scispace - formally typeset
Journal ArticleDOI

Efficient end-to-end authentication protocol for wearable health monitoring systems☆

TLDR
Comprehensive security analysis is conducted to show that the proposed protocol fixes these flaws of Amin et al.
About
This article is published in Computers & Electrical Engineering.The article was published on 2017-04-07. It has received 125 citations till now. The article focuses on the topics: Authentication protocol & Challenge-Handshake Authentication Protocol.

read more

Citations
More filters
Journal ArticleDOI

A Secure Three-Factor User Authentication Protocol With Forward Secrecy for Wireless Medical Sensor Network Systems

TL;DR: An ECC-based secure three-factor authentication protocol with forward secrecy for WMSN is proposed, which utilizes a fuzzy commitment scheme to handle the biometric information and utilizes fuzzy verifier and honey_list techniques to solve the contradiction of local password verification and mobile device lost attack.
Journal ArticleDOI

Blockchain and PUF-Based Lightweight Authentication Protocol for Wireless Medical Sensor Networks

TL;DR: Wang et al. as mentioned in this paper proposed a lightweight and reliable authentication protocol for WMSN, which is composed of cutting-edge blockchain technology and physically unclonable functions (PUFs), and a fuzzy extractor scheme is introduced to deal with biometric information.
Journal ArticleDOI

Security analysis and improvement of bio-hashing based three-factor authentication scheme for telecare medical information systems

TL;DR: An improved 3FA scheme is presented and it is shown that the new scheme fulfills session key secrecy and mutual authentication using the formal verification tool ProVerif and is capable of withstanding various attacks, and provides desired security features.
Journal ArticleDOI

BMPLS: Blockchain-Based Multi-level Privacy-Preserving Location Sharing Scheme for Telecare Medical Information Systems

TL;DR: This paper proposes a blockchain-based multi-level location sharing scheme, i.e. BMPLS, that can be applied to realize privacy-preserving location sharing based on blockchains for telecare medical information systems.
Journal ArticleDOI

An elliptic curve cryptography based enhanced anonymous authentication protocol for wearable health monitoring systems

TL;DR: An enhanced lightweight ECC based end-to-end authentication protocol is proposed to overcome the security vulnerabilities of Li et al.
References
More filters
Journal ArticleDOI

A Survey on Wearable Sensor-Based Systems for Health Monitoring and Prognosis

TL;DR: A variety of system implementations are compared in an approach to identify the technological shortcomings of the current state-of-the-art in wearable biosensor solutions and evaluate the maturity level of the top current achievements in wearable health-monitoring systems.
Journal ArticleDOI

A Secure and Dynamic Multi-Keyword Ranked Search Scheme over Encrypted Cloud Data

TL;DR: This paper constructs a special tree-based index structure and proposes a “Greedy Depth-first Search” algorithm to provide efficient multi-keyword ranked search over encrypted cloud data, which simultaneously supports dynamic update operations like deletion and insertion of documents.
Book

Elementary number theory and its applications

TL;DR: In this article, the authors introduce the notion of linear constrains and apply them to the problem of computing the order of an integer and a primitive root for a given integer.
Journal ArticleDOI

Enabling Personalized Search over Encrypted Outsourced Data with Efficiency Improvement

TL;DR: This paper study and solve the problem of personalized multi-keyword ranked search over encrypted data (PRSE) while preserving privacy in cloud computing with the help of semantic ontology WordNet, and proposes two PRSE schemes for different search intentions.
Journal ArticleDOI

A Privacy-Preserving and Copy-Deterrence Content-Based Image Retrieval Scheme in Cloud Computing

TL;DR: A unique watermark is directly embedded into the encrypted images by the cloud server before images are sent to the query user, and when image copy is found, the unlawful query user who distributed the image can be traced by the watermark extraction.
Related Papers (5)