2021
DOI: 10.1504/ijsnet.2021.113839
|View full text |Cite
|
Sign up to set email alerts
|

A computationally efficient authentication and key agreement scheme for multi-server switching in WBAN

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
5
0

Year Published

2022
2022
2023
2023

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 8 publications
(5 citation statements)
references
References 0 publications
0
5
0
Order By: Relevance
“…Robotics has been one of the most popular research topics in recent years. Among these, intelligent robots have gained much popularity [53][54][55][56][57]. Despite this, these devices are quite difficult to navigate and control, and trajectory planning is very important to ensure the safety and security of these devices [24][25][26].…”
Section: Introductionmentioning
confidence: 99%
“…Robotics has been one of the most popular research topics in recent years. Among these, intelligent robots have gained much popularity [53][54][55][56][57]. Despite this, these devices are quite difficult to navigate and control, and trajectory planning is very important to ensure the safety and security of these devices [24][25][26].…”
Section: Introductionmentioning
confidence: 99%
“…According to the researchers [35], WBAN is a wireless sensor-based network and these sensors are connected to the human body that is used to measure the psychological information of patients. This information is transmitted to doctors remotely so that the doctor could diagnose the patient's problems remotely.…”
Section: Problem Formulationmentioning
confidence: 99%
“…In a society with highly complex and connected systems, accidents and dangers become commonplace, and avoiding them becomes virtually impossible [3]. With the advent of the big data society and the concentration of data that stays in each region in the center, not only the power of data but also the size of the risk and the probability of the occurrence of the risk in case of personal information leakage has increased [4][5][6]. In general, in the relationship of personal information transactions where consumers provide personal information to data platform companies and companies provide related services to consumers, consumers and companies trade risks related to the personal information infringement through mutual contracts.…”
Section: Introductionmentioning
confidence: 99%