2021
DOI: 10.1016/j.scs.2021.103354
|View full text |Cite
|
Sign up to set email alerts
|

A Secure and reliable RFID authentication protocol using digital schnorr cryptosystem for IoT-enabled healthcare in COVID-19 scenario

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
22
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
6
2

Relationship

1
7

Authors

Journals

citations
Cited by 52 publications
(27 citation statements)
references
References 40 publications
0
22
0
Order By: Relevance
“…Moreover, the authors demonstrated the integration of IoT and Industry 4.0 in the current era of COVID-19. Shariq et al [33] presented a RFID security technique for IoT-healthcare data of COVID-19 patients. The authors registered a minimal computation overhead compared to the related approaches and concluded that the proposed technique is more resistant to several IoT data attacks and vulnerabilities.…”
Section: Related Workmentioning
confidence: 99%
“…Moreover, the authors demonstrated the integration of IoT and Industry 4.0 in the current era of COVID-19. Shariq et al [33] presented a RFID security technique for IoT-healthcare data of COVID-19 patients. The authors registered a minimal computation overhead compared to the related approaches and concluded that the proposed technique is more resistant to several IoT data attacks and vulnerabilities.…”
Section: Related Workmentioning
confidence: 99%
“…[ 1 ] developed a mathematical model to measure transmission behavior and control of COVID-19 in Malaysia. [ 30 ] developed a radio frequency identification protocol based on the digital Schnorr cryptosystem for the internet of things health in COVID-19. [ 20 ] utilized deep learning techniques to predict the COVID-19 infection through CT scan.…”
Section: Related Workmentioning
confidence: 99%
“…Although this scheme preserves confidentiality, it is vulnerable to smart card loss and offline password guessing attacks. Similarly, an efficient ECC based scheme is presented in [21] while another ultralightweight authentication method is developed in [2]. The authors in [21] show that their protocol is resistant against MitM, packet replays, impersonation, forgery and privileged insider attacks.…”
Section: Related Workmentioning
confidence: 99%
“…However, the provable security [22] component of this protocol is missing. On the other hand, the scheme in [2] is shown to be robust against many security attacks and also offers information privacy. Its formal security analysis is executed using BAN logic and Scyther tool, hence addresses the issues in [21].…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation