Research Article
Cryptanalysis and Security Improvement of Two Authentication Schemes for Healthcare Systems Using Wireless Medical Sensor Networks
| Notation | Description |
| Ui | ith user | RA | Registration agent | GWN | Gateway node | Sj | jth sensor node | IDi | The identity of Ui | SIDj | The identity of Sj | PWi | The password of Ui | BIOi | Ui’s biometrics | ⊕ | The bitwise XOR operation | || | The concatenation operation | ⟹ | The secure channel | ⟶ | The public channel | h() | A secure one-way hash function | H() | Bio-hash function | Ek()/Dk() | The symmetric encryption/decryption function with key k | Ti | The current timestamp, i = 1, 2, … | MD | Mobile device of Ui | MIDi | Temporary identity of Ui | | The identity of GWN | NCk0 | Serial number in GWN side | NCk | Serial number in Sj side |
|
|