2011
DOI: 10.1002/wcm.884
|View full text |Cite
|
Sign up to set email alerts
|

Hybrid security protocol for wireless body area networks

Abstract: Wireless body area networks (WBANs) are receiving a significant interest as an emerging technology in next generation wireless networks. Security challenges as well as this interest are also beginning to rise to the surface. We derived specific security requirements from WBANs, and proposed a new hybrid security protocol for WBANs which satisfies these requirements. This proposed protocol dealt with the overall security including up to the in-, on-, and out-body, and utilized two heterogeneous cryptosystems (t… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
37
0

Year Published

2013
2013
2022
2022

Publication Types

Select...
3
2
2

Relationship

0
7

Authors

Journals

citations
Cited by 41 publications
(37 citation statements)
references
References 14 publications
0
37
0
Order By: Relevance
“…In sensor networks many security protocols with symmetric as well as asymmetric keys are employed to obtain privacy, reliability and accuracy during data transmission C. S. lang, et.al [6]. Whereas, the BSN is the different from other ad-hoc networks because of interference in body mobility and inadequate computing resources of human body, therefore simple and efficient authentication and confidentiality techniques are very important in BSN.…”
Section: Fig 1 Body Sensor Network Architecture [9]mentioning
confidence: 98%
See 1 more Smart Citation
“…In sensor networks many security protocols with symmetric as well as asymmetric keys are employed to obtain privacy, reliability and accuracy during data transmission C. S. lang, et.al [6]. Whereas, the BSN is the different from other ad-hoc networks because of interference in body mobility and inadequate computing resources of human body, therefore simple and efficient authentication and confidentiality techniques are very important in BSN.…”
Section: Fig 1 Body Sensor Network Architecture [9]mentioning
confidence: 98%
“…Whereas, some researchers introduce the hybrid approach for symmetric and asymmetric to increase the security and privacy in BSN. C. S. lang, et.al [6], presents a hybrid technique in a more effective way to implement authentication, integrity and confidentiality, all these conventional approaches are based on public or private keys to secure human body information in BSN.…”
Section: Fig 1 Body Sensor Network Architecture [9]mentioning
confidence: 99%
“…A hybrid security protocol for WBANs is presented by Jang et al [64] in, called Hybrid Security-WBAN (HS-WBAN), which applies a combination of symmetric key and public key cryptography. HS-WBAN uses symmetric key cryptography for the communication between sensors and asymmetric keys for the communication between the sensor and sink.…”
Section: Public Key-based Authenticationmentioning
confidence: 99%
“…They meet the issue of secrecy and confidentiality at only the expense of high computation and memory requirement. Security protocols for Sensor Networks operates on set of protocols for achieving authenticity, security, confidentiality, integrity [6] . It uses several symmetric keys and encryption algorithms to encrypt the data as well as compute the Message Authentication Code (MAC) [3] [7] [9] .…”
Section: Existing Systemmentioning
confidence: 99%