Search the World's Largest Database of Information Science & Technology Terms & Definitions
InfInfoScipedia LogoScipedia
A Free Service of IGI Global Publishing House
Below please find a list of definitions for the term that
you selected from multiple scholarly research resources.

What is User Impersonation Attack

Recent Advancements in Smart Remote Patient Monitoring, Wearable Devices, and Diagnostics Systems
In an impersonation attack, an attacker records information being transmitted by an authentic user and attempts to imitate as a legal user. If a malevolent entity is successful in impersonating as a legitimate user, he will get access to sensitive information of the user.
Published in Chapter:
Robust User Authentication Scheme for IoT-Based Healthcare Applications
Geeta Sharma (Lovely Professional University, India) and Gursimrat Singh (University Health Network, Canada)
DOI: 10.4018/978-1-6684-6434-2.ch008
Abstract
Cloud technology and internet of things (IoT) is a quickly developing computing technology through which resources are shared via internet. IoT facilitates seamless interactions between humans and heterogeneous devices including personalized healthcare systems. It has the potential to provide ensure supervision of the elderly, telemonitoring, teleconsultations, and computer-assisted rehabilitation. These healthcare services allow easy access of patient data in real time. However, IoT-based remote patient monitoring and other healthcare applications are growing fast; the hurdle to its growth is security. This chapter proposes a novel remote user authentication scheme for IoT-enabled healthcare applications. The scheme is lightweight and robust to attacks and also has low computational overhead. The proposed scheme satisfies the desired essential attributes of security. A formal verification performed using ProVerif proves the security of the scheme.
Full Text Chapter Download: US $37.50 Add to Cart
eContent Pro Discount Banner
InfoSci OnDemandECP Editorial ServicesAGOSR