2017
DOI: 10.1016/j.compeleceng.2017.03.016
|View full text |Cite
|
Sign up to set email alerts
|

Efficient end-to-end authentication protocol for wearable health monitoring systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
87
1

Year Published

2017
2017
2020
2020

Publication Types

Select...
9

Relationship

3
6

Authors

Journals

citations
Cited by 127 publications
(88 citation statements)
references
References 17 publications
0
87
1
Order By: Relevance
“…The widespread adoption of IoT deployments might range from industrial internet to connected health, from smart city and grids to wildlife tracing, and from military monitoring to connected vehicles. Thus, the advancing applications of IoT with embedded cloud computing infrastructures indicate an ever‐escalating reliance on wireless sensor networks (WSN) 1 . The sensitive data in the open fields need to be captured anonymously but after successful mutual authentication process.…”
Section: Introductionmentioning
confidence: 99%
“…The widespread adoption of IoT deployments might range from industrial internet to connected health, from smart city and grids to wildlife tracing, and from military monitoring to connected vehicles. Thus, the advancing applications of IoT with embedded cloud computing infrastructures indicate an ever‐escalating reliance on wireless sensor networks (WSN) 1 . The sensitive data in the open fields need to be captured anonymously but after successful mutual authentication process.…”
Section: Introductionmentioning
confidence: 99%
“…Furthermore, A may also learn users' passwords via a malicious terminal or extract the parameters from the smart card by side-channel attack, but cannot achieve both [2,27,36]. We summarize the capacities of the adversary A in Table 2.…”
Section: Adversary Modelmentioning
confidence: 99%
“…In order to address the security aspects under the above-mentioned application scenario, many authentication protocols are proposed [4][5][6][7]. In 2009, Das [8] proposed a two-factor user authentication protocol, which is claimed to have strong authentication and session key establishment and achieves efficiency.…”
Section: Related Workmentioning
confidence: 99%