2018
DOI: 10.1155/2018/7579161
|View full text |Cite
|
Sign up to set email alerts
|

Trusted Authority Assisted Three‐Factor Authentication and Key Agreement Protocol for the Implantable Medical System

Abstract: The application of implantable medical devices (IMDs), which solves the problems of geographical distance limitation and real-time health monitoring that plague patients and doctors, has caused great repercussions in the medical community. Despite the great potential of wide application, it also brings some security and privacy issues, such as the leakage of health data and unauthorized access to IMDs. Although a number of authentication and key agreement (AKA) schemes have been developed, we find that some su… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
7
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 14 publications
(7 citation statements)
references
References 52 publications
0
7
0
Order By: Relevance
“…We provide the comparative analysis of our scheme and some representative schemes [24], [27], [37] in this section. When evaluating the computation and communication overheads, we concern with the login and authentication phase.…”
Section: Security and Performance Comparisonmentioning
confidence: 99%
See 3 more Smart Citations
“…We provide the comparative analysis of our scheme and some representative schemes [24], [27], [37] in this section. When evaluating the computation and communication overheads, we concern with the login and authentication phase.…”
Section: Security and Performance Comparisonmentioning
confidence: 99%
“…Li et al's scheme [37] is vulnerable to various weaknesses like forgery attack, man-in-the-middle attack, and replay attack, etc. Mao et al's scheme [24] provides many security attributes, but is flawed with known session-specific temporary information attack.…”
Section: Security and Performance Comparisonmentioning
confidence: 99%
See 2 more Smart Citations
“…Wazid et al [24] and Mao et al [25] propose three-factor protocols, which rely on passwords, smart cards, and biometrics. Their protocols rely on a reader-registration phase before the IMD deployment in the field.…”
Section: Related Workmentioning
confidence: 99%