2017
DOI: 10.14569/ijacsa.2017.080724
|View full text |Cite
|
Sign up to set email alerts
|

Efficient Key Agreement and Nodes Authentication Scheme for Body Sensor Networks

Abstract: Abstract-Technological evolvement of Wireless SensorNetworks (WSNs) gave birth to an attractive research area for health monitoring called Body Sensor Network (BSN). In BSN tiny sensor nodes sense physiological data of patients under medical health care and transmit this data to Base Station (BS) and then forward to Medical Server (MS). BSN is exposed to security threats due to vulnerable wireless channel. Protection of human physiological data against adversaries is a major addressable issue while keeping con… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
5
0

Year Published

2018
2018
2022
2022

Publication Types

Select...
3
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(5 citation statements)
references
References 27 publications
0
5
0
Order By: Relevance
“…On the other hand, signature based schemes have also been developed to prevent non-repudiations. For instance, a lightweight distributed model based on signatures is introduced by Alaparthy and Morgera [56] , while an energy-efficient scheme for key agreement and authentication is developed by Iqbal, J. et al [57] . Unfortunately, many security attacks cannot be prevented in this protocol [57] .…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…On the other hand, signature based schemes have also been developed to prevent non-repudiations. For instance, a lightweight distributed model based on signatures is introduced by Alaparthy and Morgera [56] , while an energy-efficient scheme for key agreement and authentication is developed by Iqbal, J. et al [57] . Unfortunately, many security attacks cannot be prevented in this protocol [57] .…”
Section: Related Workmentioning
confidence: 99%
“…For instance, a lightweight distributed model based on signatures is introduced by Alaparthy and Morgera [56] , while an energy-efficient scheme for key agreement and authentication is developed by Iqbal, J. et al [57] . Unfortunately, many security attacks cannot be prevented in this protocol [57] . An authentication scheme for wearable sensors has been developed by Li, X. et al [58] .…”
Section: Related Workmentioning
confidence: 99%
“…Further, the protocol in [44] is vulnerable to denial of service attacks and cannot uphold perfect forward secrecy [49] nor can it ensure session key agreement. To prevent this attack, an energy-efficient authentication and key agreement protocol is developed in [50]. Although the technique incurs less communication, memory and computation overheads [51], it cannot withstand many security attacks [52].…”
Section: Related Workmentioning
confidence: 99%
“…The proposed protocol [27] works between the sensor nodes (SN), controller (BS), and a medical server (MS). The SNs are (implanted) medical devices that sense vital physiological information.…”
Section: Iqbal Et Al's Protocolmentioning
confidence: 99%
“…Next, we used two well-known security verification approaches, BAN logic [21] and AVISPA [22], to formally analyze the authentication protocols. Unfortunately, many security protocols designed for IMDs are not formally verified, or they use only one verification method [23][24][25][26][27][28][29][30].…”
Section: Introductionmentioning
confidence: 99%