Research Article

An Anonymous Blockchain-Based Authentication Scheme for Secure Healthcare Applications

Table 1

Summary of different existing works.

Existing worksPublication yearTechniquesDrawbacks

Liu et al. [10]2014Certificateless signature schemeLack of traceability of confidential information
Ibrahim et al. [11]2016Anonymity preservation of the patient’s sensorConfidentiality of the user data is not preserved
Zhao et al. [12]2016Healthcare oriented blockchain schemeNo transfer authentication protocol
Debiao et al. [13]2017Authentication with provable security for WBANConfidentiality and traceability of the confidential data are not addressed
Li et al. [14]2017Unlinkable, confidentiality preserving authentication schemeComputational cost for authenticating the patients is high
Li et al. [15]2017Single round method scheme for BANLacks traceability of patient’s confidential data
Luo et al. [16]2018Privacy protector scheme for IoT-based healthcareConfidential data loss
Shen et al. [17]2018Cloud-based authentication protocol for healthcareVulnerable to different types of security threats
Li et al. [18]2018RFID based authenticationMessage eavesdropping and tag forgery attack
D. Deebak et al. [19]2019RFID authentication based on hashDenial of service and data forgery attack
Alzahrani et al. [20]2020Anonymous WBAN valid key agreement schemeIt lacks confidentiality of the information transferred
Jabeen et al. [21]2020Genetic algorithm based schemeIncrease in the computational cost analysis
Rehman et al. [22]2020Authentication scheme based on reliable base nodeSeveral attacks like compromise attack and impersonation attack
Amjad et al. [23]2020Optimization scheme for WBANRelative authentication or the security of data during transmission is not discussed
Kumar et al. [24]2021Trust assessment without encryption techniquesComplexity increases due to trust evaluator
Lara et al. [25]2021Two-party authentication schemeThe end-users need to be authenticated every time
Ning et al. [26]2021Edge computing 5G schemeAuthentication and privacy are not focused
Kumar and Chand [27]2021Cloud computing scheme for WBANPrivacy leakage and security threats
Guo et al. [28]2021Homomorphic cryptosystem schemeMutual authentication between the end-users is not provided