2020
DOI: 10.1109/jsyst.2019.2899580
|View full text |Cite
|
Sign up to set email alerts
|

A Secure Three-Factor User Authentication Protocol With Forward Secrecy for Wireless Medical Sensor Network Systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
125
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 165 publications
(152 citation statements)
references
References 38 publications
0
125
0
Order By: Relevance
“…Security and Performance Comparison. In this section, we compare the security features and performances of the improved scheme with the relevant competitive schemes [27,29,33,53,54]. Table 2 shows the comparison results of security features between the improved scheme and the related ones [27,29,33,53,54].…”
Section: Analysis Of Security Featuresmentioning
confidence: 99%
See 3 more Smart Citations
“…Security and Performance Comparison. In this section, we compare the security features and performances of the improved scheme with the relevant competitive schemes [27,29,33,53,54]. Table 2 shows the comparison results of security features between the improved scheme and the related ones [27,29,33,53,54].…”
Section: Analysis Of Security Featuresmentioning
confidence: 99%
“…In this section, we compare the security features and performances of the improved scheme with the relevant competitive schemes [27,29,33,53,54]. Table 2 shows the comparison results of security features between the improved scheme and the related ones [27,29,33,53,54]. From Table 2, it is evident that our scheme has overcome the security weaknesses existing in Jiang et al's scheme [29], while the other protocols have security vulnerabilities more or less, e.g., protocols [27,29,33] suffer from user impersonation attack and cannot preserve user anonymity, protocols [53,54] are vulnerable to stolen mobile device attack, and protocol [54] cannot resist replay and privileged insider attack.…”
Section: Analysis Of Security Featuresmentioning
confidence: 99%
See 2 more Smart Citations
“…The widespread used and resource constrained nature makes WSN an attractive target for attackers and malicious users. An attacker can disrupt operation in emergency situations or interfere with patients' data in health care application that may threaten human life or gain illegal access to some business for monitory benefits . In such cases, security of WSN becomes crucial.…”
Section: Introductionmentioning
confidence: 99%