2016
DOI: 10.3390/s16050728
|View full text |Cite
|
Sign up to set email alerts
|

1-RAAP: An Efficient 1-Round Anonymous Authentication Protocol for Wireless Body Area Networks

Abstract: Thanks to the rapid technological convergence of wireless communications, medical sensors and cloud computing, Wireless Body Area Networks (WBANs) have emerged as a novel networking paradigm enabling ubiquitous Internet services, allowing people to receive medical care, monitor health status in real-time, analyze sports data and even enjoy online entertainment remotely. However, because of the mobility and openness of wireless communications, WBANs are inevitably exposed to a large set of potential attacks, si… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
31
0

Year Published

2017
2017
2021
2021

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 58 publications
(31 citation statements)
references
References 39 publications
0
31
0
Order By: Relevance
“…However, modern technology faces serious issues due to problems in security and authentication. To solve the authentication issues in WSNs, several user authentication protocols have been proposed . In 2007, Wong et al presented a hash‐based user authentication protocol having low complexity, lightweight, and dynamic.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…However, modern technology faces serious issues due to problems in security and authentication. To solve the authentication issues in WSNs, several user authentication protocols have been proposed . In 2007, Wong et al presented a hash‐based user authentication protocol having low complexity, lightweight, and dynamic.…”
Section: Related Workmentioning
confidence: 99%
“…This structure has capabilities to cater all known attacks and deficiencies. Later, Liu et al observed that Ibrahim et al protocol is insecure against offline password guessing attack and suffers from user traceability. Therefore, they proposed a new protocol to address the two drawbacks observed in Kumar et al…”
Section: Related Workmentioning
confidence: 99%
“…In 2016, He et al [34] pointed out that the schemes of Liu et al [30] suffer from impersonation attack and they proposed an anonymous authentication scheme for WBAN. In the same year, Liu et al [35] presented a 1-round anonymous authentication protocol. However, in 2017 Li et al [36] pointed that scheme of Liu et al [35] is vulnerable to impersonation, stolen-verifier, and denial-of-service attacks and proposed an enhanced 1-round authentication protocol with user anonymity.…”
Section: Rsa-based Asymmetric Scheme (Modulus Size In Bits)mentioning
confidence: 99%
“…In the same year, Liu et al [35] presented a 1-round anonymous authentication protocol. However, in 2017 Li et al [36] pointed that scheme of Liu et al [35] is vulnerable to impersonation, stolen-verifier, and denial-of-service attacks and proposed an enhanced 1-round authentication protocol with user anonymity. Later in the same year, Li et al [37] mentioned that the above-reviewed authentication protocols for WBAN either present no revocation procedure to revoke the user's privilege or lack anonymity.…”
Section: Rsa-based Asymmetric Scheme (Modulus Size In Bits)mentioning
confidence: 99%
“…As only registered user could generate this public key pair, this public key pair can be used as a measure to test if a user is legal or not, as only the public key is transferred, so the identity of the user is hidden. Liu et al (2016) proposed an authentication scheme [16] which could well protect the identity and privacy of the user, while the scheme is very cost-effective compared to [9]. Islam and Khan proposed a partial public key method [17], where a user registers at the server several times in order to get more than one authentication keys, then the user uses different keys for authentication to achieve anonymity.…”
Section: Related Workmentioning
confidence: 99%