The health monitoring server sends a notice message which
shows the receiving information of the patient Alice to the
doctor Bob. Registered Bob enters the health monitoring server
with the password PWDB. After the health monitoring server medical sensor networks. However, deploying new
technologies in healthcare applications without considering
security makes patient privacy vulnerable as in Huang et al.’s
scheme. Moreover, the physiological data of an individual are
highly sensitive. Therefore, security is a paramount
requirement of healthcare applications, especially in the case of
patient privacy, if the patient has an embarrassing disease.