An efficient three-factor authentication protocol for wireless healthcare sensor networks

Kaydedildi:
Detaylı Bibliyografya
Yayımlandı:Multimedia Tools and Applications vol. 83, no. 23 (Jul 2024), p. 63699
Yazar: Saini, Khushil Kumar
Diğer Yazarlar: Kaur, Damandeep, Kumar, Devender, Kumar, Bijendra
Baskı/Yayın Bilgisi:
Springer Nature B.V.
Konular:
Online Erişim:Citation/Abstract
Full Text - PDF
Etiketler: Etiketle
Etiket eklenmemiş, İlk siz ekleyin!

MARC

LEADER 00000nab a2200000uu 4500
001 3076099542
003 UK-CbPIL
022 |a 1380-7501 
022 |a 1573-7721 
024 7 |a 10.1007/s11042-024-18114-1  |2 doi 
035 |a 3076099542 
045 2 |b d20240701  |b d20240731 
084 |a 108528  |2 nlm 
100 1 |a Saini, Khushil Kumar  |u Department of Computer Science & Engineering, NSUT, New Delhi, India (GRID:grid.506050.6) (ISNI:0000 0001 0693 1170) 
245 1 |a An efficient three-factor authentication protocol for wireless healthcare sensor networks 
260 |b Springer Nature B.V.  |c Jul 2024 
513 |a Journal Article 
520 3 |a Wireless Sensor Networks (WSNs) play a significant role in the health care industry in this digitised world. This technology is used to monitor and store the health-related data for patients. As a result, if such data is not kept secure, it can pose a serious threat to the patient’s life. Maintaining the anonymity of such data is an equally important task. As WSNs use an open channel to transfer data between sensor nodes, users and gateway, they are vulnerable to attackers. A user authentication strategy for remote healthcare applications has been recently developed by Soni et al. However, it has been noted in this work that this user authentication approach is not secure against user impersonation attack and offline password-guessing attack. Additionally, to overcome the shortcomings of the Soni et al.’s protocol, an effective user authentication protocol for wireless healthcare sensor networks has been put forth. The formal security verification of the proposed protocol is carried out using the ProVerif tool and the formal verification of mutual authentication is demonstrated using BAN logic. Its performance in terms of cost associated with communication, storage and computation along with its security aspects is compared to those of the other similar schemes. From such a comparison, it is evident that the proposed protocol is more secure. 
653 |a Open channels 
653 |a Verification 
653 |a Authentication protocols 
653 |a Health care 
653 |a Authentication 
653 |a Security aspects 
653 |a Sensors 
653 |a Wireless sensor networks 
653 |a Effectiveness 
700 1 |a Kaur, Damandeep  |u Bank of Montreal, Department of Risk and Governance, Montreal, Canada (GRID:grid.506050.6) 
700 1 |a Kumar, Devender  |u Department of Information Technology, NSUT, New Delhi, India (GRID:grid.506050.6) (ISNI:0000 0001 0693 1170) 
700 1 |a Kumar, Bijendra  |u Department of Computer Science & Engineering, NSUT, New Delhi, India (GRID:grid.506050.6) (ISNI:0000 0001 0693 1170) 
773 0 |t Multimedia Tools and Applications  |g vol. 83, no. 23 (Jul 2024), p. 63699 
786 0 |d ProQuest  |t ABI/INFORM Global 
856 4 1 |3 Citation/Abstract  |u https://www.proquest.com/docview/3076099542/abstract/embedded/7BTGNMKEMPT1V9Z2?source=fedsrch 
856 4 0 |3 Full Text - PDF  |u https://www.proquest.com/docview/3076099542/fulltextPDF/embedded/7BTGNMKEMPT1V9Z2?source=fedsrch