A privacy preserving three-factor authentication protocol for e-Health clouds

2016 ◽  
Vol 72 (10) ◽  
pp. 3826-3849 ◽  
Author(s):  
Qi Jiang ◽  
Muhammad Khurram Khan ◽  
Xiang Lu ◽  
Jianfeng Ma ◽  
Debiao He
2021 ◽  
Vol 2021 ◽  
pp. 1-15
Author(s):  
Tsu-Yang Wu ◽  
Lei Yang ◽  
Zhiyuan Lee ◽  
Shu-Chuan Chu ◽  
Saru Kumari ◽  
...  

The wireless sensor network is a network composed of sensor nodes self-organizing through the application of wireless communication technology. The application of wireless sensor networks (WSNs) requires high security, but the transmission of sensitive data may be exposed to the adversary. Therefore, to guarantee the security of information transmission, researchers propose numerous security authentication protocols. Recently, Wu et al. proposed a new three-factor authentication protocol for WSNs. However, we find that their protocol cannot resist key compromise impersonation attacks and known session-specific temporary information attacks. Meanwhile, it also violates perfect forward secrecy and anonymity. To overcome the proposed attacks, this paper proposes an enhanced protocol in which the security is verified by the formal analysis and informal analysis, Burross-Abadii-Needham (BAN) logic, and ProVerif tools. The comparison of security and performance proves that our protocol has higher security and lower computational overhead.


2022 ◽  
Vol 71 (2) ◽  
pp. 3703-3719
Author(s):  
Safiullah Khan ◽  
Ali Raza ◽  
Seong Oun Hwang

2013 ◽  
Vol 36 (5) ◽  
pp. 1352-1364 ◽  
Author(s):  
Bidi Ying ◽  
Dimitrios Makrakis ◽  
Hussein T. Mouftah

Sign in / Sign up

Export Citation Format

Share Document