[1]世界卫生组织. 2020—2025年数字卫生保健 全球战略[EBOL]. 2021 [20250101]. https:iris.who.intbitstreamhandle106653442499789240027633chi.pdf[2]Kumar P, Lee S G, Lee H J. ESAP: Efficientstrong authentication protocol for healthcare applications using wireless medical sensor networks[J]. Sensors, 2012, 12(2): 16251647[3]He D, Kumar N, Chen J, et al. Robust anonymous authentication protocol for healthcare applications using wireless medical sensor networks[J]. Multimedia Systems, 2015, 21: 4960[4]Li X, Niu J, Kumari S, et al. A new authentication protocol for healthcare applications using wireless medical sensor networks with user anonymity[J]. Security and Communication Networks, 2016, 9(15): 26432655[5]Das A K,Sutrala A K, Odelu V, et al. A secure smartcardbased anonymous user authentication scheme for healthcare applications using wireless medical sensor networks[J]. Wireless Personal Communications, 2017, 94: 18991933[6]Gope P, Hwang T. BSNCare: A secure IoTbased modern healthcare system using body sensor network[J]. IEEE Sensors Journal, 2015, 16(5): 13681376[7]Wu F, Xu L, Kumari S, et al. AniMSroved and anonymous twofactor authentication protocol for healthcare applications with wireless medical sensor networks[J]. Multimedia Systems, 2017, 23: 195205[8]Srinivas J, Mishra D, Mukhopadhyay S. A mutual authentication framework for wireless medical sensor networks[J]. Journal of Medical Systems, 2017, 41: 119[9]Amin R, Islam S K H, Biswas G P, et al. A robust and anonymous patient monitoring system using wireless medical sensor networks[J]. Future Generation CoMSuter Systems, 2018, 80: 483495[10]Jiang Q, Ma J, Yang C, et al. Efficient endtoend authentication protocol for wearable health monitoring systems[J].CoMSuters & Electrical Engineering, 2017, 63: 182195[11]Mo J, Hu Z, Lin Y. Cryptanalysis and security iMSrovement of two authentication schemes for healthcare systems using wireless medical sensor networks[J]. Security and Communication Networks, 2020, 2020(1): 111[12]Fotouhi M, Bayat M, Das A K, et al. A lightweight and secure twofactor authentication scheme for wireless body area networks in healthcare IoT[J].CoMSuter Networks, 2020, 177: 107333[13]Wu F, Li X, Sangaiah A K, et al. A lightweight and robust twofactor authentication scheme for personalized healthcare systems using wireless medical sensor networks[J]. Future Generation Computer Systems, 2018, 82: 727737[14]Masud M, Gaba G S, Alqahtani S, et al. A lightweight and robust secure key establishment protocol for Internet of medical things in COVID19 patients care[J]. IEEE Internet of Things Journal, 2020, 8(21): 1569415703[15]Li J, Su Z, Guo D, et al. PSLMAAKA: Provably secure and lightweight mutual authentication and key agreement protocol for fully public channels in Internet of medical things[J]. IEEE Internet of Things Journal, 2021, 8(17): 1318313195[16]Aman M N, Chua K C, Sikdar B. Mutual authentication in IoT systems using physical unclonable functions[J]. IEEE Internet of Things Journal, 2017, 4(5): 13271340[17]Mishra D, Das A K, Mukhopadhyay S. A secure user anonymitypreserving biometricbased multiserver authenticated key agreement scheme using smart cards[J]. Expert Systems with Applications, 2014, 41(18): 81298143[18]Wang W, Chen Q, Yin Z, et al. Blockchain and PUFbased lightweight authentication protocol for wireless medical sensor networks[J]. IEEE Internet of Things Journal, 2021, 9(11): 88838891[19]Yu S, Park Y. A robust authentication protocol for wireless medical sensor networks using blockchain and physically unclonable functions[J]. IEEE Internet of Things Journal, 2022, 9(20): 2021420228[20]Gao Y, AlSarawi S F, Abbott D. Physical unclonable functions[J]. Nature Electronics, 2020, 3(2): 8191[21]Kamal K Y, Muresan R. Mixedsignal physically unclonable function with CMOS capacitive cells[J]. IEEE Access, 2019, 7: 130977130998[22]Jin A T B, Ling D N C, Goh A. Biohashing: Two factor authentication featuring fingerprint data and tokenised random number[J]. Pattern Recognition, 2004, 37(11): 22452255[23]Messerges T S, Dabbish E A, Sloan R H. Examining smartcard security under the threat of power analysis attacks[J]. IEEE Trans on Computers, 2002, 51(5): 541552[24]王晨宇, 汪定, 王菲菲, 等. 面向多网关的无线传感器网络多因素认证协议[J]. 计算机学报, 2020, 43(4): 683700 |