Anonymous Authentication for Wireless Body Area Networks With Provable Security

Advances in wireless communications, embedded systems, and integrated circuit technologies have enabled the wireless body area network (WBAN) to become a promising networking paradigm. Over the last decade, as an important part of the Internet of Things, we have witnessed WBANs playing an increasing...

Full description

Saved in:
Bibliographic Details
Published inIEEE systems journal Vol. 11; no. 4; pp. 2590 - 2601
Main Authors He, Debiao, Zeadally, Sherali, Kumar, Neeraj, Lee, Jong-Hyouk
Format Journal Article
LanguageEnglish
Published IEEE 01.12.2017
Subjects
Online AccessGet full text

Cover

Loading…
Abstract Advances in wireless communications, embedded systems, and integrated circuit technologies have enabled the wireless body area network (WBAN) to become a promising networking paradigm. Over the last decade, as an important part of the Internet of Things, we have witnessed WBANs playing an increasing role in modern medical systems because of its capabilities to collect real-time biomedical data through intelligent medical sensors in or around the patients' body and send the collected data to remote medical personnel for clinical diagnostics. WBANs not only bring us conveniences but also bring along the challenge of keeping data's confidentiality and preserving patients' privacy. In the past few years, several anonymous authentication (AA) schemes for WBANs were proposed to enhance security by protecting patients' identities and by encrypting medical data. However, many of these schemes are not secure enough. First, we review the most recent AA scheme for WBANs and point out that it is not secure for medical applications by proposing an impersonation attack. After that, we propose a new AA scheme for WBANs and prove that it is provably secure. Our detailed analysis results demonstrate that our proposed AA scheme not only overcomes the security weaknesses in previous schemes but also has the same computation costs at a client side.
AbstractList Advances in wireless communications, embedded systems, and integrated circuit technologies have enabled the wireless body area network (WBAN) to become a promising networking paradigm. Over the last decade, as an important part of the Internet of Things, we have witnessed WBANs playing an increasing role in modern medical systems because of its capabilities to collect real-time biomedical data through intelligent medical sensors in or around the patients' body and send the collected data to remote medical personnel for clinical diagnostics. WBANs not only bring us conveniences but also bring along the challenge of keeping data's confidentiality and preserving patients' privacy. In the past few years, several anonymous authentication (AA) schemes for WBANs were proposed to enhance security by protecting patients' identities and by encrypting medical data. However, many of these schemes are not secure enough. First, we review the most recent AA scheme for WBANs and point out that it is not secure for medical applications by proposing an impersonation attack. After that, we propose a new AA scheme for WBANs and prove that it is provably secure. Our detailed analysis results demonstrate that our proposed AA scheme not only overcomes the security weaknesses in previous schemes but also has the same computation costs at a client side.
Author Kumar, Neeraj
Lee, Jong-Hyouk
Zeadally, Sherali
He, Debiao
Author_xml – sequence: 1
  givenname: Debiao
  surname: He
  fullname: He, Debiao
  email: hedebiao@163.com
  organization: State Key Laboratory of Software Engineering, Computer School, Wuhan University, Wuhan, China
– sequence: 2
  givenname: Sherali
  surname: Zeadally
  fullname: Zeadally, Sherali
  email: szeadally@uky.edu
  organization: College of Communication and Information, University of Kentucky, Lexington, KY, US
– sequence: 3
  givenname: Neeraj
  surname: Kumar
  fullname: Kumar, Neeraj
  email: neeraj.kumar@thapar.edu
  organization: Department of Computer Science and Engineering, Thapar University, Patiala, India
– sequence: 4
  givenname: Jong-Hyouk
  surname: Lee
  fullname: Lee, Jong-Hyouk
  email: jonghyouk@smu.ac.kr
  organization: Department of Computer Science and Engineering, Sangmyung, Cheonan, South
BookMark eNp9kMtOwzAQRS1UJNrCD8DGP5DiZ2IvQ8VTFUVqEWIVOclENaQ1sl1Q_p60RSxYsJqRRueO7hmhwcZtAKFzSiaUEn35sHhdLCeM0HTCpBCKyCM0pJpniWZcDPY7SxRV4gSNQngjRCqZ6SGa531St3bbgPNtXMEm2spE6za4cR6_WA8thICvXN3h3IPBjxC_nH8P_S2u8JN3n6ZsAS-g2nobu1N03Jg2wNnPHKPnm-vl9C6ZzW_vp_ksqViaxYRyBtxUrKSmVA3QUhEhpawEo1pnpFamSbVQtVZAuZa8JkD6UkyWQDOtSj5G7JBbeReCh6b48HZtfFdQUuyUFHslxU5J8aOkh9QfqLJx3zZ6Y9v_0YsDagHg91cmpKIp4d93KXHH
CODEN ISJEB2
CitedBy_id crossref_primary_10_1109_JIOT_2019_2892009
crossref_primary_10_1109_TMC_2023_3297854
crossref_primary_10_1155_2018_8470949
crossref_primary_10_1016_j_comcom_2020_08_014
crossref_primary_10_1109_JIOT_2018_2876133
crossref_primary_10_1007_s10916_016_0620_4
crossref_primary_10_1007_s11277_017_4250_z
crossref_primary_10_1007_s10916_016_0595_1
crossref_primary_10_3390_su142013098
crossref_primary_10_1109_JIOT_2024_3432757
crossref_primary_10_1186_s13638_021_02022_1
crossref_primary_10_1016_j_jksuci_2019_04_013
crossref_primary_10_1002_dac_3305
crossref_primary_10_3390_s25030897
crossref_primary_10_1016_j_sysarc_2020_101883
crossref_primary_10_1109_JBHI_2017_2721545
crossref_primary_10_1109_TSC_2021_3059856
crossref_primary_10_1155_2019_5860286
crossref_primary_10_1016_j_sysarc_2019_101655
crossref_primary_10_1109_TII_2019_2925071
crossref_primary_10_1109_JIOT_2021_3068364
crossref_primary_10_1007_s11036_016_0793_6
crossref_primary_10_1007_s11036_021_01840_3
crossref_primary_10_1109_JSAC_2020_3020599
crossref_primary_10_3390_cryptography8040052
crossref_primary_10_1016_j_comnet_2024_110938
crossref_primary_10_1109_TITS_2024_3413321
crossref_primary_10_1109_JIOT_2019_2959602
crossref_primary_10_4236_ijcns_2018_112002
crossref_primary_10_1109_ACCESS_2021_3058180
crossref_primary_10_1109_JIOT_2022_3171791
crossref_primary_10_1109_JSYST_2016_2574719
crossref_primary_10_1007_s10207_021_00543_w
crossref_primary_10_1109_JSYST_2020_2990749
crossref_primary_10_1002_sec_1573
crossref_primary_10_1155_2021_6577492
crossref_primary_10_1186_s13638_019_1524_z
crossref_primary_10_1007_s10586_019_03036_7
crossref_primary_10_1016_j_jisa_2019_04_004
crossref_primary_10_1007_s11227_016_1886_5
crossref_primary_10_1016_j_compeleceng_2022_107867
crossref_primary_10_1109_ACCESS_2023_3325130
crossref_primary_10_1155_2021_4939589
crossref_primary_10_1007_s10916_016_0670_7
crossref_primary_10_1109_TAP_2021_3090852
crossref_primary_10_1109_ACCESS_2018_2853985
crossref_primary_10_1007_s10723_023_09731_5
crossref_primary_10_1109_JIOT_2021_3098007
crossref_primary_10_1007_s11277_019_07005_6
crossref_primary_10_1145_3575811
crossref_primary_10_35940_ijitee_K9461_09101121
crossref_primary_10_1109_JIOT_2020_2970974
crossref_primary_10_1002_sec_1680
crossref_primary_10_1007_s12083_017_0581_5
crossref_primary_10_1007_s12083_020_00973_8
crossref_primary_10_1109_JIOT_2021_3062630
crossref_primary_10_1002_nem_1937
crossref_primary_10_3390_bdcc6040148
crossref_primary_10_1007_s11704_023_2548_4
crossref_primary_10_1007_s10916_017_0720_9
crossref_primary_10_3390_asi5040079
crossref_primary_10_1007_s11235_016_0222_y
crossref_primary_10_1016_j_adhoc_2023_103332
crossref_primary_10_1007_s40012_018_0191_2
crossref_primary_10_1016_j_sysarc_2022_102821
crossref_primary_10_1109_JIOT_2021_3078702
crossref_primary_10_1080_03091902_2019_1707890
crossref_primary_10_1016_j_jnca_2018_09_008
crossref_primary_10_1016_j_pmcj_2023_101753
crossref_primary_10_1002_dac_5267
crossref_primary_10_1007_s11276_020_02470_5
crossref_primary_10_1109_ACCESS_2019_2893918
crossref_primary_10_1109_TBDATA_2022_3148181
crossref_primary_10_1109_ACCESS_2019_2948207
crossref_primary_10_1007_s10586_020_03121_2
crossref_primary_10_1049_iet_com_2016_0091
crossref_primary_10_1177_18479790251318538
crossref_primary_10_1016_j_comnet_2019_03_006
crossref_primary_10_1016_j_jisa_2021_102761
crossref_primary_10_1007_s11277_017_4508_5
crossref_primary_10_1155_2018_9436120
crossref_primary_10_1109_TDSC_2020_3025288
crossref_primary_10_1155_2017_3194845
crossref_primary_10_1007_s13369_021_05532_8
crossref_primary_10_32604_cmc_2024_049608
crossref_primary_10_3390_s22093539
crossref_primary_10_2139_ssrn_4017049
crossref_primary_10_1109_JIOT_2021_3088641
crossref_primary_10_1007_s12652_020_02728_y
crossref_primary_10_1007_s10916_019_1458_3
crossref_primary_10_1007_s12065_022_00759_2
crossref_primary_10_1016_j_adhoc_2020_102374
crossref_primary_10_3390_s21248383
crossref_primary_10_1109_TGCN_2021_3077318
crossref_primary_10_1002_dac_4077
crossref_primary_10_1007_s10916_016_0592_4
crossref_primary_10_3390_app14083187
crossref_primary_10_1109_ACCESS_2021_3115706
crossref_primary_10_1016_j_comnet_2021_108687
crossref_primary_10_1155_2022_2793116
crossref_primary_10_1002_itl2_304
crossref_primary_10_1007_s00779_017_1055_8
crossref_primary_10_1109_ACCESS_2020_2985261
crossref_primary_10_1007_s11277_020_07702_7
crossref_primary_10_3233_IDT_170182
crossref_primary_10_1007_s11277_021_08565_2
crossref_primary_10_1155_2017_2367312
crossref_primary_10_1002_dac_4181
crossref_primary_10_1007_s10916_016_0615_1
crossref_primary_10_1109_TBDATA_2017_2710347
crossref_primary_10_1155_2017_4364376
crossref_primary_10_1109_JSYST_2016_2633559
crossref_primary_10_4018_IJISP_2022010111
crossref_primary_10_1109_TIFS_2018_2850299
crossref_primary_10_1007_s10916_018_0998_2
crossref_primary_10_1007_s11432_018_9738_2
crossref_primary_10_1049_htl_2018_5006
crossref_primary_10_1109_JIOT_2023_3252565
crossref_primary_10_1016_j_jpdc_2018_10_007
crossref_primary_10_1007_s11276_024_03690_9
crossref_primary_10_1109_ACCESS_2016_2624558
crossref_primary_10_1002_dac_4253
crossref_primary_10_1109_ACCESS_2022_3180165
crossref_primary_10_1002_dac_3288
crossref_primary_10_1109_JIOT_2023_3262498
crossref_primary_10_1007_s00500_017_2488_8
crossref_primary_10_3390_s23010240
crossref_primary_10_1007_s11277_018_6005_x
crossref_primary_10_1007_s10916_018_0987_5
crossref_primary_10_1109_JIOT_2017_2761700
crossref_primary_10_1002_cta_3708
crossref_primary_10_1155_2018_4028196
crossref_primary_10_1109_JIOT_2021_3138989
crossref_primary_10_1007_s11276_022_03205_4
crossref_primary_10_3390_s24247967
crossref_primary_10_3390_jsan6020005
crossref_primary_10_1007_s10916_017_0693_8
crossref_primary_10_1109_ACCESS_2017_2673239
crossref_primary_10_3390_su142114625
crossref_primary_10_1109_ACCESS_2019_2953042
crossref_primary_10_1109_JIOT_2023_3317292
crossref_primary_10_1007_s10916_020_01598_3
crossref_primary_10_1002_cpe_7735
crossref_primary_10_1007_s11277_016_3740_8
crossref_primary_10_1007_s11277_016_3748_0
crossref_primary_10_1016_j_maturitas_2018_04_008
crossref_primary_10_1016_j_jmsy_2022_01_005
crossref_primary_10_1109_JSYST_2018_2881711
crossref_primary_10_3390_s20185148
crossref_primary_10_1002_dac_4823
crossref_primary_10_1155_2022_3086516
crossref_primary_10_1007_s10916_018_0990_x
crossref_primary_10_1109_ACCESS_2020_3031484
crossref_primary_10_1109_TNSE_2022_3205044
crossref_primary_10_1109_JSYST_2020_2992650
crossref_primary_10_1007_s11227_023_05749_4
crossref_primary_10_1109_TSG_2017_2720159
crossref_primary_10_3390_en16010008
crossref_primary_10_1007_s13369_017_2447_9
crossref_primary_10_1109_ACCESS_2018_2880898
crossref_primary_10_1109_JSYST_2019_2899580
crossref_primary_10_1007_s10916_016_0590_6
crossref_primary_10_1007_s11277_021_09020_y
crossref_primary_10_1155_2017_4167549
crossref_primary_10_1007_s11277_016_3352_3
crossref_primary_10_1016_j_cmpb_2018_02_002
crossref_primary_10_1109_ACCESS_2020_2989305
crossref_primary_10_1007_s00500_016_2231_x
crossref_primary_10_1007_s11042_019_7149_8
crossref_primary_10_1007_s11277_024_11051_0
crossref_primary_10_1007_s10916_016_0587_1
crossref_primary_10_1007_s12083_024_01686_y
crossref_primary_10_1016_j_cose_2022_102800
crossref_primary_10_1109_JSEN_2022_3198645
crossref_primary_10_1007_s12652_017_0516_2
crossref_primary_10_1007_s10916_018_0964_z
crossref_primary_10_1007_s11432_016_0161_2
crossref_primary_10_1016_j_jisa_2020_102499
crossref_primary_10_1186_s42400_020_00061_7
crossref_primary_10_1007_s10916_016_0613_3
crossref_primary_10_1002_ett_3677
crossref_primary_10_1007_s11277_017_5130_2
crossref_primary_10_1109_TNSE_2019_2961932
crossref_primary_10_1016_j_sysarc_2021_102307
crossref_primary_10_1145_3465171
crossref_primary_10_1109_TSUSC_2022_3221125
crossref_primary_10_1007_s00500_016_2244_5
crossref_primary_10_1007_s10586_016_0701_7
crossref_primary_10_1007_s12652_021_03655_2
crossref_primary_10_1007_s10916_016_0491_8
crossref_primary_10_3390_s23031121
crossref_primary_10_3390_s19020341
crossref_primary_10_3390_s17071482
crossref_primary_10_3390_sym12020287
crossref_primary_10_1007_s00500_017_2504_z
crossref_primary_10_1007_s11277_021_08969_0
crossref_primary_10_1007_s10586_024_04449_9
crossref_primary_10_1007_s10916_016_0586_2
crossref_primary_10_1109_ACCESS_2019_2942195
crossref_primary_10_1007_s00500_016_2271_2
crossref_primary_10_1007_s00500_017_2482_1
crossref_primary_10_1016_j_compeleceng_2023_108759
crossref_primary_10_33793_acperpro_02_03_104
crossref_primary_10_1007_s10207_021_00570_7
crossref_primary_10_1109_ACCESS_2020_3026630
crossref_primary_10_1007_s10916_017_0699_2
crossref_primary_10_1109_ACCESS_2020_3001152
crossref_primary_10_1007_s10916_016_0610_6
crossref_primary_10_1007_s11227_024_06801_7
crossref_primary_10_1016_j_jisa_2025_104031
crossref_primary_10_1371_journal_pone_0169414
crossref_primary_10_1016_j_tele_2018_09_001
crossref_primary_10_1007_s11277_016_3742_6
crossref_primary_10_1109_JSEN_2022_3141064
crossref_primary_10_1016_j_comnet_2016_12_013
crossref_primary_10_1007_s10207_023_00717_8
crossref_primary_10_1038_s41598_024_66603_y
crossref_primary_10_1155_2021_8876766
crossref_primary_10_1007_s11276_018_1704_5
crossref_primary_10_1007_s00779_017_1048_7
crossref_primary_10_1109_ACCESS_2017_2676119
crossref_primary_10_1002_dac_3814
crossref_primary_10_1109_TMC_2020_3048703
crossref_primary_10_47836_pjst_32_6_25
crossref_primary_10_1177_1550147718824465
crossref_primary_10_1002_ett_3509
crossref_primary_10_1007_s10586_017_0783_x
crossref_primary_10_1109_ACCESS_2021_3096188
crossref_primary_10_1109_TIFS_2020_2986881
crossref_primary_10_1007_s11277_016_3739_1
crossref_primary_10_1007_s11277_021_08509_w
crossref_primary_10_1002_sec_1652
crossref_primary_10_1109_ACCESS_2016_2637887
crossref_primary_10_1109_TVT_2019_2938968
crossref_primary_10_1109_TIFS_2016_2573746
crossref_primary_10_32604_cmc_2021_019051
crossref_primary_10_1016_j_comnet_2020_107333
crossref_primary_10_1109_TMC_2020_3015010
crossref_primary_10_1007_s10916_016_0585_3
crossref_primary_10_1109_JIOT_2017_2706752
crossref_primary_10_1109_JSYST_2022_3152742
crossref_primary_10_1016_j_bios_2023_115509
crossref_primary_10_1109_TBDATA_2017_2705048
crossref_primary_10_1007_s13369_021_05442_9
crossref_primary_10_1007_s11235_017_0340_1
crossref_primary_10_1080_02522667_2020_1799511
crossref_primary_10_1109_MVT_2020_2979261
crossref_primary_10_1007_s10207_019_00464_9
crossref_primary_10_1016_j_dcan_2024_11_012
crossref_primary_10_1109_ACCESS_2018_2847030
crossref_primary_10_1109_JSYST_2020_3036425
crossref_primary_10_1007_s11276_021_02652_9
crossref_primary_10_1002_dac_3251
crossref_primary_10_1109_JIOT_2023_3264565
Cites_doi 10.1007/s001450010003
10.1109/MWC.2010.5601959
10.1090/S0025-5718-1987-0866109-5
10.1145/1777406.1777410
10.1109/TITB.2009.2037617
10.1145/2185448.2185454
10.1145/2422966.2422975
10.1007/978-3-540-74853-3_15
10.1109/INFCOM.2010.5462095
10.1109/WCNC.2010.5506580
10.1016/j.jss.2011.06.061
10.1109/JSAC.2013.130913
10.1016/j.inffus.2011.01.001
10.1016/j.comnet.2009.12.008
10.1007/3-540-39799-X_31
10.1109/MCOM.2006.1632652
10.1007/3-540-45539-6_11
10.1109/TIT.1985.1057074
10.1145/1999995.2000016
10.1145/2462096.2462123
10.1109/ISSNIP.2007.4496869
10.1145/359340.359342
10.1147/sj.353.0609
10.1109/TPDS.2013.145
10.1109/SURV.2013.121313.00064
10.1145/1814433.1814466
10.1016/j.inffus.2012.12.002
10.1007/3-540-39568-7_5
10.1109/TIFS.2015.2473820
10.1109/WAINA.2012.125
10.1016/j.cose.2008.11.008
ContentType Journal Article
DBID 97E
RIA
RIE
AAYXX
CITATION
DOI 10.1109/JSYST.2016.2544805
DatabaseName IEEE All-Society Periodicals Package (ASPP) 2005–Present
IEEE All-Society Periodicals Package (ASPP) 1998–Present
IEEE Electronic Library (IEL)
CrossRef
DatabaseTitle CrossRef
DatabaseTitleList
Database_xml – sequence: 1
  dbid: RIE
  name: IEEE Electronic Library (IEL)
  url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/
  sourceTypes: Publisher
DeliveryMethod fulltext_linktorsrc
Discipline Engineering
EISSN 1937-9234
EndPage 2601
ExternalDocumentID 10_1109_JSYST_2016_2544805
7458160
Genre orig-research
GrantInformation_xml – fundername: Basic Science Research Program through the National Research Foundation of Korea (NRF) funded by the Ministry of Science, ICT & Future Planning
  grantid: NRF-2014R1A1A1006770
– fundername: National Natural Science Foundation of China
  grantid: 61572379; 61501333; U1536204
  funderid: 10.13039/501100001809
– fundername: National High-tech R&D Program of China
  grantid: 2015AA016004
– fundername: Research Fund of the Guangxi Key Laboratory of Trusted Software
  grantid: kx201529
– fundername: Natural Science Foundation of Hubei Province of China
  grantid: 2015CFB257
GroupedDBID 0R~
29I
4.4
5GY
5VS
6IK
97E
AAJGR
AARMG
AASAJ
AAWTH
ABAZT
ABQJQ
ABVLG
ACIWK
AENEX
AETIX
AGQYO
AGSQL
AHBIQ
AKJIK
AKQYR
ALMA_UNASSIGNED_HOLDINGS
ATWAV
BEFXN
BFFAM
BGNUA
BKEBE
BPEOZ
CS3
DU5
EBS
EJD
HZ~
IFIPE
IPLJI
JAVBF
LAI
M43
O9-
OCL
RIA
RIE
RNS
AAYXX
CITATION
RIG
ID FETCH-LOGICAL-c267t-132e3ac2b1ab8fe1b804555c4219970d8af6948d98e13953d0e080525be1798b3
IEDL.DBID RIE
ISSN 1932-8184
IngestDate Tue Jul 01 01:43:28 EDT 2025
Thu Apr 24 23:03:25 EDT 2025
Wed Aug 27 08:36:58 EDT 2025
IsPeerReviewed true
IsScholarly true
Issue 4
Language English
License https://ieeexplore.ieee.org/Xplorehelp/downloads/license-information/IEEE.html
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c267t-132e3ac2b1ab8fe1b804555c4219970d8af6948d98e13953d0e080525be1798b3
PageCount 12
ParticipantIDs ieee_primary_7458160
crossref_primary_10_1109_JSYST_2016_2544805
crossref_citationtrail_10_1109_JSYST_2016_2544805
ProviderPackageCode CITATION
AAYXX
PublicationCentury 2000
PublicationDate 2017-Dec.
2017-12-00
PublicationDateYYYYMMDD 2017-12-01
PublicationDate_xml – month: 12
  year: 2017
  text: 2017-Dec.
PublicationDecade 2010
PublicationTitle IEEE systems journal
PublicationTitleAbbrev JSYST
PublicationYear 2017
Publisher IEEE
Publisher_xml – name: IEEE
References ref35
cai (ref10) 0
ref13
ref34
ref12
ref15
ref36
ref14
ref31
he (ref30) 2012; 13
ref33
ref11
ref32
ref2
ref39
ref17
ref38
ref16
ref19
ref18
yoon (ref29) 0
samaneh (ref1) 2014; 16
jiang (ref21) 0
shen (ref23) 2015; 16
guo (ref22) 2014; 15
ref24
chatterjee (ref41) 2014; 21
ref25
ref20
ref28
ref27
ref8
ref7
ref9
toorani (ref3) 2015
ref6
ref5
toorani (ref4) 2015; 17
ref40
hankerson (ref26) 2004
scott (ref37) 0
References_xml – ident: ref36
  doi: 10.1007/s001450010003
– ident: ref9
  doi: 10.1109/MWC.2010.5601959
– ident: ref25
  doi: 10.1090/S0025-5718-1987-0866109-5
– ident: ref7
  doi: 10.1145/1777406.1777410
– ident: ref8
  doi: 10.1109/TITB.2009.2037617
– ident: ref15
  doi: 10.1145/2185448.2185454
– ident: ref20
  doi: 10.1145/2422966.2422975
– ident: ref12
  doi: 10.1007/978-3-540-74853-3_15
– ident: ref19
  doi: 10.1109/INFCOM.2010.5462095
– year: 2015
  ident: ref3
  article-title: On vulnerabilities of the security association in the IEEE 802.15. 6 Standard
– ident: ref40
  doi: 10.1109/WCNC.2010.5506580
– ident: ref32
  doi: 10.1016/j.jss.2011.06.061
– ident: ref16
  doi: 10.1109/JSAC.2013.130913
– volume: 21
  start-page: 121
  year: 2014
  ident: ref41
  article-title: An enhanced access control scheme in wireless sensor networks
  publication-title: The Journal of Ad Hoc and Sensor Wireless Networks
– volume: 17
  start-page: 629
  year: 2015
  ident: ref4
  article-title: Cryptanalysis of two PAKE protocols for body area networks and smart environments
  publication-title: Int J Netw Secur
– start-page: 633
  year: 0
  ident: ref29
  article-title: Robust ID-based remote mutual authentication with key agreement protocol for mobile devices on ECC
  publication-title: Proc Int Conf Comput Sci Eng
– volume: 13
  start-page: 223
  year: 2012
  ident: ref30
  article-title: An ID-based client authentication with key agreement protocol for mobile client-server environment on ECC with provable security
  publication-title: Inf Fusion
  doi: 10.1016/j.inffus.2011.01.001
– ident: ref38
  doi: 10.1016/j.comnet.2009.12.008
– start-page: 1
  year: 0
  ident: ref10
  article-title: Good neighbor: Ad hoc pairing of nearby wireless devices by multiple antennas
  publication-title: Proc Symp Network and Distributed System Security
– ident: ref24
  doi: 10.1007/3-540-39799-X_31
– year: 2004
  ident: ref26
  publication-title: Guide to Elliptic CurveCryptography
– ident: ref5
  doi: 10.1109/MCOM.2006.1632652
– ident: ref35
  doi: 10.1007/3-540-45539-6_11
– ident: ref17
  doi: 10.1109/TIT.1985.1057074
– ident: ref14
  doi: 10.1145/1999995.2000016
– ident: ref11
  doi: 10.1145/2462096.2462123
– ident: ref6
  doi: 10.1109/ISSNIP.2007.4496869
– start-page: 134
  year: 0
  ident: ref37
  article-title: Implementing cryptographicpairings on smartcards
  publication-title: Cryptographic Hardware and Embedded Systems (CHES)
– ident: ref18
  doi: 10.1145/359340.359342
– ident: ref2
  doi: 10.1147/sj.353.0609
– ident: ref34
  doi: 10.1109/TPDS.2013.145
– volume: 16
  start-page: 1658
  year: 2014
  ident: ref1
  article-title: Wireless body area networks: A survey
  publication-title: IEEE Commun Surv Tuts
  doi: 10.1109/SURV.2013.121313.00064
– volume: 16
  start-page: 171
  year: 2015
  ident: ref23
  article-title: A novel routing protocol providing good transmission reliability in underwater sensor networks
  publication-title: J Internet Technol
– ident: ref13
  doi: 10.1145/1814433.1814466
– ident: ref31
  doi: 10.1016/j.inffus.2012.12.002
– ident: ref27
  doi: 10.1007/3-540-39568-7_5
– ident: ref39
  doi: 10.1109/TIFS.2015.2473820
– volume: 15
  start-page: 929
  year: 2014
  ident: ref22
  article-title: A variable threshold-value authentication architecture for wireless mesh networks
  publication-title: J Internet Technol
– ident: ref33
  doi: 10.1109/WAINA.2012.125
– ident: ref28
  doi: 10.1016/j.cose.2008.11.008
– start-page: 438
  year: 0
  ident: ref21
  article-title: An efficient scheme for user authentication inwireless sensor networks
  publication-title: Proc 21st Int Conf Adv Inf Netw Appl Workshops
SSID ssj0058579
Score 2.5853908
Snippet Advances in wireless communications, embedded systems, and integrated circuit technologies have enabled the wireless body area network (WBAN) to become a...
SourceID crossref
ieee
SourceType Enrichment Source
Index Database
Publisher
StartPage 2590
SubjectTerms Attack
Authentication
Body area networks
Elliptic curve cryptography
Medical diagnostic imaging
security
wireless body area network (WBAN)
Wireless communication
Title Anonymous Authentication for Wireless Body Area Networks With Provable Security
URI https://ieeexplore.ieee.org/document/7458160
Volume 11
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1LS8NAEF5qT3rwVcX6Yg_eNGmyeW2OKkoptAptoZ7CPiYIFis1FfTXu7N5UETEW0g2ybC77MzsfvN9hFzgURNPEuXkMTcJSgjCkToFR_JIiTzIA7CifcNR3J-Gg1k0a5GrphYGACz4DFy8tGf5eqFWuFXWS8KI-7FJ0DdM4lbWatWrrvml5dXDeMQxTiisC2S8tDcYP40niOKKXSTk4ihVt-aE1lRVrFO53yHD2pwSS_Lirgrpqq8fTI3_tXeXbFfRJb0up8MeacHrPtla4xzskIcm4ae4PYZgoXLXjprwlSIYdm4WP3qz0J_mOyDoqASKv5tnxTN9XC4-sNqKjivhuwMyvb-b3PadSlXBUSxOUHueQSAUk76QPAdfchPVRZEKGWJOPM1FHqch1ykHEx1GgfbAQ92DSAKSm8ngkLSNoXBEKAtSadInCR7ToVSQhoHgidYiYMoXKuoSv-7mTFWU46h8Mc9s6uGlmR2aDIcmq4amSy6bd95Kwo0_W3ew25uWVY8f_377hGwy9MoWjXJK2sVyBWcmpijkuZ1M3wIuyFg
linkProvider IEEE
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1LS8NAEF6KHtSDryrW5x68adq8NtkcVSy1tlVoC_UU9jFBsFipqaC_3p1NWoqIeAvJJhl2l52Z3W--j5BzPGricaycLOImQQlBOFIn4EjOlMiCLAAr2tftRa1h2B6xUYVcLmphAMCCz6COl_YsX0_UDLfKGnHIuBeZBH3V-H3mFdVa83XX_NQy62FE4hg3FM5LZNyk0e4_9QeI44rqSMnFUaxuyQ0t6apYt9LcIt25QQWa5KU-y2Vdff3gavyvxdtks4wv6VUxIXZIBV53ycYS62CVPCxSfoobZAgXKvbtqAlgKcJhx2b5o9cT_Wm-A4L2Cqj4u3mWP9PH6eQD661ov5S-2yPD5u3gpuWUugqO8qMY1ed9CITypSckz8CT3MR1jKnQR9SJq7nIoiTkOuFg4kMWaBdcVD5gEpDeTAb7ZMUYCgeE-kEiTQIlwfV1KBUkYSB4rLUIfOUJxWrEm3dzqkrScdS-GKc2-XCT1A5NikOTlkNTIxeLd94Kyo0_W1ex2xctyx4__P32GVlrDbqdtHPXuz8i6z76aItNOSYr-XQGJybCyOWpnVjfo2HLoQ
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Anonymous+Authentication+for+Wireless+Body+Area+Networks+With+Provable+Security&rft.jtitle=IEEE+systems+journal&rft.au=He%2C+Debiao&rft.au=Zeadally%2C+Sherali&rft.au=Kumar%2C+Neeraj&rft.au=Lee%2C+Jong-Hyouk&rft.date=2017-12-01&rft.issn=1932-8184&rft.eissn=1937-9234&rft.volume=11&rft.issue=4&rft.spage=2590&rft.epage=2601&rft_id=info:doi/10.1109%2FJSYST.2016.2544805&rft.externalDBID=n%2Fa&rft.externalDocID=10_1109_JSYST_2016_2544805
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1932-8184&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1932-8184&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1932-8184&client=summon