2019
DOI: 10.1109/access.2019.2912870
|View full text |Cite
|
Sign up to set email alerts
|

A Lightweight Mutual Authentication and Key Agreement Scheme for Medical Internet of Things

Abstract: Wireless body area networks play an indispensable role in the medical Internet of Things. It is a network of several wearables or implantable devices that use wireless technologies to communicate. These devices usually collect the wearer's physiological data and send it to the server. Some health care providers can access the server over the network and provide medical care to the wearer. Due to the openness and mobility of the wireless network, the adversary can easily steal and forge information, which excha… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
93
0
1

Year Published

2020
2020
2024
2024

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 78 publications
(94 citation statements)
references
References 28 publications
0
93
0
1
Order By: Relevance
“…Our scheme computational cost is better than all other schemes in the sensor side [4], [9], [17], [18] with a 70% reduction by using P-I and 80% reduction by using P-II. Besides, P-I preforms similar to [9], [17], [18] in the hub node side, but better than [4], [25] and P-II performs better than all other schemes with an 80% reduction in the hub node side, as depicted in fig5. Furthermore, we chose a hash function with a 224bit key size to allow the sensor to have a sufficient amount of security more than [9], [17] which take a 160bit key size, and Koya and P. P [18] which takes a 128bit size key, (see Table III Table IV).…”
Section: A Computational Costmentioning
confidence: 87%
See 4 more Smart Citations
“…Our scheme computational cost is better than all other schemes in the sensor side [4], [9], [17], [18] with a 70% reduction by using P-I and 80% reduction by using P-II. Besides, P-I preforms similar to [9], [17], [18] in the hub node side, but better than [4], [25] and P-II performs better than all other schemes with an 80% reduction in the hub node side, as depicted in fig5. Furthermore, we chose a hash function with a 224bit key size to allow the sensor to have a sufficient amount of security more than [9], [17] which take a 160bit key size, and Koya and P. P [18] which takes a 128bit size key, (see Table III Table IV).…”
Section: A Computational Costmentioning
confidence: 87%
“…In this paper, we enhanced Li et al [17] scheme that uses a random nonce and complex interconnected parameter system with the least number of hash function. Although [17] has an efficient performance, it lacks perfect forward secrecy, un-traceability, node impersonation protection, key escrow protection, and session key protection according to [4], [9], [18]. Our motivation was to find the best contribution to Li et al [17] scheme and improve it for better security and efficiency.…”
Section: A Contribution and Motivationmentioning
confidence: 99%
See 3 more Smart Citations