2020
DOI: 10.1007/s11277-020-07304-3
|View full text |Cite
|
Sign up to set email alerts
|

SEEMAKA: Secured Energy-Efficient Mutual Authentication and Key Agreement Scheme for Wireless Body Area Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
11
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
5
4

Relationship

0
9

Authors

Journals

citations
Cited by 29 publications
(11 citation statements)
references
References 38 publications
0
11
0
Order By: Relevance
“…A secured Energy Efficient Mutual Authentication and Key Agreement Scheme for Wireless Body Area Networks (SEEMAKA) is proposed by Narwal B et al in (63) . SEEMAKA uses fewer hash functions and bitwise XOR operations.…”
Section: Traditional Key Agreement Schemesmentioning
confidence: 99%
“…A secured Energy Efficient Mutual Authentication and Key Agreement Scheme for Wireless Body Area Networks (SEEMAKA) is proposed by Narwal B et al in (63) . SEEMAKA uses fewer hash functions and bitwise XOR operations.…”
Section: Traditional Key Agreement Schemesmentioning
confidence: 99%
“…Therefore, OFMC attains the session complexity and averts replay attack without executing different sessions between communicating participants. Also, OFMC checks whether the genuine participants can execute the protocol by seeking the passive attacker and broadcasts the instructions of a few sessions to the attacker between genuine participants [30]. The test outputs show that the protocol dodges replay attack.…”
Section: Correctness Of the Protocolmentioning
confidence: 99%
“…Although their scheme is guarded against A1, A8, offline password guessing, A6, and A4, but it still has high computation cost and delays in communication due to extensive cryptographic operations. (Li et al) [11] (Konan) [48] (Lu et al) [52] (Kompara et al) [10] Cloud (Wu et al) [54] (Gupta et al) [55] (Polai et al) [56] (Koya et al) [25] (Camara et al) [57] (Narwal and Mohapatra) [58] Asymmetric Mobile (Liu et al) [32] (Li et al) [33] (Sowjanya et al) [8] (Li et al) [42] (Ali et al) [40] (Liu and Chung ) [41] (Mo and Chen) [38] (Challa et al) [37] (Chang et al) [34] ( Park and Park) [35] (Wang et al ) [36] Cloud (Li et al) [42] (Shen et al) [43] (Deng et al) [44] (Alzahrani et al) [24] (Lu et al) [45] (Xu et al) […”
Section: Asymmetric Cryptography In Mobile Platformmentioning
confidence: 99%
“…Camara et al [57] specified that the scheme in [25] has a weakness versus A5 that an adversary can effortlessly predict the protected arguments easily to acquire the following session key by the sensor. Bhawna Narwal et al [58] had offered a structure to improve the security of [25] but it slow.…”
Section: Symmetric Cryptography In Cloud Platformmentioning
confidence: 99%