Reference Hub30
A Lightweight Three-Factor Anonymous Authentication Scheme With Privacy Protection for Personalized Healthcare Applications

A Lightweight Three-Factor Anonymous Authentication Scheme With Privacy Protection for Personalized Healthcare Applications

Mengxia Shuai, Nenghai Yu, Hongxia Wang, Ling Xiong, Yue Li
Copyright: © 2021 |Volume: 33 |Issue: 3 |Pages: 18
ISSN: 1546-2234|EISSN: 1546-5012|EISBN13: 9781799859062|DOI: 10.4018/JOEUC.20210501.oa1
Cite Article Cite Article

MLA

Shuai, Mengxia, et al. "A Lightweight Three-Factor Anonymous Authentication Scheme With Privacy Protection for Personalized Healthcare Applications." JOEUC vol.33, no.3 2021: pp.1-18. http://doi.org/10.4018/JOEUC.20210501.oa1

APA

Shuai, M., Yu, N., Wang, H., Xiong, L., & Li, Y. (2021). A Lightweight Three-Factor Anonymous Authentication Scheme With Privacy Protection for Personalized Healthcare Applications. Journal of Organizational and End User Computing (JOEUC), 33(3), 1-18. http://doi.org/10.4018/JOEUC.20210501.oa1

Chicago

Shuai, Mengxia, et al. "A Lightweight Three-Factor Anonymous Authentication Scheme With Privacy Protection for Personalized Healthcare Applications," Journal of Organizational and End User Computing (JOEUC) 33, no.3: 1-18. http://doi.org/10.4018/JOEUC.20210501.oa1

Export Reference

Mendeley
Favorite Full-Issue Download

Abstract

Security and privacy issues in wireless medical sensor networks (WMSNs) have attracted lots of attention in both academia and industry due to the sensitiveness of medical system. In the past decade, extensive research has been carried out on these security issues, but no single study exists that addresses them adequately, especially for some important security properties, such as user anonymity and forward secrecy. As a step towards this direction, in this paper, the authors propose a lightweight three-factor anonymous authentication scheme with forward secrecy for personalized healthcare applications using only the lightweight cryptographic primitives. The proposed scheme adopts pseudonym identity technique to protect users' real identities and employs one-way hash chain technique to ensure forward secrecy. Analysis and comparison results demonstrate that the proposed scheme can not only reduce execution time by 34% as compared with the most effective related schemes, but also achieve more security and functional features.