2020
DOI: 10.1109/access.2020.3000716
|View full text |Cite
|
Sign up to set email alerts
|

ITSSAKA-MS: An Improved Three-Factor Symmetric-Key Based Secure AKA Scheme for Multi-Server Environments

Abstract: A variety of three-factor smart-card based schemes, specifically designed for telecare medicine information systems (TMIS) are available for remote user authentication. Most of the existing schemes for TMIS are customarily proposed for the single server-based environments and in a single-server environment. Therefore, there is a need for patients to distinctly register and login with each server to employ distinct services, so it escalates the overhead of keeping the cards and memorizing the passwords for the … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
23
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
3
3

Relationship

0
6

Authors

Journals

citations
Cited by 37 publications
(23 citation statements)
references
References 53 publications
(69 reference statements)
0
23
0
Order By: Relevance
“…• M A can steal the legal user's smart card and extract the stored secret credentials in memory by performing power analysis [3]- [5]. • M A can be a legitimate and privileged insider, which is able to reveal the verifier table stored in the RC database [1]. • After getting the secret credentials of the smart card, an adversary may attempt potential attacks such as "MITM", "masquerade", "off-line password guessing" attacks and so on [6]- [8].…”
Section: A Adversary Modelmentioning
confidence: 99%
See 4 more Smart Citations
“…• M A can steal the legal user's smart card and extract the stored secret credentials in memory by performing power analysis [3]- [5]. • M A can be a legitimate and privileged insider, which is able to reveal the verifier table stored in the RC database [1]. • After getting the secret credentials of the smart card, an adversary may attempt potential attacks such as "MITM", "masquerade", "off-line password guessing" attacks and so on [6]- [8].…”
Section: A Adversary Modelmentioning
confidence: 99%
“…We briefly review Ali et al's AKA scheme for multiserver environments. Ali et al's scheme [1] is composed of three processes: user registration, server registration, authentication, and key establishment. The symbols utilized in this paper are summarized in Table 1.…”
Section: Review Of the Ali Et Al's Schemementioning
confidence: 99%
See 3 more Smart Citations