2019
DOI: 10.1016/j.comnet.2018.11.021
|View full text |Cite
|
Sign up to set email alerts
|

A lightweight anonymous user authentication and key establishment scheme for wearable devices

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
49
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
6
3

Relationship

0
9

Authors

Journals

citations
Cited by 116 publications
(61 citation statements)
references
References 23 publications
0
49
0
Order By: Relevance
“…i.e., gateway or server, through either direct or multi-hop communication mechanism [3]. This sensitive data needs to be collected and accessed solely by authenticated device(s) in an operational network.…”
Section: Introductionmentioning
confidence: 99%
“…i.e., gateway or server, through either direct or multi-hop communication mechanism [3]. This sensitive data needs to be collected and accessed solely by authenticated device(s) in an operational network.…”
Section: Introductionmentioning
confidence: 99%
“…More recently, in 2019, articles on this subject were published by Dammak et al [45], Gupta et al [46], Lyu et al [47], Ma et al [48], Renuka et al [49], and Li et al [50]. However, these schemes still have weaknesses, particularly in terms of the computation and communication overheads, which are highly compared to those of our proposed scheme.…”
Section: Related Workmentioning
confidence: 86%
“…Among these research ( [66], [67], [69]- [73], [78], [79]), Elliptic curve cryptography (ECC) is the most popular public-key cryptographic algorithm, as it requires smaller key size over other traditional public-key cryptographic algorithms, such as Rivest-Shamir-Adleman (RSA). On the other hand, symmetric cryptographic algorithms are often used in research ( [68], [75], [76]) on access control, data transmission to and from IoMT sensors, as they are light-weight on those resource constraint devices. For hybrid security schemes ( [74], [77], [80], [81]), symmetric cryptographic algorithms are often used as session keys.…”
Section: A State-of-the-artmentioning
confidence: 99%