2020
DOI: 10.1109/access.2020.3005592
|View full text |Cite
|
Sign up to set email alerts
|

LAKS-NVT: Provably Secure and Lightweight Authentication and Key Agreement Scheme Without Verification Table in Medical Internet of Things

Abstract: Wireless body area networks (WBANs) and wireless sensor networks (WSNs) are important concepts for the Internet of Things (IoT). They have been applied to various healthcare services to ensure that users can access convenient medical services by exchanging physiological data between user and medical server. User physiological data is collected by sensor nodes and sent to medical service providers, doctors, etc. using public channels. However, these channels are vulnerable to various potential attacks, and henc… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
35
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
6
2

Relationship

1
7

Authors

Journals

citations
Cited by 60 publications
(37 citation statements)
references
References 51 publications
(82 reference statements)
0
35
0
Order By: Relevance
“…In this section, we use the universally-accepted real-or-random (ROR) model [25] in order to prove the security of the session key in our proposed protocol.We provide the similar proof as adopted in [26,27].…”
Section: Ror Modelmentioning
confidence: 93%
“…In this section, we use the universally-accepted real-or-random (ROR) model [25] in order to prove the security of the session key in our proposed protocol.We provide the similar proof as adopted in [26,27].…”
Section: Ror Modelmentioning
confidence: 93%
“…The proposed system ensures mutual authentication and user verification but not resilient to access control and network scalability. Park et al ( Parket al, 2020 ) et al design an efficient and secure mutual authenticated scheme for medical IoT. The system preserves privacy and ensures secure data communication and but did not discuss the sensor's stolen, insider attack, and data masquerading attacks.…”
Section: Related Workmentioning
confidence: 99%
“… Did not achieve access control and scalability. Park et al ( Parket al, 2020 ) 2020 Design an efficient and secure mutual authenticated scheme for medical IoT Preserve user privacy and secure communication Not provide sensor stolen, privileged insider, and data masquerading attacks Saha et al ( Saha et al, 2020 ) 2020 Proposed a access control mechanism for healthcare system via private blockchain Preserve access control Not provide scalability and forward secrecy. Proposed scheme Proposed a privacy-preserving data sharing system based on Hyperledger Fabric for the medical health care system Easily resilient to various kind of attacks, achieve PCI solution for COVID-19 like pandemic.…”
Section: Related Workmentioning
confidence: 99%
“…The session key is easily disclosed, because the random numbers k A and k S are encrypted with same key z S . To prevent this attack, the random number should be encrypted with other data [19], [20] or another method to conceal data [21] VI. CONCLUSIONS User authentication and key agreement are important security requirements for IoT environments.…”
Section: Countermeasure Of Session Key Disclosure Attacksmentioning
confidence: 99%
“…Recently, a number of authentication and key agreement schemes have been proposed in IoT environments [11], [12], [19]. In 2017, Li et al [13] proposed a key distribution protocol using ECC in IoT.…”
Section: Introductionmentioning
confidence: 99%