2020
DOI: 10.1002/dac.4423
|View full text |Cite
|
Sign up to set email alerts
|

A secure and efficient remote patient‐monitoring authentication protocol for cloud‐IoT

Abstract: Summary The ongoing Cloud‐IoT (Internet of Things)–based technological advancements have revolutionized the ways in which remote patients could be monitored and provided with health care facilities. The real‐time monitoring of patient's health leads to dispensing the right medical treatment at the right time. The health professionals need to access patients' sensitive data for such monitoring, and if treated with negligence, it could also be used for malevolent objectives by the adversary. Hence, the Cloud‐IoT… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
21
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 26 publications
(21 citation statements)
references
References 57 publications
(157 reference statements)
0
21
0
Order By: Relevance
“…Mutual authentication scheme [25] obtained the 89% of reliability of 85% of accuracy. The session key arrangement scheme [39] obtained the 83% of reliability and 87% of accuracy. Elliptical Curve cryptography [11] obtained the 87% of reliability and 89% of accuracy.…”
Section: Discussionmentioning
confidence: 99%
See 2 more Smart Citations
“…Mutual authentication scheme [25] obtained the 89% of reliability of 85% of accuracy. The session key arrangement scheme [39] obtained the 83% of reliability and 87% of accuracy. Elliptical Curve cryptography [11] obtained the 87% of reliability and 89% of accuracy.…”
Section: Discussionmentioning
confidence: 99%
“…Damasevicius et al [38] explained the network flow features to detect the different types of attackers by using the cybersecurity mechanism in wireless sensor networks. Alzahrani et al [39] explained the cloud-based IoT scheme for remote patient health monitoring in body area networks. Authentication protocols with session key mechanisms to avoid smart card attacks and improves efficiency.…”
Section: Different Security Aspects Of Secure Wbanmentioning
confidence: 99%
See 1 more Smart Citation
“…In IoT-based healthcare, studies on encryption and authentication protocols for user 8 Mobile Information Systems Figure 6: Keyword co-occurrence network obtained using VOSviewer. Mobile Information Systems authentication [120][121][122][123] and data encryption for patient privacy protection [124][125][126][127] are relevant. Safe and efficient medical data retrieval is important for remote medical monitoring.…”
Section: Keyword Clustering and Evolution Of Research On Iotmentioning
confidence: 99%
“…Further, Chaudhry et al proposed enhanced protocol in cyber physical systems. In 2020, Chen et al [65] proposed a secure electronic medical record authorization system for smart device application in cloud computing environments, Mo et al [66] proposed an improved anonymous authentication protocol for wearable health monitoring systems and Alzahrani et al [67] proposed a secure and efficient remote patient-monitoring authentication protocol for cloud-IoT.…”
Section: Introductionmentioning
confidence: 99%