2021
DOI: 10.1007/s12083-021-01190-7
|View full text |Cite
|
Sign up to set email alerts
|

A lightweight continuous authentication scheme for medical wireless body area networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
8
0
1

Year Published

2021
2021
2024
2024

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 19 publications
(9 citation statements)
references
References 39 publications
0
8
0
1
Order By: Relevance
“…The performance results for the proposed scheme was compared with the literature, i.e., Koya et al [18], Tao et al [19], Wazid, et al [20], Xu, et al [25], Almuhaideb et al [26], and Rehman et al [14]. We compared our proposed scheme with currently available state-of-the-state authentication schemes in the same category.…”
Section: The Evaluation Of Performance Resultsmentioning
confidence: 99%
“…The performance results for the proposed scheme was compared with the literature, i.e., Koya et al [18], Tao et al [19], Wazid, et al [20], Xu, et al [25], Almuhaideb et al [26], and Rehman et al [14]. We compared our proposed scheme with currently available state-of-the-state authentication schemes in the same category.…”
Section: The Evaluation Of Performance Resultsmentioning
confidence: 99%
“…Wan et al 18 proposed an intra‐BAN tier authentication scheme. By ensuring forward secrecy, node anonymity, and node unlinkability, this approach protects against node impersonation, man‐in‐the‐middle attacks, and session key leaks.…”
Section: Literature Surveymentioning
confidence: 99%
“…Thus, IBE solutions for WBANs can be difficult to implement in practice for recommended security levels. Examples of custom solutions for authentication in WBANs are proposed in [39], [40]. In [39], a custom authentication algorithm between the sensor node and a base station (personal server) that is based on the use of a hash function and key management is presented.…”
Section: Related Workmentioning
confidence: 99%
“…Examples of custom solutions for authentication in WBANs are proposed in [39], [40]. In [39], a custom authentication algorithm between the sensor node and a base station (personal server) that is based on the use of a hash function and key management is presented. Security at Layers 2 and 3 nor the security services of confidentiality, integrity and access control are considered.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation