2019
DOI: 10.1109/access.2019.2935782
|View full text |Cite
|
Sign up to set email alerts
|

Secure Identity Authentication of Community Medical Internet of Things

Abstract: In the community medical Internet of Things (IoT) environment, there exist a large number of device nodes, network nodes and user nodes which form a heterogeneous network. In order to ensure smooth data exchange, some gateway nodes are adopted to connect different network spaces. Therefore, how to identify and authenticate the identities of heterogeneous nodes is an urgent problem to be solved. In this paper, we start with node security identity authentication, make uses of the mechanism of elliptic curve encr… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

2
32
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
6
2

Relationship

0
8

Authors

Journals

citations
Cited by 33 publications
(34 citation statements)
references
References 19 publications
2
32
0
Order By: Relevance
“…On the other hand, symmetric cryptographic algorithms are often used in research ( [68], [75], [76]) on access control, data transmission to and from IoMT sensors, as they are light-weight on those resource constraint devices. For hybrid security schemes ( [74], [77], [80], [81]), symmetric cryptographic algorithms are often used as session keys. Furthermore, the most applied attacks in the adversarial/security analysis are Chosen Plaintext Attack CPA), replay, impersonation, insider, eavesdropping, and Manin-the-Middle (MitM) attacks.…”
Section: A State-of-the-artmentioning
confidence: 99%
See 1 more Smart Citation
“…On the other hand, symmetric cryptographic algorithms are often used in research ( [68], [75], [76]) on access control, data transmission to and from IoMT sensors, as they are light-weight on those resource constraint devices. For hybrid security schemes ( [74], [77], [80], [81]), symmetric cryptographic algorithms are often used as session keys. Furthermore, the most applied attacks in the adversarial/security analysis are Chosen Plaintext Attack CPA), replay, impersonation, insider, eavesdropping, and Manin-the-Middle (MitM) attacks.…”
Section: A State-of-the-artmentioning
confidence: 99%
“…A number of research also analyze their security schemes in terms of Mutual Authentication (MA), Anonymity and Traceability (A&T), Forward Security (FS), Contextual Privacy (CP), and and unlinkability. Apart from ( [68], [81]) that performed their experiments on actual hardware, the others performed their experiments using computer simulations.…”
Section: A State-of-the-artmentioning
confidence: 99%
“…Xu Cheng et al [9] The system built on community medical IoT system ensured the nodes' legality and communication security.…”
Section: Secure Authenticationmentioning
confidence: 99%
“…Xu Cheng et al [9] studied a secure identity authentication for community medical IoT. Here, the authors have utilized node security for system initialization.…”
Section: Review On Authentication and Authorization Techniques Formentioning
confidence: 99%
“…As part of its functioning, it automatically distributes adverts. Pop-up advertisements on websites are a famous example of adware [5].…”
Section: Adwarementioning
confidence: 99%