4.6 Article

Secure ECC-Based Three-Factor Mutual Authentication Protocol for Telecare Medical Information System

Related references

Note: Only part of the references are listed.
Article Telecommunications

An enhanced scheme for mutual authentication for healthcare services

Salman Shamshad et al.

Summary: With the advancement of technology, the Telecare Medicine Information System (TMIS) provides fast and convenient healthcare services. However, the system faces security risks and challenges, leading to the proposal of authentication protocols. Existing protocols have vulnerabilities, and improved protocols have been introduced. However, these protocols also have security flaws, prompting the introduction of a new and more secure protocol.

DIGITAL COMMUNICATIONS AND NETWORKS (2022)

Article Telecommunications

A Provably Secure and Lightweight Patient-Healthcare Authentication Protocol in Wireless Body Area Networks

Bander A. Alzahrani et al.

Summary: Advancements in wireless technology have enabled remote patient healthcare monitoring through smart devices and internet connectivity, but existing protocols face security challenges that need to be addressed.

WIRELESS PERSONAL COMMUNICATIONS (2021)

Article Computer Science, Artificial Intelligence

A secure three factor based authentication scheme for health care systems using IoT enabled devices

Shreeya Swagatika Sahoo et al.

Summary: The Internet of Things (IoT) has become popular due to the use of Internet-enabled devices, but security and privacy concerns remain due to the insecure sharing of information. To address this, mutual authentication between patients and medical servers is necessary to protect medical privacy and system reliability.

JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING (2021)

Article Computer Science, Information Systems

Improved ECC-Based Three-Factor Multiserver Authentication Scheme

Tsu-Yang Wu et al.

Summary: A multiserver environment is more efficient in managing the increase in users for mobile network services, with the security of users’ information being crucial. An authentication scheme based on biometrics has been proposed, but found to be insecure. An improved scheme has been introduced and its security and performance have been validated through various analyses.

SECURITY AND COMMUNICATION NETWORKS (2021)

Article Chemistry, Analytical

WSN-SLAP: Secure and Lightweight Mutual Authentication Protocol for Wireless Sensor Networks

Deok Kyu Kwon et al.

Summary: The importance of secure authentication in WSN was discussed, with the introduction of Moghadam et al.'s protocol and its identified vulnerabilities, and the proposal of WSN-SLAP as an alternative solution to address these issues.

SENSORS (2021)

Article Chemistry, Analytical

A Secure and Lightweight Authentication Protocol for IoT-Based Smart Homes

JiHyeon Oh et al.

Summary: Smart homes provide high levels of comfort and improved quality of life for users through home services provided by smart devices, but face security and privacy issues. Establishing secure authentication protocols between users and smart devices is crucial. A proposed secure and lightweight authentication protocol aims to address security flaws in existing protocols, offering better security and lower computational costs in practical IoT-based smart home environments.

SENSORS (2021)

Article Construction & Building Technology

An anonymous device to device access control based on secure certificate for internet of medical things systems

Shehzad Ashraf Chaudhry et al.

Summary: The Internet of Medical Things (IoMT) is based on sensing and communication infrastructure as well as computation facilities, providing convenient and cost-effective ways for healthcare by enabling remote access to patients' physiological data. However, communication delays in IoMT can be very harmful to healthcare.

SUSTAINABLE CITIES AND SOCIETY (2021)

Article Chemistry, Analytical

Provably Secure Three-Factor-Based Mutual Authentication Scheme with PUF for Wireless Medical Sensor Networks

DeokKyu Kwon et al.

Summary: Wireless medical sensor networks (WMSNs) are utilized in remote medical service environments to offer convenient healthcare services to patients. A three-factor-based mutual authentication scheme with physical unclonable function (PUF) has been proposed to address security vulnerabilities and provide strong security, anonymity, and other features for WMSNs.

SENSORS (2021)

Article Green & Sustainable Science & Technology

A Secure, Lightweight, and Anonymous User Authentication Protocol for IoT Environments

Seunghwan Son et al.

Summary: The Internet of Things (IoT) is applied in various environments where efficient and secure authentication processes are needed to ensure network sustainability. Many existing IoT authentication protocols have security vulnerabilities that need to be addressed. The proposed novel authentication scheme in this study uses lower computation and communication costs, provides better security and performance, and is suitable for real IoT environments.

SUSTAINABILITY (2021)

Article Computer Science, Information Systems

Lightweight Failover Authentication Mechanism for IoT-Based Fog Computing Environment

Soumya Banerjee et al.

Summary: In this work, a new security mechanism was proposed for ensuring security during failover among fog nodes in IoT. The scheme achieves fast lightweight secondary authentication leveraging initial authentication. The research demonstrates the security of the proposed scheme through formal security analysis, informal security analysis, and comparative analysis with other schemes.

ELECTRONICS (2021)

Article Engineering, Multidisciplinary

Secure and Efficient Honey List-Based Authentication Protocol for Vehicular Ad Hoc Networks

JoonYoung Lee et al.

Summary: VANET and IoV technologies are crucial for smart city systems, with V2V communication ensuring traffic system management and road safety. A lightweight protocol is proposed for regional segmentation management and overhead resolution, utilizing mutual authentication and honey_list technology for security.

IEEE TRANSACTIONS ON NETWORK SCIENCE AND ENGINEERING (2021)

Article Computer Science, Information Systems

Lightweight Three-Factor-Based Privacy- Preserving Authentication Scheme for IoT-Enabled Smart Homes

Sungjin Yu et al.

Summary: Smart homes, as an emerging paradigm of Internet of Things, face security vulnerabilities. The authentication protocol proposed by Kaur and Kumar has security flaws, leading to a new secure and efficient authentication scheme being designed.

IEEE ACCESS (2021)

Article Computer Science, Information Systems

Design of Secure Decentralized Car-Sharing System Using Blockchain

Myeonghyun Kim et al.

Summary: Car-sharing systems can solve urban problems by providing shared vehicles and reducing personal vehicle usage. However, security concerns exist due to information being transmitted through a public channel. Designing a secure authentication protocol and a decentralized scheme using blockchain technology is essential for addressing these issues.

IEEE ACCESS (2021)

Article Telecommunications

Improved Biometric-Based Mutual Authentication and Key Agreement Scheme Using ECC

Shreeya Swagatika Sahoo et al.

WIRELESS PERSONAL COMMUNICATIONS (2020)

Article Engineering, Electrical & Electronic

An enhanced anonymous and unlinkable user authentication and key agreement protocol for TMIS by utilization of ECC

Arezou Ostad-Sharif et al.

INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS (2019)

Article Chemistry, Analytical

Secure Three-Factor Authentication Protocol for Multi-Gateway IoT Environments

JoonYoung Lee et al.

SENSORS (2019)

Article Computer Science, Information Systems

Anonymity Preserving and Lightweight Multimedical Server Authentication Protocol for Telecare Medical Information System

Ruhul Amin et al.

IEEE JOURNAL OF BIOMEDICAL AND HEALTH INFORMATICS (2019)

Article Health Care Sciences & Services

A Robust and Efficient ECC-based Mutual Authentication and Session Key Generation Scheme for Healthcare Applications

Arezou Ostad-Sharif et al.

JOURNAL OF MEDICAL SYSTEMS (2019)

Article Computer Science, Information Systems

An efficient improvement remote user mutual authentication and session key agreement scheme for E-health care systems

Niloofar Ravanbakhsh et al.

MULTIMEDIA TOOLS AND APPLICATIONS (2018)

Article Computer Science, Artificial Intelligence

Security analysis and improvement of bio-hashing based three-factor authentication scheme for telecare medical information systems

Qi Jiang et al.

JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING (2018)

Article Computer Science, Information Systems

New robust biometrics-based mutual authentication scheme with key agreement using elliptic curve cryptography

Mingping Qi et al.

MULTIMEDIA TOOLS AND APPLICATIONS (2018)

Article Computer Science, Interdisciplinary Applications

Secure anonymity-preserving password-based user authentication and session key agreement scheme for telecare medicine information systems

Anil Kumar Sutrala et al.

COMPUTER METHODS AND PROGRAMS IN BIOMEDICINE (2016)

Article Multidisciplinary Sciences

An improved authenticated key agreement protocol for telecare medicine information system

Wenhao Liu et al.

SPRINGERPLUS (2016)

Article Health Care Sciences & Services

An Improved RSA Based User Authentication and Session Key Agreement Protocol Usable in TMIS

Ruhul Amin et al.

JOURNAL OF MEDICAL SYSTEMS (2015)

Article Health Care Sciences & Services

Robust ECC-based Authenticated Key Agreement Scheme with Privacy Protection for Telecare Medicine Information Systems

Liping Zhang et al.

JOURNAL OF MEDICAL SYSTEMS (2015)

Article Health Care Sciences & Services

An Efficient and Robust RSA-Based Remote User Authentication for Telecare Medical Information Systems

Debasis Giri et al.

JOURNAL OF MEDICAL SYSTEMS (2015)

Article Health Care Sciences & Services

An Authentication Scheme for Secure Access to Healthcare Services

Muhammad Khurram Khan et al.

JOURNAL OF MEDICAL SYSTEMS (2013)

Article Computer Science, Artificial Intelligence

An improved BioHashing for human authentication

Alessandra Lumini et al.

PATTERN RECOGNITION (2007)

Article Computer Science, Artificial Intelligence

Biohashing: two factor authentication featuring fingerprint data and tokenised random number

ATB Jin et al.

PATTERN RECOGNITION (2004)