Change search
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • harvard1
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
An efficient ECC-based provably secure three-factor user authentication and key agreement protocol for wireless healthcare sensor networks
Center for Security, Theory and Algorithmic Research, International Institute of Information Technology, Hyderabad .
Center for Security, Theory and Algorithmic Research, International Institute of Information Technology, Hyderabad .
Department of Computer Science and Engineering, Indian Institute of Information Technology Chittoor.
Department of Computer Science and Engineering, Thapar University, Patiala .
Show others and affiliations
2017 (English)In: Computers & electrical engineering, ISSN 0045-7906, E-ISSN 1879-0755, Vol. 69, p. 534-554Article in journal (Refereed) Published
Abstract [en]

We first show the security limitations of a recent user authentication scheme proposed for wireless healthcare sensor networks. We then present a provably secure three-factor user authentication and key agreement protocol for wireless healthcare sensor networks. The proposed scheme supports functionality features, such as dynamic sensor node addition, password as well as biometrics update, smart card revocation along with other usual features required for user authentication in wireless sensor networks. Our scheme is shown to be secure through the rigorous formal security analysis under the Real-Or-Random (ROR) model and broadly-accepted Burrows-Abadi-Needham (BAN) logic. Furthermore, the simulation through the widely-known Automated Validation of Internet Security Protocols and Applications (AVISPA) tool shows that our scheme is also secure. High security, and low communication and computation costs make our scheme more suitable for practical application in healthcare applications as compared to other related existing schemes.

Place, publisher, year, edition, pages
Elsevier, 2017. Vol. 69, p. 534-554
National Category
Media and Communication Technology
Research subject
Pervasive Mobile Computing
Identifiers
URN: urn:nbn:se:ltu:diva-65225DOI: 10.1016/j.compeleceng.2017.08.003ISI: 000440122300037Scopus ID: 2-s2.0-85027507889OAI: oai:DiVA.org:ltu-65225DiVA, id: diva2:1134716
Note

Validerad;2018;Nivå 2;2018-07-24 (inah)

Available from: 2017-08-21 Created: 2017-08-21 Last updated: 2018-08-16Bibliographically approved

Open Access in DiVA

No full text in DiVA

Other links

Publisher's full textScopus

Authority records BETA

Vasilakos, Athanasios

Search in DiVA

By author/editor
Vasilakos, Athanasios
By organisation
Computer Science
In the same journal
Computers & electrical engineering
Media and Communication Technology

Search outside of DiVA

GoogleGoogle Scholar

doi
urn-nbn

Altmetric score

doi
urn-nbn
Total: 10 hits
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • harvard1
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf