scispace - formally typeset
Journal ArticleDOI

A secure elliptic curve cryptography based mutual authentication protocol for cloud-assisted TMIS

TLDR
The proposed protocol secure against man-in-the-middle attack, patient anonymity, replay attack, known-key security property, data confidentiality, data non-repudiation, message authentication, impersonation attack, session key security and patient unlinkability, is compared with existing related protocols in same cloud based TMIS.
About
This article is published in Telematics and Informatics.The article was published on 2019-05-01. It has received 55 citations till now. The article focuses on the topics: Authentication protocol & Replay attack.

read more

Citations
More filters
Journal ArticleDOI

On the Design of Mutual Authentication and Key Agreement Protocol in Internet of Vehicles-Enabled Intelligent Transportation System

TL;DR: In this article, the authors proposed a new mutual authentication and key agreement protocol in an IoV-enabled Intelligent Transportation System (ITS) using both formal and informal security analysis, as well as formal security verification using an automated verification tool.
Journal ArticleDOI

CSEF: Cloud-Based Secure and Efficient Framework for Smart Medical System Using ECC

TL;DR: The proposed CSEF is secure against security attacks, and satisfies many security attributes such as man-in-the-middle attack, impersonation attack, data non-repudiation, doctor anonymity, replay attack, known-key security property, message authentication, patient anonymity, data confidentiality, stolen-verifier attack, parallel session attack and session key security.
Journal ArticleDOI

PALK: Password-based anonymous lightweight key agreement framework for smart grid

TL;DR: A password-based anonymous lightweight key agreement framework for smart grid (PALK) is designed by using elliptic curve cryptography and it is proved that PALK is security against man-in-the-middle attack and replay attack using the simulation tool “AVISPA”.
Journal ArticleDOI

RSEAP: RFID based secure and efficient authentication protocol for vehicular cloud computing

TL;DR: This work proposes an elliptic curve cryptography (ECC) based authentication framework for VCC, which is equipped with a radio frequency identification (RFID), and proves the claim of secure communication using formal security analysis in the random oracle model and information analysis.
Journal ArticleDOI

An elliptic curve cryptography based mutual authentication scheme for smart grid communications using biometric approach

TL;DR: An ECC-based mutual authentication protocol for smart grid communication using biometric approach that takes much less communication and computation costs compared with other existing protocols in SG environment and is convenient for practical application in SG communication.
References
More filters
Journal ArticleDOI

Anonymous Authentication for Wireless Body Area Networks With Provable Security

TL;DR: A new anonymous authentication scheme for WBANs is proposed and it is proved that it is provably secure and overcomes the security weaknesses in previous schemes but also has the same computation costs at a client side.
Journal ArticleDOI

Robust anonymous authentication protocol for health-care applications using wireless medical sensor networks

TL;DR: A robust anonymous authentication protocol for health-care applications using WMSNs is proposed, which has strong security and computational efficiency and is more suitable for Health-Care applications usingWMSNs.
Journal ArticleDOI

A robust and anonymous patient monitoring system using wireless medical sensor networks

TL;DR: An architecture for patient monitoring health-care system in WMSN is proposed and an anonymity-preserving mutual authentication protocol for mobile users is designed and it is demonstrated that the proposed protocol is efficient and robust.
Journal ArticleDOI

A More Secure Authentication Scheme for Telecare Medicine Information Systems

TL;DR: This work proposes an improved scheme for authentication scheme for mobile devices in telecare medicine information system that is not only more secure than Wu et al.
Journal ArticleDOI

Cloud Centric Authentication for Wearable Healthcare Monitoring System

TL;DR: A new cloud based user authentication scheme for secure authentication of medical data that provides the session-key security and protects active attacks and a detailed comparative analysis for the communication and computation costs along with security and functionality features which proves its efficiency in comparison to the other existing schemes of its category.
Related Papers (5)