2020
DOI: 10.3390/s20072072
|View full text |Cite
|
Sign up to set email alerts
|

Mutual Authentication Protocol for D2D Communications in a Cloud-Based E-Health System

Abstract: The development of the Internet of Things (IoT) predicts several new applications, some of which are designed to be incorporated into e-health systems, and some technologies, like cloud computing and device-to-device communication (D2D), are promising for use in the support of resource-constrained devices employed in Mobile-health (m-health) and Telecare Medicine Information Systems (TMIS). In a scenario with billions of devices predicted for the IoT, it is essential to avoid performance and security problems… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
19
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 23 publications
(19 citation statements)
references
References 26 publications
0
19
0
Order By: Relevance
“…In [10,20,21], the authors focused on device-to-device communication in a mobile healthcare environment to solve security issues that occur during communication, such as mutual authentication and end-to-end security between devices. They insisted that they have solved the problem by analyzing their proposed method according to security requirements, but they have not been able to solve the security issues for protecting personal information in the IoT devices.…”
Section: Related Workmentioning
confidence: 99%
See 3 more Smart Citations
“…In [10,20,21], the authors focused on device-to-device communication in a mobile healthcare environment to solve security issues that occur during communication, such as mutual authentication and end-to-end security between devices. They insisted that they have solved the problem by analyzing their proposed method according to security requirements, but they have not been able to solve the security issues for protecting personal information in the IoT devices.…”
Section: Related Workmentioning
confidence: 99%
“…They insisted that they have solved the problem by analyzing their proposed method according to security requirements, but they have not been able to solve the security issues for protecting personal information in the IoT devices. In [10,[19][20][21], the authors focused on authentication and end-to-end security in communication between IoT devices but did not address the privacy issue.…”
Section: Related Workmentioning
confidence: 99%
See 2 more Smart Citations
“…The number of devices that are connected to the internet is estimated in the billions [21]. With so many devices, cloud computing can no longer provide prompt response to the huge amount of smart applications, especially medical Apps, which are sensitively dependent on time [22], [23]. To meet such requirements, many solutions such as mobile clouds or multiple clouds and fog computing emerged [24] in 2012.…”
Section: Literature Reviewmentioning
confidence: 99%