2019
DOI: 10.1109/jiot.2019.2934947
|View full text |Cite
|
Sign up to set email alerts
|

Comments on “Biometrics-Based Privacy-Preserving User Authentication Scheme for Cloud-Based Industrial Internet of Things Deployment”

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
23
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
8

Relationship

0
8

Authors

Journals

citations
Cited by 53 publications
(23 citation statements)
references
References 7 publications
0
23
0
Order By: Relevance
“…DAS et al [24] proposed an AKE scheme for the IoT environment, which utilized lightweight hash function and FE technique for the bio-metric verification and cannot withstand traceability attack. Hussain et al [25] pointed out that the scheme proposed by DAS et al is vulnerable to various security attacks such as traceability attack, stolen-verifier attack, stolen/lost smart-device attack, and also does not render forward secrecy. Moreover, Challa et al [26] presented an AKE scheme based on ECC, which is not suitable for resource-limited devices because of high computational overhead.…”
Section: Related Workmentioning
confidence: 99%
“…DAS et al [24] proposed an AKE scheme for the IoT environment, which utilized lightweight hash function and FE technique for the bio-metric verification and cannot withstand traceability attack. Hussain et al [25] pointed out that the scheme proposed by DAS et al is vulnerable to various security attacks such as traceability attack, stolen-verifier attack, stolen/lost smart-device attack, and also does not render forward secrecy. Moreover, Challa et al [26] presented an AKE scheme based on ECC, which is not suitable for resource-limited devices because of high computational overhead.…”
Section: Related Workmentioning
confidence: 99%
“…• Referring to the DY model [2], a malicious attacker (M A) is able to eavesdrop, modify, replay, inject, or delete transmitted messages over a public channel. • M A can steal the legal user's smart card and extract the stored secret credentials in memory by performing power analysis [3]- [5]. • M A can be a legitimate and privileged insider, which is able to reveal the verifier table stored in the RC database [1].…”
Section: A Adversary Modelmentioning
confidence: 99%
“…In this study, we explore the state‐of‐the‐art on authentication protocols regarding the monitoring of remote patient health care. Many remote patient monitoring protocols can be witnessed in the past; however, these protocols have many proven drawbacks 1–27 . Still, there is a need of a secure and efficient remote patient‐health care monitoring protocol (RPMP).…”
Section: Introductionmentioning
confidence: 99%
“…The authentication of patient, medical professional, or any kind of user is a technique to recognize the involved participants. Many authentication schemes 6–27 for remote patient's health monitoring have been presented in the last 5 years; however, none of those is secure against various attacks. Therefore, we are motivated to design an enhanced authentication technique.…”
Section: Introductionmentioning
confidence: 99%