An efficient three-factor authentication protocol for wireless healthcare sensor networks
Kaydedildi:
| Yayımlandı: | Multimedia Tools and Applications vol. 83, no. 23 (Jul 2024), p. 63699 |
|---|---|
| Yazar: | |
| Diğer Yazarlar: | , , |
| Baskı/Yayın Bilgisi: |
Springer Nature B.V.
|
| Konular: | |
| Online Erişim: | Citation/Abstract Full Text - PDF |
| Etiketler: |
Etiket eklenmemiş, İlk siz ekleyin!
|
MARC
| LEADER | 00000nab a2200000uu 4500 | ||
|---|---|---|---|
| 001 | 3076099542 | ||
| 003 | UK-CbPIL | ||
| 022 | |a 1380-7501 | ||
| 022 | |a 1573-7721 | ||
| 024 | 7 | |a 10.1007/s11042-024-18114-1 |2 doi | |
| 035 | |a 3076099542 | ||
| 045 | 2 | |b d20240701 |b d20240731 | |
| 084 | |a 108528 |2 nlm | ||
| 100 | 1 | |a Saini, Khushil Kumar |u Department of Computer Science & Engineering, NSUT, New Delhi, India (GRID:grid.506050.6) (ISNI:0000 0001 0693 1170) | |
| 245 | 1 | |a An efficient three-factor authentication protocol for wireless healthcare sensor networks | |
| 260 | |b Springer Nature B.V. |c Jul 2024 | ||
| 513 | |a Journal Article | ||
| 520 | 3 | |a Wireless Sensor Networks (WSNs) play a significant role in the health care industry in this digitised world. This technology is used to monitor and store the health-related data for patients. As a result, if such data is not kept secure, it can pose a serious threat to the patient’s life. Maintaining the anonymity of such data is an equally important task. As WSNs use an open channel to transfer data between sensor nodes, users and gateway, they are vulnerable to attackers. A user authentication strategy for remote healthcare applications has been recently developed by Soni et al. However, it has been noted in this work that this user authentication approach is not secure against user impersonation attack and offline password-guessing attack. Additionally, to overcome the shortcomings of the Soni et al.’s protocol, an effective user authentication protocol for wireless healthcare sensor networks has been put forth. The formal security verification of the proposed protocol is carried out using the ProVerif tool and the formal verification of mutual authentication is demonstrated using BAN logic. Its performance in terms of cost associated with communication, storage and computation along with its security aspects is compared to those of the other similar schemes. From such a comparison, it is evident that the proposed protocol is more secure. | |
| 653 | |a Open channels | ||
| 653 | |a Verification | ||
| 653 | |a Authentication protocols | ||
| 653 | |a Health care | ||
| 653 | |a Authentication | ||
| 653 | |a Security aspects | ||
| 653 | |a Sensors | ||
| 653 | |a Wireless sensor networks | ||
| 653 | |a Effectiveness | ||
| 700 | 1 | |a Kaur, Damandeep |u Bank of Montreal, Department of Risk and Governance, Montreal, Canada (GRID:grid.506050.6) | |
| 700 | 1 | |a Kumar, Devender |u Department of Information Technology, NSUT, New Delhi, India (GRID:grid.506050.6) (ISNI:0000 0001 0693 1170) | |
| 700 | 1 | |a Kumar, Bijendra |u Department of Computer Science & Engineering, NSUT, New Delhi, India (GRID:grid.506050.6) (ISNI:0000 0001 0693 1170) | |
| 773 | 0 | |t Multimedia Tools and Applications |g vol. 83, no. 23 (Jul 2024), p. 63699 | |
| 786 | 0 | |d ProQuest |t ABI/INFORM Global | |
| 856 | 4 | 1 | |3 Citation/Abstract |u https://www.proquest.com/docview/3076099542/abstract/embedded/7BTGNMKEMPT1V9Z2?source=fedsrch |
| 856 | 4 | 0 | |3 Full Text - PDF |u https://www.proquest.com/docview/3076099542/fulltextPDF/embedded/7BTGNMKEMPT1V9Z2?source=fedsrch |