2018 3rd International Conference on Contemporary Computing and Informatics (IC3I) 2018
DOI: 10.1109/ic3i44769.2018.9007303
|View full text |Cite
|
Sign up to set email alerts
|

A Review on Authentication Protocols in Wireless Body Area Networks (WBAN)

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
9
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
4
3
1

Relationship

2
6

Authors

Journals

citations
Cited by 18 publications
(9 citation statements)
references
References 13 publications
0
9
0
Order By: Relevance
“…In 2018, Narwal and Mohapatra [47] attempted to provide a comprehensive analysis of several authentication approaches. The authors also provide a complete analysis of the schemes based on security attacks, security features, and a variety of other factors.…”
Section: Related Security Survey Presented For Wbansmentioning
confidence: 99%
“…In 2018, Narwal and Mohapatra [47] attempted to provide a comprehensive analysis of several authentication approaches. The authors also provide a complete analysis of the schemes based on security attacks, security features, and a variety of other factors.…”
Section: Related Security Survey Presented For Wbansmentioning
confidence: 99%
“…Aman and Shah [81] explored the security problems of ubiquitous healthcare (U-Healthcare) related work. The survey by Narwal and Mohapatra [82] focuses on the analysis of authentication schemes in terms of main outcomes, strengths, and limitations. In addition to this, the authors discuss the architecture of WBAN, security essentials, and security attacks are discussed in detail.…”
Section: Related Studies On Biometric-based Approachesmentioning
confidence: 99%
“…Using multiple sensors (accelerometer and microphone), Cao et al [107] presented a device-to-Device (D2D) communication that the user needs to hold two devices in one hand and randomly shake them for a few seconds. Jin et al [99] proposed a Future works [78] 2011 [73] 2013 [77] 2013 [75] 2015 [74] 2016 [76] 2016 [93] 2016 [94] 2016 [95] 2016 [81] 2017 [80] 2017 [82] 2018 [83] 2018 [84] 2018 [85] 2018 [86] 2018 [87] 2019 [88] 2019 [89] 2019 [90] 2019 [91] 2020 [92] 2021 [79] 2021 scheme to pair smartphones in close distance by exploiting correlated magnetometer readings.…”
Section: A Motion and Positionmentioning
confidence: 99%
“…The most common consensus protocol is proof of work. Proof of work is a puzzle that is easy to solve but not so easy that everyone solves [7,[24][25][26][27][28][29][30]. It is important that it must be solved in a particular time period.…”
Section: Workingmentioning
confidence: 99%