2017
DOI: 10.1016/j.compeleceng.2016.01.002
|View full text |Cite
|
Sign up to set email alerts
|

Secure user authentication scheme for wireless healthcare sensor networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
60
0

Year Published

2017
2017
2021
2021

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 118 publications
(60 citation statements)
references
References 12 publications
0
60
0
Order By: Relevance
“…The idea of hash function is used by protocols [52] and [155], such as the IPSec protocol implements an anti-replay mechanism based on Message Authentication Code (MAC) [167]. In addition, the idea of Timestamp in the encrypted messages is used by [43,66,55,52,151,152,153,154,70,71,155,73,75,76,78,81,79,80,159].…”
Section: Replay Attackmentioning
confidence: 99%
See 1 more Smart Citation
“…The idea of hash function is used by protocols [52] and [155], such as the IPSec protocol implements an anti-replay mechanism based on Message Authentication Code (MAC) [167]. In addition, the idea of Timestamp in the encrypted messages is used by [43,66,55,52,151,152,153,154,70,71,155,73,75,76,78,81,79,80,159].…”
Section: Replay Attackmentioning
confidence: 99%
“…Das et al [158] reviewed the recently proposed Chang-Le's two protocols [277] and then showed that their protocols are insecure against some known attacks. Liu and Chung [159] proposed a secure user authentication scheme for wireless healthcare sensor networks, which is efficient in terms of computation cost of compared to both schemes in [278] and [279]. Gope et al [280] proposed a special idea for resilience of DoS attacks in designing anonymous user authentication protocol.…”
Section: Authentication Protocols For Iosmentioning
confidence: 99%
“…• Mutual authentication Mutual authentication is a prerequisite for preventing fraudulent authentication requests. The traditional methods of authentication (such as password and name) are not suitable for HC applications [18]. In general, there are two kinds of authentication, simple and mutual.…”
Section: Overview Of Techniquesmentioning
confidence: 99%
“…The attacker can use his device as a fake server to receive all clients' requests. Mutual authentication provides a security solution to prevent known attacks [18]. In this type of authentication, each party authenticates the other party and thus, prevents counterfeit attacks by both client or server.…”
Section: Overview Of Techniquesmentioning
confidence: 99%
“…However, Li et al pointed out the vulnerability of Das's scheme to off-line password guessing, user impersonation, node impersonation and unknown user attacks [13]. Recently Liu and Chung proposed a bilinear pairing-based authentication Manuscript scheme for IoT-based medical care system [14]. Unfortunately, Li et al showed the security weaknesses in Liu and Chung's scheme focused on password disclosure attack, replay attack, sensed data disclosure attack, sensed data forgery attack, stolen smart card (SC) attack and off-line password guessing attack [15].…”
Section: Introductionmentioning
confidence: 99%