2018
DOI: 10.1109/tie.2017.2739683
|View full text |Cite
|
Sign up to set email alerts
|

Privacy Protection for E-Health Systems by Means of Dynamic Authentication and Three-Factor Key Agreement

Abstract: During the past decade, the electronic healthcare (e-health) system has been evolved into a more patient-oriented service with smaller and smarter wireless devices. However, these convenient smart devices have limited computing capacity and memory size, which makes it harder to protect the user's massive private data in the e-health system. Although some works have established a secure session key between the user and the medical server, the weaknesses still exist in preserving the anonymity with low energy co… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
65
0

Year Published

2018
2018
2024
2024

Publication Types

Select...
5
4

Relationship

0
9

Authors

Journals

citations
Cited by 122 publications
(79 citation statements)
references
References 39 publications
0
65
0
Order By: Relevance
“…Before elaborating a security analysis, we summarize the following adversary model used in this work. (2) The attacker can extract all the secret data stored in MD if the lost/stolen mobile device is obtained by him [42,43] (3) The attacker can guess the user's identity and password offline by enumerating pairs in (ID and PW) from Cartesian product D ID × D PW in polynomial time, where D ID and D PW denote the identity space and the password space [37,44], respectively (4) The random numbers and the secret keys selected by each communication parties are adequately large to prevent the attacker from guessing these data successfully in polynomial time (5) The insider can obtain the registration request message of the user, and the insider can access the verifier table [45,46] 3.2. KSSTI Attack.…”
Section: Cryptanalysis On Jiang Et Al's Protocolmentioning
confidence: 99%
See 1 more Smart Citation
“…Before elaborating a security analysis, we summarize the following adversary model used in this work. (2) The attacker can extract all the secret data stored in MD if the lost/stolen mobile device is obtained by him [42,43] (3) The attacker can guess the user's identity and password offline by enumerating pairs in (ID and PW) from Cartesian product D ID × D PW in polynomial time, where D ID and D PW denote the identity space and the password space [37,44], respectively (4) The random numbers and the secret keys selected by each communication parties are adequately large to prevent the attacker from guessing these data successfully in polynomial time (5) The insider can obtain the registration request message of the user, and the insider can access the verifier table [45,46] 3.2. KSSTI Attack.…”
Section: Cryptanalysis On Jiang Et Al's Protocolmentioning
confidence: 99%
“…At present, electronic-health (e-health) services are greatly promoted with the significant advances in computer science, wireless communication technologies, low-power sensors, and various security solutions [1][2][3][4][5][6][7][8] have been developed to build secure e-health systems. Wireless sensor network (WSN) plays an important role in e-health via sensing, measuring, gathering patient's information for doctor's diagnosis, or recording in the medical server.…”
Section: Introductionmentioning
confidence: 99%
“…Mutual authentication protocol is designed in [9] for smart city IoT application, which is constructed based on learning with errors complexity assumption. Zhang et al [10] suggest a three-factor key agreement protocol for e-health system, which supports dynamic authentication. Another key agreement protocol for multi-gateway IoT network is proposed in [11].…”
Section: Security Of Iot and Big Datamentioning
confidence: 99%
“…Dawoud et al [45] defined different scenarios for the integration of the ehealth systems with the cloud computing systems and these scenarios discussed the authentication and data processing in the different parts of the system. Zhang et al [46] proposed a three-factor authenticated key agreement scheme based on a dynamic authentication mechanism to protect the users privacy using for e-health systems, and it was proved to be semantically secure under the real or random model. Sahi et al [47] reviewed the latest research with regard to privacy preservation in e-Healthcare and explored whether this research offers any possible solutions to patient privacy requirements for e-Healthcare.…”
Section: Related Workmentioning
confidence: 99%