2019
DOI: 10.1007/s12652-019-01513-w
|View full text |Cite
|
Sign up to set email alerts
|

An efficient two-factor authentication scheme with key agreement for IoT based E-health care application using smart card

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
25
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
7
2

Relationship

0
9

Authors

Journals

citations
Cited by 27 publications
(27 citation statements)
references
References 39 publications
0
25
0
Order By: Relevance
“…As a result, they generate the authentication, data integrity, and confidentiality problems in the H-IoT applications employed in the context of COVID-19 ( Zeadally et al., 2019b ). H-IoT networks consist of thousands of gadgets, which collect massive amounts of data from their deployed area and send it across the network with hop count communication to further processing, therefore, efficient availability and data access are particularly indispensable to the clients and enterprises in these networks ( Karthigaiveni and Indrani, 2019 ). It involves data consumption privileges that might be assigned to various professionals in the context of big H-IoT applications employed in the consolidation of COVID-19.…”
Section: Network and Security Challenges In H-iotmentioning
confidence: 99%
“…As a result, they generate the authentication, data integrity, and confidentiality problems in the H-IoT applications employed in the context of COVID-19 ( Zeadally et al., 2019b ). H-IoT networks consist of thousands of gadgets, which collect massive amounts of data from their deployed area and send it across the network with hop count communication to further processing, therefore, efficient availability and data access are particularly indispensable to the clients and enterprises in these networks ( Karthigaiveni and Indrani, 2019 ). It involves data consumption privileges that might be assigned to various professionals in the context of big H-IoT applications employed in the consolidation of COVID-19.…”
Section: Network and Security Challenges In H-iotmentioning
confidence: 99%
“…In this section, we evaluate the performance of several authentication protocols in the cloud healthcare environment, including Mohit et al [28], Li et al [29], Kumari et al [30], Karthigaiveni and Indrani [38], Sahoo et al [39], and ours.…”
Section: Performance Evaluationmentioning
confidence: 99%
“…To ease the medical facilities through the telecare medical information system (TMIS) in remote areas with the help of the internet provides a sharp reduction in patient travel time and medical expenditure. With the advances in TMIS by employing various healthcare applications in the domain of Cloud Environment [1] , [2] , [3] , [4] , Internet of Things platform [5] , [6] , [7] , Wearable Devices [8] , [9] , Wireless Body Area Network (WBAN) [10] , [11] , Wireless Medical Sensor Network [12] , [13] are extensively focused in literature. Among the various applications, the cloud environment-based TMIS has received significant interest in the e-medical system.…”
Section: Introductionmentioning
confidence: 99%