2023
DOI: 10.1109/tii.2022.3179429
|View full text |Cite
|
Sign up to set email alerts
|

Cybersecurity Attack-Resilience Authentication Mechanism for Intelligent Healthcare System

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
7
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
6
2
1

Relationship

0
9

Authors

Journals

citations
Cited by 16 publications
(7 citation statements)
references
References 22 publications
0
7
0
Order By: Relevance
“…In this section, we demonstrate the robustness of the proposed system against malicious security attacks through an informal analysis and AVISPA simulation. Additionally, we employ BAN logic [30,31], a widely recognized formal-security-analysis method, to…”
Section: Security Analysismentioning
confidence: 99%
See 1 more Smart Citation
“…In this section, we demonstrate the robustness of the proposed system against malicious security attacks through an informal analysis and AVISPA simulation. Additionally, we employ BAN logic [30,31], a widely recognized formal-security-analysis method, to…”
Section: Security Analysismentioning
confidence: 99%
“…In this section, we demonstrate the robustness of the proposed system against malicious security attacks through an informal analysis and AVISPA simulation. Additionally, we employ BAN logic [30,31], a widely recognized formal-security-analysis method, to establish that the proposed scheme ensures secure mutual authentication. Following that, we validate the session key's confidentiality using the real-or-random (ROR) model.…”
Section: Security Analysismentioning
confidence: 99%
“…In this section, we show the resilience of the proposed system against malicious security attacks through an informal analysis and AVISPA simulation. We also utilize BAN logic [30,31], which is a widely accepted formal security analysis, to prove that the proposed scheme is guaranteed for secure mutual authentication. Subsequently, we prove the session key secrecy utilizing the real-or-random (ROR) model.…”
Section: Security Analysismentioning
confidence: 99%
“…Furthermore, Xiong et al [33] proposed a new multiserver authentication scheme for mobile cloud computing (MCC) environments, which integrates hierarchical access control into the authentication protocol. In 2023, Soni et al [34] proposed a novel multiserver authentication framework for intelligent healthcare systems, which consists of signature-based static authentication and machine-learning-based continuous monitoring.…”
Section: Related Workmentioning
confidence: 99%