2022
DOI: 10.1007/s42979-022-01300-z
|View full text |Cite
|
Sign up to set email alerts
|

Authentication Schemes for Healthcare Applications Using Wireless Medical Sensor Networks: A Survey

Abstract: Many applications are developed with the quick emergence of the Internet of things (IoT) and wireless sensor networks (WSNs) in the health sector. Healthcare applications that use wireless medical sensor networks (WMSNs) provide competent communication solutions for enhancing people life. WMSNs rely on highly sensitive and resource-constrained devices, so-called sensors, that sense patients’ vital signs then send them through open channels via gateways to specialists. However, these transmitted data from WMSNs… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
8
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
5
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 32 publications
(17 citation statements)
references
References 96 publications
0
8
0
Order By: Relevance
“…Many authentication studies have analyzed their performance in the following manner [ 9 , 10 , 11 , 12 , 13 , 14 , 15 , 20 , 21 , 22 , 24 , 25 , 26 , 27 , 28 , 29 , 30 , 31 , 32 ]. We compared each computation amount in terms of the research methods used.…”
Section: Performance Analysis Of the Proposed Schemementioning
confidence: 99%
“…Many authentication studies have analyzed their performance in the following manner [ 9 , 10 , 11 , 12 , 13 , 14 , 15 , 20 , 21 , 22 , 24 , 25 , 26 , 27 , 28 , 29 , 30 , 31 , 32 ]. We compared each computation amount in terms of the research methods used.…”
Section: Performance Analysis Of the Proposed Schemementioning
confidence: 99%
“…But majority of these contributed protocols failed in satisfying the security and privacy requirements of IoMT such as integrity, authentication, anonymity, untraceability, and perfect forward secrecy. 8,9 In general, knowledge, possession and inherent factor associated with the user credentials is considered as the input for the process of secure authentication. Specifically, the knowledge factor represents the values stored in the devices like the secret keys.…”
Section: F I G U R Ementioning
confidence: 99%
“…Over the years, several authentication protocols have existed in the literature to handling the issue of security and privacy that are associated with the data communication in the IoMT environment. But majority of these contributed protocols failed in satisfying the security and privacy requirements of IoMT such as integrity, authentication, anonymity, untraceability, and perfect forward secrecy 8,9 …”
Section: Introductionmentioning
confidence: 99%
“…In 2019, Soni et al [23] proposed a three-factor authentication model for healthcare systems and claimed that it provides all the security requirements. However, Authors in [24] and [25] show that the scheme proposed by [23] cannot provide perfect forward secrecy.…”
Section: Related Workmentioning
confidence: 99%
“…Dharminder et al's scheme includes the followings: (1) Registration phase, (ii) Login and authentication phase, and iii Password change phase. We briefly, describe these phases as follows: Ravanbakhsh & Nazari [33] Utilized ECC a and Fuzzy Extractor Known-session-specific temporary information attacks Perfect forward secrecy [34] Li et al [36] Provides privacy and mutual authentication for TMIS Not provide user anonymity and unlinkability Impersonation attack [37] Giri et al [38] RSA-based authentication for TMIS Off-line password guessing Insider attacks Not provide user anonymity [39] Bin [40] RSA-based authentication for telecare systems Off-line password guessing attack Not provide perfect forward secrecy [41] Lu et al [10] Biometric-based authentication for TMIS, using ECC Off-line identity guessing attack Server impersonation attack Off-line password guessing attack [9] Mishra et al [42] Biometric-based scheme for TMIS Man-in-the-middle attack Not provide perfect forward secrecy [43] Li et al [19] Anonymity preserving authentication for WBAN d Not provide perfect forward secrecy Insider attacks [44] He et al [20] Secure authentication for WBAN Known-session-specific temporary information attack Denial of service attack [44] Sahoo et al [28] Biometric-based authentication using ECC insider attack Not provide anonymity [29] Sahoo et al [26] ECC-based authentication for TMIS replay attack password guessing attack [27] Gupta et al [3] Hash and Biometric-based scheme for WBAN, Known-session-specific temporary information attack Stolen verifier attack Not provide perfect forward secrecy Soni et al [23] Three-factor authentication using ECC Not provide perfect forward secrecy [24], [25] Aghili et al [13] Low computation cost authentication Not provide perfect forward secrecy Server impersonation attack malicios sensor attack [22] Masud et al [30] Low computation cost, hash and Xor-based scheme for WBAN Not provide anonymity insider attack impersonation attack password guessing attack [31],…”
Section: Overview Of Dharminder Et Al's Schemementioning
confidence: 99%