2023
DOI: 10.32604/cmes.2022.019595
|View full text |Cite
|
Sign up to set email alerts
|

Amassing the Security: An Enhanced Authentication and Key Agreement Protocol for Remote Surgery in Healthcare Environment

Abstract: The development of the Internet of Things has facilitated the rapid development of various industries. With the improvement in people's living standards, people's health requirements are steadily improving. However, owing to the scarcity of medical and health care resources in some areas, the demand for remote surgery has gradually increased. In this paper, we investigate remote surgery in the healthcare environment. Surgeons can operate robotic arms to perform remote surgery for patients, which substantially … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
7
1
1

Relationship

0
9

Authors

Journals

citations
Cited by 9 publications
(8 citation statements)
references
References 47 publications
0
4
0
Order By: Relevance
“…Encryption can protect data from being intercepted and viewed by unauthorized parties during transmission. Developers can use techniques such as end-to-end encryption or transport layer security to secure data in transit using authenticated key agreement schemes [33][34][35] in different environments and symmetric or asymmetric encryption to protect data stored on the chatbot's database.…”
Section: Discussionmentioning
confidence: 99%
“…Encryption can protect data from being intercepted and viewed by unauthorized parties during transmission. Developers can use techniques such as end-to-end encryption or transport layer security to secure data in transit using authenticated key agreement schemes [33][34][35] in different environments and symmetric or asymmetric encryption to protect data stored on the chatbot's database.…”
Section: Discussionmentioning
confidence: 99%
“…The real-oracle random (ROR) model 41,42 is also widely used to demonstrate the security of an authentication scheme. 19,[43][44][45] The security of an authentication scheme under the ROR model is considered powerful evidence of its security and reliability.…”
Section: Ror Modelmentioning
confidence: 99%
“…We compare the security and performance of our proposed protocol to five IoHT authentication protocols [23,29,33,35,47].…”
Section: Security and Performance Comparisonsmentioning
confidence: 99%