2017
DOI: 10.1007/s12652-017-0574-5
|View full text |Cite
|
Sign up to set email alerts
|

Secure and lightweight remote patient authentication scheme with biometric inputs for mobile healthcare environments

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
5

Citation Types

0
6
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
6
2

Relationship

0
8

Authors

Journals

citations
Cited by 24 publications
(6 citation statements)
references
References 44 publications
0
6
0
Order By: Relevance
“…To overcome these weaknesses, they proposed an improved protocol that employs only elliptic curve scalar multiplication for both the reader and the tag. They show that their proposed scheme can withstand known attacks like MITM attack and requires 50% less communication cost and 23% less computation time than the Mohammedi et al [23] scheme. Mason et al [25] provide an advanced technique for securely identifying patients.…”
Section: Introductionmentioning
confidence: 97%
See 2 more Smart Citations
“…To overcome these weaknesses, they proposed an improved protocol that employs only elliptic curve scalar multiplication for both the reader and the tag. They show that their proposed scheme can withstand known attacks like MITM attack and requires 50% less communication cost and 23% less computation time than the Mohammedi et al [23] scheme. Mason et al [25] provide an advanced technique for securely identifying patients.…”
Section: Introductionmentioning
confidence: 97%
“…The HIMS is called CareMed HIMS and a combination of technologies such as UML, biometrics, data management and computer programming have been used to develop the system. Mohammedi et al [23] proposed a lightweight biometric-based authentication scheme for mobile healthcare environments. The suggested scheme converts the patient biometric data to ECC-based keys so there is no need to save or communicate the patient's biometric template.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…Mohammedi et al [ 25 ] proposed a biometrics-based mobile lightweight patient authentication scheme, which was developed by integrating it with information security. Mikhailovskaya et al [ 26 ] introduced the idea of ensuring the stability of information security systems using RFID technology to counter possible attacks through remote scatterers mitigation.…”
Section: Introductionmentioning
confidence: 99%
“…However, imposing on-demand security with the integration of risk-based authentication, without interfering with the simple authentication setup under common situations. Nonetheless, a secure and lightweight remote medical verification approach of biometric -based inputs for portable healthcare situations was proposed [16]. It provides an authentication process with a data encryption agreement: i) It does not require distant location transmission of the participant's biometric data; ii) It does not maintain a dataset of interaction binding the sick people to their biometric features; iii) It should not have to analyze biometric data; vi) The mathematical cost is greatly lowered, and it prevents various attacks such as recording, fake accent, virtual machine spoofing, confidentiality, insider, man-in-themiddle, as well as cyber.…”
Section: Introductionmentioning
confidence: 99%