Security and Privacy Issues in IoT Devices and Sensor Networks 2021
DOI: 10.1016/b978-0-12-821255-4.00003-1
|View full text |Cite
|
Sign up to set email alerts
|

Security and privacy in wireless body sensor networks using lightweight cryptography scheme

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2

Citation Types

0
15
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
4
4

Relationship

0
8

Authors

Journals

citations
Cited by 16 publications
(15 citation statements)
references
References 8 publications
0
15
0
Order By: Relevance
“…Besides using this scheme, the patient data are protected from adversaries' attacks. In this scheme [29], the authors applied a lightweight cryptosystem to ensure data security and privacy with minimal cost. In addition, the wavelet transform frequency-time domain method is applied for separating relevant signals.…”
Section: Related Work On Wbanmentioning
confidence: 99%
“…Besides using this scheme, the patient data are protected from adversaries' attacks. In this scheme [29], the authors applied a lightweight cryptosystem to ensure data security and privacy with minimal cost. In addition, the wavelet transform frequency-time domain method is applied for separating relevant signals.…”
Section: Related Work On Wbanmentioning
confidence: 99%
“…Moreover, the results are compared with the state-of-the-art models by using the measures of frequency, Gates utilization count, power, area, sampling rate and propagation delay. Table I evaluates the comparison of the existing random number generation block in the hashing Memory design and proposed technique of VIHS in Cryptography with respect to the measures of components size based on the number of 2-input Hash Signature's, 3-Input Hash Signature's and the number of Flip-Flops that are referred from the paper [25]. For this analysis, some of the existing hashing with optimal Hash Signature designs have been considered.…”
Section: Resultsmentioning
confidence: 99%
“…These results stated that the proposed dynamic system register-based hashing with optimal Hash Signature provides the better size in components, when compared to the existing model of VIHS. Table II compares the values of area consumption in the unit of (µm2) in the existing [25] and proposed hashing with optimal Hash Signature methodologies. For the proposed work, the power consumption is reduced to the range of 25%.…”
Section: Resultsmentioning
confidence: 99%
“…This algorithm demonstrates better performance compared to AES in terms of execution time and immunity for statistical attacks. Sivasangari et al [39] proposed the SPECG encryption algorithm, which generates a unique 256-bit encryption key based on ECG data and applies RC7 [78] for data encryption. Key generation using either a genetic algorithm or a DNA sequence can exhaustively consume computation resources and may not be suitable for on node implementation.…”
Section: Background and Related Workmentioning
confidence: 99%
“…While other parts of the network can be protected with generally well-known solutions, security design for sensor nodes is more challenging. Since a BSN's sensor nodes constantly share and transmit sensitive physiological, physical, and/or environmental information related to an individual to other devices in close proximity (a few meters) and eventually to the cloud, the privacy and security of the data is a major concern [34][35][36][37][38][39]. In addition, the miniaturized sensors have limited resources in terms of computation, battery power, memory, and network bandwidth [24,40].…”
mentioning
confidence: 99%