2021
DOI: 10.3390/s21186039
|View full text |Cite
|
Sign up to set email alerts
|

Provably Secure Three-Factor-Based Mutual Authentication Scheme with PUF for Wireless Medical Sensor Networks

Abstract: Wireless medical sensor networks (WMSNs) are used in remote medical service environments to provide patients with convenient healthcare services. In a WMSN environment, patients wear a device that collects their health information and transmits the information via a gateway. Then, doctors make a diagnosis regarding the patient, utilizing the health information. However, this information can be vulnerable to various security attacks because the information is exchanged via an insecure channel. Therefore, a secu… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
5
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
7
1
1

Relationship

1
8

Authors

Journals

citations
Cited by 25 publications
(5 citation statements)
references
References 44 publications
0
5
0
Order By: Relevance
“…Dharminder et al's scheme includes the followings: (1) Registration phase, (ii) Login and authentication phase, and iii Password change phase. We briefly, describe these phases as follows: Ravanbakhsh & Nazari [33] Utilized ECC a and Fuzzy Extractor Known-session-specific temporary information attacks Perfect forward secrecy [34] Li et al [36] Provides privacy and mutual authentication for TMIS Not provide user anonymity and unlinkability Impersonation attack [37] Giri et al [38] RSA-based authentication for TMIS Off-line password guessing Insider attacks Not provide user anonymity [39] Bin [40] RSA-based authentication for telecare systems Off-line password guessing attack Not provide perfect forward secrecy [41] Lu et al [10] Biometric-based authentication for TMIS, using ECC Off-line identity guessing attack Server impersonation attack Off-line password guessing attack [9] Mishra et al [42] Biometric-based scheme for TMIS Man-in-the-middle attack Not provide perfect forward secrecy [43] Li et al [19] Anonymity preserving authentication for WBAN d Not provide perfect forward secrecy Insider attacks [44] He et al [20] Secure authentication for WBAN Known-session-specific temporary information attack Denial of service attack [44] Sahoo et al [28] Biometric-based authentication using ECC insider attack Not provide anonymity [29] Sahoo et al [26] ECC-based authentication for TMIS replay attack password guessing attack [27] Gupta et al [3] Hash and Biometric-based scheme for WBAN, Known-session-specific temporary information attack Stolen verifier attack Not provide perfect forward secrecy Soni et al [23] Three-factor authentication using ECC Not provide perfect forward secrecy [24], [25] Aghili et al [13] Low computation cost authentication Not provide perfect forward secrecy Server impersonation attack malicios sensor attack [22] Masud et al [30] Low computation cost, hash and Xor-based scheme for WBAN Not provide anonymity insider attack impersonation attack password guessing attack [31],…”
Section: Overview Of Dharminder Et Al's Schemementioning
confidence: 99%
See 1 more Smart Citation
“…Dharminder et al's scheme includes the followings: (1) Registration phase, (ii) Login and authentication phase, and iii Password change phase. We briefly, describe these phases as follows: Ravanbakhsh & Nazari [33] Utilized ECC a and Fuzzy Extractor Known-session-specific temporary information attacks Perfect forward secrecy [34] Li et al [36] Provides privacy and mutual authentication for TMIS Not provide user anonymity and unlinkability Impersonation attack [37] Giri et al [38] RSA-based authentication for TMIS Off-line password guessing Insider attacks Not provide user anonymity [39] Bin [40] RSA-based authentication for telecare systems Off-line password guessing attack Not provide perfect forward secrecy [41] Lu et al [10] Biometric-based authentication for TMIS, using ECC Off-line identity guessing attack Server impersonation attack Off-line password guessing attack [9] Mishra et al [42] Biometric-based scheme for TMIS Man-in-the-middle attack Not provide perfect forward secrecy [43] Li et al [19] Anonymity preserving authentication for WBAN d Not provide perfect forward secrecy Insider attacks [44] He et al [20] Secure authentication for WBAN Known-session-specific temporary information attack Denial of service attack [44] Sahoo et al [28] Biometric-based authentication using ECC insider attack Not provide anonymity [29] Sahoo et al [26] ECC-based authentication for TMIS replay attack password guessing attack [27] Gupta et al [3] Hash and Biometric-based scheme for WBAN, Known-session-specific temporary information attack Stolen verifier attack Not provide perfect forward secrecy Soni et al [23] Three-factor authentication using ECC Not provide perfect forward secrecy [24], [25] Aghili et al [13] Low computation cost authentication Not provide perfect forward secrecy Server impersonation attack malicios sensor attack [22] Masud et al [30] Low computation cost, hash and Xor-based scheme for WBAN Not provide anonymity insider attack impersonation attack password guessing attack [31],…”
Section: Overview Of Dharminder Et Al's Schemementioning
confidence: 99%
“…In 2021, Masud et al [30] designed a lightweight scheme for authenticating entities in a telecare medical system that only uses hash and XOR functions. But as mentioned in [25] and [31], their scheme was insecure to a series of attacks such as impersonation, insider, and password guessing attacks, and cannot provide anonymity.…”
Section: Related Workmentioning
confidence: 99%
“…To address this problem, a lightweight and privacy-preserving protocol is presented in [105]. However, this approach is vulnerable to user impersonation, offline password guessing and privileged insider attacks [106]. In addition, it cannot offer user anonymity.…”
Section: Related Workmentioning
confidence: 99%
“…In multi-server environments, an adversary can insert, delete, or modify messages exchanged through a public channel. If adversary obtains these messages and transmits those to users or servers, the adversary can attempt replay or man-in-the-middle (MITM) attack [5]- [8]. Moreover, a malicious adversary can extract user's sensitive personal parameters stored in the mobile device or smart card utilizing power analysis attack.…”
Section: Introductionmentioning
confidence: 99%