2019
DOI: 10.1016/j.jisa.2019.03.008
|View full text |Cite
|
Sign up to set email alerts
|

A secure authentication protocol for wearable devices environment using ECC

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
10
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 14 publications
(11 citation statements)
references
References 22 publications
0
10
0
Order By: Relevance
“…However, each client in our model is directly connected to the server when authenticating, so the process to be fast. This is very different from systems that have many nodes and are connected serially [17,45]. They need more processing based on the number of nodes.…”
Section: Running Time Comparisonmentioning
confidence: 99%
See 2 more Smart Citations
“…However, each client in our model is directly connected to the server when authenticating, so the process to be fast. This is very different from systems that have many nodes and are connected serially [17,45]. They need more processing based on the number of nodes.…”
Section: Running Time Comparisonmentioning
confidence: 99%
“…The mechanism to generate keys need extra time in each execution, but it does not require security and store of keys in the system as in the smart grid [24] and smart city models [38]. Compared to other models based on symmetric cryptosystem [17,33,45], our proposed protocol does not need secure key distribution.…”
Section: Running Time Comparisonmentioning
confidence: 99%
See 1 more Smart Citation
“…In addition, several studies have reported the feasibility of using wearables to authenticate users’ identity from the continuous collection of user-centric data, such as heart rate, body temperature, ECG signals or body motion [ 413 , 414 , 415 ]. Concerning device authentication, which cannot implement traditional protocols due to their energy and time consumption, a number of lightweight authentication protocols have already been presented [ 416 , 417 , 418 , 419 ].…”
Section: Information Security: Requirements Attacks and Solutionsmentioning
confidence: 99%
“…Fotouhi et al [23] propose a new lightweight hash chain-based and forward secure authentication scheme for WBAN. Kumar et al [24] presented an ECC-based authentication scheme for wearable devices environment. Jegadeesan et al [25] proposed an efficient privacy-preserving anonymous authentication for WBAN.…”
Section: Related Workmentioning
confidence: 99%