2021
DOI: 10.1145/3398039
|View full text |Cite
|
Sign up to set email alerts
|

Lightweight Multi-party Authentication and Key Agreement Protocol in IoT-based E-Healthcare Service

Abstract: Internet of Things(IoT) is playing a promising role in e-Healthcare applications in the current era; nevertheless, security is one amongst the significant challenges in its success. The requirement of resource constraint security mechanism makes the design and implementation of it more challenging. Existing security mechanisms concentrate on two-party mutual authentication; but, a scenario, for example, Healthcare requires multi-party authentication where secure communication is essential amongst a patient, e-… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
8
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
7

Relationship

1
6

Authors

Journals

citations
Cited by 25 publications
(8 citation statements)
references
References 26 publications
0
8
0
Order By: Relevance
“…Eleven further studies supported patients and clinicians, where seven used CAs in treatment, education, and data collection [ 43 , 44 , 45 , 46 , 47 , 48 , 49 ]. Two studies helped in following-up [ 50 , 51 ], and two studies promoted medication adherence [ 52 , 53 ]. The most common chronic condition was diabetes ( n = 5).…”
Section: Resultsmentioning
confidence: 99%
See 1 more Smart Citation
“…Eleven further studies supported patients and clinicians, where seven used CAs in treatment, education, and data collection [ 43 , 44 , 45 , 46 , 47 , 48 , 49 ]. Two studies helped in following-up [ 50 , 51 ], and two studies promoted medication adherence [ 52 , 53 ]. The most common chronic condition was diabetes ( n = 5).…”
Section: Resultsmentioning
confidence: 99%
“…Two studies were for type 1 [ 29 , 39 ], one study was for type 2 [ 28 ], and one focused on diabetes in general, whether the patients have type 1 or 2 [ 40 ]. One study focused on prediabetes with obesity [ 51 ]. The other four studies concentrated on different aspects of depression, such as symptoms and disorders [ 37 , 45 , 46 , 52 ].…”
Section: Resultsmentioning
confidence: 99%
“…However, the protocol is not lightweight because of using exponential operations and hence it’s not suitable for IoT applications. Sahu et al [ 30 ] presented a lightweight multi-party authentication and key-establishment protocol in IoT-based e-Healthcare service access net-work using lattice identity-based encryption. They tested the security of their protocol using Scyther tool.…”
Section: Related Workmentioning
confidence: 99%
“…Concentrating on the data classifications at the edge opens more security threats by combining unattended deployment of both the IoT devices and Edge devices. One of the key threats is the authentication of both data sources and Edges [27][28][29], where authentications process should be before the data classifier technique to ensure avoiding the modified and malicious incoming data streams. Also, this process is to identify the authenticated edges to forward data streams for analysis.…”
Section: Security Concernsmentioning
confidence: 99%