Review Article

[Retracted] Biometric Authentication for Intelligent and Privacy-Preserving Healthcare Systems

Table 5

Different types of attacks: authentication and privacy-preserving healthcare systems.

ReferenceYearAttacksDescription

[37]2012Dictionary and password guessing attackGuessing the password from a password list
[38]2013Denial of serviceDenying service to the user by creating unnecessary traffic
[20]2012Impersonation attacksImpersonating to be someone and stealing information
[39]2013Patient anonymity violationExploiting the hidden identity of the patient
[40]2014SpoofingThe act of misrepresenting a communication from an unknown source as coming from a recognized, reliable source.
[22]2012Malware infusionIngesting malware into the system so that it does not work properly
[23]2016Man in the middleCapturing and listening to the information being passed from the sender to the receiver and vice versa.
[21]2015Tracing attacksIn each session, the patient uses the same identifier, leading to the disclosure of private information.