4.8 Article

Blockchain and PUF-Based Lightweight Authentication Protocol for Wireless Medical Sensor Networks

相关参考文献

注意:仅列出部分参考文献,下载原文获取全部文献信息。
Article Computer Science, Information Systems

Security Analysis on A Secure Three-Factor User Authentication Protocol With Forward Secrecy for Wireless Medical Sensor Network Systems

Muhammad Asad Saleem et al.

Summary: The Internet of Things facilitates the connection of different devices with the Internet, with wireless sensor networks being applied in smart fields. Researchers introduced a three-factor user authentication protocol for WMSN, but it has security flaws.

IEEE SYSTEMS JOURNAL (2021)

Article Engineering, Electrical & Electronic

HARCI: A Two-Way Authentication Protocol for Three Entity Healthcare IoT Networks

Tejasvi Alladi et al.

Summary: This paper introduces a two-way two-stage authentication protocol using Physical Unclonable Functions (PUFs) to address the physical security challenges of healthcare IoT devices. The protocol is lightweight and formally evaluated for security, compared to relevant protocols to show its suitability and robustness.

IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS (2021)

Article Computer Science, Information Systems

PSL-MAAKA: Provably Secure and Lightweight Mutual Authentication and Key Agreement Protocol for Fully Public Channels in Internet of Medical Things

Jiliang Li et al.

Summary: This article presents a lightweight and secure MAAKA protocol for IoMT, utilizing hash and XOR operations for efficient authentication and key agreement, proving security with the random oracle model, satisfying security requirements in IoMT, and demonstrating optimal performance compared to other competing schemes in terms of communication overhead, computation overhead, and storage overhead.

IEEE INTERNET OF THINGS JOURNAL (2021)

Article Computer Science, Information Systems

A Secure Three-Factor User Authentication Protocol With Forward Secrecy for Wireless Medical Sensor Network Systems

Xiong Li et al.

IEEE SYSTEMS JOURNAL (2020)

Article Computer Science, Information Systems

Cryptanalysis and Security Improvement of Two Authentication Schemes for Healthcare Systems Using Wireless Medical Sensor Networks

Jiaqing Mo et al.

SECURITY AND COMMUNICATION NETWORKS (2020)

Article Computer Science, Hardware & Architecture

A lightweight and secure two-factor authentication scheme for wireless body area networks in health-care IoT

Mahdi Fotouhi et al.

COMPUTER NETWORKS (2020)

Article Computer Science, Information Systems

Lightweight and Secure Three-Factor Authentication Scheme for Remote Patient Monitoring Using On-Body Wireless Networks

Mengxia Shuai et al.

SECURITY AND COMMUNICATION NETWORKS (2019)

Article Computer Science, Information Systems

CasCP: Efficient and Secure Certificateless Authentication Scheme for Wireless Body Area Networks with Conditional Privacy-Preserving

Yong Xie et al.

SECURITY AND COMMUNICATION NETWORKS (2019)

Article Computer Science, Hardware & Architecture

An efficient ECC-based provably secure three-factor user authentication and key agreement protocol for wireless healthcare sensor networks

Sravani Challa et al.

COMPUTERS & ELECTRICAL ENGINEERING (2018)

Article Computer Science, Theory & Methods

A lightweight and robust two-factor authentication scheme for personalized healthcare systems using wireless medical sensor networks

Fan Wu et al.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2018)

Article Computer Science, Theory & Methods

A robust and anonymous patient monitoring system using wireless medical sensor networks

Ruhul Amin et al.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2018)

Review Cardiac & Cardiovascular Systems

Cybersecurity for Cardiac Implantable Electronic Devices What Should You Know?

Adrian Baranchuk et al.

JOURNAL OF THE AMERICAN COLLEGE OF CARDIOLOGY (2018)

Article Computer Science, Information Systems

Design of Secure User Authenticated Key Management Protocol for Generic IoT Networks

Mohammad Wazid et al.

IEEE INTERNET OF THINGS JOURNAL (2018)

Article Health Care Sciences & Services

A Mutual Authentication Framework for Wireless Medical Sensor Networks

Jangirala Srinivas et al.

JOURNAL OF MEDICAL SYSTEMS (2017)

Article Computer Science, Hardware & Architecture

Efficient end-to-end authentication protocol for wearable health monitoring systems

Qi Jiang et al.

COMPUTERS & ELECTRICAL ENGINEERING (2017)

Article Computer Science, Information Systems

A new authentication protocol for healthcare applications using wireless medical sensor networks with user anonymity

Xiong Li et al.

SECURITY AND COMMUNICATION NETWORKS (2016)

Proceedings Paper Computer Science, Hardware & Architecture

Noise-Resilient SRAM Physically Unclonable Function Design for Security

Sujay Pandey et al.

2016 IEEE 25TH ASIAN TEST SYMPOSIUM (ATS) (2016)

Article Computer Science, Theory & Methods

Automated Security Protocol Analysis With the AVISPA Tool

Luca Vigano

ELECTRONIC NOTES IN THEORETICAL COMPUTER SCIENCE (2006)

Article Computer Science, Hardware & Architecture

Examining smart-card security under the threat of power analysis attacks

TS Messerges et al.

IEEE TRANSACTIONS ON COMPUTERS (2002)