway node | |
k | ’s private key |
j-th sensor | |
’s identity | |
Secret key of | |
Session key | |
Timestamp | |
The random numbers | |
⊕ | Bitwise XOR |
Secure-hash function | |
Concatenation operation |
Query | Description |
---|---|
For , start). Assume is in a normal state and selects , and to compute , , , . Next, the query returns the . | |
On . Assume that computes and checks in a normal state. Next, calculates . Then, selects . The query is answered by . | |
For . On receiving the message , computes and checks the . Then, calculates . Next, returns the output . | |
For . Assume that computes , and checks in a normal state. If the holds, calculates and selects . Then, the query returns the . | |
On ). Upon receiving the message (), computes and checks . If the is correct, computes , which means that the accepts and terminates. | |
Continue to use queries to simulate the process for . ⟵(, start), ) ⟵(, ⟵ (, ⟵ (. The query returns , (), and (). | |
If the is accepted, this query outputs in the smart device. | |
Flip the coin c. If the result is 1, the will be returned. Otherwise, a random string of the same length as will be returned. |
Security Properties | Soni et al. [23] | Hajian et al. [33] | Shuai et al. [35] | Amintoosi et al. [29] | Wu et al. [47] | Ours |
---|---|---|---|---|---|---|
S1 | √ | × [17] | √ | √ | √ | √ |
S2 | × [24] | √ | × [36] | √ | √ | √ |
S3 | √ | √ | × [36] | × | √ | √ |
S4 | × [24] | √ | √ | √ | √ | √ |
S5 | √ | × [17] | √ | √ | √ | √ |
S6 | × [24] | √ | √ | √ | √ | √ |
S7 | √ | × [17] | √ | √ | √ | √ |
S8 | √ | √ | √ | × | √ | √ |
Lenovo Laptop | Desktop Computer | MI 8 | |
---|---|---|---|
Operating System | Windows 10 | Windows 10 | Android system |
CPU | Intel(R) Core(TM) i7-6700HQ CPU @ 2.60 GHz | Intel(R) Core(TM) i5-9500 CPU @ 3.00 GHz | Qualcomm Snapdragon 845 |
Running Memory | 8 GB | 16 GB | 6 GB |
Definitions | Operations | (ms) | (ms) | (ms) |
---|---|---|---|---|
Point scalar multiplication | 0.4326 | 0.3672 | 0.5543 | |
Symmetric key encryption/decryption | 0.1864 | 0.1482 | 0.2458 | |
Hash function | 0.0032 | 0.0028 | 0.0043 |
Protocols | (ms) | (ms) | (ms) |
---|---|---|---|
Soni et al. [23] | ≈ 1.3394 | ≈ 1.1324 | ≈ 0.0215 |
Hajian et al. [33] | ≈ 0.0384 | ≈ 0.0196 | ≈ 0.0387 |
Shuai et al. [35] | ≈ 0.3984 | ≈ 0.3244 | ≈ 0.0172 |
Amintoosi et al. [29] | ≈ 0.0256 | ≈ 0.0280 | ≈ 0.0258 |
Wu et al. [47] | ≈ 0.0512 | ≈ 0.0588 | ≈ 0.0387 |
Ours | ≈ 0.0384 | ≈ 0.0336 | ≈ 0.0301 |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2023 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Wu, T.-Y.; Wang, L.; Chen, C.-M. Enhancing the Security: A Lightweight Authentication and Key Agreement Protocol for Smart Medical Services in the IoHT. Mathematics 2023, 11, 3701. https://doi.org/10.3390/math11173701
Wu T-Y, Wang L, Chen C-M. Enhancing the Security: A Lightweight Authentication and Key Agreement Protocol for Smart Medical Services in the IoHT. Mathematics. 2023; 11(17):3701. https://doi.org/10.3390/math11173701
Chicago/Turabian StyleWu, Tsu-Yang, Liyang Wang, and Chien-Ming Chen. 2023. "Enhancing the Security: A Lightweight Authentication and Key Agreement Protocol for Smart Medical Services in the IoHT" Mathematics 11, no. 17: 3701. https://doi.org/10.3390/math11173701
APA StyleWu, T. -Y., Wang, L., & Chen, C. -M. (2023). Enhancing the Security: A Lightweight Authentication and Key Agreement Protocol for Smart Medical Services in the IoHT. Mathematics, 11(17), 3701. https://doi.org/10.3390/math11173701