Review Article
[Retracted] Biometric Authentication for Intelligent and Privacy-Preserving Healthcare Systems
Table 5
Different types of attacks: authentication and privacy-preserving healthcare systems.
| Reference | Year | Attacks | Description |
| [37] | 2012 | Dictionary and password guessing attack | Guessing the password from a password list | [38] | 2013 | Denial of service | Denying service to the user by creating unnecessary traffic | [20] | 2012 | Impersonation attacks | Impersonating to be someone and stealing information | [39] | 2013 | Patient anonymity violation | Exploiting the hidden identity of the patient | [40] | 2014 | Spoofing | The act of misrepresenting a communication from an unknown source as coming from a recognized, reliable source. | [22] | 2012 | Malware infusion | Ingesting malware into the system so that it does not work properly | [23] | 2016 | Man in the middle | Capturing and listening to the information being passed from the sender to the receiver and vice versa. | [21] | 2015 | Tracing attacks | In each session, the patient uses the same identifier, leading to the disclosure of private information. |
|
|