咨询与建议

看过本文的还看了

相关文献

该作者的其他文献

文献详情 >Amassing the Security:An Enhan... 收藏

Amassing the Security:An Enhanced Authentication and Key Agreement Protocol for Remote Surgery in Healthcare Environment

作     者:Tsu-Yang Wu Qian Meng Lei Yang Saru Kumari Matin Pirouz 

作者机构:Shandong University of Science and TechnologyQingdao266400China Chaudhary Charan Singh UniversityMeerutUttar Pradesh250004India California State UniversityFresno93740USA 

出 版 物:《工程与科学中的计算机建模(英文)》 (Computer Modeling in Engineering & Sciences)

年 卷 期:2023年第134卷第1期

页      面:317-341页

核心收录:

学科分类:0710[理学-生物学] 11[军事学] 1105[军事学-军队指挥学] 1002[医学-临床医学] 1001[医学-基础医学(可授医学、理学学位)] 0839[工学-网络空间安全] 08[工学] 0837[工学-安全科学与工程] 110505[军事学-密码学] 0811[工学-控制科学与工程] 110503[军事学-军事通信学] 0812[工学-计算机科学与技术(可授工学、理学学位)] 

主  题:IoT healthcare security analysis authentication robotic arm ROR 

摘      要:The development of the Internet of Things has facilitated the rapid development of various *** the improvement in people’s living standards,people’s health requirements are steadily ***,owing to the scarcity of medical and health care resources in some areas,the demand for remote surgery has gradually *** this paper,we investigate remote surgery in the healthcare *** can operate robotic arms to perform remote surgery for patients,which substantially facilitates successful surgeries and saves ***,Kamil et *** a secure protocol for surgery in the healthcare ***,after cryptanalyzing their protocol,we deduced that their protocols are vulnerable to temporary value disclosure and insider ***,we design an improved authentication and key agreement protocol for remote surgeries in the healthcare ***,we adopt the real or random(ROR)model and an automatic verification tool Proverif to verify the security of our *** security analysis and performance comparison,it is confirmed that our protocol is a relatively secure protocol.

读者评论 与其他读者分享你的观点

用户名:未登录
我的评分