2018
DOI: 10.1002/spy2.25
|View full text |Cite
|
Sign up to set email alerts
|

Heterogeneous signcryption with keyword search for wireless body area network

Abstract: Wireless body area network (WBAN) is composed of sensors that capture and transmit physiological data to an application provider's (AP) remote server. When integrated into the Internet of Things (IoT) infrastructure, WBAN data can be accessed from anywhere and at anytime. A secure storage and access mechanism to this sensitive data is necessary within a heterogeneous IoT. Searchable encryption (SE) provides secure method that could be used by an AP for example, hospital employees to securely access a patient's… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
41
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 19 publications
(44 citation statements)
references
References 29 publications
0
41
0
Order By: Relevance
“…This scheme does not support forward secrecy, public verifiability, and protection against replay attack. Omala et al [15] proposed a keyword search technique for WBAN based on heterogeneous signcryption, in which the data owner uses the concept of CLI, while the server and receiver utilize the PKI functionality. This heterogeneous signcryption generates the mathematical structure of bilinear pairing.…”
Section: Related Work On Signcryption For Wbanmentioning
confidence: 99%
See 1 more Smart Citation
“…This scheme does not support forward secrecy, public verifiability, and protection against replay attack. Omala et al [15] proposed a keyword search technique for WBAN based on heterogeneous signcryption, in which the data owner uses the concept of CLI, while the server and receiver utilize the PKI functionality. This heterogeneous signcryption generates the mathematical structure of bilinear pairing.…”
Section: Related Work On Signcryption For Wbanmentioning
confidence: 99%
“…The schemes proposed in [9,13,14,17] used the concept of certificateless signcryption technique. The technique used in [18] is based on certificate-based signcryption, and the schemes in [11,15,16,19] are on the basis of heterogeneous signcryption techniques.…”
Section: Goal(s) Of Research Strengthsmentioning
confidence: 99%
“…Furthermore, Omala et al 40 put forward a heterogeneous signcryption in which the messages were transmitted from CLC to IBC. Based on this scheme, they also combined with the keyword search to construct a new protocol 41 . Nonetheless, we observe that the heterogeneous signcryption scheme with equality test from the PKI to CLC had not been suggested.…”
Section: Related Workmentioning
confidence: 99%
“…We take the competitive schemes in Reference 18, References 18+ 26, References 21,22,37,38,41, and the PK‐CLET into consideration to execute the comparison operations. For evaluating the time overhead of competitive works, we utilize the computer to deploy the simulation experiment, which own the Intel Core i5‐8400CPU @ 2.80 GHz as well as 16.00 GB memory.…”
Section: Comparisonmentioning
confidence: 99%
“…We need a mechanism to decrease computation time during decryption and verification processes. Signcryption is an advanced technique to execute signature and encryption in one step to reduce communication as well as computational costs, where a signcryption scheme ensures both confidentiality and authenticity of data being communicated over a public channel . It is useful in various applications in our daily life.…”
Section: Introductionmentioning
confidence: 99%