2021
DOI: 10.1016/j.dcan.2020.06.003
|View full text |Cite
|
Sign up to set email alerts
|

Lightweight authentication protocol for e-health clouds in IoT-based applications through 5G technology

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
16
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
6
3

Relationship

0
9

Authors

Journals

citations
Cited by 48 publications
(19 citation statements)
references
References 47 publications
0
16
0
Order By: Relevance
“…In order to achieve reliability and access control, we discussed several papers, in two of these papers [21,23] the authors presented a lightweight protocol for achieving authentication, in our opinion, their use of a lightweight protocol was an excellent option as they consume fewer resources during the calculation and it is more efficient compared to the traditional protocol, the difference between them is the first protocol depend on XOR and shit operations only, not hash function or other cryptographic operations [21], while the other protocol depends on hash function, and elliptic curve cryptosystem [23]. In another paper [22], the authors present a framework relies on a diffie-hellman key exchange, for a service-oriented three-party key agreement to agree to session keys between IoT servers, users, and local fog. In another research [24] the authors presented the Chip Specific Authentication and Access Control mechanism by authorize AAC devices to third parties that provide these devices in 5G RAN.…”
Section: Discussionmentioning
confidence: 99%
See 1 more Smart Citation
“…In order to achieve reliability and access control, we discussed several papers, in two of these papers [21,23] the authors presented a lightweight protocol for achieving authentication, in our opinion, their use of a lightweight protocol was an excellent option as they consume fewer resources during the calculation and it is more efficient compared to the traditional protocol, the difference between them is the first protocol depend on XOR and shit operations only, not hash function or other cryptographic operations [21], while the other protocol depends on hash function, and elliptic curve cryptosystem [23]. In another paper [22], the authors present a framework relies on a diffie-hellman key exchange, for a service-oriented three-party key agreement to agree to session keys between IoT servers, users, and local fog. In another research [24] the authors presented the Chip Specific Authentication and Access Control mechanism by authorize AAC devices to third parties that provide these devices in 5G RAN.…”
Section: Discussionmentioning
confidence: 99%
“…they prove that their protocol has a high level of performance and security. In the paper [22], the authors propose a secure and efficient authentication framework that supports network segmentation and fog computing to enable users to efficiently establish connections with the 5G network and access IoT services, Authentication is achieved to ensure the confidentiality of the service data and the reliability of the users. Users can anonymously authenticate with IoT servers by authorizing both the 5G core network and IoT servers the authors demonstrated their protocol adequacy under the 5G infrastructure.…”
Section: Authenticity and Access Control To Secure Communicationmentioning
confidence: 99%
“…Almost all the application fields of IoTs have researched some dimension of light-weight authentication schemes in recent years. For healthcare field, the major contributors of authentication schemes include: a light-weight authentication protocol for cloud-based health-care systems (LAPCHS) [34]; a two-factor authentication scheme for Wireless Body Area Network (WBAN) [35]; Secure and light-weight RFID authentication protocol for Medical IoT (SecLAP) [36]; a light-weight mutual authentication and key agreement protocol for remote surgery application in tactile internet environment [37], and authentication for e-healthcare using 5G [38]. Some other health-related approaches are also seen in [39]- [41].…”
Section: A Light-weight Authentication Protocolsmentioning
confidence: 99%
“…Thus, the administrator of the document database needs to protect the residents' health data information. For example, the work of [22] provided a new protocol for e-Health cloud, and the protocol could prevent some major attack, e.g., offline password guessing, impersonation, stolen smart card and user anonymity attacks; Meanwhile, the work employed the Random Oracle Model to evaluate and verify their provided protocol.…”
Section: Related Workmentioning
confidence: 99%