2021
DOI: 10.1109/access.2021.3084135
|View full text |Cite
|
Sign up to set email alerts
|

Lightweight Authentication Protocol Using Self-Certified Public Keys for Wireless Body Area Networks in Health-Care Applications

Abstract: Health-care centers have been meeting challenges due to the increase in the aging population and chronic diseases that need continuous medical monitoring. Wireless body area network (WBAN) is a non-invasive technology consisting of diverse connected bio-medical sensors placed in the human body, which measure physiological parameters and make the information accessible to health-care professionals ubiquitously. However, a major problem in WBAN is the security and privacy of the patient's medical information. An… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
8
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
6
3

Relationship

0
9

Authors

Journals

citations
Cited by 22 publications
(8 citation statements)
references
References 70 publications
0
8
0
Order By: Relevance
“…However, this work fails to revoke the malicious end users from the medical network. Lara et al in [ 43 ] proposed a two-party authentication scheme based on elliptic cryptography. Though this method uses the lightweight authentication protocol, there is no efficient handover and revocation mechanism in this work.…”
Section: Related Workmentioning
confidence: 99%
“…However, this work fails to revoke the malicious end users from the medical network. Lara et al in [ 43 ] proposed a two-party authentication scheme based on elliptic cryptography. Though this method uses the lightweight authentication protocol, there is no efficient handover and revocation mechanism in this work.…”
Section: Related Workmentioning
confidence: 99%
“…In this section, we will discuss related works for the E-health system. A number of authentication schemes [3][4][5] have been proposed for E-health system. In 1976, Diffie and Hellman [6] proposed a method to setup session key named Diffie-Hellman key exchange.…”
Section: Related Workmentioning
confidence: 99%
“…In this section, the performance analysis of the proposed CL-AKA scheme is discussed in comparison with existing competent schemes namely, [ 13 , 17 19 , 29 31 , 33 ], and [ 37 ]. This section demonstrates the comparision of the proposed scheme with respect to security features, computation cost, and communication cost with above mentioned seven related protocols.…”
Section: Performance Analysismentioning
confidence: 99%
“…Therefore, the scheme may not be adequate for resource-constrained environment. Later, Lara et al [ 33 ] proposed a two-party authentication scheme using self-certified public keys based on ECC for healthcare application. The scheme focus to establish communication between the patient’s portable personal terminal and an application provider (AP) with a Two-party scheme.…”
Section: Introductionmentioning
confidence: 99%