2021
DOI: 10.4018/joeuc.20210501.oa1
|View full text |Cite
|
Sign up to set email alerts
|

A Lightweight Three-Factor Anonymous Authentication Scheme With Privacy Protection for Personalized Healthcare Applications

Abstract: Security and privacy issues in wireless medical sensor networks (WMSNs) have attracted lots of attention in both academia and industry due to the sensitiveness of medical system. In the past decade, extensive research has been carried out on these security issues, but no single study exists that addresses them adequately, especially for some important security properties, such as user anonymity and forward secrecy. As a step towards this direction, in this paper, the authors propose a lightweight three-factor … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
41
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 39 publications
(41 citation statements)
references
References 42 publications
0
41
0
Order By: Relevance
“…In 2021, Shuai et al [24] proposed a lightweight 3FA anonymous authentication scheme; however, we pointed out that Shuai et al's scheme is vulnerable to stolen-verifier attack, modification of messages attack, and no perfect forward security. To solve these problems, we propose a new 3FA scheme based on ECC and Fuzzy Extractor algorithm.…”
Section: Motivations and Contributionsmentioning
confidence: 95%
See 2 more Smart Citations
“…In 2021, Shuai et al [24] proposed a lightweight 3FA anonymous authentication scheme; however, we pointed out that Shuai et al's scheme is vulnerable to stolen-verifier attack, modification of messages attack, and no perfect forward security. To solve these problems, we propose a new 3FA scheme based on ECC and Fuzzy Extractor algorithm.…”
Section: Motivations and Contributionsmentioning
confidence: 95%
“…Shuai et al's scheme [24] consists of three phases: registration phase, login and authentication phase, and password change phase.…”
Section: Review the Shuai Et Al's Schemementioning
confidence: 99%
See 1 more Smart Citation
“…e algorithms that can be used are Markov Hierarchical Hidden Model (HMM), Convolutional Neural Network (CNN), Conditional Random Field (CRF), etc. [11,12].…”
Section: Motion Recognition Algorithm Based On Trajectorymentioning
confidence: 99%
“…ere are two ways to classify the data in this dataset. e first is the multiple verification method proposed by Wang et al [11]. For individual classification, subjects 1, 3, 5, 7, and 9 are used for education, and subjects 2, 4, 6, 8, and 10 are used for testing.…”
Section: Experiments and Analysis On Msr Action 3d Databasementioning
confidence: 99%