Dynamically scalable privacy-preserving authentication protocol for distributed IoT based healthcare service providers
Wireless Networks, ISSN: 1572-8196, Vol: 29, Issue: 3, Page: 1385-1409
2023
- 1Citations
- 11Captures
- 1Mentions
Metric Options: CountsSelecting the 1-year or 3-year option will change the metrics count to percentiles, illustrating how an article or review compares to other articles or reviews within the selected time period in the same journal. Selecting the 1-year option compares the metrics against other articles/reviews that were also published in the same calendar year. Selecting the 3-year option compares the metrics against other articles/reviews that were also published in the same calendar year plus the two years prior.
Example: if you select the 1-year option for an article published in 2019 and a metric category shows 90%, that means that the article or review is performing better than 90% of the other articles/reviews published in that journal in 2019. If you select the 3-year option for the same article published in 2019 and the metric category shows 90%, that means that the article or review is performing better than 90% of the other articles/reviews published in that journal in 2019, 2018 and 2017.
Citation Benchmarking is provided by Scopus and SciVal and is different from the metrics context provided by PlumX Metrics.
Example: if you select the 1-year option for an article published in 2019 and a metric category shows 90%, that means that the article or review is performing better than 90% of the other articles/reviews published in that journal in 2019. If you select the 3-year option for the same article published in 2019 and the metric category shows 90%, that means that the article or review is performing better than 90% of the other articles/reviews published in that journal in 2019, 2018 and 2017.
Citation Benchmarking is provided by Scopus and SciVal and is different from the metrics context provided by PlumX Metrics.
Most Recent News
New Technology Findings from Sardar Vallabhbhai National Institute of Technology Discussed (Dynamically Scalable Privacy-preserving Authentication Protocol for Distributed Iot Based Healthcare Service Providers)
2023 JAN 09 (NewsRx) -- By a News Reporter-Staff News Editor at Tech Daily News -- Data detailed on Technology have been presented. According to
Article Description
Internet-of-Things (IoT) in digital healthcare service providers forms large-scale distributed networks where entities at the edge enable dynamic communication and collaboration. Rapid rise in connected devices generates a high volume of real-time data susceptible to various security and privacy attacks. Distributed IoT has escalated the requirement of dynamic scalability in smart healthcare service providers. Secure authentication for accessing healthcare data in distributed IoT becomes essential to prevent impersonation and confirm ethical medical information exchange. Several authors have proposed privacy-preserving authentication protocols over unsecured public networks. However, their protocols lack dynamic scalability concerning collective security and privacy requirements. We propose a privacy-preserving scalable authentication protocol solution jointly fulfilling robust security and achieving content and contextual privacy. We introduce a partially trusted third party (TTP) responsible only for dynamically performing new user authentication without restarting existing communication channels. The proposed protocol incorporates dynamic tokens and secret shared key updation to enable robust security while achieving dynamic scalability. Anonymity and untraceability are attained using selective encryption over partial personally identifiable information. This also achieves automatic fake identity rejection, protecting legitimate credentials on-the-fly and at the TTP storage. We illustrate formal security analysis using Real-or-Random oracle model and formal validation using a scyther security verification tool. Theoretical analysis demonstrates that our protocol is resilient against known security and privacy attacks. Finally, a performance evaluation with relatively similar modeled schemes is elucidated to validate the utility of our solution.
Bibliographic Details
Springer Science and Business Media LLC
Provide Feedback
Have ideas for a new metric? Would you like to see something else here?Let us know