2017
DOI: 10.1016/j.compeleceng.2017.02.011
|View full text |Cite
|
Sign up to set email alerts
|

An enhanced 1-round authentication protocol for wireless body area networks with user anonymity

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
63
0

Year Published

2017
2017
2024
2024

Publication Types

Select...
5
5

Relationship

0
10

Authors

Journals

citations
Cited by 90 publications
(63 citation statements)
references
References 20 publications
0
63
0
Order By: Relevance
“…A key agreement protocol is used for message privacy protection. The data collected by the sensor nodes usually transmitted via wireless channel (Li et al, 2017). The collected information is sensitive in more cases; hence lightweight authentication protocol is designed to provide light weight security.…”
Section: Related Workmentioning
confidence: 99%
“…A key agreement protocol is used for message privacy protection. The data collected by the sensor nodes usually transmitted via wireless channel (Li et al, 2017). The collected information is sensitive in more cases; hence lightweight authentication protocol is designed to provide light weight security.…”
Section: Related Workmentioning
confidence: 99%
“…Tsai et al proposed a scheme for distributed mobile cloud computing services [ 26 ], the security strength of their scheme is based on bilinear pairing and dynamic nonce generation. There are other schemes that based on the elliptic curve security [ 27 , 28 , 29 ].…”
Section: Related Workmentioning
confidence: 99%
“…In the same year, Liu et al [35] presented a 1-round anonymous authentication protocol. However, in 2017 Li et al [36] pointed that scheme of Liu et al [35] is vulnerable to impersonation, stolen-verifier, and denial-of-service attacks and proposed an enhanced 1-round authentication protocol with user anonymity. Later in the same year, Li et al [37] mentioned that the above-reviewed authentication protocols for WBAN either present no revocation procedure to revoke the user's privilege or lack anonymity.…”
Section: Rsa-based Asymmetric Scheme (Modulus Size In Bits)mentioning
confidence: 99%