2022
DOI: 10.1007/978-981-19-5403-0_2
|View full text |Cite
|
Sign up to set email alerts
|

Forward and Backward Key Secrecy Preservation Scheme for Medical Internet of Things

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
5
0

Year Published

2023
2023
2023
2023

Publication Types

Select...
6

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(5 citation statements)
references
References 36 publications
0
5
0
Order By: Relevance
“…The protocol achieved a 43.98% reduction in computational overhead, an 18.18% increase in supported security characteristics, and a 19.05% reduction in space complexities. Another noteworthy study in wireless healthcare networks addressed security and privacy by developing an authentication scheme that ensures strong mutual authentication, backward secrecy, session key negotiation, and forward key secrecy in transmitting sensitive patient data over wireless channels [ 38 ]. The scheme proved resilient against various attacks and exhibited lower computation and communication complexities.…”
Section: Related Workmentioning
confidence: 99%
“…The protocol achieved a 43.98% reduction in computational overhead, an 18.18% increase in supported security characteristics, and a 19.05% reduction in space complexities. Another noteworthy study in wireless healthcare networks addressed security and privacy by developing an authentication scheme that ensures strong mutual authentication, backward secrecy, session key negotiation, and forward key secrecy in transmitting sensitive patient data over wireless channels [ 38 ]. The scheme proved resilient against various attacks and exhibited lower computation and communication complexities.…”
Section: Related Workmentioning
confidence: 99%
“…The emergence of the industrial internet of things (IIoT) has advanced e-health by facilitating the development of connected healthcare systems that enhance interoperability, visibility and data connectivity. However, the deployment of such technology has led to growing concerns regarding security and privacy [173] of healthcare data. The risks are further increased when the collection, sharing and processing is accomplished via cutting-edge connected sensor devices.…”
Section: Key Findingsmentioning
confidence: 99%
“…In addition, the approach in [144] cannot provide anonymity [146]. This problem is tackled by the dynamic pseudonym based authentication schemes in [147], [148], [149], [150], [151], [152], [153], [154], [155], [156], [157], [158], [159], [160], [161], [162] and [163]. As such, the eavesdropping the communication channel cannot yield any valid users identities [59], [164], [165].…”
Section: Security Schemes For Cloud Environmentmentioning
confidence: 99%