2018
DOI: 10.1007/s40860-018-0062-5
|View full text |Cite
|
Sign up to set email alerts
|

Multi-factor user authentication scheme for IoT-based healthcare services

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
31
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
2
2
1

Relationship

1
4

Authors

Journals

citations
Cited by 86 publications
(42 citation statements)
references
References 46 publications
0
31
0
Order By: Relevance
“…The attacker can eavesdrop and manipulate the message in real-time without the sender or receiver noticing [6]. Referenced in: [32], [13], [16], [19], [21], [46], [26].…”
Section: Denial Of Service (Dos) (26)mentioning
confidence: 99%
See 3 more Smart Citations
“…The attacker can eavesdrop and manipulate the message in real-time without the sender or receiver noticing [6]. Referenced in: [32], [13], [16], [19], [21], [46], [26].…”
Section: Denial Of Service (Dos) (26)mentioning
confidence: 99%
“…Insider attack (4): In WBAN applications an attacker can launch an insider attack by using a physically compromised node with authorised system access to drop, modify and misroute data packets to harm normal network functionality [8], [13], [15], [34].…”
Section: Denial Of Service (Dos) (26)mentioning
confidence: 99%
See 2 more Smart Citations
“…However, their scheme is prone to offline password guessing attacks. Dhillon and Kalra proposed biometrics‐based strong authentication protocol using ECC for IoT‐based health care networks which allows a medical professional to access patient data securely from Cloud‐IoT network. Sharma and Kalra proposed lightweight, robust remote user authentication and key agreement protocols for e‐governance applications in the smart cities using smart card.…”
Section: Related Workmentioning
confidence: 99%