2022
DOI: 10.1016/j.dcan.2021.07.002
|View full text |Cite
|
Sign up to set email alerts
|

An enhanced scheme for mutual authentication for healthcare services

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
22
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
6
1

Relationship

1
6

Authors

Journals

citations
Cited by 41 publications
(24 citation statements)
references
References 31 publications
0
22
0
Order By: Relevance
“…Their strategy does not ensure the property of sensor node anonymity. In 2021, Shamshad et al 14 designed a secure mutual authentication scheme for healthcare service. They claimed that their scheme can withstand a variety of cryptographic attacks including insider, replay, masquerade and offline password guessing attack.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Their strategy does not ensure the property of sensor node anonymity. In 2021, Shamshad et al 14 designed a secure mutual authentication scheme for healthcare service. They claimed that their scheme can withstand a variety of cryptographic attacks including insider, replay, masquerade and offline password guessing attack.…”
Section: Related Workmentioning
confidence: 99%
“…Our proposed scheme provides authentication and a key agreement scheme between fog server and IoT device. The proposed authentication and key agreement scheme overcomes the flaws in the existing literature 10‐14 The proposed scheme provides device anonymity, ensuring that cryptanalyst cannot get device information in place of a legitimate fog server. The proposed scheme employs ECC to provide cost‐effective operation in the resource‐constrained environment.…”
Section: Introductionmentioning
confidence: 99%
“…Although healthcare can provide people with significant convenience, several security problems [13][14][15][16][17] exist, such as the disclosure of patients' medical data and the tampering of patients' medical schemes by illegal personnel of the system. Many researchers have proposed a large number of schemes [12,[18][19][20] to address the security problems inherent in the healthcare environment. However, some existing authentication and key agreement protocols have security vulnerabilities, such as against offline guessing, impersonation and insider attacks.…”
Section: Introductionmentioning
confidence: 99%
“…As explained in [12], TMIS has made it possible for patients to access doctor's telemedicine services over the internet. In so doing, TMIS accelerate the convenience of healthcare services access to patients at their place of preference [13], providing real-time remote diagnosis. As discussed in [14], these digital healthcare technologies have revolutionized the healthcare sector, enabling efficient collection, storage and access to ePHI.…”
Section: Introductionmentioning
confidence: 99%
“…However, ensuring the security of massive personal health information (PHI) being collected by numerous electronic devices has been noted to be cumbersome [32]. As such, the assurance of perfect confidentiality, integrity, secrecy and security in TMIS remains challenging [13].…”
Section: Introductionmentioning
confidence: 99%