2023
DOI: 10.1002/ett.4716
|View full text |Cite
|
Sign up to set email alerts
|

Lightweight and efficient privacy‐preserving mutual authentication scheme to secure Internet of Things‐based smart healthcare

Abstract: In recent years, Internet of Things (IoT) technology has been adopted in numerous application areas, such as healthcare, agriculture, industrial automation, and many more. The use of IoT and other technologies like cloud computing and machine learning has made the modern healthcare system to be smart, automated, and efficient. However, the continuous proliferation of cyber‐attacks on IoT devices has increased IoT challenges like data security, privacy protection, authentication, and so forth. In smart healthca… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
6
0

Year Published

2023
2023
2023
2023

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 18 publications
(14 citation statements)
references
References 39 publications
0
6
0
Order By: Relevance
“…Das et al [32] introduced a privacy-preserving mutual authentication scheme aimed at overcoming the security and privacy challenges faced by IoT-based healthcare systems. The scheme utilizes efficient cryptographic methods such as XOR, concatenation, and hash operation, taking into account the processing limitations of IoT devices.…”
Section: Lightweight Cryptographic Primitives-based Solutionmentioning
confidence: 99%
“…Das et al [32] introduced a privacy-preserving mutual authentication scheme aimed at overcoming the security and privacy challenges faced by IoT-based healthcare systems. The scheme utilizes efficient cryptographic methods such as XOR, concatenation, and hash operation, taking into account the processing limitations of IoT devices.…”
Section: Lightweight Cryptographic Primitives-based Solutionmentioning
confidence: 99%
“…For IoT-enabled hospitals, a reciprocal authentication method that protects privacy was suggested by Das, S. and Namasudra in order to accomplish quick and efficient network device verification [ 38 ]. This suggested authentication method was built using lightweight cryptographic primitives, such as XOR, combination, and hash operation, to accommodate the computing power of the IoT devices.…”
Section: Related Workmentioning
confidence: 99%
“…Hence, an illegal session key computation attack is not possible on proposed XAISM-CTH. 26,27 • The messages which need to be exchanged should contain different timestamp values, random nonce values, secret key values, and various identities. The secret values are only known to the associated parties, not to the attackers.…”
Section: Security Analysismentioning
confidence: 99%
“…This protects XAISM-CTH against the replay, man-in-the-middle, and impersonation attacks. 26,28 • There is a provision to store secret values in the secured region of the database of cloud servers. Therefore, these values are not available to the attackers.…”
Section: Security Analysismentioning
confidence: 99%
See 1 more Smart Citation