2021
DOI: 10.1109/access.2021.3115706
|View full text |Cite
|
Sign up to set email alerts
|

An Efficient, Hybrid Authentication Using ECG and Lightweight Cryptographic Scheme for WBAN

Abstract: The Wireless Body Area Network (WBAN) plays a pivotal role in providing ubiquitous computing and has applications in different fields, especially in health monitoring. The advancement in wearable devices has revolutionized the concept of medical services and brought ease to our daily lives. However, the latent threat imposed by attackers has increased concerns related to the security and privacy of patient's data due to the open nature of the wireless network. The authentication schemes are used to secure pati… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2022
2022
2023
2023

Publication Types

Select...
5
2

Relationship

1
6

Authors

Journals

citations
Cited by 18 publications
(3 citation statements)
references
References 21 publications
0
3
0
Order By: Relevance
“…Rehman et al 17 proposed a simple WBAN authentication mechanism for safely transmitting sensitive information over a public channel. The approach uses XOR operations and a hash function to improve its performance.…”
Section: Literature Surveymentioning
confidence: 99%
“…Rehman et al 17 proposed a simple WBAN authentication mechanism for safely transmitting sensitive information over a public channel. The approach uses XOR operations and a hash function to improve its performance.…”
Section: Literature Surveymentioning
confidence: 99%
“…The work evaluates the different security attacks and computational overheads. The hybrid authentication using electrocardiogram (ECG) and block cipher for wireless body area network (WBAN) applications is well described in [20]. The RCIA-based RFID authentication with the logic of events theory (LET) is presented in [21].…”
Section: Introductionmentioning
confidence: 99%
“…The authentication solutions pertaining to the anonymous lightweight category [17,18] and hybrid approaches, such as [19], along with other cryptographic schemes and RNN based biometrics schemes, [20] also exist in the literature. However, our main focus is, to sum up, authentication schemes based on ML techniques [21,22].…”
Section: Introductionmentioning
confidence: 99%