2013
DOI: 10.1007/s00530-013-0346-9
|View full text |Cite
|
Sign up to set email alerts
|

Robust anonymous authentication protocol for health-care applications using wireless medical sensor networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
241
0
2

Year Published

2014
2014
2023
2023

Publication Types

Select...
6
2

Relationship

0
8

Authors

Journals

citations
Cited by 299 publications
(251 citation statements)
references
References 21 publications
0
241
0
2
Order By: Relevance
“…The first method has the advantage of avoiding using asymmetric cryptographic algorithm, while the disadvantage is the dependency on the accessibility to the network [5]. The user identification will be invalid if the updated secret information of the user and the gateway is non-synchronized.…”
Section: IImentioning
confidence: 99%
See 2 more Smart Citations
“…The first method has the advantage of avoiding using asymmetric cryptographic algorithm, while the disadvantage is the dependency on the accessibility to the network [5]. The user identification will be invalid if the updated secret information of the user and the gateway is non-synchronized.…”
Section: IImentioning
confidence: 99%
“…The first one is the weakness or none of user anonymity [3,[5][6][7][8][9][10][11][12][13][14], which would cause being tracked easily. The second one is information leakage of the lost smart card [3,[6][7][8][9][10][11][12][13][14], which causes the attacker can do guesswork in a smaller space after extracting the information in the smart card.…”
Section: Advances In Computer Science Research Volume 44mentioning
confidence: 99%
See 1 more Smart Citation
“…Based on the special properties of medical/health data, when IoT is used in the medical/health field, some security risks emerge [3], [4]. In 2015, Wu et al proposed employment of the regenerating codes Copyright c 2016 The Institute of Electronics, Information and Communication Engineers and symmetric-key encryption with a Blom based key management [5].…”
Section: Related Workmentioning
confidence: 99%
“…However, we find that Shim's proposed improved protocol is unworkable because the signature verification does not hold true. Among various secure protocols in WSNs [3][4][5][6][7][8][9][11][12][13][14][15][16][17][18][19][20][21][22][23][24], most of the published reprogramming protocols [3, 6, 12-14, 16, 18, 20-23] are based on the centralized approach, which assumes the existence of a base station, and only the base station has the authority to reprogram sensor nodes. The centralized approach is not reliable in reality because of inefficiency, weak scalability, and vulnerability to potential attacks along the communication path [24].…”
Section: Introductionmentioning
confidence: 99%