A formally verified authentication protocol in secure framework for mobile healthcare during COVID-19-like pandemic

Existing schemes in the realm of mobile healthcare (also, e-Healthcare) based on cloud and IoMT (Internet of Medical Things) do not ensure end-to-end security and are not compliant with HIPAA (Heal...

[1]  Martín Abadi,et al.  Authentification and Delegation with Smart-Cards , 1993, Sci. Comput. Program..

[2]  Peng Liu,et al.  Leveraging Information Asymmetry to Transform Android Apps into Self-Defending Code Against Repackaging Attacks , 2018, IEEE Transactions on Mobile Computing.

[3]  Fan Wu,et al.  Cryptanalysis and Improvement of a User Authentication Scheme Preserving Uniqueness and Anonymity for Connected Health Care , 2015, Journal of Medical Systems.

[4]  Jiankun Hu,et al.  New secure healthcare system using cloud of things , 2017, Cluster Computing.

[5]  Ja-Ling Wu,et al.  A Privacy-Preserving Cloud-Based Data Management System with Efficient Revocation Scheme , 2017, 2017 18th International Conference on Parallel and Distributed Computing, Applications and Technologies (PDCAT).

[6]  Athanasios V. Vasilakos,et al.  An Enhanced Mobile-Healthcare Emergency System Based on Extended Chaotic Maps , 2013, Journal of Medical Systems.

[7]  Pardeep Kumar,et al.  E-SAP: Efficient-Strong Authentication Protocol for Healthcare Applications Using Wireless Medical Sensor Networks , 2012, Sensors.

[8]  Understanding Security Risks When Exchanging Medical Records Using IHE , 2020 .

[9]  Cjf Cas Cremers Scyther : semantics and verification of security protocols , 2006 .

[10]  Jiankun Hu,et al.  Corresponding author’s address: , 2022 .

[11]  Al-Sakib Khan Pathan Access to information vs blocking of information during COVID-19 pandemic: a governance dilemma in the era of crowdsourcing based on ICT , 2020 .

[12]  Brij B. Gupta,et al.  An internet-of-things-based security scheme for healthcare environment for robust location privacy , 2020 .

[13]  Rune Fensli,et al.  End-to-end Security and Privacy Protection for Co-operative Access to Health and Care Data in a Telehealth Trial System for Remote Supervision of COPD-Patients , 2015 .

[14]  Kuan-Ching Li,et al.  Multi-Keyword ranked search based on mapping set matching in cloud ciphertext storage system , 2020, Connect. Sci..

[15]  Sherali Zeadally,et al.  Analysis of Security Protocols for Mobile Healthcare , 2016, Journal of Medical Systems.

[16]  Cheng-Chi Lee,et al.  A new three-party-authenticated key agreement scheme based on chaotic maps without password table , 2014, Nonlinear Dynamics.

[17]  Yuan Zhang,et al.  Design and Data Analysis of Sports Information Acquisition System Based on Internet of Medical Things , 2020, IEEE Access.

[18]  S. Vivekanandan,et al.  A typical IoT architecture-based regular monitoring of arthritis disease using time wrapping algorithm , 2020 .

[19]  Xiong Li,et al.  An improved and anonymous two-factor authentication protocol for health-care applications with wireless medical sensor networks , 2017, Multimedia Systems.

[20]  Wei Liang,et al.  A new authentication protocol for healthcare applications using wireless medical sensor networks with user anonymity , 2016, Secur. Commun. Networks.

[21]  Abbas Ghaemi Bafghi,et al.  An anonymous mobile payment protocol based on SWPP , 2014, Electronic Commerce Research.

[22]  Al-Sakib Khan Pathan,et al.  Trusted service manager (TSM) based privacy preserving and secure mobile commerce framework with formal verification , 2019, Complex Adapt. Syst. Model..

[23]  Sheetal Kalra,et al.  A Lightweight User Authentication Scheme for Cloud-IoT Based Healthcare Services , 2018, Iranian Journal of Science and Technology, Transactions of Electrical Engineering.

[24]  Cheng-Chi Lee,et al.  Robust anonymous authentication protocol for health-care applications using wireless medical sensor networks , 2013, Multimedia Systems.

[25]  Martín Abadi,et al.  A logic of authentication , 1990, TOCS.

[26]  V. N. Sastry,et al.  Secure mobile payment framework based on UICC with formal verification , 2014, Int. J. Comput. Sci. Eng..

[27]  Sheetal Kalra,et al.  Multi-factor user authentication scheme for IoT-based healthcare services , 2018, Journal of Reliable Intelligent Environments.

[28]  Cheng-Chi Lee,et al.  An extended chaotic maps based user authentication and privacy preserving scheme against DoS attacks in pervasive and ubiquitous computing environments , 2013, Nonlinear Dynamics.

[29]  Bala Srinivasan,et al.  Lightweight Mobile Credit-Card Payment Protocol , 2003, INDOCRYPT.

[30]  Jie Tang,et al.  An edge streaming data processing framework for autonomous driving , 2020 .

[31]  Al-Sakib Khan Pathan Denial of service in wireless sensor networks: issues and challenges , 2010 .

[32]  David Naccache,et al.  White-Box Cryptography: Security in an Insecure Environment , 2016, IEEE Security & Privacy.