Secure Authentication Scheme for Medicine Anti-Counterfeiting System in IoT Environment

A counterfeit drug is a medication or pharmaceutical product which is manufactured and made available on the market to deceptively represent its origin, authenticity and effectiveness, etc., and causes serious threats to the health of a patient. Counterfeited medicines have an adverse effect on the...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:IEEE internet of things journal Jg. 4; H. 5; S. 1634 - 1646
Hauptverfasser: Wazid, Mohammad, Das, Ashok Kumar, Khan, Muhammad Khurram, Al-Ghaiheb, Abdulatif Al-Dhawailie, Kumar, Neeraj, Vasilakos, Athanasios V.
Format: Journal Article
Sprache:Englisch
Veröffentlicht: IEEE 01.10.2017
Schlagworte:
ISSN:2327-4662, 2327-4662
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Abstract A counterfeit drug is a medication or pharmaceutical product which is manufactured and made available on the market to deceptively represent its origin, authenticity and effectiveness, etc., and causes serious threats to the health of a patient. Counterfeited medicines have an adverse effect on the public health and cause revenue loss to the legitimate manufacturing organizations. In this paper, we propose a new authentication scheme for medicine anticounterfeiting system in the Internet of Things environment which is used for checking the authenticity of pharmaceutical products (dosage forms). The proposed scheme utilizes the near field communication (NFC) and is suitable for mobile environment, which also provides efficient NFC update phase. The security analysis using the widely accepted real-or-random model proves that the proposed scheme provides the session key security. The proposed scheme also protects other known attacks which are analyzed informally. Furthermore, the formal security verification using the broadly accepted automated validation of Internet security protocols and applications tool shows that the proposed scheme is secure. The scheme is efficient with respect to computation and communication costs, and also it provides additional functionality features when compared to other existing schemes. Finally, for demonstration of the practicality of the scheme, we evaluate it using the broadly accepted NS2 simulation.
AbstractList A counterfeit drug is a medication or pharmaceutical product which is manufactured and made available on the market to deceptively represent its origin, authenticity and effectiveness, etc., and causes serious threats to the health of a patient. Counterfeited medicines have an adverse effect on the public health and cause revenue loss to the legitimate manufacturing organizations. In this paper, we propose a new authentication scheme for medicine anti-counterfeiting system in the Internet of Things environment which is used for checking the authenticity of pharmaceutical products (dosage forms). The proposed scheme utilizes the near field communication (NFC) and is suitable for mobile environment, which also provides efficient NFC update phase. The security analysis using the widely accepted real-or-random model proves that the proposed scheme provides the session key security. The proposed scheme also protects other known attacks which are analyzed informally. Furthermore, the formal security verification using the broadly accepted automated validation of Internet security protocols and applications tool shows that the proposed scheme is secure. The scheme is efficient with respect to computation and communication costs, and also it provides additional functionality features when compared to other existing schemes. Finally, for demonstration of the practicality of the scheme, we evaluate it using the broadly accepted NS2 simulation
A counterfeit drug is a medication or pharmaceutical product which is manufactured and made available on the market to deceptively represent its origin, authenticity and effectiveness, etc., and causes serious threats to the health of a patient. Counterfeited medicines have an adverse effect on the public health and cause revenue loss to the legitimate manufacturing organizations. In this paper, we propose a new authentication scheme for medicine anticounterfeiting system in the Internet of Things environment which is used for checking the authenticity of pharmaceutical products (dosage forms). The proposed scheme utilizes the near field communication (NFC) and is suitable for mobile environment, which also provides efficient NFC update phase. The security analysis using the widely accepted real-or-random model proves that the proposed scheme provides the session key security. The proposed scheme also protects other known attacks which are analyzed informally. Furthermore, the formal security verification using the broadly accepted automated validation of Internet security protocols and applications tool shows that the proposed scheme is secure. The scheme is efficient with respect to computation and communication costs, and also it provides additional functionality features when compared to other existing schemes. Finally, for demonstration of the practicality of the scheme, we evaluate it using the broadly accepted NS2 simulation.
Author Kumar, Neeraj
Al-Ghaiheb, Abdulatif Al-Dhawailie
Vasilakos, Athanasios V.
Das, Ashok Kumar
Wazid, Mohammad
Khan, Muhammad Khurram
Author_xml – sequence: 1
  givenname: Mohammad
  surname: Wazid
  fullname: Wazid, Mohammad
  email: mohammad.wazid@research.iiit.ac.in
  organization: Center for Security, Theor. & Algorithmic Res., Int. Inst. of Inf. Technol., Hyderabad, India
– sequence: 2
  givenname: Ashok Kumar
  surname: Das
  fullname: Das, Ashok Kumar
  email: iitkgp.akdas@gmail.com
  organization: Center for Security, Theor. & Algorithmic Res., Int. Inst. of Inf. Technol., Hyderabad, India
– sequence: 3
  givenname: Muhammad Khurram
  surname: Khan
  fullname: Khan, Muhammad Khurram
  email: mkhurram@ksu.edu.sa
  organization: Clinical Pharmacy Dept., King Saud Univ., Riyadh, Saudi Arabia
– sequence: 4
  givenname: Abdulatif Al-Dhawailie
  surname: Al-Ghaiheb
  fullname: Al-Ghaiheb, Abdulatif Al-Dhawailie
  email: alatif@ksu.edu.sa
  organization: Clinical Pharmacy Dept., King Saud Univ., Riyadh, Saudi Arabia
– sequence: 5
  givenname: Neeraj
  surname: Kumar
  fullname: Kumar, Neeraj
  email: neeraj.kumar@thapar.edu
  organization: Dept. of Comput. Sci. & Eng., Thapar Univ., Patiala, India
– sequence: 6
  givenname: Athanasios V.
  surname: Vasilakos
  fullname: Vasilakos, Athanasios V.
  email: th.vasilakos@gmail.com
  organization: Dept. of Comput. Sci., Lulea Univ. of Technol., Luleå, Sweden
BackLink https://urn.kb.se/resolve?urn=urn:nbn:se:ltu:diva-66294$$DView record from Swedish Publication Index
BookMark eNp9kM9OwkAQxjcGExF5AONlH8Di_mm77ZEgKgbDAdTjpt3OwhrYJduthre3CBrjwcxhJpnvN5PvO0cd6ywgdEnJgFKS3zxOZosBI1QMmCCpSNgJ6jLORBSnKev8ms9Qv67fCCEtltA87aLXOajGAx42YQU2GFUE4yyeqxVsAGvn8RNURhnbStp1NHKNDeA1mGDsEs93dYANNhZP3AKP7bvxzm7aQxfoVBfrGvrH3kPPd-PF6CGazu4no-E0UjzNQqRLHZcqo1QznvM4B9VWJbQSaSxiXYqyEiQrEyAkrTinBVecQpYVJU1yVTDeQ9eHu_UHbJtSbr3ZFH4nXWHkrXkZSueXch0a2brP41YuDnLlXV170FKZ8GU5-MKsJSVyn6jcJyr3icpjoi1J_5Dfr_5jrg6MAYAfvcg5Ixnjn90thTw
CODEN IITJAU
CitedBy_id crossref_primary_10_1109_ACCESS_2022_3228505
crossref_primary_10_1109_TSC_2023_3257569
crossref_primary_10_1016_j_procs_2021_04_049
crossref_primary_10_3390_s22041361
crossref_primary_10_1155_2022_5163003
crossref_primary_10_1016_j_jisa_2020_102507
crossref_primary_10_3390_su13158158
crossref_primary_10_1109_ACCESS_2019_2896641
crossref_primary_10_1016_j_compeleceng_2019_02_013
crossref_primary_10_1109_JIOT_2020_2984618
crossref_primary_10_1007_s11235_022_00938_7
crossref_primary_10_3390_electronics10121417
crossref_primary_10_1016_j_ijmedinf_2020_104164
crossref_primary_10_1109_ACCESS_2020_3036832
crossref_primary_10_1016_j_comnet_2018_11_025
crossref_primary_10_1109_ACCESS_2019_2941575
crossref_primary_10_1109_ACCESS_2019_2945974
crossref_primary_10_1038_s41467_023_36508_x
crossref_primary_10_1016_j_jksuci_2022_02_022
crossref_primary_10_1016_j_smhl_2018_11_001
crossref_primary_10_1080_14740338_2022_2091543
crossref_primary_10_1109_COMST_2020_2973314
crossref_primary_10_1007_s10586_022_03566_7
crossref_primary_10_1016_j_compeleceng_2022_107969
crossref_primary_10_1109_ACCESS_2019_2898376
crossref_primary_10_1007_s10479_023_05604_y
crossref_primary_10_1109_JIOT_2025_3551279
crossref_primary_10_1155_2018_3680851
crossref_primary_10_1109_JBHI_2017_2753464
crossref_primary_10_1016_j_jisa_2020_102590
crossref_primary_10_3390_cryptography8040052
crossref_primary_10_1002_ett_4421
crossref_primary_10_1109_TCE_2025_3552021
crossref_primary_10_1016_j_future_2018_04_019
crossref_primary_10_1109_JIOT_2020_3035697
crossref_primary_10_1007_s10207_019_00484_5
crossref_primary_10_1016_j_addr_2021_113958
crossref_primary_10_3390_s20174923
crossref_primary_10_1016_j_isatra_2021_01_036
crossref_primary_10_1016_j_sysarc_2021_102296
crossref_primary_10_1109_ACCESS_2020_3029196
crossref_primary_10_1007_s11227_018_2538_8
crossref_primary_10_1155_2023_5060564
crossref_primary_10_1109_ACCESS_2020_2989305
crossref_primary_10_1109_ACCESS_2018_2890389
crossref_primary_10_3390_s21217229
crossref_primary_10_1007_s40843_024_3265_2
crossref_primary_10_1016_j_comcom_2022_10_010
crossref_primary_10_1002_spy2_178
crossref_primary_10_1109_JIOT_2018_2854714
crossref_primary_10_3390_fi13040086
crossref_primary_10_1016_j_jisa_2018_08_003
crossref_primary_10_1109_TDSC_2018_2857811
crossref_primary_10_3390_s24237423
crossref_primary_10_1016_j_prime_2023_100158
crossref_primary_10_1109_JIOT_2021_3109314
crossref_primary_10_1016_j_adhoc_2021_102685
crossref_primary_10_1016_j_csi_2021_103567
crossref_primary_10_1108_JBIM_01_2022_0045
crossref_primary_10_1088_2053_1591_acc0df
crossref_primary_10_1109_ACCESS_2021_3089871
crossref_primary_10_1007_s10479_023_05761_0
crossref_primary_10_3390_pr10112203
crossref_primary_10_1007_s41870_023_01173_2
Cites_doi 10.1109/ICASID.2012.6325288
10.1016/j.jnca.2010.09.003
10.1109/TWC.2015.2473165
10.1007/s10916-011-9700-7
10.1109/TIFS.2015.2439964
10.1016/j.ins.2015.02.010
10.1007/BF00124891
10.1049/iet-ifs.2010.0125
10.1007/s10623-005-6344-y
10.1109/MCOM.2015.7010518
10.1007/978-3-8349-8683-2
10.1049/et.2013.0716
10.1016/j.jisa.2015.01.001
10.1109/IS3C.2012.112
10.1007/s11036-016-0741-5
10.1109/PERCOMW.2007.98
10.1007/978-3-540-30580-4_6
10.1016/j.csi.2006.04.004
10.1109/TWC.2008.080128
10.1007/11513988_27
10.1007/3-540-45539-6_12
10.1109/ICNISC.2015.36
10.1016/j.compind.2011.04.001
10.1145/1066677.1067041
10.1109/TCE.2016.7448560
10.1016/j.jnca.2014.01.014
10.1109/TCSS.2016.2519463
10.1109/ICMLC.2009.5212582
10.1109/JSYST.2016.2544805
10.1109/TIT.1983.1056650
10.1145/1880022.1880027
10.1002/dac.2933
10.1016/j.compind.2015.01.004
ContentType Journal Article
DBID 97E
RIA
RIE
AAYXX
CITATION
ADTPV
AOWAS
DOI 10.1109/JIOT.2017.2706752
DatabaseName IEEE All-Society Periodicals Package (ASPP) 2005–Present
IEEE All-Society Periodicals Package (ASPP) 1998–Present
IEEE/IET Electronic Library
CrossRef
SwePub
SwePub Articles
DatabaseTitle CrossRef
DatabaseTitleList

Database_xml – sequence: 1
  dbid: RIE
  name: IEEE/IET Electronic Library
  url: https://ieeexplore.ieee.org/
  sourceTypes: Publisher
DeliveryMethod fulltext_linktorsrc
Discipline Computer Science
EISSN 2327-4662
EndPage 1646
ExternalDocumentID oai_DiVA_org_ltu_66294
10_1109_JIOT_2017_2706752
7932082
Genre orig-research
GrantInformation_xml – fundername: Deanship of Scientific Research at King Saud University
  grantid: RGP-288
  funderid: 10.13039/501100002383
GroupedDBID 0R~
4.4
6IK
97E
AAJGR
AARMG
AASAJ
AAWTH
ABAZT
ABJNI
ABQJQ
ABVLG
AGQYO
AGSQL
AHBIQ
AKJIK
AKQYR
ALMA_UNASSIGNED_HOLDINGS
ATWAV
BEFXN
BFFAM
BGNUA
BKEBE
BPEOZ
EBS
EJD
IFIPE
IPLJI
JAVBF
M43
OCL
PQQKQ
RIA
RIE
AAYXX
CITATION
ADTPV
AOWAS
ID FETCH-LOGICAL-c368t-fbf4bc811f239349ececed7fc76474fb7bd708b5e006d331a3c31e88ab159ca23
IEDL.DBID RIE
ISICitedReferencesCount 78
ISICitedReferencesURI http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=000412362300046&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
ISSN 2327-4662
IngestDate Sat Oct 25 06:21:28 EDT 2025
Sat Nov 29 06:16:42 EST 2025
Tue Nov 18 21:12:15 EST 2025
Wed Aug 27 03:02:46 EDT 2025
IsPeerReviewed false
IsScholarly true
Issue 5
Language English
License https://ieeexplore.ieee.org/Xplorehelp/downloads/license-information/IEEE.html
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c368t-fbf4bc811f239349ececed7fc76474fb7bd708b5e006d331a3c31e88ab159ca23
ORCID 0000-0002-5196-9589
PageCount 13
ParticipantIDs crossref_citationtrail_10_1109_JIOT_2017_2706752
swepub_primary_oai_DiVA_org_ltu_66294
crossref_primary_10_1109_JIOT_2017_2706752
ieee_primary_7932082
PublicationCentury 2000
PublicationDate 2017-10-01
PublicationDateYYYYMMDD 2017-10-01
PublicationDate_xml – month: 10
  year: 2017
  text: 2017-10-01
  day: 01
PublicationDecade 2010
PublicationTitle IEEE internet of things journal
PublicationTitleAbbrev JIoT
PublicationYear 2017
Publisher IEEE
Publisher_xml – name: IEEE
References ref13
ref12
ref15
ref14
hamze (ref36) 2013
ref11
ref10
(ref19) 2016
ref17
ref16
ref18
(ref2) 2016
vanstone (ref49) 1992; 35
kim (ref24) 2006
zanetti (ref30) 2013
ref46
ref45
ref47
ref42
ref41
ref43
choi (ref5) 2008; 35
blass (ref29) 2011
(ref8) 2016
ref7
ref9
ref4
ref6
ref40
burns (ref1) 2006; 84
kim (ref23) 2006
ref35
ref34
kaufman (ref37) 2017
ref33
ref32
choi (ref28) 2013
ref39
(ref44) 2016
ref38
(ref50) 1995
tuyls (ref31) 2006
(ref51) 2016
ref26
ref25
ref20
armando (ref48) 2005; 3576
ref22
ref21
ref27
(ref3) 2016
References_xml – year: 1995
  ident: ref50
  article-title: Secure hash standard
– ident: ref26
  doi: 10.1109/ICASID.2012.6325288
– year: 2017
  ident: ref37
  publication-title: Internet Key Exchange Protocol Version 2 (IKEv2)
– ident: ref39
  doi: 10.1016/j.jnca.2010.09.003
– start-page: 166
  year: 2013
  ident: ref36
  article-title: An improvement of NFC-SEC with signed exchanges for an e-prescription-based application
  publication-title: Proc Int Conf Mobile Comput Appl Services (MobiCASE)
– ident: ref42
  doi: 10.1109/TWC.2015.2473165
– year: 2016
  ident: ref2
  publication-title: Counterfeit Drugs Raise Africa's Temperature
– ident: ref35
  doi: 10.1007/s10916-011-9700-7
– ident: ref45
  doi: 10.1109/TIFS.2015.2439964
– ident: ref11
  doi: 10.1016/j.ins.2015.02.010
– ident: ref38
  doi: 10.1007/BF00124891
– year: 2016
  ident: ref8
  publication-title: NFC Tags Explained
– year: 2016
  ident: ref51
  publication-title: The Network Simulator-ns-2
– start-page: 265
  year: 2013
  ident: ref28
  article-title: Data management of RFID-based track-and-trace anti-counterfeiting in apparel supply chain
  publication-title: Proc Int Conf Internet Technol Secur Trans
– ident: ref40
  doi: 10.1049/iet-ifs.2010.0125
– year: 2016
  ident: ref3
  publication-title: Substandard spurious falsely labelled falsified and counterfeit (SSFFC) medical products
– ident: ref34
  doi: 10.1007/s10623-005-6344-y
– ident: ref9
  doi: 10.1109/MCOM.2015.7010518
– year: 2016
  ident: ref19
  publication-title: How does a RFID system work?
– ident: ref20
  doi: 10.1007/978-3-8349-8683-2
– volume: 35
  start-page: 50
  year: 1992
  ident: ref49
  article-title: Responses to ST's proposal
  publication-title: Commun ACM
– ident: ref7
  doi: 10.1049/et.2013.0716
– ident: ref32
  doi: 10.1016/j.jisa.2015.01.001
– ident: ref15
  doi: 10.1109/IS3C.2012.112
– start-page: 115
  year: 2006
  ident: ref31
  article-title: RFID-tags for anti-counterfeiting
  publication-title: Topics in Cryptology-CT-RSA
– start-page: 1
  year: 2006
  ident: ref24
  article-title: Product authentication service of consumer's mobile RFID device
  publication-title: Proc 10th IEEE Int Symp Consum Electron (ISCE)
– ident: ref6
  doi: 10.1007/s11036-016-0741-5
– ident: ref14
  doi: 10.1109/PERCOMW.2007.98
– ident: ref41
  doi: 10.1007/978-3-540-30580-4_6
– ident: ref27
  doi: 10.1016/j.csi.2006.04.004
– ident: ref22
  doi: 10.1109/TWC.2008.080128
– start-page: 5
  year: 2006
  ident: ref23
  article-title: A wireless service for product authentication in mobile RFID environment
  publication-title: Proc 1st Int Symp Wireless Pervasive Comput
– volume: 3576
  start-page: 281
  year: 2005
  ident: ref48
  article-title: The AVISPA tool for the automated validation of Internet security protocols and applications
  publication-title: Proc 17th Int Conf Comput -Aided Verification (CAV)
  doi: 10.1007/11513988_27
– year: 2016
  ident: ref44
  publication-title: AVISPA Automated Validation of Internet Security Protocols and Applications
– ident: ref43
  doi: 10.1007/3-540-45539-6_12
– ident: ref16
  doi: 10.1109/ICNISC.2015.36
– ident: ref4
  doi: 10.1016/j.compind.2011.04.001
– ident: ref17
  doi: 10.1145/1066677.1067041
– ident: ref46
  doi: 10.1109/TCE.2016.7448560
– ident: ref18
  doi: 10.1016/j.jnca.2014.01.014
– ident: ref12
  doi: 10.1109/TCSS.2016.2519463
– ident: ref25
  doi: 10.1109/ICMLC.2009.5212582
– ident: ref10
  doi: 10.1109/JSYST.2016.2544805
– volume: 84
  start-page: 689
  year: 2006
  ident: ref1
  article-title: WHO launches taskforce to fight counterfeit drugs
  publication-title: Bull World Health Org
– volume: 35
  start-page: 1
  year: 2008
  ident: ref5
  article-title: An RFID-based anti-counterfeiting system
  publication-title: IAENG Int J Comput Sci
– ident: ref21
  doi: 10.1109/TIT.1983.1056650
– ident: ref33
  doi: 10.1145/1880022.1880027
– ident: ref47
  doi: 10.1002/dac.2933
– start-page: 1
  year: 2013
  ident: ref30
  article-title: Tailing RFID tags for clone detection
  publication-title: Proc 20th Annu Netw Distrib Syst Security Symp
– start-page: 1
  year: 2011
  ident: ref29
  article-title: Tracker: Security and privacy for RFID-based supply chains
  publication-title: Proc 8th Annu Symp Netw Distrib Syst Security
– ident: ref13
  doi: 10.1016/j.compind.2015.01.004
SSID ssj0001105196
Score 2.424923
Snippet A counterfeit drug is a medication or pharmaceutical product which is manufactured and made available on the market to deceptively represent its origin,...
SourceID swepub
crossref
ieee
SourceType Open Access Repository
Enrichment Source
Index Database
Publisher
StartPage 1634
SubjectTerms Anti-counterfeiting
Authentication
automated validation of Internet security protocols and applications (AVISPA)
Counterfeiting
Distribuerade datorsystem
Drugs
Internet of Things
Mobile and Pervasive Computing
Mobile handsets
NS2 simulation
Organizations
security
Servers
Title Secure Authentication Scheme for Medicine Anti-Counterfeiting System in IoT Environment
URI https://ieeexplore.ieee.org/document/7932082
https://urn.kb.se/resolve?urn=urn:nbn:se:ltu:diva-66294
Volume 4
WOSCitedRecordID wos000412362300046&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
journalDatabaseRights – providerCode: PRVIEE
  databaseName: IEEE/IET Electronic Library
  customDbUrl:
  eissn: 2327-4662
  dateEnd: 99991231
  omitProxy: false
  ssIdentifier: ssj0001105196
  issn: 2327-4662
  databaseCode: RIE
  dateStart: 20140101
  isFulltext: true
  titleUrlDefault: https://ieeexplore.ieee.org/
  providerName: IEEE
link http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV3NS8MwFH9sw4MXp05xfpGDXsRu_UzS49CJE5wepu5W2vQVC7OT2fn3m9d2HYoI0kshCS35Jbzv9wM4Q-Up4qI0uBsmhotE5K4cboTKT2RsaQMiMQuyCTEey-nUf2zAZV0Lg4hF8hn26LWI5cdztSRXWV-fJVuLrCY0heBlrdban2KRMsKrwKVl-v270cOEcrdEzxakF9vfRE_BpfKjP2ghU27a__ubbdiqdEc2KMHegQZmu9Be8TKw6pp24KVwoiMj9xclA5VeOT3-im_ItJbK7quIOhvoYYPq0omtGlPKgWZlE3OWZmw0n7DhuhJuD55uhpOrW6MiUDD0dsvcSKLEjZS0rIQanbk-Kv3EIlGCu8JNIhHFwpSRh_rqxY5jhY5yLJQyjLSSo0Lb2YdWNs_wABhHEUmypxxtX1lawsWe7clYK5dcWywhdsFc7W2gqu7iRHIxCworw_QDgiMgOIIKji5c1Evey9Yaf03uEAL1xGrzu3BeAlgPULvs6_R5EGisglm-DDi3fffw9-VHsEkfKZPzjqGVL5Z4AhvqM08_FqfFAfsCwQrP8Q
linkProvider IEEE
linkToHtml http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV1bT8IwFD5BNNEXUdGI1z7oi3GyS7d2j8RLQAF9wMtbs3VnkQTBIPj77dkGRGNMzF6WtM2Wfm3O_XwAJ6h9TVyUVsCj1OJIRO7aC6xIh6lMHGNApHZGNiG6XfnyEj6U4HxeC4OIWfIZXtBrFstPRnpKrrK6OUuuEVlLsOxz7tp5tdbCo-KQOhIUoUvHDuu3rfseZW-JC1eQZux-Ez4Zm8qPDqGZVLmp_O9_NmC90B5ZI4d7E0o43ILKjJmBFRe1Cs-ZGx0ZOcAoHSj3y5nxV3xDZvRU1ili6qxhhi2qTCe-auxTFjTL25iz_pC1Rj12vaiF24bHm-veZdMqKBQss-FyYqVxymMtHSelVmc8RG2eRKRaBFzwNBZxImwZ-2guX-J5TuRpz0Epo9ioOTpyvR0oD0dD3AUWoIglWVSesbAcI-MS3_VlYtTLwNgsEdbAnu2t0kV_caK5GKjMzrBDRXAogkMVcNTgbL7kPW-u8dfkKiEwn1hsfg1OcwDnA9Qw-6r_1FAGKzWYTFUQuCHf-335Maw2e522are6d_uwRh_MU_UOoDwZT_EQVvTnpP8xPsoO2xe4htM4
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Secure+Authentication+Scheme+for+Medicine+Anti-Counterfeiting+System+in+IoT+Environment&rft.jtitle=IEEE+internet+of+things+journal&rft.au=Wazid%2C+Mohammad&rft.au=Das%2C+Ashok+Kumar&rft.au=Khan%2C+Muhammad+Khurram&rft.au=Al-Dhawailie+Al-Ghaiheb%2C+Abdulatif&rft.date=2017-10-01&rft.issn=2327-4662&rft.eissn=2327-4662&rft.volume=4&rft.issue=5&rft.spage=1634&rft_id=info:doi/10.1109%2FJIOT.2017.2706752&rft.externalDocID=oai_DiVA_org_ltu_66294
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=2327-4662&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=2327-4662&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=2327-4662&client=summon