2015 IEEE/CIC International Conference on Communications in China (ICCC) 2015
DOI: 10.1109/iccchina.2015.7448641
|View full text |Cite
|
Sign up to set email alerts
|

An improved IEEE 802.15.6 password authenticated association protocol

Abstract: A body area network is a network of nodes around human bodies. Body area networks are associated with human body, and collect sensitive information of users. If this information cannot be properly protected, users would stop using these applications. IEEE Std 802.15.6 is a standard for body area networks; it provides several security association protocols. In this paper, password authenticated association protocol in the standard is reviewed. First of all, several attacks are found. In addition, we proposed an… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
9
0

Year Published

2016
2016
2022
2022

Publication Types

Select...
4
2

Relationship

3
3

Authors

Journals

citations
Cited by 6 publications
(9 citation statements)
references
References 7 publications
0
9
0
Order By: Relevance
“…Smart healthcare protocols and technologies —The protocols and standards that govern smart healthcare include IEEE 802.15.6, Wi‐Fi, BLE, 6LoWPAN, ZigBee, Z‐Wave, Ethernet, CoAP and DTLS, as shown in Figure . The following are brief descriptions of some of the protocols or standards: IEEE 802.15.6 is a radio communication standard for WBANs.…”
Section: Security Requirements System Models Threat Models and Promentioning
confidence: 99%
“…Smart healthcare protocols and technologies —The protocols and standards that govern smart healthcare include IEEE 802.15.6, Wi‐Fi, BLE, 6LoWPAN, ZigBee, Z‐Wave, Ethernet, CoAP and DTLS, as shown in Figure . The following are brief descriptions of some of the protocols or standards: IEEE 802.15.6 is a radio communication standard for WBANs.…”
Section: Security Requirements System Models Threat Models and Promentioning
confidence: 99%
“…In [10] the authors illustrate an initiator impersonation attack and a responder impersonation attack to the standard protocol. At the end of these attacks, the attackers successfully establish a master key with one side of the communicating parties, while the other side thinks it has the shared master key with the true participant.…”
Section: Security Problemsmentioning
confidence: 99%
“…The authors in [10] propose a modified protocol to the standard protocol. Specifically, the modified protocol is similar to the standard one except that it does not send PK I in the clear in M 4 .…”
Section: The Modified Protocolmentioning
confidence: 99%
See 2 more Smart Citations