367:(WBAN) that transmit data through radio frequencies. This is beneficial for patients that should not be disturbed while being monitored, and can reduced the workload for medical worker and allow them to focus on the more hands-on jobs. However, a large concern for healthcare providers and patients about using remote health data tracking is that sensitive patient data is being transmitted through unsecured channels, so authentication occurs between the medical body area network user (the patient), the Healthcare Service Provider (HSP) and the trusted third party.
329:(IoT), where physical objects are incorporated into the Internet and can communicate via IP address. Authentication schemes can be applied to many types of systems that involve data transmission. As the Internet's presence in mechanical systems increases, writing effective security schemes for large numbers of users, objects, and servers can become challenging, especially when needing schemes to be lightweight and have low computational costs. Instead of password-based authentication, devices will use
72:(IoT). Writing effective security schemes in IoT systems is challenging, especially when schemes are desired to be lightweight and have low computational costs. Mutual authentication is a crucial security step that can defend against many adversarial attacks, which otherwise can have large consequences if IoT systems (such as e-Healthcare servers) are hacked. In scheme analyses done of past works, a lack of mutual authentication had been considered a weakness in data transmission schemes.
260:, which allows quick access to large amounts of data, but sometimes large amounts of data can slow down communication. Even with edge-based cloud computing, which is faster than general cloud computing due to a closer proximity between the server and user, lightweight schemes allow for more speed when managing larger amounts of data. One solution to keep schemes lightweight during the mutual authentication process is to limit the number of
428:(UAV) systems, a platform authentication occurs rather than user authentication. Mutual authentication during vehicle communication prevents one vehicle's system from being breached, which can then affect the whole system negatively. For example, a system of drones can be employed for agriculture work and cargo delivery, but if one drone were to be breached, the whole system has the potential to collapse.
271:(D2D) communication, where multiple devices can communicate locally in close proximities, removes the third party network. This in turn can speed up communication time. However, the authentication still occurs through insecure channels, so researchers believe it is still important to ensure mutual authentication occurs in order to keep a secure scheme.
249:, adding a mutual authentication step to data transmissions protocols can often increase performance runtime and computational costs. This can become an issue for network systems that cannot handle large amounts of data or those that constantly have to update for new real-time data (e.g. location tracking, real-time health data).
215:, and the authentication of the client to the server is left to the application layer. TLS also offers client-to-server authentication using client-side X.509 authentication. As it requires provisioning of the certificates to the clients and involves less user-friendly experience, it's rarely used in end-user applications.
359:
Similarly, an alternate RFID tag and reader system that assigns designated readers to tags has been proposed for extra security and low memory cost. Instead of considering all tag readers as one entity, only certain readers can read specific tags. With this method, if a reader is breached, it will
174:
A replay attack is similar to a MITM attack in which older messages are replayed out of context to fool the server. However, this does not work against schemes using mutual authentication because timestamps are a verification factor that are used in the protocols. If the change in time is greater
165:
or intercept a message, and sometimes alter the intended message for the recipient. The two parties openly receive messages without verifying the sender, so they do not realize an adversary has inserted themselves into the communication line. Mutual authentication can prevent MITM attacks because
286:
because the password is human-made rather than a computer-generated certificate. While applications could simply require users to use a computer-generated password, it is inconvenient for people to remember. User-made passwords and the ability to change one's password are important for making an
351:(RFID) tags are commonly used for object detection, which many manufacturers are implementing into their warehouse systems for automation. This allows for a faster way to keep up with inventory and track objects. However, keeping track of items in a system with RFID tags that transmit data to a
316:
have grown more popular over password-based schemes because it is more difficult to copy or guess session keys when using biometrics, but it can be difficult to encrypt noisy data. Due to these security risks and limitations, schemes can still employ mutual authentication regardless of how many
287:
application user-friendly, so many schemes work to accommodate the characteristic. Researchers note that a password based protocol with mutual authentication is important because user identities and passwords are still protected, as the messages are only readable to the two parties involved.
194:
Impersonation attacks refer to malicious attacks where a user or individual pretends to be an authorized user to gain unauthorized access to a system while feigning permission. When each party authenticates the other, they send each other a certificate that only the other party knows how to
355:
increases the chances of security risks, as there are now more digital elements to keep track of. A three way mutual authentication can occur between RFID tags, the tag readers, and the cloud network that stores this data in order to keep RFID tag data secure and unable to be manipulated.
222:(B2B) applications, where a limited number of programmatic and homogeneous clients are connecting to specific web services, the operational burden is limited, and security requirements are usually much higher as compared to consumer environments.
401:(MEC) is considered to be an improved, more lightweight fog-cloud computing networking system, and can be used for medical technology that also revolves around location-based data. Due to the large physical range required of locational tracking,
89:, they will both authenticate the other and verify that it is who they are expecting to communicate with before any data or messages are transmitted. A mutual authentication process that exchanges user IDs may be implemented as follows:
187:
or be identified as someone else. Mutual authentication can prevent spoofing attacks because the server will authenticate the user as well, and verify that they have the correct session key before allowing any further communication and
603:
Amin, Ruhul; Islam, SK Hafizul; Vijayakumar, Pandi; Khan, Muhammad
Khurram; Chang, Victor (2018). "A robust and efficient bilinear pairing based mutual authentication and session key verification over insecure communication".
140:(BAN logic) is a well regarded and widely accepted method to use, because it verifies that a message came from a trustworthy entity. BAN logic first assumes an entity is not to be trusted, and then will verify its legality.
290:
However, a negative aspect about password-based authentication is that password tables can take up a lot of memory space. One way around using a lot of memory during a password-based authentication scheme is to implement
80:
Schemes that have a mutual authentication step may use different methods of encryption, communication, and verification, but they all share one thing in common: each entity involved in the communication is verified. If
131:
At this point, both parties are verified to be who they claim to be and safe for the other to communicate with. Lastly, Alice and Bob will create a shared secret key so that they can continue communicating in a secure
1097:
Karuppiah, Marimuthu; Das, Ashok Kumar; Li, Xiong; Kumari, Saru; Wu, Fan; Chaudhry, Shehzad Ashraf; Niranchana, R. (2019). "Secure Remote User Mutual
Authentication Scheme with Key Agreement for Cloud Environment".
360:
not affect the whole system. Individual readers will communicate with specific tags during mutual authentication, which runs in constant time as readers use the same private key for the authentication process.
303:
Recently, more schemes have higher level authentication than password based schemes. While password-based authentication is considered as "single-factor authentication," schemes are beginning to implement
195:
unscramble, verifying themselves as a trusted source. In this way, adversaries cannot use impersonation attacks because they do not have the correct certificate to act as if they are the other party.
416:, keeping data about the car and its surrounding states secure. By authenticating the fog nodes and the vehicle, vehicular handoff becomes a safe process and the car’s system is safe from hackers.
295:(OTP), which is a password sent to the user via SMS or email. OTPs are time-sensitive, which means that they will expire after a certain amount of time and that memory does not need to be stored.
648:
Chen, Chin-Ling; Chiang, Mao-Lun; Hsieh, Hui-Ching; Liu, Ching-Cheng; Deng, Yong-Yuan (2020). "A Lightweight Mutual
Authentication with Wearable Device in Location-Based Mobile Edge Computing".
379:
are another way to store patient data collected remotely. Clouds are useful for storing large amounts of data, such as medical information, that can be accessed by many devices whenever needed.
518:
Chen, Liquan; Qian, Sijie; Lim, Ming; Wang, Shihui (2018). "An enhanced direct anonymous attestation scheme with mutual authentication for network-connected UAV communication systems".
166:
both the sender and recipient verify each other before sending them their message keys, so if one of the parties is not verified to be who they claim they are, the session will end.
312:) or biometric-based (three-factor) authentication schemes. Smart cards are simpler to implement and easy for authentication, but still have risks of being tampered with.
199:
Mutual authentication also ensures information integrity because if the parties are verified to be the correct source, then the information received is reliable as well.
175:
than the maximum allowed time delay, the session will be aborted. Similarly, messages can include a randomly generated number to keep track of when a message was sent.
1233:
Anandhi, S.; Anitha, R.; Sureshkumar, Venkatasamy (2020). "An
Authentication Protocol to Track an Object with Multiple RFID Tags Using Cloud Computing Environment".
391:
is one way that has been proposed to mutually authenticate the user to the database, by authenticating with the main mediBchain node and keeping patient anonymity.
894:
Narwal, Bhawna; Mohapatra, Amar Kumar (2020). "SEEMAKA: Secured Energy-Efficient Mutual
Authentication and Key Agreement Scheme for Wireless Body Area Networks".
754:
Sasikaladevi, N.; Malathi, D. (2019). "Energy
Efficient Lightweight Mutual Authentication Protocol (REAP) for MBAN Based on Genus-2 Hyper-Elliptic Curve".
688:
Sahoo, Shreeya
Swagatika; Mohanty, Sujata; Majhi, Banshidhar (2020). "Improved Biometric-Based Mutual Authentication and Key Agreement Scheme Using ECC".
387:(TMIS), an important way for medical patients to receive healthcare remotely, can ensure secured data with mutual authentication verification schemes.
1359:
Liu, Xiaoxue; Ma, Wenping; Cao, Hao (2019). "NPMA: A Novel
Privacy-Preserving Mutual Authentication in TMIS for Mobile Edge-Cloud Architecture".
558:
Jan, Mian Ahmad; Khan, Fazlullah; Alam, Muhammad; Usman, Muhammad (2019). "A payload-based mutual authentication scheme for
Internet of Things".
274:
Schemes may sacrifice a better runtime or storage cost when ensuring mutual authentication in order to prioritize protecting the sensitive data.
282:
In mutual authentication schemes that require a user's input password as part of the verification process, there is a higher vulnerability to
1062:
Karuppiah, Marimuthu; Saravanan, R. (2015). "Cryptanalysis and an
Improvement of New Remote Mutual Authentication Scheme using Smart Cards".
137:
424:
Many systems that do not require a human user as part of the system also have protocols that mutually authenticate between parties. In
1413:
460:
Chen, Yulei; Chen, Jianhua (2020). "A secure three-factor-based authentication with key agreement protocol for e-Health clouds".
397:
is a networking system that can handle large amounts of data, but still has limitations regarding computational and memory cost.
252:
Thus, it becomes a desired characteristic of many mutual authentication schemes to have lightweight properties (e.g. have a low
1408:
848:
Melki, Reem; Noura, Hassan N.; Chehab, Ali (2020). "Lightweight multi-factor mutual authentication protocol for IoT devices".
348:
53:
Mutual authentication is a desired characteristic in verification schemes that transmit sensitive data, in order to ensure
409:
that track patient health data can be used to call the nearest hospital if the patient shows a negative change in vitals.
309:
27:
1309:"MBPA: A Medibchain-Based Privacy-Preserving Mutual Authentication in TMIS for Mobile Medical Cloud Architecture"
1269:
726:
208:
156:
47:
425:
35:
796:"A Mutual Authentication Scheme for Secure Fog Computing Service Handover in Vehicular Network Environment"
330:
62:
1171:"MAKE-IT—A Lightweight Mutual Authentication and Key Exchange Protocol for Industrial Internet of Things"
398:
39:
1320:
1182:
1009:
807:
413:
219:
149:
341:
Mutual authentication can be satisfied in radio network schemes, where data transmissions through
1384:
1338:
1289:
1250:
1115:
1079:
911:
865:
825:
771:
705:
665:
621:
585:
535:
485:
437:
384:
326:
246:
184:
118:
Alice checks the format and timestamp. If either is incorrect or invalid, the session is aborted.
93:
Alice sends an message encrypted with Bob's public key to Bob to show that Alice is a valid user.
69:
183:
Spoofing attacks rely on using false data to pose as another user in order to gain access to a
99:
Bob checks the format and timestamp. If either is incorrect or invalid, the session is aborted.
1376:
1210:
1037:
946:
477:
364:
292:
212:
1368:
1328:
1281:
1242:
1200:
1190:
1149:
1107:
1071:
1027:
1017:
938:
903:
857:
815:
763:
697:
657:
613:
575:
567:
527:
469:
268:
253:
256:) in order to accommodate the system that is storing a lot of data. Many systems implement
376:
352:
342:
257:
178:
57:. Mutual authentication can be accomplished with two types of credentials: usernames and
1324:
1186:
1013:
998:"Mutual Authentication Protocol for D2D Communications in a Cloud-Based E-Health System"
811:
1205:
1170:
1032:
997:
230:
31:
1402:
1388:
1342:
1293:
1254:
915:
869:
829:
775:
709:
669:
489:
394:
226:
169:
162:
86:
82:
54:
1119:
1083:
965:
625:
589:
539:
43:
1075:
571:
363:
Many e-Healthcare systems that remotely monitor patient health data use wireless
124:
Alice checks if the message matches a valid user. If not, the session is aborted.
1333:
1308:
1169:
Choudhary, Karanjeet; Gaba, Gurjot Singh; Butun, Ismail; Kumar, Pardeep (2020).
820:
795:
1246:
930:
907:
861:
767:
701:
661:
473:
105:
Bob checks if the message matches a valid user. If not, the session is aborted.
1372:
1285:
1111:
942:
617:
406:
388:
313:
305:
950:
481:
531:
152:
because it can protect communications against adversarial attacks, notably:
1380:
1214:
1041:
1270:"Privacy-Preserving Mutual Authentication in RFID with Designated Readers"
405:
can send data to the edge of the cloud to store data. An application like
380:
121:
Then, the message is decrypted with Alice's secret key, giving Bob's ID.
58:
580:
102:
The message is then decrypted with Bob's secret key, giving Alice's ID.
1195:
1022:
1154:
1137:
283:
1138:"Two-factor authentication using biometric based quantum operations"
211:
protocol only proves the identity of the server to the client using
161:
Man-in-the-middle (MITM) attacks are when a third party wishes to
1268:
Guo, Fuchun; Mu, Yi; Susilo, Willy; Varadharajan, Vijay (2017).
325:
Mutual authentication is often found in schemes employed in the
234:
136:
To verify that mutual authentication has occurred successfully,
112:
Bob sends Alice a message back to show that Bob is a valid user.
261:
38:. It is a default mode of authentication in some protocols (
402:
1064:
Journal of Discrete Mathematical Sciences and Cryptography
966:"The Transport Layer Security (TLS) Protocol Version 1.2"
218:
Mutual TLS authentication (mTLS) is more often used in
16:
Two parties authenticating each other at the same time
245:
While lightweight schemes and secure schemes are not
727:"Mutual TLS: Securing Microservices in Service Mesh"
345:
are secure after verifying the sender and receiver.
996:g. Lopes, Ana Paula; Gondim, Paulo R. L. (2020).
321:Certificate based schemes and system applications
68:Mutual authentication is often employed in the
850:International Journal of Information Security
8:
1307:Liu, Xiaoxue; Ma, Wenping; Cao, Hao (2019).
1136:Sharma, Mohit Kr; Nene, Manisha J. (2020).
931:"HCI for Cybersecurity, Privacy and Trust"
1332:
1204:
1194:
1153:
1031:
1021:
819:
794:Dewanta, Favian; Mambo, Masahiro (2019).
579:
412:Fog node networks can be implemented in
449:
241:Lightweight schemes vs. secured schemes
1354:
1352:
1228:
1226:
1224:
1131:
1129:
1057:
1055:
1053:
1051:
991:
989:
987:
985:
889:
887:
885:
883:
881:
879:
843:
841:
839:
721:
719:
553:
551:
549:
455:
453:
7:
789:
787:
785:
749:
747:
683:
681:
679:
643:
641:
639:
637:
635:
513:
511:
509:
507:
505:
503:
501:
499:
333:to verify each other's identities.
560:Future Generation Computer Systems
438:Two types of Mutual Authentication
317:authentication factors are added.
34:each other at the same time in an
14:
935:Lecture Notes in Computer Science
606:Multimedia Tools and Applications
267:Applications that solely rely on
1274:Wireless Personal Communications
1235:Wireless Personal Communications
1100:Mobile Networks and Applications
896:Wireless Personal Communications
756:Wireless Personal Communications
690:Wireless Personal Communications
650:Wireless Personal Communications
420:Machine to machine verification
148:Mutual authentication supports
349:Radio frequency identification
76:Process steps and verification
1:
1076:10.1080/09720529.2015.1013693
462:The Journal of Supercomputing
229:-based applications based on
929:Moallem, Abbas, ed. (2021).
572:10.1016/j.future.2017.08.035
115:Alice verifies the message:
1334:10.1109/ACCESS.2019.2947313
964:Dierks, Tim (August 2008).
821:10.1109/ACCESS.2019.2931217
299:Multi-factor authentication
264:used during communication.
237:, via systems like SPIFFE.
138:Burrows-Abadi-Needham logic
1430:
1361:Journal of Medical Systems
1247:10.1007/s11277-020-07330-1
908:10.1007/s11277-020-07304-3
862:10.1007/s10207-019-00484-5
768:10.1007/s11277-019-06693-4
702:10.1007/s11277-019-06897-8
662:10.1007/s11277-020-07240-2
474:10.1007/s11227-020-03395-8
85:wants to communicate with
46:) and optional in others (
1373:10.1007/s10916-019-1444-9
1286:10.1007/s11277-017-4430-x
1112:10.1007/s11036-018-1061-8
943:10.1007/978-3-030-77392-2
618:10.1007/s11042-017-4996-z
28:two-factor authentication
26:(not to be confused with
157:Man-in-the-middle attack
30:) refers to two parties
1414:Computer access control
532:10.1109/CC.2018.8387987
426:unmanned aerial vehicle
63:public key certificates
36:authentication protocol
1409:Authentication methods
278:Password-based schemes
96:Bob verifies message:
24:two-way authentication
399:Mobile edge computing
371:Cloud based computing
225:mTLS is also used in
191:Impersonation attacks
150:zero trust networking
20:Mutual authentication
1142:Security and Privacy
520:China Communications
220:business-to-business
1325:2019IEEEA...7n9282L
1187:2020Senso..20.5166C
1014:2020Senso..20.2072G
812:2019IEEEA...7j3095D
395:Fog-cloud computing
385:Information Systems
612:(9): 11041–11066.
365:body area networks
327:Internet of Things
293:one-time passwords
247:mutually exclusive
213:X.509 certificates
70:Internet of Things
1319:: 149282–149298.
1196:10.3390/s20185166
1023:10.3390/s20072072
806:: 103095–103114.
343:radio frequencies
1421:
1393:
1392:
1356:
1347:
1346:
1336:
1304:
1298:
1297:
1280:(3): 4819–4845.
1265:
1259:
1258:
1241:(4): 2339–2361.
1230:
1219:
1218:
1208:
1198:
1166:
1160:
1159:
1157:
1155:10.1002/spy2.102
1133:
1124:
1123:
1106:(3): 1046–1062.
1094:
1088:
1087:
1059:
1046:
1045:
1035:
1025:
993:
980:
979:
977:
976:
961:
955:
954:
926:
920:
919:
902:(4): 1985–2008.
891:
874:
873:
845:
834:
833:
823:
791:
780:
779:
762:(4): 2471–2488.
751:
742:
741:
739:
738:
723:
714:
713:
685:
674:
673:
645:
630:
629:
600:
594:
593:
583:
555:
544:
543:
515:
494:
493:
468:(4): 3359–3380.
457:
269:device-to-device
254:memory footprint
1429:
1428:
1424:
1423:
1422:
1420:
1419:
1418:
1399:
1398:
1397:
1396:
1358:
1357:
1350:
1306:
1305:
1301:
1267:
1266:
1262:
1232:
1231:
1222:
1168:
1167:
1163:
1135:
1134:
1127:
1096:
1095:
1091:
1061:
1060:
1049:
995:
994:
983:
974:
972:
963:
962:
958:
928:
927:
923:
893:
892:
877:
847:
846:
837:
793:
792:
783:
753:
752:
745:
736:
734:
725:
724:
717:
696:(2): 991–1017.
687:
686:
677:
647:
646:
633:
602:
601:
597:
557:
556:
547:
517:
516:
497:
459:
458:
451:
446:
434:
422:
373:
339:
323:
301:
280:
258:cloud computing
243:
207:By default the
205:
179:Spoofing attack
146:
78:
17:
12:
11:
5:
1427:
1425:
1417:
1416:
1411:
1401:
1400:
1395:
1394:
1348:
1299:
1260:
1220:
1161:
1125:
1089:
1070:(5): 623–649.
1047:
981:
970:tools.ietf.org
956:
921:
875:
856:(6): 679–694.
835:
781:
743:
715:
675:
631:
595:
545:
495:
448:
447:
445:
442:
441:
440:
433:
432:External links
430:
421:
418:
414:car automation
372:
369:
338:
337:Radio networks
335:
322:
319:
300:
297:
279:
276:
242:
239:
204:
201:
197:
196:
192:
189:
181:
176:
172:
167:
159:
145:
142:
134:
133:
129:
128:
127:
126:
125:
119:
113:
110:
109:
108:
107:
106:
100:
94:
77:
74:
32:authenticating
15:
13:
10:
9:
6:
4:
3:
2:
1426:
1415:
1412:
1410:
1407:
1406:
1404:
1390:
1386:
1382:
1378:
1374:
1370:
1366:
1362:
1355:
1353:
1349:
1344:
1340:
1335:
1330:
1326:
1322:
1318:
1314:
1310:
1303:
1300:
1295:
1291:
1287:
1283:
1279:
1275:
1271:
1264:
1261:
1256:
1252:
1248:
1244:
1240:
1236:
1229:
1227:
1225:
1221:
1216:
1212:
1207:
1202:
1197:
1192:
1188:
1184:
1180:
1176:
1172:
1165:
1162:
1156:
1151:
1147:
1143:
1139:
1132:
1130:
1126:
1121:
1117:
1113:
1109:
1105:
1101:
1093:
1090:
1085:
1081:
1077:
1073:
1069:
1065:
1058:
1056:
1054:
1052:
1048:
1043:
1039:
1034:
1029:
1024:
1019:
1015:
1011:
1007:
1003:
999:
992:
990:
988:
986:
982:
971:
967:
960:
957:
952:
948:
944:
940:
936:
932:
925:
922:
917:
913:
909:
905:
901:
897:
890:
888:
886:
884:
882:
880:
876:
871:
867:
863:
859:
855:
851:
844:
842:
840:
836:
831:
827:
822:
817:
813:
809:
805:
801:
797:
790:
788:
786:
782:
777:
773:
769:
765:
761:
757:
750:
748:
744:
732:
731:The New Stack
728:
722:
720:
716:
711:
707:
703:
699:
695:
691:
684:
682:
680:
676:
671:
667:
663:
659:
655:
651:
644:
642:
640:
638:
636:
632:
627:
623:
619:
615:
611:
607:
599:
596:
591:
587:
582:
577:
573:
569:
566:: 1028–1039.
565:
561:
554:
552:
550:
546:
541:
537:
533:
529:
525:
521:
514:
512:
510:
508:
506:
504:
502:
500:
496:
491:
487:
483:
479:
475:
471:
467:
463:
456:
454:
450:
443:
439:
436:
435:
431:
429:
427:
419:
417:
415:
410:
408:
407:smart watches
404:
400:
396:
392:
390:
386:
382:
378:
375:e-Healthcare
370:
368:
366:
361:
357:
354:
350:
346:
344:
336:
334:
332:
328:
320:
318:
315:
311:
307:
298:
296:
294:
288:
285:
277:
275:
272:
270:
265:
263:
259:
255:
250:
248:
240:
238:
236:
232:
228:
227:microservices
223:
221:
216:
214:
210:
202:
200:
193:
190:
186:
182:
180:
177:
173:
171:
170:Replay attack
168:
164:
160:
158:
155:
154:
153:
151:
143:
141:
139:
130:
123:
122:
120:
117:
116:
114:
111:
104:
103:
101:
98:
97:
95:
92:
91:
90:
88:
84:
75:
73:
71:
66:
64:
60:
56:
55:data security
51:
49:
45:
41:
37:
33:
29:
25:
21:
1364:
1360:
1316:
1312:
1302:
1277:
1273:
1263:
1238:
1234:
1181:(18): 5166.
1178:
1174:
1164:
1145:
1141:
1103:
1099:
1092:
1067:
1063:
1005:
1001:
973:. Retrieved
969:
959:
934:
924:
899:
895:
853:
849:
803:
799:
759:
755:
735:. Retrieved
733:. 2021-02-01
730:
693:
689:
653:
649:
609:
605:
598:
581:10453/117906
563:
559:
526:(5): 61–76.
523:
519:
465:
461:
423:
411:
393:
374:
362:
358:
353:cloud server
347:
340:
331:certificates
324:
302:
289:
281:
273:
266:
251:
244:
224:
217:
206:
198:
147:
135:
79:
67:
52:
23:
19:
18:
1367:(10): 318.
1313:IEEE Access
1008:(7): 2072.
800:IEEE Access
656:: 575–598.
403:5G networks
1403:Categories
975:2016-04-22
737:2021-02-20
444:References
389:Blockchain
314:Biometrics
310:two-factor
306:smart card
1389:202570185
1343:204863294
1294:207264759
1255:219070999
951:0302-9743
916:216529906
870:209340123
830:199509951
776:204084523
710:208125038
670:218934756
490:221146362
482:0920-8542
163:eavesdrop
59:passwords
1381:31522286
1215:32927788
1120:64720667
1084:62591965
1042:32272675
626:13674284
590:57380203
540:49333360
383:Medical
381:Telecare
233:such as
231:runtimes
144:Defenses
1321:Bibcode
1206:7570918
1183:Bibcode
1175:Sensors
1033:7181216
1010:Bibcode
1002:Sensors
808:Bibcode
284:hackers
188:access.
132:manner.
1387:
1379:
1341:
1292:
1253:
1213:
1203:
1118:
1082:
1040:
1030:
949:
914:
868:
828:
774:
708:
668:
624:
588:
538:
488:
480:
377:clouds
185:server
61:, and
1385:S2CID
1339:S2CID
1290:S2CID
1251:S2CID
1148:(3).
1116:S2CID
1080:S2CID
912:S2CID
866:S2CID
826:S2CID
772:S2CID
706:S2CID
666:S2CID
622:S2CID
586:S2CID
536:S2CID
486:S2CID
83:Alice
1377:PMID
1211:PMID
1038:PMID
947:ISSN
478:ISSN
262:bits
235:Dapr
203:mTLS
1369:doi
1329:doi
1282:doi
1243:doi
1239:113
1201:PMC
1191:doi
1150:doi
1108:doi
1072:doi
1028:PMC
1018:doi
939:doi
904:doi
900:113
858:doi
816:doi
764:doi
760:109
698:doi
694:111
658:doi
654:113
614:doi
576:hdl
568:doi
528:doi
470:doi
209:TLS
87:Bob
50:).
48:TLS
44:SSH
40:IKE
22:or
1405::
1383:.
1375:.
1365:43
1363:.
1351:^
1337:.
1327:.
1315:.
1311:.
1288:.
1278:96
1276:.
1272:.
1249:.
1237:.
1223:^
1209:.
1199:.
1189:.
1179:20
1177:.
1173:.
1144:.
1140:.
1128:^
1114:.
1104:24
1102:.
1078:.
1068:18
1066:.
1050:^
1036:.
1026:.
1016:.
1006:20
1004:.
1000:.
984:^
968:.
945:.
937:.
933:.
910:.
898:.
878:^
864:.
854:19
852:.
838:^
824:.
814:.
802:.
798:.
784:^
770:.
758:.
746:^
729:.
718:^
704:.
692:.
678:^
664:.
652:.
634:^
620:.
610:77
608:.
584:.
574:.
564:92
562:.
548:^
534:.
524:15
522:.
498:^
484:.
476:.
466:77
464:.
452:^
65:.
42:,
1391:.
1371::
1345:.
1331::
1323::
1317:7
1296:.
1284::
1257:.
1245::
1217:.
1193::
1185::
1158:.
1152::
1146:3
1122:.
1110::
1086:.
1074::
1044:.
1020::
1012::
978:.
953:.
941::
918:.
906::
872:.
860::
832:.
818::
810::
804:7
778:.
766::
740:.
712:.
700::
672:.
660::
628:.
616::
592:.
578::
570::
542:.
530::
492:.
472::
308:(
Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.