2014
DOI: 10.1155/2014/347169
|View full text |Cite
|
Sign up to set email alerts
|

An Improved User Authentication Protocol for Healthcare Services via Wireless Medical Sensor Networks

Abstract: Healthcare service sector is one of the major applications of Wireless Sensor Networks (WSNs) acknowledged as Wireless Medical Sensor Network (WMSNs). It deploys tiny medical sensor-nodes (MS-nodes) on the body of the patient to sense crucial physiological signs which can be accessed and analyzed by registered medical professionals. Recently, Khan et al. analyzed Kumar et al. 's scheme proposed for healthcare applications using WMSNs and observed that the scheme is susceptible to many security weaknesses if an… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
52
0

Year Published

2015
2015
2024
2024

Publication Types

Select...
6
2

Relationship

1
7

Authors

Journals

citations
Cited by 38 publications
(54 citation statements)
references
References 23 publications
0
52
0
Order By: Relevance
“…But as the identity is a fixed value, a user could be tracked by an adversary. Schemes [29][30][31][32] use a similar method, but all these procedures are prone to suffer from tractability attack.…”
Section: Related Workmentioning
confidence: 99%
See 2 more Smart Citations
“…But as the identity is a fixed value, a user could be tracked by an adversary. Schemes [29][30][31][32] use a similar method, but all these procedures are prone to suffer from tractability attack.…”
Section: Related Workmentioning
confidence: 99%
“…Thus, only the gateway could learn the identities. As for the shared key between user and sensor, in some schemes, the gateway knows the shared key in schemes [6][7][8][11][12][13][14], while, in some others, the gateway does not know the key, they use Diffie-Hellman (DH) anonymous key agreement protocol to build the shared key [1,2,4,5,9,30]. As we have discussed, the gateway is not allowed to know the shared key in order to prevent a curious gateway from eavesdropping the sensor data.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…If so, terminates the session; otherwise proceeds further. 8) Obtains (CIDu*|| Tg*||M*||Tu*) as in (18), computes Au* as in (19) and compares Au* with Au. If the verification holds, the legitimacy of the GW node is successful and hence of U.…”
Section: Introductionmentioning
confidence: 99%
“…When we enjoy online shopping, online game, on line documentation, data exchange, and so forth, identity authentication is a basic protection measure to authenticate the identity of remote users [1]. Since Lamport [2] first protocol was shown in 1981, numerous protocols have been proposed and used in many communication systems [3][4][5][6][7]. In 2000, Hwang and Li [8] proposed a new remote user authentication scheme using smart card based on ElGamal's public key cryptosystem.…”
Section: Introductionmentioning
confidence: 99%