Journal ArticleDOI
A secure elliptic curve cryptography based mutual authentication protocol for cloud-assisted TMIS
TLDR
The proposed protocol secure against man-in-the-middle attack, patient anonymity, replay attack, known-key security property, data confidentiality, data non-repudiation, message authentication, impersonation attack, session key security and patient unlinkability, is compared with existing related protocols in same cloud based TMIS.About:
This article is published in Telematics and Informatics.The article was published on 2019-05-01. It has received 55 citations till now. The article focuses on the topics: Authentication protocol & Replay attack.read more
Citations
More filters
Journal ArticleDOI
On the Design of Mutual Authentication and Key Agreement Protocol in Internet of Vehicles-Enabled Intelligent Transportation System
Palak Bagga,Ashok Kumar Das,Mohammad Wazid,Joel J. P. C. Rodrigues,Kim-Kwang Raymond Choo,Young-Ho Park +5 more
TL;DR: In this article, the authors proposed a new mutual authentication and key agreement protocol in an IoV-enabled Intelligent Transportation System (ITS) using both formal and informal security analysis, as well as formal security verification using an automated verification tool.
Journal ArticleDOI
CSEF: Cloud-Based Secure and Efficient Framework for Smart Medical System Using ECC
TL;DR: The proposed CSEF is secure against security attacks, and satisfies many security attributes such as man-in-the-middle attack, impersonation attack, data non-repudiation, doctor anonymity, replay attack, known-key security property, message authentication, patient anonymity, data confidentiality, stolen-verifier attack, parallel session attack and session key security.
Journal ArticleDOI
PALK: Password-based anonymous lightweight key agreement framework for smart grid
TL;DR: A password-based anonymous lightweight key agreement framework for smart grid (PALK) is designed by using elliptic curve cryptography and it is proved that PALK is security against man-in-the-middle attack and replay attack using the simulation tool “AVISPA”.
Journal ArticleDOI
RSEAP: RFID based secure and efficient authentication protocol for vehicular cloud computing
TL;DR: This work proposes an elliptic curve cryptography (ECC) based authentication framework for VCC, which is equipped with a radio frequency identification (RFID), and proves the claim of secure communication using formal security analysis in the random oracle model and information analysis.
Journal ArticleDOI
An elliptic curve cryptography based mutual authentication scheme for smart grid communications using biometric approach
TL;DR: An ECC-based mutual authentication protocol for smart grid communication using biometric approach that takes much less communication and computation costs compared with other existing protocols in SG environment and is convenient for practical application in SG communication.
References
More filters
Journal ArticleDOI
Anonymous Authentication for Wireless Body Area Networks With Provable Security
TL;DR: A new anonymous authentication scheme for WBANs is proposed and it is proved that it is provably secure and overcomes the security weaknesses in previous schemes but also has the same computation costs at a client side.
Journal ArticleDOI
Robust anonymous authentication protocol for health-care applications using wireless medical sensor networks
TL;DR: A robust anonymous authentication protocol for health-care applications using WMSNs is proposed, which has strong security and computational efficiency and is more suitable for Health-Care applications usingWMSNs.
Journal ArticleDOI
A robust and anonymous patient monitoring system using wireless medical sensor networks
TL;DR: An architecture for patient monitoring health-care system in WMSN is proposed and an anonymity-preserving mutual authentication protocol for mobile users is designed and it is demonstrated that the proposed protocol is efficient and robust.
Journal ArticleDOI
A More Secure Authentication Scheme for Telecare Medicine Information Systems
He Debiao,Chen Jianhua,Zhang Rui +2 more
TL;DR: This work proposes an improved scheme for authentication scheme for mobile devices in telecare medicine information system that is not only more secure than Wu et al.
Journal ArticleDOI
Cloud Centric Authentication for Wearable Healthcare Monitoring System
TL;DR: A new cloud based user authentication scheme for secure authentication of medical data that provides the session-key security and protects active attacks and a detailed comparative analysis for the communication and computation costs along with security and functionality features which proves its efficiency in comparison to the other existing schemes of its category.