2023
DOI: 10.1109/jiot.2023.3270300
|View full text |Cite
|
Sign up to set email alerts
|

Anonymous Lightweight Authenticated Key Agreement Protocol for Fog-Assisted Healthcare IoT System

Abstract: County (UMBC)ScholarWorks@UMBC digital repository on the Maryland Shared Open Access (MD-SOAR) platform.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
4

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(3 citation statements)
references
References 41 publications
0
3
0
Order By: Relevance
“…In [24], an AKA mechanism is suggested, but it falls short of supplying a satisfactory user anonymity shield and lacks an efficient technique for password update. An anonymous AKA procedure employing chaotic maps and the hash algorithm is outlined in [25], with its security corroborated operating the BAN logic model. However, vulnerabilities are determined in an AKA procedure conceived for the cloud-enabled IoT environment employing ECC and a hash function, as provided in [26].…”
Section: Related Workmentioning
confidence: 99%
“…In [24], an AKA mechanism is suggested, but it falls short of supplying a satisfactory user anonymity shield and lacks an efficient technique for password update. An anonymous AKA procedure employing chaotic maps and the hash algorithm is outlined in [25], with its security corroborated operating the BAN logic model. However, vulnerabilities are determined in an AKA procedure conceived for the cloud-enabled IoT environment employing ECC and a hash function, as provided in [26].…”
Section: Related Workmentioning
confidence: 99%
“…In [18], a three-party AKA framework is proposed, but it lacks adequate user anonymity protection and does not offer an efficient method for password change. An anonymous AKA scheme constructed using the chaotic map and hash function is presented in [19], with its security validated using the Burrows-Abadi-Needham (BAN) logic model. However, vulnerabilities exist in an AKA scheme utilizing ECC and a hash function for the cloud-enabled IoT environment, as noted in [20].…”
Section: Related Workmentioning
confidence: 99%
“…The initialization vector is computed in (19), which is used in the decryption process. In addition, from the decryption process, GW y obtains the plaintext TID SN z and R 1 and computes the verification parameter in (21).…”
Section: 31mentioning
confidence: 99%