|
Existing works | Publication year | Techniques | Drawbacks |
|
Liu et al. [10] | 2014 | Certificateless signature scheme | Lack of traceability of confidential information |
Ibrahim et al. [11] | 2016 | Anonymity preservation of the patient’s sensor | Confidentiality of the user data is not preserved |
Zhao et al. [12] | 2016 | Healthcare oriented blockchain scheme | No transfer authentication protocol |
Debiao et al. [13] | 2017 | Authentication with provable security for WBAN | Confidentiality and traceability of the confidential data are not addressed |
Li et al. [14] | 2017 | Unlinkable, confidentiality preserving authentication scheme | Computational cost for authenticating the patients is high |
Li et al. [15] | 2017 | Single round method scheme for BAN | Lacks traceability of patient’s confidential data |
Luo et al. [16] | 2018 | Privacy protector scheme for IoT-based healthcare | Confidential data loss |
Shen et al. [17] | 2018 | Cloud-based authentication protocol for healthcare | Vulnerable to different types of security threats |
Li et al. [18] | 2018 | RFID based authentication | Message eavesdropping and tag forgery attack |
D. Deebak et al. [19] | 2019 | RFID authentication based on hash | Denial of service and data forgery attack |
Alzahrani et al. [20] | 2020 | Anonymous WBAN valid key agreement scheme | It lacks confidentiality of the information transferred |
Jabeen et al. [21] | 2020 | Genetic algorithm based scheme | Increase in the computational cost analysis |
Rehman et al. [22] | 2020 | Authentication scheme based on reliable base node | Several attacks like compromise attack and impersonation attack |
Amjad et al. [23] | 2020 | Optimization scheme for WBAN | Relative authentication or the security of data during transmission is not discussed |
Kumar et al. [24] | 2021 | Trust assessment without encryption techniques | Complexity increases due to trust evaluator |
Lara et al. [25] | 2021 | Two-party authentication scheme | The end-users need to be authenticated every time |
Ning et al. [26] | 2021 | Edge computing 5G scheme | Authentication and privacy are not focused |
Kumar and Chand [27] | 2021 | Cloud computing scheme for WBAN | Privacy leakage and security threats |
Guo et al. [28] | 2021 | Homomorphic cryptosystem scheme | Mutual authentication between the end-users is not provided |
|