Secure Authentication Scheme for Medicine Anti-Counterfeiting System in IoT Environment
A counterfeit drug is a medication or pharmaceutical product which is manufactured and made available on the market to deceptively represent its origin, authenticity and effectiveness, etc., and causes serious threats to the health of a patient. Counterfeited medicines have an adverse effect on the...
Gespeichert in:
| Veröffentlicht in: | IEEE internet of things journal Jg. 4; H. 5; S. 1634 - 1646 |
|---|---|
| Hauptverfasser: | , , , , , |
| Format: | Journal Article |
| Sprache: | Englisch |
| Veröffentlicht: |
IEEE
01.10.2017
|
| Schlagworte: | |
| ISSN: | 2327-4662, 2327-4662 |
| Online-Zugang: | Volltext |
| Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
| Abstract | A counterfeit drug is a medication or pharmaceutical product which is manufactured and made available on the market to deceptively represent its origin, authenticity and effectiveness, etc., and causes serious threats to the health of a patient. Counterfeited medicines have an adverse effect on the public health and cause revenue loss to the legitimate manufacturing organizations. In this paper, we propose a new authentication scheme for medicine anticounterfeiting system in the Internet of Things environment which is used for checking the authenticity of pharmaceutical products (dosage forms). The proposed scheme utilizes the near field communication (NFC) and is suitable for mobile environment, which also provides efficient NFC update phase. The security analysis using the widely accepted real-or-random model proves that the proposed scheme provides the session key security. The proposed scheme also protects other known attacks which are analyzed informally. Furthermore, the formal security verification using the broadly accepted automated validation of Internet security protocols and applications tool shows that the proposed scheme is secure. The scheme is efficient with respect to computation and communication costs, and also it provides additional functionality features when compared to other existing schemes. Finally, for demonstration of the practicality of the scheme, we evaluate it using the broadly accepted NS2 simulation. |
|---|---|
| AbstractList | A counterfeit drug is a medication or pharmaceutical product which is manufactured and made available on the market to deceptively represent its origin, authenticity and effectiveness, etc., and causes serious threats to the health of a patient. Counterfeited medicines have an adverse effect on the public health and cause revenue loss to the legitimate manufacturing organizations. In this paper, we propose a new authentication scheme for medicine anti-counterfeiting system in the Internet of Things environment which is used for checking the authenticity of pharmaceutical products (dosage forms). The proposed scheme utilizes the near field communication (NFC) and is suitable for mobile environment, which also provides efficient NFC update phase. The security analysis using the widely accepted real-or-random model proves that the proposed scheme provides the session key security. The proposed scheme also protects other known attacks which are analyzed informally. Furthermore, the formal security verification using the broadly accepted automated validation of Internet security protocols and applications tool shows that the proposed scheme is secure. The scheme is efficient with respect to computation and communication costs, and also it provides additional functionality features when compared to other existing schemes. Finally, for demonstration of the practicality of the scheme, we evaluate it using the broadly accepted NS2 simulation A counterfeit drug is a medication or pharmaceutical product which is manufactured and made available on the market to deceptively represent its origin, authenticity and effectiveness, etc., and causes serious threats to the health of a patient. Counterfeited medicines have an adverse effect on the public health and cause revenue loss to the legitimate manufacturing organizations. In this paper, we propose a new authentication scheme for medicine anticounterfeiting system in the Internet of Things environment which is used for checking the authenticity of pharmaceutical products (dosage forms). The proposed scheme utilizes the near field communication (NFC) and is suitable for mobile environment, which also provides efficient NFC update phase. The security analysis using the widely accepted real-or-random model proves that the proposed scheme provides the session key security. The proposed scheme also protects other known attacks which are analyzed informally. Furthermore, the formal security verification using the broadly accepted automated validation of Internet security protocols and applications tool shows that the proposed scheme is secure. The scheme is efficient with respect to computation and communication costs, and also it provides additional functionality features when compared to other existing schemes. Finally, for demonstration of the practicality of the scheme, we evaluate it using the broadly accepted NS2 simulation. |
| Author | Kumar, Neeraj Al-Ghaiheb, Abdulatif Al-Dhawailie Vasilakos, Athanasios V. Das, Ashok Kumar Wazid, Mohammad Khan, Muhammad Khurram |
| Author_xml | – sequence: 1 givenname: Mohammad surname: Wazid fullname: Wazid, Mohammad email: mohammad.wazid@research.iiit.ac.in organization: Center for Security, Theor. & Algorithmic Res., Int. Inst. of Inf. Technol., Hyderabad, India – sequence: 2 givenname: Ashok Kumar surname: Das fullname: Das, Ashok Kumar email: iitkgp.akdas@gmail.com organization: Center for Security, Theor. & Algorithmic Res., Int. Inst. of Inf. Technol., Hyderabad, India – sequence: 3 givenname: Muhammad Khurram surname: Khan fullname: Khan, Muhammad Khurram email: mkhurram@ksu.edu.sa organization: Clinical Pharmacy Dept., King Saud Univ., Riyadh, Saudi Arabia – sequence: 4 givenname: Abdulatif Al-Dhawailie surname: Al-Ghaiheb fullname: Al-Ghaiheb, Abdulatif Al-Dhawailie email: alatif@ksu.edu.sa organization: Clinical Pharmacy Dept., King Saud Univ., Riyadh, Saudi Arabia – sequence: 5 givenname: Neeraj surname: Kumar fullname: Kumar, Neeraj email: neeraj.kumar@thapar.edu organization: Dept. of Comput. Sci. & Eng., Thapar Univ., Patiala, India – sequence: 6 givenname: Athanasios V. surname: Vasilakos fullname: Vasilakos, Athanasios V. email: th.vasilakos@gmail.com organization: Dept. of Comput. Sci., Lulea Univ. of Technol., Luleå, Sweden |
| BackLink | https://urn.kb.se/resolve?urn=urn:nbn:se:ltu:diva-66294$$DView record from Swedish Publication Index |
| BookMark | eNp9kM9OwkAQxjcGExF5AONlH8Di_mm77ZEgKgbDAdTjpt3OwhrYJduthre3CBrjwcxhJpnvN5PvO0cd6ywgdEnJgFKS3zxOZosBI1QMmCCpSNgJ6jLORBSnKev8ms9Qv67fCCEtltA87aLXOajGAx42YQU2GFUE4yyeqxVsAGvn8RNURhnbStp1NHKNDeA1mGDsEs93dYANNhZP3AKP7bvxzm7aQxfoVBfrGvrH3kPPd-PF6CGazu4no-E0UjzNQqRLHZcqo1QznvM4B9VWJbQSaSxiXYqyEiQrEyAkrTinBVecQpYVJU1yVTDeQ9eHu_UHbJtSbr3ZFH4nXWHkrXkZSueXch0a2brP41YuDnLlXV170FKZ8GU5-MKsJSVyn6jcJyr3icpjoi1J_5Dfr_5jrg6MAYAfvcg5Ixnjn90thTw |
| CODEN | IITJAU |
| CitedBy_id | crossref_primary_10_1109_ACCESS_2022_3228505 crossref_primary_10_1109_TSC_2023_3257569 crossref_primary_10_1016_j_procs_2021_04_049 crossref_primary_10_3390_s22041361 crossref_primary_10_1155_2022_5163003 crossref_primary_10_1016_j_jisa_2020_102507 crossref_primary_10_3390_su13158158 crossref_primary_10_1109_ACCESS_2019_2896641 crossref_primary_10_1016_j_compeleceng_2019_02_013 crossref_primary_10_1109_JIOT_2020_2984618 crossref_primary_10_1007_s11235_022_00938_7 crossref_primary_10_3390_electronics10121417 crossref_primary_10_1016_j_ijmedinf_2020_104164 crossref_primary_10_1109_ACCESS_2020_3036832 crossref_primary_10_1016_j_comnet_2018_11_025 crossref_primary_10_1109_ACCESS_2019_2941575 crossref_primary_10_1109_ACCESS_2019_2945974 crossref_primary_10_1038_s41467_023_36508_x crossref_primary_10_1016_j_jksuci_2022_02_022 crossref_primary_10_1016_j_smhl_2018_11_001 crossref_primary_10_1080_14740338_2022_2091543 crossref_primary_10_1109_COMST_2020_2973314 crossref_primary_10_1007_s10586_022_03566_7 crossref_primary_10_1016_j_compeleceng_2022_107969 crossref_primary_10_1109_ACCESS_2019_2898376 crossref_primary_10_1007_s10479_023_05604_y crossref_primary_10_1109_JIOT_2025_3551279 crossref_primary_10_1155_2018_3680851 crossref_primary_10_1109_JBHI_2017_2753464 crossref_primary_10_1016_j_jisa_2020_102590 crossref_primary_10_3390_cryptography8040052 crossref_primary_10_1002_ett_4421 crossref_primary_10_1109_TCE_2025_3552021 crossref_primary_10_1016_j_future_2018_04_019 crossref_primary_10_1109_JIOT_2020_3035697 crossref_primary_10_1007_s10207_019_00484_5 crossref_primary_10_1016_j_addr_2021_113958 crossref_primary_10_3390_s20174923 crossref_primary_10_1016_j_isatra_2021_01_036 crossref_primary_10_1016_j_sysarc_2021_102296 crossref_primary_10_1109_ACCESS_2020_3029196 crossref_primary_10_1007_s11227_018_2538_8 crossref_primary_10_1155_2023_5060564 crossref_primary_10_1109_ACCESS_2020_2989305 crossref_primary_10_1109_ACCESS_2018_2890389 crossref_primary_10_3390_s21217229 crossref_primary_10_1007_s40843_024_3265_2 crossref_primary_10_1016_j_comcom_2022_10_010 crossref_primary_10_1002_spy2_178 crossref_primary_10_1109_JIOT_2018_2854714 crossref_primary_10_3390_fi13040086 crossref_primary_10_1016_j_jisa_2018_08_003 crossref_primary_10_1109_TDSC_2018_2857811 crossref_primary_10_3390_s24237423 crossref_primary_10_1016_j_prime_2023_100158 crossref_primary_10_1109_JIOT_2021_3109314 crossref_primary_10_1016_j_adhoc_2021_102685 crossref_primary_10_1016_j_csi_2021_103567 crossref_primary_10_1108_JBIM_01_2022_0045 crossref_primary_10_1088_2053_1591_acc0df crossref_primary_10_1109_ACCESS_2021_3089871 crossref_primary_10_1007_s10479_023_05761_0 crossref_primary_10_3390_pr10112203 crossref_primary_10_1007_s41870_023_01173_2 |
| Cites_doi | 10.1109/ICASID.2012.6325288 10.1016/j.jnca.2010.09.003 10.1109/TWC.2015.2473165 10.1007/s10916-011-9700-7 10.1109/TIFS.2015.2439964 10.1016/j.ins.2015.02.010 10.1007/BF00124891 10.1049/iet-ifs.2010.0125 10.1007/s10623-005-6344-y 10.1109/MCOM.2015.7010518 10.1007/978-3-8349-8683-2 10.1049/et.2013.0716 10.1016/j.jisa.2015.01.001 10.1109/IS3C.2012.112 10.1007/s11036-016-0741-5 10.1109/PERCOMW.2007.98 10.1007/978-3-540-30580-4_6 10.1016/j.csi.2006.04.004 10.1109/TWC.2008.080128 10.1007/11513988_27 10.1007/3-540-45539-6_12 10.1109/ICNISC.2015.36 10.1016/j.compind.2011.04.001 10.1145/1066677.1067041 10.1109/TCE.2016.7448560 10.1016/j.jnca.2014.01.014 10.1109/TCSS.2016.2519463 10.1109/ICMLC.2009.5212582 10.1109/JSYST.2016.2544805 10.1109/TIT.1983.1056650 10.1145/1880022.1880027 10.1002/dac.2933 10.1016/j.compind.2015.01.004 |
| ContentType | Journal Article |
| DBID | 97E RIA RIE AAYXX CITATION ADTPV AOWAS |
| DOI | 10.1109/JIOT.2017.2706752 |
| DatabaseName | IEEE All-Society Periodicals Package (ASPP) 2005–Present IEEE All-Society Periodicals Package (ASPP) 1998–Present IEEE/IET Electronic Library CrossRef SwePub SwePub Articles |
| DatabaseTitle | CrossRef |
| DatabaseTitleList | |
| Database_xml | – sequence: 1 dbid: RIE name: IEEE/IET Electronic Library url: https://ieeexplore.ieee.org/ sourceTypes: Publisher |
| DeliveryMethod | fulltext_linktorsrc |
| Discipline | Computer Science |
| EISSN | 2327-4662 |
| EndPage | 1646 |
| ExternalDocumentID | oai_DiVA_org_ltu_66294 10_1109_JIOT_2017_2706752 7932082 |
| Genre | orig-research |
| GrantInformation_xml | – fundername: Deanship of Scientific Research at King Saud University grantid: RGP-288 funderid: 10.13039/501100002383 |
| GroupedDBID | 0R~ 4.4 6IK 97E AAJGR AARMG AASAJ AAWTH ABAZT ABJNI ABQJQ ABVLG AGQYO AGSQL AHBIQ AKJIK AKQYR ALMA_UNASSIGNED_HOLDINGS ATWAV BEFXN BFFAM BGNUA BKEBE BPEOZ EBS EJD IFIPE IPLJI JAVBF M43 OCL PQQKQ RIA RIE AAYXX CITATION ADTPV AOWAS |
| ID | FETCH-LOGICAL-c368t-fbf4bc811f239349ececed7fc76474fb7bd708b5e006d331a3c31e88ab159ca23 |
| IEDL.DBID | RIE |
| ISICitedReferencesCount | 78 |
| ISICitedReferencesURI | http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=000412362300046&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| ISSN | 2327-4662 |
| IngestDate | Sat Oct 25 06:21:28 EDT 2025 Sat Nov 29 06:16:42 EST 2025 Tue Nov 18 21:12:15 EST 2025 Wed Aug 27 03:02:46 EDT 2025 |
| IsPeerReviewed | false |
| IsScholarly | true |
| Issue | 5 |
| Language | English |
| License | https://ieeexplore.ieee.org/Xplorehelp/downloads/license-information/IEEE.html |
| LinkModel | DirectLink |
| MergedId | FETCHMERGED-LOGICAL-c368t-fbf4bc811f239349ececed7fc76474fb7bd708b5e006d331a3c31e88ab159ca23 |
| ORCID | 0000-0002-5196-9589 |
| PageCount | 13 |
| ParticipantIDs | crossref_citationtrail_10_1109_JIOT_2017_2706752 swepub_primary_oai_DiVA_org_ltu_66294 crossref_primary_10_1109_JIOT_2017_2706752 ieee_primary_7932082 |
| PublicationCentury | 2000 |
| PublicationDate | 2017-10-01 |
| PublicationDateYYYYMMDD | 2017-10-01 |
| PublicationDate_xml | – month: 10 year: 2017 text: 2017-10-01 day: 01 |
| PublicationDecade | 2010 |
| PublicationTitle | IEEE internet of things journal |
| PublicationTitleAbbrev | JIoT |
| PublicationYear | 2017 |
| Publisher | IEEE |
| Publisher_xml | – name: IEEE |
| References | ref13 ref12 ref15 ref14 hamze (ref36) 2013 ref11 ref10 (ref19) 2016 ref17 ref16 ref18 (ref2) 2016 vanstone (ref49) 1992; 35 kim (ref24) 2006 zanetti (ref30) 2013 ref46 ref45 ref47 ref42 ref41 ref43 choi (ref5) 2008; 35 blass (ref29) 2011 (ref8) 2016 ref7 ref9 ref4 ref6 ref40 burns (ref1) 2006; 84 kim (ref23) 2006 ref35 ref34 kaufman (ref37) 2017 ref33 ref32 choi (ref28) 2013 ref39 (ref44) 2016 ref38 (ref50) 1995 tuyls (ref31) 2006 (ref51) 2016 ref26 ref25 ref20 armando (ref48) 2005; 3576 ref22 ref21 ref27 (ref3) 2016 |
| References_xml | – year: 1995 ident: ref50 article-title: Secure hash standard – ident: ref26 doi: 10.1109/ICASID.2012.6325288 – year: 2017 ident: ref37 publication-title: Internet Key Exchange Protocol Version 2 (IKEv2) – ident: ref39 doi: 10.1016/j.jnca.2010.09.003 – start-page: 166 year: 2013 ident: ref36 article-title: An improvement of NFC-SEC with signed exchanges for an e-prescription-based application publication-title: Proc Int Conf Mobile Comput Appl Services (MobiCASE) – ident: ref42 doi: 10.1109/TWC.2015.2473165 – year: 2016 ident: ref2 publication-title: Counterfeit Drugs Raise Africa's Temperature – ident: ref35 doi: 10.1007/s10916-011-9700-7 – ident: ref45 doi: 10.1109/TIFS.2015.2439964 – ident: ref11 doi: 10.1016/j.ins.2015.02.010 – ident: ref38 doi: 10.1007/BF00124891 – year: 2016 ident: ref8 publication-title: NFC Tags Explained – year: 2016 ident: ref51 publication-title: The Network Simulator-ns-2 – start-page: 265 year: 2013 ident: ref28 article-title: Data management of RFID-based track-and-trace anti-counterfeiting in apparel supply chain publication-title: Proc Int Conf Internet Technol Secur Trans – ident: ref40 doi: 10.1049/iet-ifs.2010.0125 – year: 2016 ident: ref3 publication-title: Substandard spurious falsely labelled falsified and counterfeit (SSFFC) medical products – ident: ref34 doi: 10.1007/s10623-005-6344-y – ident: ref9 doi: 10.1109/MCOM.2015.7010518 – year: 2016 ident: ref19 publication-title: How does a RFID system work? – ident: ref20 doi: 10.1007/978-3-8349-8683-2 – volume: 35 start-page: 50 year: 1992 ident: ref49 article-title: Responses to ST's proposal publication-title: Commun ACM – ident: ref7 doi: 10.1049/et.2013.0716 – ident: ref32 doi: 10.1016/j.jisa.2015.01.001 – ident: ref15 doi: 10.1109/IS3C.2012.112 – start-page: 115 year: 2006 ident: ref31 article-title: RFID-tags for anti-counterfeiting publication-title: Topics in Cryptology-CT-RSA – start-page: 1 year: 2006 ident: ref24 article-title: Product authentication service of consumer's mobile RFID device publication-title: Proc 10th IEEE Int Symp Consum Electron (ISCE) – ident: ref6 doi: 10.1007/s11036-016-0741-5 – ident: ref14 doi: 10.1109/PERCOMW.2007.98 – ident: ref41 doi: 10.1007/978-3-540-30580-4_6 – ident: ref27 doi: 10.1016/j.csi.2006.04.004 – ident: ref22 doi: 10.1109/TWC.2008.080128 – start-page: 5 year: 2006 ident: ref23 article-title: A wireless service for product authentication in mobile RFID environment publication-title: Proc 1st Int Symp Wireless Pervasive Comput – volume: 3576 start-page: 281 year: 2005 ident: ref48 article-title: The AVISPA tool for the automated validation of Internet security protocols and applications publication-title: Proc 17th Int Conf Comput -Aided Verification (CAV) doi: 10.1007/11513988_27 – year: 2016 ident: ref44 publication-title: AVISPA Automated Validation of Internet Security Protocols and Applications – ident: ref43 doi: 10.1007/3-540-45539-6_12 – ident: ref16 doi: 10.1109/ICNISC.2015.36 – ident: ref4 doi: 10.1016/j.compind.2011.04.001 – ident: ref17 doi: 10.1145/1066677.1067041 – ident: ref46 doi: 10.1109/TCE.2016.7448560 – ident: ref18 doi: 10.1016/j.jnca.2014.01.014 – ident: ref12 doi: 10.1109/TCSS.2016.2519463 – ident: ref25 doi: 10.1109/ICMLC.2009.5212582 – ident: ref10 doi: 10.1109/JSYST.2016.2544805 – volume: 84 start-page: 689 year: 2006 ident: ref1 article-title: WHO launches taskforce to fight counterfeit drugs publication-title: Bull World Health Org – volume: 35 start-page: 1 year: 2008 ident: ref5 article-title: An RFID-based anti-counterfeiting system publication-title: IAENG Int J Comput Sci – ident: ref21 doi: 10.1109/TIT.1983.1056650 – ident: ref33 doi: 10.1145/1880022.1880027 – ident: ref47 doi: 10.1002/dac.2933 – start-page: 1 year: 2013 ident: ref30 article-title: Tailing RFID tags for clone detection publication-title: Proc 20th Annu Netw Distrib Syst Security Symp – start-page: 1 year: 2011 ident: ref29 article-title: Tracker: Security and privacy for RFID-based supply chains publication-title: Proc 8th Annu Symp Netw Distrib Syst Security – ident: ref13 doi: 10.1016/j.compind.2015.01.004 |
| SSID | ssj0001105196 |
| Score | 2.424923 |
| Snippet | A counterfeit drug is a medication or pharmaceutical product which is manufactured and made available on the market to deceptively represent its origin,... |
| SourceID | swepub crossref ieee |
| SourceType | Open Access Repository Enrichment Source Index Database Publisher |
| StartPage | 1634 |
| SubjectTerms | Anti-counterfeiting Authentication automated validation of Internet security protocols and applications (AVISPA) Counterfeiting Distribuerade datorsystem Drugs Internet of Things Mobile and Pervasive Computing Mobile handsets NS2 simulation Organizations security Servers |
| Title | Secure Authentication Scheme for Medicine Anti-Counterfeiting System in IoT Environment |
| URI | https://ieeexplore.ieee.org/document/7932082 https://urn.kb.se/resolve?urn=urn:nbn:se:ltu:diva-66294 |
| Volume | 4 |
| WOSCitedRecordID | wos000412362300046&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| journalDatabaseRights | – providerCode: PRVIEE databaseName: IEEE/IET Electronic Library customDbUrl: eissn: 2327-4662 dateEnd: 99991231 omitProxy: false ssIdentifier: ssj0001105196 issn: 2327-4662 databaseCode: RIE dateStart: 20140101 isFulltext: true titleUrlDefault: https://ieeexplore.ieee.org/ providerName: IEEE |
| link | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV3NS8MwFH9sw4MXp05xfpGDXsRu_UzS49CJE5wepu5W2vQVC7OT2fn3m9d2HYoI0kshCS35Jbzv9wM4Q-Up4qI0uBsmhotE5K4cboTKT2RsaQMiMQuyCTEey-nUf2zAZV0Lg4hF8hn26LWI5cdztSRXWV-fJVuLrCY0heBlrdban2KRMsKrwKVl-v270cOEcrdEzxakF9vfRE_BpfKjP2ghU27a__ubbdiqdEc2KMHegQZmu9Be8TKw6pp24KVwoiMj9xclA5VeOT3-im_ItJbK7quIOhvoYYPq0omtGlPKgWZlE3OWZmw0n7DhuhJuD55uhpOrW6MiUDD0dsvcSKLEjZS0rIQanbk-Kv3EIlGCu8JNIhHFwpSRh_rqxY5jhY5yLJQyjLSSo0Lb2YdWNs_wABhHEUmypxxtX1lawsWe7clYK5dcWywhdsFc7W2gqu7iRHIxCworw_QDgiMgOIIKji5c1Evey9Yaf03uEAL1xGrzu3BeAlgPULvs6_R5EGisglm-DDi3fffw9-VHsEkfKZPzjqGVL5Z4AhvqM08_FqfFAfsCwQrP8Q |
| linkProvider | IEEE |
| linkToHtml | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV1bT8IwFD5BNNEXUdGI1z7oi3GyS7d2j8RLQAF9wMtbs3VnkQTBIPj77dkGRGNMzF6WtM2Wfm3O_XwAJ6h9TVyUVsCj1OJIRO7aC6xIh6lMHGNApHZGNiG6XfnyEj6U4HxeC4OIWfIZXtBrFstPRnpKrrK6OUuuEVlLsOxz7tp5tdbCo-KQOhIUoUvHDuu3rfseZW-JC1eQZux-Ez4Zm8qPDqGZVLmp_O9_NmC90B5ZI4d7E0o43ILKjJmBFRe1Cs-ZGx0ZOcAoHSj3y5nxV3xDZvRU1ili6qxhhi2qTCe-auxTFjTL25iz_pC1Rj12vaiF24bHm-veZdMqKBQss-FyYqVxymMtHSelVmc8RG2eRKRaBFzwNBZxImwZ-2guX-J5TuRpz0Epo9ioOTpyvR0oD0dD3AUWoIglWVSesbAcI-MS3_VlYtTLwNgsEdbAnu2t0kV_caK5GKjMzrBDRXAogkMVcNTgbL7kPW-u8dfkKiEwn1hsfg1OcwDnA9Qw-6r_1FAGKzWYTFUQuCHf-335Maw2e522are6d_uwRh_MU_UOoDwZT_EQVvTnpP8xPsoO2xe4htM4 |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Secure+Authentication+Scheme+for+Medicine+Anti-Counterfeiting+System+in+IoT+Environment&rft.jtitle=IEEE+internet+of+things+journal&rft.au=Wazid%2C+Mohammad&rft.au=Das%2C+Ashok+Kumar&rft.au=Khan%2C+Muhammad+Khurram&rft.au=Al-Dhawailie+Al-Ghaiheb%2C+Abdulatif&rft.date=2017-10-01&rft.issn=2327-4662&rft.eissn=2327-4662&rft.volume=4&rft.issue=5&rft.spage=1634&rft_id=info:doi/10.1109%2FJIOT.2017.2706752&rft.externalDocID=oai_DiVA_org_ltu_66294 |
| thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=2327-4662&client=summon |
| thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=2327-4662&client=summon |
| thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=2327-4662&client=summon |