2016
DOI: 10.1109/tmscs.2016.2525997
|View full text |Cite
|
Sign up to set email alerts
|

Secure and Efficient Data Communication Protocol for Wireless Body Area Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
91
0

Year Published

2017
2017
2023
2023

Publication Types

Select...
5
2
2

Relationship

3
6

Authors

Journals

citations
Cited by 117 publications
(91 citation statements)
references
References 38 publications
0
91
0
Order By: Relevance
“…KP ABE was adopted by [33] to broadcast a single encrypted message to a specific group of users. Reference [13] utilizes the Linear Secret Sharing to construct the access policy [22,34] and then enforce access control. However, most of the works done before have no implementation and real life performance analysis.…”
Section: Related Workmentioning
confidence: 99%
“…KP ABE was adopted by [33] to broadcast a single encrypted message to a specific group of users. Reference [13] utilizes the Linear Secret Sharing to construct the access policy [22,34] and then enforce access control. However, most of the works done before have no implementation and real life performance analysis.…”
Section: Related Workmentioning
confidence: 99%
“…The first one is the weakness or none of user anonymity [3,[5][6][7][8][9][10][11][12][13][14], which would cause being tracked easily. The second one is information leakage of the lost smart card [3,[6][7][8][9][10][11][12][13][14], which causes the attacker can do guesswork in a smaller space after extracting the information in the smart card. The third one is security recovery when system secret information is revealed [3, 5 -12], in which case, the system cannot update secret information conveniently because all users must register again.…”
Section: Advances In Computer Science Research Volume 44mentioning
confidence: 99%
“…From the top, the HWSN is divided into three layers, the gateway, the cluster head and the sensor nodes. Some protocols have been suggested on the security of HWSN [3,[5][6][7][8][9][10][11][12][13][14], in which several problems exist in the user authentication. After investigating the main technology of authentication, an enhanced secure anonymity user authentication protocol will be proposed by combing three factors of smart card, user password, and user biometrics in this paper.…”
Section: Introductionmentioning
confidence: 99%
“…For example, more than 400, 000 electronic eyes in Beijing may lead to privacy leakage (e.g., vehicle location information) by data sharing in vehicular ad hoc networks (VANETs) [6][7][8]. Similarly, we can also gain illegal access to personal health datasets gathered from various sensors of physical sign in body sensor networks (BSNs) and publish these private data without permission [9][10][11]. As a result, how to protect user privacy is one of the important research issues in fog computing.…”
Section: Introductionmentioning
confidence: 99%