2017
DOI: 10.1007/s11277-017-4075-9
|View full text |Cite
|
Sign up to set email alerts
|

A Novel Protocol with Patient and Node Identification for Optical WBAN with Inherent Security and Interference Rejection

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
9
0

Year Published

2018
2018
2022
2022

Publication Types

Select...
6

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(9 citation statements)
references
References 15 publications
0
9
0
Order By: Relevance
“…Comparison of various symmetric key cryptographic protocols in terms of initial key exchange phase, security, energy efficiency and computational overhead has led to the following conclusions. In terms of security, [69,72,74] and [75] have shown better performance as compared to [69]. In terms of eenergy efficiency, [69] and [72] have shown better performance in comparison to [71].…”
Section: Comparative Study Of Symmetric Key Cryptographic Protocols: Findings and Discussionmentioning
confidence: 99%
See 2 more Smart Citations
“…Comparison of various symmetric key cryptographic protocols in terms of initial key exchange phase, security, energy efficiency and computational overhead has led to the following conclusions. In terms of security, [69,72,74] and [75] have shown better performance as compared to [69]. In terms of eenergy efficiency, [69] and [72] have shown better performance in comparison to [71].…”
Section: Comparative Study Of Symmetric Key Cryptographic Protocols: Findings and Discussionmentioning
confidence: 99%
“…Baqai et al [ 72 ] presented a routing protocol which provides the secure transmission and is energy efficient in WBAN. It helps in identification of patients/nodes, provides inherent security and rejects interference from Infrared (IR) sources and false data invaders.…”
Section: Classification Of Secure Routing Protocols For Wbanmentioning
confidence: 99%
See 1 more Smart Citation
“…Many strategies are explored and suggested as research challenges and issues in wireless body area networks, including cluster-based detection, cloud-assisted intrusion detection, and ad-hoc based communication. Baqai et al [ 52 ] explained the node identification scheme to reduce the inherence rejection in optical-based wireless body area networks. This scheme was implemented by using an energy-efficient security protocol for mobile applications.…”
Section: Research Challenges In Secure Wbanmentioning
confidence: 99%
“…Due to its features and usefulness it is being used in many ways especially in access and core networks. It is now widely accepted that optical wireless technology can prove to be viable alternative to the radio and microwave [15][16][17][18][19][20]. Many encoding schemes are used in OCDMA (Optical Code Division Multiple Access Network) but SAC (Spectral Amplitude Codes) is widely used as it is considered an effective arrangement to eliminate dominant noise called MAI (Multi Access Interference [21].…”
Section: Introductionmentioning
confidence: 99%