2023
DOI: 10.1155/2023/4845850
|View full text |Cite
|
Sign up to set email alerts
|

Provably Secure and Lightweight Patient Monitoring Protocol for Wireless Body Area Network in IoHT

Abstract: As one of the important applications of Internet of Health Things (IoHT) technology in the field of healthcare, wireless body area network (WBAN) has been widely used in medical therapy, and it can not only monitor and record physiological information but also transmit the data collected by sensor devices to the server in time. However, due to the unreliability and vulnerability of wireless network communication, as well as the limited storage and computing resources of sensor nodes in WBAN, a lot of authentic… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
11
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
3
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(11 citation statements)
references
References 39 publications
0
11
0
Order By: Relevance
“…Given the DY adversary's capabilities, via formal security analysis, we can demonstrate that the adversary does not have a significant and strong advantage with respect to breaking the semantic security of the session key in our protocol. Then, via heuristic analysis, one can observe that the proposed protocol not only fulfills the desired attributes but also demonstrates resilience against a multitude of known attacks [20,21].…”
Section: Security Analysis Of the Proposed Protocolmentioning
confidence: 99%
“…Given the DY adversary's capabilities, via formal security analysis, we can demonstrate that the adversary does not have a significant and strong advantage with respect to breaking the semantic security of the session key in our protocol. Then, via heuristic analysis, one can observe that the proposed protocol not only fulfills the desired attributes but also demonstrates resilience against a multitude of known attacks [20,21].…”
Section: Security Analysis Of the Proposed Protocolmentioning
confidence: 99%
“…However, a deficiency was shown in that there was no mutual authentication among the three entities (access point, hub node, and sensor node); this creates obstacles when encountering real-world applications. Then, Xie et al of [31] analyzed that the protocol [30] cannot resist a stolen-verifier attack and has no perfect forward secrecy. Then, a robust patient monitoring authentication scheme based on elliptic curve cryptography (ECC) [32] was proposed, and the formal security proof demonstrates the security of their scheme.…”
Section: Related Workmentioning
confidence: 99%
“…However, a difference appears in the remaining four attributes. Specifically, scheme [31] does not involve the "password" as an authentication factor and so there is no comparison to be made (denoted by '-'). However, the scheme presented by [28] shows weakness in E 3 , with no secret user or sensor node constituting the session key.…”
Section: Performance Analyses In Functionality and Consumed Costmentioning
confidence: 99%
See 2 more Smart Citations