4.5 Article

Provably secure certificateless protocol for wireless body area network

Related references

Note: Only part of the references are listed.
Article Computer Science, Hardware & Architecture

A Certificateless Authentication and Key Agreement Scheme for Secure Cloud-assisted Wireless Body Area Network

Qingfeng Cheng et al.

Summary: This research identifies security risks in a cloud-assisted authentication protocol and designs a new anonymous certificateless authentication scheme to ensure secure communication between devices and cloud servers.

MOBILE NETWORKS & APPLICATIONS (2022)

Article Telecommunications

LAKA: Lightweight Authentication and Key Agreement Protocol for Internet of Things Based Wireless Body Area Network

Mukesh Soni et al.

Summary: The concept of wireless body area network in the medical field is crucial for exchanging health data efficiently. A proposed secure and lightweight health authentication and key agreement protocol reduces security risks and communication overhead in WBAN communications.

WIRELESS PERSONAL COMMUNICATIONS (2022)

Article Computer Science, Hardware & Architecture

A blockchain-based secure data-sharing framework for Software Defined Wireless Body Area Networks

Khalid Hasan et al.

Summary: In recent years, the combination of blockchain and IoT has brought about digital transformation and secure data sharing in various fields. Integrating blockchain with programmable Software-Defined Networks can greatly improve healthcare management services. However, sharing sensitive information in healthcare systems faces challenges. To address this, we propose an architectural framework that combines blockchain with Software-Defined Wireless Body Area Networks to facilitate secure data sharing, and we design a smart contract-based access control policy.

COMPUTER NETWORKS (2022)

Article Computer Science, Information Systems

O3HSC: Outsourced Online/Offline Hybrid Signcryption for Wireless Body Area Networks

Suhui Liu et al.

Summary: This paper proposes an outsourced online/offline hybrid encryption signature scheme that utilizes attribute-based encryption and identity-based ring signature, achieving data confidentiality and fine-grained access control, as well as increasing the throughput of the central authority and saving power resources of mobile devices.

IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT (2022)

Article Computer Science, Information Systems

Efficient Anonymous Authentication for Wireless Body Area Networks

Chuang Li et al.

Summary: Advances in integrated circuit and wireless communication technologies have made wireless body area networks (WBANs) increasingly important in the medical field. This paper proposes a identity-based authenticated encryption method without pairing, and based on this method, constructs an anonymous authentication scheme. The subsequent security and performance analysis demonstrates that the proposed schemes are secure (including forward anonymity) under the random oracle model, and practical in WBANs with limited resources.

IEEE ACCESS (2022)

Article Computer Science, Information Systems

An efficient anonymous authentication and confidentiality preservation schemes for secure communications in wireless body area networks

Maria Azees et al.

Summary: WBAN is utilized for exchanging biological data between patients and doctors through a network of implantable or wearable medical sensors, providing suitable medical services. Secure anonymous authentication and confidentiality preservation schemes are essential for ensuring safe data transmission and play a significant role in maintaining security levels.

WIRELESS NETWORKS (2021)

Article Computer Science, Information Systems

Efficient Certificateless Online/Offline Signature Scheme for Wireless Body Area Networks

Cong Peng et al.

Summary: This article proposes an efficient certificateless online/offline signature scheme for wireless body area networks (WBANs), demonstrating high security and performance with low computational cost. Compared to other approaches, the proposed scheme significantly reduces computational cost for offline signers (up to 89%) and supports batch verification to reduce the verifier's execution time. Additionally, the signature size of the proposed scheme is similar to conventional signature schemes.

IEEE INTERNET OF THINGS JOURNAL (2021)

Article Computer Science, Information Systems

An elliptic curve cryptography based enhanced anonymous authentication protocol for wearable health monitoring systems

K. Sowjanya et al.

INTERNATIONAL JOURNAL OF INFORMATION SECURITY (2020)

Article Computer Science, Information Systems

Efficient and privacy-preserving authentication scheme for wireless body area networks

Mengxia Shuai et al.

JOURNAL OF INFORMATION SECURITY AND APPLICATIONS (2020)

Article Computer Science, Information Systems

Secured Data Collection With Hardware-Based Ciphers for IoT-Based Healthcare

Hai Tao et al.

IEEE INTERNET OF THINGS JOURNAL (2019)

Article Computer Science, Hardware & Architecture

Identity-Based User Authenticated Key Agreement Protocol for Multi-Server Environment with Anonymity

Alzubair Hassan et al.

MOBILE NETWORKS & APPLICATIONS (2019)

Article Computer Science, Information Systems

Survey on security in intra-body area network communication

Marko Kompara et al.

AD HOC NETWORKS (2018)

Article Computer Science, Hardware & Architecture

Cloud-aided lightweight certificateless authentication protocol with anonymity for wireless body area networks

Jian Shen et al.

JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2018)

Proceedings Paper Computer Science, Information Systems

Highly Efficient Privacy-Preserving Key Agreement for Wireless Body Area Networks

Haibat Khan et al.

2018 17TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (IEEE TRUSTCOM) / 12TH IEEE INTERNATIONAL CONFERENCE ON BIG DATA SCIENCE AND ENGINEERING (IEEE BIGDATASE) (2018)

Article Computer Science, Information Systems

Anonymous Authentication for Wireless Body Area Networks With Provable Security

Debiao He et al.

IEEE SYSTEMS JOURNAL (2017)

Article Computer Science, Hardware & Architecture

An enhanced 1-round authentication protocol for wireless body area networks with user anonymity

Xiong Li et al.

COMPUTERS & ELECTRICAL ENGINEERING (2017)

Article Health Care Sciences & Services

Efficient and Anonymous Authentication Scheme for Wireless Body Area Networks

Libing Wu et al.

JOURNAL OF MEDICAL SYSTEMS (2016)

Article Computer Science, Hardware & Architecture

Identity-Based Encryption with Outsourced Revocation in Cloud Computing

Jin Li et al.

IEEE TRANSACTIONS ON COMPUTERS (2015)

Article Computer Science, Theory & Methods

Revocable and Scalable Certificateless Remote Authentication Protocol With Anonymity for Wireless Body Area Networks

Hu Xiong et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2015)

Article Health Care Sciences & Services

New Authentication Scheme for Wireless Body Area Networks Using the Bilinear Pairing

Chunzhi Wang et al.

JOURNAL OF MEDICAL SYSTEMS (2015)

Article Engineering, Electrical & Electronic

Cryptanalysis of a dynamic identity-based remote user authentication scheme with verifiable password update

Xiong Li et al.

INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS (2015)

Article Computer Science, Theory & Methods

Cost-Effective Scalable and Anonymous Certificateless Remote Authentication Protocol

Hu Xiong

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2014)

Article Computer Science, Theory & Methods

Secure Deduplication with Efficient and Reliable Convergent Key Management

Jin Li et al.

IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS (2014)

Article Computer Science, Theory & Methods

Certificateless Remote Anonymous Authentication Schemes for Wireless Body Area Networks

Jingwei Liu et al.

IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS (2014)

Article Health Care Sciences & Services

An Efficient Anonymous Authentication Scheme for Wireless Body Area Networks Using Elliptic Curve Cryptosystem

Zhenguo Zhao

JOURNAL OF MEDICAL SYSTEMS (2014)

Article Computer Science, Information Systems

IBE-Lite: A Lightweight Identity-Based Cryptography for Body Sensor Networks

Chiu C. Tan et al.

IEEE TRANSACTIONS ON INFORMATION TECHNOLOGY IN BIOMEDICINE (2009)

Article Computer Science, Theory & Methods

Efficient pairing computation on supersingular Abelian varieties

Paulo S. L. M. Barreto et al.

DESIGNS CODES AND CRYPTOGRAPHY (2007)