2020
DOI: 10.1002/cpe.5734
|View full text |Cite
|
Sign up to set email alerts
|

Cloud‐assisted elliptic curve password authenticated key exchange protocol for wearable healthcare monitoring system

Abstract: Wearable devices (WDs) adopting advanced microsensors and IoT technology are facing severe security risks in the process of building wearable healthcare monitoring system. In particular, new requirements are proposed for the security of the identity authentication and key agreement protocol as well as the consumption of computing resources for WDs, such as replay attack, modification attack, server-spoofing attack, privileged-insider attack, and denial-of-service attack. To satisfy such requirements, cloud-ass… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
6
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
5
2
1

Relationship

1
7

Authors

Journals

citations
Cited by 8 publications
(6 citation statements)
references
References 29 publications
0
6
0
Order By: Relevance
“…IotC should be able to concurrently network multiple WSs. (v) Te combination of IotC and WS must be built according to the diagnostic needs of doctors [7]. (vi) To reduce the impact of remote network quality on IoHT system availability, the IotC and WS should have ofine networking capabilities.…”
Section: Networking Requirements Of Sensor Layer Networkmentioning
confidence: 99%
See 2 more Smart Citations
“…IotC should be able to concurrently network multiple WSs. (v) Te combination of IotC and WS must be built according to the diagnostic needs of doctors [7]. (vi) To reduce the impact of remote network quality on IoHT system availability, the IotC and WS should have ofine networking capabilities.…”
Section: Networking Requirements Of Sensor Layer Networkmentioning
confidence: 99%
“…However, this scheme does not support the dynamic construction of a sensor layer network. In 2020, Wang et al [7] proposed a lightweight WSs and WNC mutual authentication protocol based on the elliptic curve cryptography (ECC) algorithm. With the help of a cloud-assisted authentication service, the protocol can realize mutual authentication and key negotiation of a wearable network connector (WNC) access to WSs designated by doctors.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Much like embedded devices, they are loaded with sensors for collecting data from the surrounding ecosystem and transmitting the data to the destination for desired analysis and actions. With the advancement in healthcare wearable devices [2] such as implantable pacemakers, biofluidic-based wearables, and skin-based wearables, there has been growing concern over their manufacturing and their implications for security and privacy [3]. Consider a pacemaker as an example.…”
Section: Introductionmentioning
confidence: 99%
“…Wireless body area network [6] usually installs sensors on clothes or attached to the human body and can also be implanted into the skin to monitor the user's physical activ-ities and the state of body functions. The physical health data monitored by the sensors are sent to the cloud server for storage and analysis through the Internet of Things (IoTs).…”
Section: Introductionmentioning
confidence: 99%