2020
DOI: 10.3390/s20247136
|View full text |Cite
|
Sign up to set email alerts
|

A Secure and Lightweight Three-Factor-Based Authentication Scheme for Smart Healthcare Systems

Abstract: Internet of Things (IoT) technology has recently been integrated with various healthcare devices to monitor patients’ health status and share it with their healthcare practitioners. Since healthcare data often contain personal and sensitive information, healthcare systems must provide a secure user authentication scheme. Recently, Adavoudi-Jolfaei et al. and Sharma and Kalra proposed a lightweight protocol using hash function encryption only for user authentication on wireless sensor systems. In this paper, we… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
6
2

Relationship

2
6

Authors

Journals

citations
Cited by 15 publications
(4 citation statements)
references
References 30 publications
0
4
0
Order By: Relevance
“…For security analysis in our scheme, we consider the following attack model [ 20 , 21 , 22 ]: The attacker can extract the data in the device that stores some security parameters. The attacker can access the public communication channel, at which point the attacker can interrupt, return, amend and eliminate or transmit the message.…”
Section: Preliminariesmentioning
confidence: 99%
See 1 more Smart Citation
“…For security analysis in our scheme, we consider the following attack model [ 20 , 21 , 22 ]: The attacker can extract the data in the device that stores some security parameters. The attacker can access the public communication channel, at which point the attacker can interrupt, return, amend and eliminate or transmit the message.…”
Section: Preliminariesmentioning
confidence: 99%
“…Many authentication studies have analyzed their performance in the following manner [ 9 , 10 , 11 , 12 , 13 , 14 , 15 , 20 , 21 , 22 , 24 , 25 , 26 , 27 , 28 , 29 , 30 , 31 , 32 ]. We compared each computation amount in terms of the research methods used.…”
Section: Performance Analysis Of the Proposed Schemementioning
confidence: 99%
“…In this section, we will discuss related works for the E-health system. A number of authentication schemes [3][4][5] have been proposed for E-health system. In 1976, Diffie and Hellman [6] proposed a method to setup session key named Diffie-Hellman key exchange.…”
Section: Related Workmentioning
confidence: 99%
“…The associate editor coordinating the review of this manuscript and approving it for publication was Chunsheng Zhu . ing computationally complex processes based on symmetric/asymmetric encryption/decryption or using modular operations to design authentication protocols [15]- [19]. These protocols must handle various security issues such as forgery attacks, known as session-key attacks, reverse and forward secrecy, and smart card loss issues.…”
Section: Introductionmentioning
confidence: 99%