132
Views
21
CrossRef citations to date
0
Altmetric
Articles

Authentication protocols for wireless body area network with key management approach

&

References

  • Shi L, Li M, Yu S, Yuan J. Bana: body area network authentication exploiting channel characteristics. Selected Areas in Communications, IEEE Journal on 2013; 31(9): 1803–1816.
  • K. M. Pouryazdanpanah, M. Anjomshoa, S. A. Salehi, A. Afroozeh, and G. M. Moshfegh, “DSVBF: Dual sink vector-based routing protocol for underwater wireless sensor network,” in Control and System Graduate Research Colloquium (ICSGRC), 2014 IEEE 5th, 2014, pp. 227-232: IEEE.
  • R. Cavallari, F. Martelli, R. Rosini, C. Buratti, and R. Verdone, “A survey on wireless body area networks: Technologies and design challenges,” IEEE Communications Surveys & Tutorials, vol. 16, no. 3, pp. 1635-1657, 2014. doi: 10.1109/SURV.2014.012214.00007
  • A. Rahim, N. Javaid, M. Aslam, Z. Rahman, U. Qasim, and Z. Khan, “A comprehensive survey of MAC protocols for wireless body area networks,” in Broadband, Wireless Computing, Communication and Applications (BWCCA), 2012 Seventh International Conference on, 2012, pp. 434-439: IEEE
  • S. A. Salehi, M. Razzaque, I. Tomeo-Reyes, N. Hussain, and V. Kaviani, “Efficient high-rate key management technique for wireless body area networks,” in Communications (APCC), 2016 22nd Asia-Pacific Conference on, 2016, pp. 529-534: IEEE.
  • Masdari, M., & Ahmadzadeh, S. (2016). Comprehensive analysis of the authentication methods in wireless body area networks. Security and Communication Networks, 9(17), 4777-4803. doi: 10.1002/sec.1642
  • Pomalaza-Ráez C, Taparugssanagorn A. The UWB Channel in Medical Wireless Body Area Networks(WBANs). INTECH Open Access Publisher: Rijeka Croatia, 2012.
  • Wireless Body Area Networks: A Survey Samaneh Movassaghi, Student Member, IEEE, Mehran Abolhasan, Senior Member, IEEE, Justin Lipman, Member, IEEE, David Smith, Member, IEEE, and Abbas Jamalipour, Fellow, IEE
  • M. Hanson, H. Powell, A. Barth, K. Ringgenberg, B. Calhoun, J. Aylor, and J. Lach, “Body area sensor networks: Challenges and opportunities,” Computer, vol. 42, pp. 58–65, Jan. 2009. doi: 10.1109/MC.2009.5
  • Elhayatmy, G., Dey, N., & Ashour, A. S. (2018). Internet of things based wireless body area network in healthcare. In Internet of Things and Big Data Analytics Toward Next-Generation Intelligence (pp. 3-20). Springer, Cham.
  • Safaric, S., & Malaric, K. (2006, June). ZigBee wireless standard. In Multimedia Signal Processing and Communications, 48th International Symposium ELMAR2006 focused on (pp. 259-262). IEEE.
  • Lee, J. S. (2006). Performance evaluation of IEEE 802.15. 4 for low-rate wireless personal area networks. IEEE Transactions on Consumer Electronics, 52(3), 742–749. doi: 10.1109/TCE.2006.273150
  • M. A. M. Vieira, C. N. Coelho, D.C. Silva, and J. M. Mata, “Survey on wireless sensor network devices,” in Proc. IEEE Int. Conf. Emerging Technologies and Factory Automation (ETFA’03), Lisbon, Portugal, September 2003, vol. 1, pp. 537-544.
  • Hegde, A., & Prasad, D. (2017, December). Evaluation of PHY and MAC layer in WBAN using Castalia: Lower layer parameters of WBAN in Castalia. In 2017 International Conference on Intelligent Sustainable Systems (ICISS) (pp. 395–399). IEEE.
  • Ullah, S., Higgins, H., Braem, B., Latre, B., Blondia, C., Moerman, I., … & Kwak, K. S. (2012). A comprehensive survey of wireless body area networks. Journal of medical systems, 36(3), 1065-1094 doi: 10.1007/s10916-010-9571-3
  • Datta, S. (2008). Potential for improving decision support catalysed by semantic interoperability between systems.
  • Rushanan, M., Rubin, A. D., Kune, D. F., & Swanson, C. M. (2014, May). Sok: Security and privacy in implantable medical devices and body area networks. In 2014 IEEE Symposium on Security and Privacy (SP) (pp. 524-539). IEEE.
  • Amin, R., Islam, S. H., Biswas, G. P., Khan, M. K., & Kumar, N. (2018). A robust and anonymous patient monitoring system using wireless medical sensor networks. Future Generation Computer Systems, 80, 483-495 doi: 10.1016/j.future.2016.05.032
  • Tang, W., Zhang, K., Ren, J., Zhang, Y., & Shen, X. S. (2018). Flexible and Efficient Authenticated Key Agreement Scheme for BANs Based on Physiological Features. IEEE Transactions on Mobile Computing
  • X. Li, M.H. Ibrahim, S. Kumari, A.K. Sangaiah, V. Gupta, K.-K.R. Choo, Anonymous mutual authentication and key agreement scheme for wearable sensors in wireless body area networks, Comput. Netw. 129 (2017) 429–443. doi: 10.1016/j.comnet.2017.03.013
  • Lee TF, Chang IP, Lin TH, Wang CC. A secure and efficient password-based user authentication scheme using smart cards for the integrated epr information system. Journal of medical systems. 2013; 37(3).
  • Wen F. A more secure anonymous user authentication scheme for the integrated EPR information system. Journal of medical systems. 2014; 38(5).
  • Das AK. A secure and robust password-based remote user authentication scheme using smart cards for the integrated epr information system. Journal of medical systems. 2015; 39(3).
  • Jung J, Kim J, Choi Y, Won D. An Anonymous User Authentication and Key Agreement Scheme Based on a Symmetric Cryptosystem in Wireless Sensor Networks. Sensors. 2016; 16(8):1299 doi: 10.3390/s16081299
  • Kang D, Jung J, Mun J, Lee D, Choi Y, Won D. Efficient and robust user authentication scheme that achieve user anonymity with a Markov chain. Security and Communication Networks. 2016; 9 (11). doi: 10.1002/sec.1432
  • Anonymous hybrid mutual authentication and key agreement scheme for wireless body area network Aneesh M. Koya *, Deepthi P. Department of Electronics and Communication Engineering, National Institute of Technology, Calicut, Kerala, India (2018)
  • Alia MA, Tamimi AA, AL-Allaf ON. Cryptography Based Authentication Methods. in Proceedings of the World Congress on Engineering and Computer Science. 2014.
  • Kandola S. A Survey of Cryptographic Algorithms. St. Lawrence University: Minnesota, USA, 2013
  • Ma L, Ge Y, Zhu Y. TinyZKP: a lightweight authentication scheme based on zero-knowledge proof for wireless body area networks. Wireless Personal Communications 2014; 77(2): 1077–1090 doi: 10.1007/s11277-013-1555-4
  • Kumbhare YL, Rangaree PH, Asutkar DG. Wireless Body Area Sensor Network Authentication using HMAC function. in 2nd National Conference on Information and Communication Technology (NCICT). 2011.
  • Ramli SN, Ahmad R, Abdollah MF, Dutkiewicz E. A biometric-based security for data authentication in Wireless Body Area Network (WBAN). in Advanced Communication Technology (ICACT), 2013 15th International Conference on. 2013. IEEE.
  • Shi L, Li M, Yu S, Yuan J. Bana: body area network authentication exploiting channel characteristics. Selected Areas in Communications, IEEE Journal on 2013; 31(9): 1803–1816
  • Y. Ren, V. Oleshchuk, F. Y. Li, and S. Sulistyo, “FoSBaS: A bi-directional secrecy and collusion resilience key management scheme for BANs,” in Wireless Communications and Networking Conference (WCNC), 2012 IEEE, 2012, pp. 2841-2846.
  • D. Malan, T. Fulford-Jones, M. Welsh, and S. Moulton, “Codeblue: An ad hoc sensor network infrastructure for emergency medical care,” in International workshop on wearable and implantable body sensor networks, 2004.
  • Ferrag, Mohamed Amine, et al. “Authentication protocols for Internet of Things: a comprehensive survey.” Security and Communication Networks 2017 (2017).
  • Toorani, Mohsen. “On vulnerabilities of the security association in the IEEE 802.15. 6 standard.” International Conference on Financial Cryptography and Data Security. Springer, Berlin, Heidelberg, 2015.
  • Xili Wu, Juan Qu & Yuming Feng (2018) Security enhancement on an anonymous authentication scheme for wireless communications using smart cards, Journal of Discrete Mathematical Sciences and Cryptography, 21:5, 1139-1155, DOI: 10.1080/09720529.2018.1489426

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.