scispace - formally typeset
Journal ArticleDOI

Robust secure communication protocol for smart healthcare system with FPGA implementation

Reads0
Chats0
TLDR
A novel architecture in the MWSNs is proposed and a suitable authenticated key establishment protocol using the light weight Elliptic Curve Cryptography (ECC) for the architecture is designed, solving the security issues found in existing protocols.
About
This article is published in Future Generation Computer Systems.The article was published on 2019-11-01. It has received 58 citations till now. The article focuses on the topics: Authentication protocol & Authentication.

read more

Citations
More filters
Journal ArticleDOI

A Secure and Efficient Cloud-Centric Internet-of-Medical-Things-Enabled Smart Healthcare System With Public Verifiability

TL;DR: This article presents the state-of-the-art secure and efficient cloud-centric IoMT-enabled smart healthcare system with public verifiability, and implements an escrow-free identity-based aggregate signcryption (EF-IDASC) scheme to secure data transmission.
Journal ArticleDOI

Lightweight Cryptographic Protocols for IoT-Constrained Devices: A Survey

TL;DR: The comparative analysis of the existing lightweight cryptographic solutions along with their advantages, drawbacks, and vulnerabilities highlights the need for elastic cryptographic protocols which are capable of adapting to the asymmetric capabilities of the different nodes in IoT systems.
Journal ArticleDOI

Security and Privacy for mHealth and uHealth Systems: A Systematic Mapping Study

TL;DR: Results suggest that the existing research on security and privacy of m/uHealth systems primarily focuses on select group of control families (compliant with NIST800-53), protection of systems and information, access control, authentication, individual participation, and privacy authorisation.
Journal ArticleDOI

CFSec: Password based secure communication protocol in cloud-fog environment

TL;DR: This paper first shows an architecture for the data flow model between the cloud and fog computing and then designs an authentication protocol with proper key establishment between thecloud, fog, and user and proves the robustness of the protocol.
Journal ArticleDOI

Machine-to-Machine Communication for Device Identification and Classification in Secure Telerobotics Surgery

TL;DR: In this paper, the authors proposed an efficient device type detection and classification (EDDC) protocol for device identification and classification in M2M communication for secure telerobotic surgery in telemedicine industry.
References
More filters
Journal ArticleDOI

A logic of authentication

TL;DR: This paper describes the beliefs of trustworthy parties involved in authentication protocols and the evolution of these beliefs as a consequence of communication, and gives the results of the analysis of four published protocols.
Journal ArticleDOI

Secure integration of IoT and Cloud Computing

TL;DR: A survey of IoT and Cloud Computing with a focus on the security issues of both technologies is presented, and it shows how the Cloud Computing technology improves the function of the IoT.
Journal ArticleDOI

Two-factor user authentication in wireless sensor networks

TL;DR: This letter presents a two-factor user authentication protocol for WSN, which provides strong authentication, session key establishment, and achieves efficiency.
Book ChapterDOI

Fast Multiplication on Elliptic Curves over GF(2m) without Precomputation

TL;DR: The improved method possesses many desirable features for implementing elliptic curves in restricted environments and requires less memory than projective schemes and the amount of computation needed for a scalar multiplication is fixed for all multipliers of the same binary length.
Journal ArticleDOI

An efficient user authentication and key agreement scheme for heterogeneous wireless sensor network tailored for the Internet of Things environment

TL;DR: This paper focuses on overcoming the security weaknesses of Turkanovic et?al.'s scheme, by proposing a new and improved UAKAS which enables the same functionality but improves the security level and enables the HWSN to dynamically grow without influencing any party involved in the UAKas.
Related Papers (5)