2021 International Conference on Artificial Intelligence and Smart Systems (ICAIS) 2021
DOI: 10.1109/icais50930.2021.9395917
|View full text |Cite
|
Sign up to set email alerts
|

On the Security of Authenticated Key Agreement Scheme for Fog-driven IoT Healthcare System

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
7

Relationship

0
7

Authors

Journals

citations
Cited by 9 publications
(4 citation statements)
references
References 8 publications
0
4
0
Order By: Relevance
“…Chen et al [34] showed that the work in [3] is vulnerable to ephemeral secret leakage attacks and designed a secure AKA protocol based on fog computing. In 2021, Shamshad et al [35] reported that the work in [3] is incapable of resisting impersonation attacks and cannot provide anonymity for users and fog nodes. Wu et al [36] also found that Jia et al's protocol [3] exhibits security vulnerabilities, such as known session specific temporary information attacks and a lack of pre-verification.…”
Section: Related Workmentioning
confidence: 99%
“…Chen et al [34] showed that the work in [3] is vulnerable to ephemeral secret leakage attacks and designed a secure AKA protocol based on fog computing. In 2021, Shamshad et al [35] reported that the work in [3] is incapable of resisting impersonation attacks and cannot provide anonymity for users and fog nodes. Wu et al [36] also found that Jia et al's protocol [3] exhibits security vulnerabilities, such as known session specific temporary information attacks and a lack of pre-verification.…”
Section: Related Workmentioning
confidence: 99%
“…To ensure privacy preservation, access control, data security, and secure search, all data, including PHI, keywords, and patient identities, are encrypted with a public key using keyword search. Two kinds of blockchains, private and consortium blockchains, are developed in another research by Shamshad et al [50] by defining their consensus, data formats, and procedures. A private blockchain is responsible for the maintenance of EHRs, while a consortium blockchain keeps the safe indexes of EHRs.…”
Section: Types Of Blockchainmentioning
confidence: 99%
“…Out of N from N 1 authorities, an identity-based signature scheme with numerous authorities can survive a collision attack. This model performs more efficiently than traditional electronic health record management systems [18].…”
Section: Related Workmentioning
confidence: 99%