4.6 Article

ID-Based Deniable Authentication Protocol with Key Agreement and Time-Bound Properties for 6G-Based WBAN Healthcare Environments

Related references

Note: Only part of the references are listed.
Article Chemistry, Analytical

Business-Oriented Security Analysis of 6G for eHealth: An Impact Assessment Approach

Chiara Suraci et al.

Summary: Following the COVID-19 outbreak, the health sector is undergoing a digital transformation, with a focus on eHealth. Cellular networks and next-generation technologies are vital to support eHealth services and address security concerns. This paper explores the economics of security in eHealth and provides a qualitative assessment of the impact of security breaches on business dynamics.

SENSORS (2023)

Review Chemistry, Multidisciplinary

Authentication in the Internet of Medical Things: Taxonomy, Review, and Open Issues

Norah Alsaeed et al.

Summary: The Internet of Medical Things (IoMT) has transformed healthcare by connecting patients with providers remotely. Authentication is a crucial security measure in IoMT, but it is challenging due to diverse and resource-constrained devices. This systematic review examines 118 articles published between 2016 and 2021, identifying authentication schemes and trends. Most schemes use distributed architecture and public key infrastructure, with hybrid cryptography being popular. Future directions include support for end-to-end, cross-layer, and cross-domain authentication, and addressing open issues.

APPLIED SCIENCES-BASEL (2022)

Article Computer Science, Information Systems

MEC and D2D as Enabling Technologies for a Secure and Lightweight 6G eHealth System

Chiara Suraci et al.

Summary: The COVID-19 pandemic has accelerated the development of the eHealth sector and led to the proposal of a new eHealth system architecture. This architecture integrates low-latency enabling technologies and security mechanisms to ensure optimal management of sensitive health data.

IEEE INTERNET OF THINGS JOURNAL (2022)

Review Chemistry, Analytical

A Survey on Wireless Wearable Body Area Networks: A Perspective of Technology and Economy

David Samuel Bhatti et al.

Summary: This study focuses on the deployment and awareness issues of wearable and body-worn devices, addressing technical and economical considerations. It provides insights into the feasibility, limitations, and security concerns of wireless body area networks. Additionally, it explores the global market growth, regulations in different regions, and possible research projects in this field. The study emphasizes the importance of these devices to various stakeholders and highlights the potential benefits in healthcare and fitness industries.

SENSORS (2022)

Article Chemistry, Multidisciplinary

Security of Blockchain and AI-Empowered Smart Healthcare: Application-Based Analysis

Abdulatif Alabdulatif et al.

Summary: A smart healthcare system faces various security challenges and vulnerabilities due to the easy access to healthcare services and applications. This article reviews the recent security challenges and proposes an AI and blockchain-based secure architecture as a case study to analyze malware and network attacks on wearable devices. The article also highlights open issues and research challenges in smart healthcare systems.

APPLIED SCIENCES-BASEL (2022)

Article Computer Science, Information Systems

A Novel Three-Factor Authentication Protocol for Multiple Service Providers in 6G-Aided Intelligent Healthcare Systems

Tuan-Vinh Le et al.

Summary: The emergence of 6G technology has brought about advanced intelligent healthcare systems that address potential issues and concerns in service. Security and privacy are important considerations in this communication system. The authors propose a convenient and cost-saving communication solution, and provide security proof using various verification tools.

IEEE ACCESS (2022)

Article Engineering, Biomedical

Ensuring data integrity of healthcare information in the era of digital health

Mohammad Zarour et al.

Summary: Data integrity remains a persistent issue in the healthcare sector, posing significant health threats and challenges for clinicians. This research aims to describe the threat plot of data integrity, particularly in Saudi Arabia, through attack statistics and propose using a fuzzy analytical hierarchy process to improve data security. The study suggests prioritizing blockchain as a method for data integrity management across Saudi Arabia.

HEALTHCARE TECHNOLOGY LETTERS (2021)

Review Computer Science, Hardware & Architecture

A comprehensive review of wireless body area network

Khalid Hasan et al.

JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2019)

Article Computer Science, Theory & Methods

Efficient Fixed-base exponentiation and scalar multiplication based on a multiplicative splitting exponent recoding

Jean-Marc Robert et al.

JOURNAL OF CRYPTOGRAPHIC ENGINEERING (2019)

Article Computer Science, Information Systems

Group-Oriented Range-Bound Key Agreement for Internet of Things Scenarios

Hung-Yu Chien

IEEE INTERNET OF THINGS JOURNAL (2018)

Article Computer Science, Information Systems

AD-ASGKA - authenticated dynamic protocols for asymmetric group key agreement

Mingchu Li et al.

SECURITY AND COMMUNICATION NETWORKS (2016)

Article Computer Science, Theory & Methods

Round-Efficient and Sender-Unrestricted Dynamic Group Key Agreement Protocol for Secure Group Communications

Lei Zhang et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2015)

Article Computer Science, Theory & Methods

Identity-based deniable authentication for ad hoc networks

Fagen Li et al.

COMPUTING (2014)

Article Computer Science, Hardware & Architecture

Affiliation-Hiding Authenticated Asymmetric Group Key Agreement

Chang Xu et al.

COMPUTER JOURNAL (2012)

Article Computer Science, Hardware & Architecture

A revocable ID-based authenticated group key exchange protocol with resistant to malicious participants

Tsu-Yang Wu et al.

COMPUTER NETWORKS (2012)

Article Computer Science, Information Systems

A novel deniable authentication protocol using generalized ElGamal signature scheme

Wei-Bin Lee et al.

INFORMATION SCIENCES (2007)

Article Computer Science, Hardware & Architecture

Efficient deniable authentication protocol based on generalized ElGamal signature scheme

ZH Shao

COMPUTER STANDARDS & INTERFACES (2004)

Article Computer Science, Theory & Methods

The Weil pairing, and its efficient calculation

VS Miller

JOURNAL OF CRYPTOLOGY (2004)

Article Computer Science, Hardware & Architecture

Identity-based fault-tolerant conference key agreement

X Yi

IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING (2004)

Article Computer Science, Theory & Methods

Separating decision Diffie-Hellman from computational Diffie-Hellman in cryptographic groups

A Joux et al.

JOURNAL OF CRYPTOLOGY (2003)

Article Computer Science, Artificial Intelligence

A time-bound cryptographic key assignment scheme for access control in a hierarchy

WG Tzeng

IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING (2002)