The platform will undergo maintenance on Sep 14 at about 7:45 AM EST and will be unavailable for approximately 2 hours.
2021
DOI: 10.1109/access.2021.3099299
|View full text |Cite
|
Sign up to set email alerts
|

An Improved Authentication Protocol for Smart Healthcare System Using Wireless Medical Sensor Network

Abstract: With the rapid development and evolution of wireless network technology, electronic health has shown great potential in continuously monitoring the health of patients. The wireless medical sensor network (WMSN) has played an important role in this field. In WMSN, medical sensors are placed on patients to collect relevant health data and transmitted to medical professionals in hospitals or at home through insecure channels. These health data need to be highly protected because they contain patientrelated privat… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
9

Relationship

0
9

Authors

Journals

citations
Cited by 26 publications
(14 citation statements)
references
References 40 publications
(68 reference statements)
0
4
0
Order By: Relevance
“…IoD Ref. [43] Hash + ECC + XOR Weak against MITM, impersonation, and stolen smart card attacks. WSN RADF-IIoT Hash + CM + AEAD + XOR Protection against various attacks.…”
Section: Ref [41]mentioning
confidence: 99%
“…IoD Ref. [43] Hash + ECC + XOR Weak against MITM, impersonation, and stolen smart card attacks. WSN RADF-IIoT Hash + CM + AEAD + XOR Protection against various attacks.…”
Section: Ref [41]mentioning
confidence: 99%
“…The comparison results of computation costs and the security features are shown in Tables 3 and 4, respectively. Table 3 shows the improved scheme is superior to the schemes [18,19] in terms of computation costs. Table 4 shows the comparison results of security features between the improved scheme and the relative schemes [15,18,20] .…”
Section: Comparisionmentioning
confidence: 99%
“…In healthcare monitoring systems, anonymous failure means serious user privacy and access credentials disclosure. A good anonymous authentication protocol can help to alleviate this problem [78].…”
Section: ) Typical Attack Technologiesmentioning
confidence: 99%
“…Similar to anonymous authentication, without the help of trusted third parties and preloaded secrets, Zhang et al [40] designed an AKA scheme using the secret mismatch problem. Yuanbing et al [78] proposed a protocol for a smart medical system based on ECC, which can resist internal privilege attacks and smart card theft without the problem of user anonymity loss. With SDN architecture, a lightweight AKA scheme named ALAM and its upgrade version were proposed in [32,95].…”
Section: ) Authentication and Key Agreement (Aka)mentioning
confidence: 99%