2022
DOI: 10.1155/2022/2793116
|View full text |Cite
|
Sign up to set email alerts
|

An Anonymous Blockchain-Based Authentication Scheme for Secure Healthcare Applications

Abstract: Nowadays, continuous monitoring of a patient’s healthcare data has become a critical factor in human well-being. However, with the rapid advancement of wireless technology, doctors and healthcare professionals can monitor the patient’s healthcare data in real time. But to access the confidential patient’s data which is transferred through the open wireless medium, the secure transmission plays an important role. In this work, the privacy and the anonymity of the end-users (patient/doctor) are preserved using a… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
6
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
7
2
1

Relationship

0
10

Authors

Journals

citations
Cited by 12 publications
(6 citation statements)
references
References 32 publications
0
6
0
Order By: Relevance
“…In [15], Mei et al suggests an authentication and key agreement scheme that ensures anonymity, the scheme is built upon pseudonyms, utilizing a nonsingular elliptic curve. In [16], Azees et al suggests a signature based AKA protocol for vehicular ad-hoc networks.…”
Section: Relevant Literaturementioning
confidence: 99%
“…In [15], Mei et al suggests an authentication and key agreement scheme that ensures anonymity, the scheme is built upon pseudonyms, utilizing a nonsingular elliptic curve. In [16], Azees et al suggests a signature based AKA protocol for vehicular ad-hoc networks.…”
Section: Relevant Literaturementioning
confidence: 99%
“…Signature-Based Authentication. In [71], an authentication system based on an anonymous signature is presented so that unauthorized users do not enter the network and forged messages are not exchanged. First, all VANET users must submit their original credentials.…”
Section: Awan's Modelmentioning
confidence: 99%
“…Authentication in large networks, however, requires key management. Managed environments are those where a common trusted center manages keys [ 17 – 25 ]. A network node that does not have impenetrable hardware and authentication infrastructure, such as in gaming environments without a trusted center to control the network, can compromise the credibility of the network.…”
Section: Introductionmentioning
confidence: 99%