2020
DOI: 10.1016/j.comnet.2020.107567
|View full text |Cite
|
Sign up to set email alerts
|

SHAPARAK: Scalable healthcare authentication protocol with attack-resilience and anonymous key-agreement

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
38
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 29 publications
(56 citation statements)
references
References 25 publications
0
38
0
Order By: Relevance
“…Hajian et al claimed that SHAPARAK can prevent various security attacks, including impersonation, sensor device compromise, and privileged insider attacks, and also can provide anonymity and mutual authentication. However, we prove that SHAPARAK [11] suffers from many security drawbacks such as "man-in-the-middle (MITM)", "impersonation", and "session key disclosure" attacks. In addition, their scheme does not provide "mutual authentication".…”
Section: Figure 1: Tmis System Modelmentioning
confidence: 93%
See 1 more Smart Citation
“…Hajian et al claimed that SHAPARAK can prevent various security attacks, including impersonation, sensor device compromise, and privileged insider attacks, and also can provide anonymity and mutual authentication. However, we prove that SHAPARAK [11] suffers from many security drawbacks such as "man-in-the-middle (MITM)", "impersonation", and "session key disclosure" attacks. In addition, their scheme does not provide "mutual authentication".…”
Section: Figure 1: Tmis System Modelmentioning
confidence: 93%
“…In 2020, Hajian et al [11] proposed a scalable healthcare authentication protocol with attack-resilience and anonymous key agreement (SHAPARAK) in TMIS environments. Hajian et al claimed that SHAPARAK can prevent various security attacks, including impersonation, sensor device compromise, and privileged insider attacks, and also can provide anonymity and mutual authentication.…”
Section: Figure 1: Tmis System Modelmentioning
confidence: 99%
“…In 2019, Gupta et al [ 41 ] proposed a protocol that used wearable medical devices for IoHT to prevent attackers from modifying patient health information. However, Hajian et al [ 42 ] pointed out that this protocol [ 41 ] did not protect information against privileged insider attacks, offline password-guessing attacks, and de-synchronization attacks. The proposed protocol of Hajian et al [ 42 ] also could not provide perfect forward security and was vulnerable to session-key disclosure and impersonation attacks.…”
Section: Related Workmentioning
confidence: 99%
“…However, Hajian et al [ 42 ] pointed out that this protocol [ 41 ] did not protect information against privileged insider attacks, offline password-guessing attacks, and de-synchronization attacks. The proposed protocol of Hajian et al [ 42 ] also could not provide perfect forward security and was vulnerable to session-key disclosure and impersonation attacks. To improve the security of the protocol, Kumar et al [ 43 ] used digital signatures to encrypt the IoHT protocol communication process.…”
Section: Related Workmentioning
confidence: 99%
“…In heterogeneous WSNs, any insecure terminal nodes possibly threaten the whole network's security as the flexible access mode; potential vulnerabilities continually come forth due to the complexity of heterogeneous networks [1]. us, it is necessary to design an authentication protocol to ensure that only legitimate users have access to the network [2]. Generally, as far as sensor nodes are resource-constrained in some aspects such as low energy, insufficient computing capabilities, and lack of memory space, many expensive cryptographic primitives are not suitable.…”
Section: Introductionmentioning
confidence: 99%