The platform will undergo maintenance on Sep 14 at about 7:45 AM EST and will be unavailable for approximately 2 hours.
2011
DOI: 10.5121/ijnsa.2011.3201
|View full text |Cite
|
Sign up to set email alerts
|

A Light Weight Protocol To Provide Location Privacy In Wireless Body Area Networks

Abstract: Location privacy is one of the major security problems in a Wireless Body Area Networks (WBANs

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
9
0

Year Published

2012
2012
2021
2021

Publication Types

Select...
6
2

Relationship

0
8

Authors

Journals

citations
Cited by 14 publications
(10 citation statements)
references
References 4 publications
0
9
0
Order By: Relevance
“…Traditionally, authentication in WSNs and BANs relied on the existence of prior security context [19], [20], [21], [22], [23]. If the device in BANs is physically compromised, the prior security context in the device will be disclosed to attackers.…”
Section: Related Workmentioning
confidence: 99%
“…Traditionally, authentication in WSNs and BANs relied on the existence of prior security context [19], [20], [21], [22], [23]. If the device in BANs is physically compromised, the prior security context in the device will be disclosed to attackers.…”
Section: Related Workmentioning
confidence: 99%
“…Many security experts in the field of wireless technologies have conducted research on different aspects within the security architecture of Bluetooth and have provided amazing results with new tweaks that enhances the security of the device within a network. Some commendable research work is mentioned in [6]. [7] and [8].…”
Section: Related Workmentioning
confidence: 99%
“…In [6], the authors have presented a light weight protocol to provide location privacy in wireless body area network. The basic idea of their protocol is on the use of temporary pseudonyms instead the use of hardware addresses to communicate in the wireless body area networks.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…solution the function used in the central system is just the inverse of the function used at the sensor node for cipher the data. There are few methods present [17] for key generation and cipher the data. …”
Section: A Complete Examplementioning
confidence: 99%