Please use this identifier to cite or link to this item: http://dr.iiserpune.ac.in:8080/xmlui/handle/123456789/10180
Full metadata record
DC FieldValueLanguage
dc.contributor.authorGoswami, Chandanen_US
dc.contributor.authorBasak, Aniketen_US
dc.contributor.authorGHOSH, RAJEETen_US
dc.contributor.authorAdhikari, Avisheken_US
dc.contributor.authorSarkar, Pinakien_US
dc.date.accessioned2025-06-13T06:00:05Z
dc.date.available2025-06-13T06:00:05Z
dc.date.issued2025-05en_US
dc.identifier.citationComputer Networks, 263, 111212.en_US
dc.identifier.issn1872-7069en_US
dc.identifier.issn1389-1286en_US
dc.identifier.urihttps://doi.org/10.1016/j.comnet.2025.111212en_US
dc.identifier.urihttp://dr.iiserpune.ac.in:8080/xmlui/handle/123456789/10180
dc.description.abstractRapid advancement of the Internet of Things (IoT) is revolutionizing various sectors of our daily lives; healthcare being a prime beneficiary. Likelihood of viral infections among medical personnel has drastically decreased with the introduction of wireless monitoring platforms in the Internet of Medical Things (IoMT) network. Recent developments in wireless communications and computer systems have further enhanced the efficiency, security, and privacy of the entire healthcare industry. However, integrating IoT with electronic health (e-health) management systems presents several challenges, including secure communications over insecure channels, authentication, and key agreement among participating devices. This manuscript introduces a secure three-factor (user, medical server, and sensor device) lightweight mutual authenticated key agreement scheme (KAS) based on the Chinese Remainder Theorem (CRT) for an arbitrary number of co-primes in the IoMT network. We present a formal semantic security analysis of our proposed protocol using the Real-Or-Random (ROR) model for computational security. Moreover, simulation results using the Automated Validation of Internet Security Protocols and Applications (AVISPA) show that the proposed scheme is safe against well-known active and passive threats. Our proposed scheme is well-designed to perform efficiently, reducing both computation cost and communication cost. Finally, the proposed scheme has significant security advantages and performance benefits, making the scheme more efficient, secure, and robust compared to its state-of-the-art counterparts.en_US
dc.language.isoenen_US
dc.publisherElsevier B.V.en_US
dc.subjectAuthenticated key agreement schemeen_US
dc.subjectChinese Remainder Theoremen_US
dc.subjectBio-hash functionen_US
dc.subjectReal-Or-Random modelen_US
dc.subjectAVISPAen_US
dc.subject2025en_US
dc.titleLightweight authenticated key agreement scheme for IoMT network using generalized Chinese Remainder Theoremen_US
dc.typeArticleen_US
dc.contributor.departmentDept. of Mathematicsen_US
dc.identifier.sourcetitleComputer Networksen_US
dc.publication.originofpublisherForeignen_US
Appears in Collections:JOURNAL ARTICLES

Files in This Item:
There are no files associated with this item.


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.