2016
DOI: 10.14257/ijsia.2016.10.11.02
|View full text |Cite
|
Sign up to set email alerts
|

Secure Wireless Body Area Network (WBAN) Communication Method Using New Random Key Management Scheme

Abstract: Wireless Body Area Networks (WBANs)

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
3
3

Relationship

0
6

Authors

Journals

citations
Cited by 11 publications
(7 citation statements)
references
References 20 publications
(22 reference statements)
0
5
0
Order By: Relevance
“…This type of attack concentrates on efficient results such as a high delivery rate and lesser delay. Spoofing attacker [ 57 ] Jamming Attack [ 21 ] DoS Attacks [ 36 ] Vulnerable attacks [ 26 ] High and low-rate attacks [ 27 ] …”
Section: Discussion and Recommendationsmentioning
confidence: 99%
See 3 more Smart Citations
“…This type of attack concentrates on efficient results such as a high delivery rate and lesser delay. Spoofing attacker [ 57 ] Jamming Attack [ 21 ] DoS Attacks [ 36 ] Vulnerable attacks [ 26 ] High and low-rate attacks [ 27 ] …”
Section: Discussion and Recommendationsmentioning
confidence: 99%
“…Figure 7 shows the comparison of attacker detection techniques. Spoofing attacker detection method [ 57 ] obtained the 75% of delivery rate after detecting the attacks, Jamming Attack detection method [ 21 ] obtained the 72% of the delivery rate, DoS attack detection method obtained 82% of delivery rate, Vulnerable attack detection methods [ 26 ] obtained 84% of delivery rate and High and low-rate attack detection method [ 27 ] obtained the 89% of delivery rate. Here high and low-rate attacks achieve a higher delivery rate and that leads to lesser delay compared to other techniques.…”
Section: Discussion and Recommendationsmentioning
confidence: 99%
See 2 more Smart Citations
“…In modern communication systems, data security efforts are crucial, especially for communication in wireless networks [1]- [5]. This underlines the need for a shared secret key to secure communication through the public network.…”
Section: Introductionmentioning
confidence: 99%