2023
DOI: 10.3233/jifs-223617
|View full text |Cite
|
Sign up to set email alerts
|

A secure lightweight fuzzy embedder based user authentication scheme for internet of medical things applications

Abstract: The Internet of Medical Things (IoMT) is a network of medical devices, hardware infrastructure, and software that allows healthcare information technology to be communicated over the web. The IoMT sensors communicate medical data to server for the quick diagnosis. As, it handles private and confidential information of a user, security is the primary objective. The existing IoT authentication schemes either using two-factor(Username, password) or multi-factor (username, password, biometric) to authenticate a us… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
2
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
4
1
1

Relationship

0
6

Authors

Journals

citations
Cited by 24 publications
(2 citation statements)
references
References 47 publications
0
2
0
Order By: Relevance
“…To improve on the efficiency and overcome attacks such as offline password guessing, three factor-based authentication schemes such as [168][169][170][171][172] were introduced. Other lightweight privacy-preserving techniques including [173][174][175]176] also provide improved efficiency.…”
Section: Defense Mechanisms Against Cloud Domain Attacksmentioning
confidence: 99%
“…To improve on the efficiency and overcome attacks such as offline password guessing, three factor-based authentication schemes such as [168][169][170][171][172] were introduced. Other lightweight privacy-preserving techniques including [173][174][175]176] also provide improved efficiency.…”
Section: Defense Mechanisms Against Cloud Domain Attacksmentioning
confidence: 99%
“…However, M-FA requires specialized hardware such as fingerprint sensor, iris sensor, camera and so forth to capture the user's biometric data. 31 Furthermore, binding or generating secret keys from biometric characteristics (such as fuzzy commitment, 32 fuzzy extractors 33,34 etc.) incurs additional computational complexity on the end-user.…”
mentioning
confidence: 99%