2021
DOI: 10.3390/healthcare9091114
|View full text |Cite
|
Sign up to set email alerts
|

Privacy-Preserving Authentication Protocol for Wireless Body Area Networks in Healthcare Applications

Abstract: Mobile healthcare service has become increasingly popular thanks to the significant advances in the wireless body area networks (WBANs). It helps medical professionals to collect patient’s healthcare data remotely and provides remote medical diagnosis. Since the health data are privacy-related, they should provide services with privacy-preserving, which should consider security and privacy at the same time. Recently, some lightweight patient healthcare authentication protocols were proposed for WBANs. However,… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
7
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
7

Relationship

0
7

Authors

Journals

citations
Cited by 12 publications
(7 citation statements)
references
References 57 publications
0
7
0
Order By: Relevance
“…Figure 7 shows the performance comparisons among the related system. We notice that our work achieves good result in the Table 4 explained the mechanism of arriving computation cost (2𝑇 𝑆𝑖𝑔𝑛 +2𝑇 𝑉𝑒𝑟𝑖𝑓𝑦 ==> 0.35) based on Table 3 [45]. Additionally, using digital signature operations (sign/verify) leads to obtain best result because these operations do not require extra time for encryption/decryption and the transferred data between mobile and server considers very critical and needs more efficiency and secrecy.…”
Section: Computation Resultsmentioning
confidence: 76%
See 3 more Smart Citations
“…Figure 7 shows the performance comparisons among the related system. We notice that our work achieves good result in the Table 4 explained the mechanism of arriving computation cost (2𝑇 𝑆𝑖𝑔𝑛 +2𝑇 𝑉𝑒𝑟𝑖𝑓𝑦 ==> 0.35) based on Table 3 [45]. Additionally, using digital signature operations (sign/verify) leads to obtain best result because these operations do not require extra time for encryption/decryption and the transferred data between mobile and server considers very critical and needs more efficiency and secrecy.…”
Section: Computation Resultsmentioning
confidence: 76%
“…We will concentrate on the computation requirements of the healthcare phase from the proposed system because the phase is the most frequently used one. To facilitate computation analysis, we define the computational requirements of a mathematical operation as 𝑇 𝑚 , a one-way hash function as 𝑇 ℎ , symmetric key encryption and decryption as 𝑇 𝑠𝑦𝑚 , an elliptic curve cryptosystem as 𝑇 𝑒𝑐𝑐 and a bilinear pairing operation as 𝑇 𝑏𝑝 , and Schnorr digital signature, respectively, but do not consider the overhead of the exclusive-or operations as 𝑇 ⊕ , [45], [47] which require a comparatively quite low overhead than any other operations. Table 3 the computational overhead comparison among the related protocols based on Table 4.…”
Section: Computation Resultsmentioning
confidence: 99%
See 2 more Smart Citations
“…Ryu and Kim [24] proposed a privacy-preserving authentication protocol for WBANs used in healthcare services. This protocol employs lightweight one-way hash functions and exclusive-or operations, yielding enhanced privacy and security features compared to similar protocols.…”
Section: Related Workmentioning
confidence: 99%