2023
DOI: 10.1016/j.smhl.2023.100413
|View full text |Cite
|
Sign up to set email alerts
|

An end-to-end authentication mechanism for Wireless Body Area Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2023
2023
2023
2023

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(1 citation statement)
references
References 20 publications
0
1
0
Order By: Relevance
“…Techniques like data integrity checks, digital signatures, and hash functions can help detect and prevent data tampering [85]- [88]. However, anauthorized access refers to the attempt by an unauthorized entity to gain access to the WBAN network or its resources [89], [90]. Attackers may try to exploit vulnerabilities in the network infrastructure or compromise weak authentication mechanisms to gain unauthorized access.…”
Section: Security and Threats Issuesmentioning
confidence: 99%
“…Techniques like data integrity checks, digital signatures, and hash functions can help detect and prevent data tampering [85]- [88]. However, anauthorized access refers to the attempt by an unauthorized entity to gain access to the WBAN network or its resources [89], [90]. Attackers may try to exploit vulnerabilities in the network infrastructure or compromise weak authentication mechanisms to gain unauthorized access.…”
Section: Security and Threats Issuesmentioning
confidence: 99%