2023
DOI: 10.1007/s11227-023-05144-z
|View full text |Cite
|
Sign up to set email alerts
|

Secrecy aware key management scheme for Internet of Healthcare Things

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
4
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
6
1

Relationship

1
6

Authors

Journals

citations
Cited by 7 publications
(7 citation statements)
references
References 60 publications
0
4
0
Order By: Relevance
“…The designed protocol enables mutual authentication between two patients through the assistance of their respective servers, facilitating reliable shared E2E session key establishment while preserving privacy and security [41]. A secure and lightweight group key management protocol [32] was proposed for the IoHT. The proposed protocol uses elliptic curve cryptography, one-way accumulation, and cryptographic accumulators to provide forward and backward secrecy.…”
Section: Internet Of Medical Things (Iomt)mentioning
confidence: 99%
See 2 more Smart Citations
“…The designed protocol enables mutual authentication between two patients through the assistance of their respective servers, facilitating reliable shared E2E session key establishment while preserving privacy and security [41]. A secure and lightweight group key management protocol [32] was proposed for the IoHT. The proposed protocol uses elliptic curve cryptography, one-way accumulation, and cryptographic accumulators to provide forward and backward secrecy.…”
Section: Internet Of Medical Things (Iomt)mentioning
confidence: 99%
“…A robust authentication mechanism among communication parties is essential to defend against MitM attacks. Recent research relies on the ECC [23], [80], digital signature [32], the Inverse Computational Diffie-Hellman (ICDH) problem, and the DL problem [22] as methods to mitigate this attack. The security parameters should be deployed in the registration phase using the secured channel in these methods.…”
Section: ) Man In the Middle Attackmentioning
confidence: 99%
See 1 more Smart Citation
“…Trivedi and Rao explored the secrecy-conscious key management systems for the IoT [22]. To improve the effectiveness and convenience of healthcare administration, the IoT is quickly changing as a crucial component of online healthcare data.…”
Section: Related Workmentioning
confidence: 99%
“…In [25], a GKM system was proposed to improve the effectiveness and convenience of healthcare IoT administration, combining elliptic curve encryption with oneway accumulation for sharing secret messages. This method updated the previously generated GK as the group's membership grew or shrank using classical ciphers, reducing processing and transmission costs.…”
Section: Introductionmentioning
confidence: 99%