2018
DOI: 10.1016/j.jnca.2018.01.003
|View full text |Cite
|
Sign up to set email alerts
|

Cloud-aided lightweight certificateless authentication protocol with anonymity for wireless body area networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
97
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
8

Relationship

0
8

Authors

Journals

citations
Cited by 254 publications
(102 citation statements)
references
References 19 publications
0
97
0
Order By: Relevance
“…This section describes performance evaluation of the repaired protocol along with other related protocols [4,[10][11][12]14] in security properties and estimated time. We focus on the security against the anonymity, tracking attack, insider attack, replay attack, impersonation attack, man-in-the-middle attack, mutual authentication and the session key forward secrecy.…”
Section: Performance Evaluationmentioning
confidence: 99%
See 2 more Smart Citations
“…This section describes performance evaluation of the repaired protocol along with other related protocols [4,[10][11][12]14] in security properties and estimated time. We focus on the security against the anonymity, tracking attack, insider attack, replay attack, impersonation attack, man-in-the-middle attack, mutual authentication and the session key forward secrecy.…”
Section: Performance Evaluationmentioning
confidence: 99%
“…We focus on the security against the anonymity, tracking attack, insider attack, replay attack, impersonation attack, man-in-the-middle attack, mutual authentication and the session key forward secrecy. From Table 1, we see that only the repaired protocol, Wu's protocol [12] and Shen et al [14] fulfill all the security properties. …”
Section: Performance Evaluationmentioning
confidence: 99%
See 1 more Smart Citation
“…The existing research results have begun to focus on the security authentication of dynamic nodes access [15]. However, these methods are not applicable to existing largescale self-organization networks.…”
Section: Related Workmentioning
confidence: 99%
“…Therefore, the conventional protocols that are developed for traditional networks fail to provide high throughput performance, low latency, and reliability for vehicular networks. So, there is a need to implement secure lightweight cryptographic algorithms (as well as lightweight PKI [6]) on small embedded devices at acceptable execution time. Recently, scholars focus on developing the lightweight cryptographic algorithms and key generations schemes which may provide security for vehicular networks with high performance efficiently.…”
Section: Introductionmentioning
confidence: 99%