Anonymous Authentication for Wireless Body Area Networks With Provable Security
Advances in wireless communications, embedded systems, and integrated circuit technologies have enabled the wireless body area network (WBAN) to become a promising networking paradigm. Over the last decade, as an important part of the Internet of Things, we have witnessed WBANs playing an increasing...
Saved in:
Published in | IEEE systems journal Vol. 11; no. 4; pp. 2590 - 2601 |
---|---|
Main Authors | , , , |
Format | Journal Article |
Language | English |
Published |
IEEE
01.12.2017
|
Subjects | |
Online Access | Get full text |
Cover
Loading…
Abstract | Advances in wireless communications, embedded systems, and integrated circuit technologies have enabled the wireless body area network (WBAN) to become a promising networking paradigm. Over the last decade, as an important part of the Internet of Things, we have witnessed WBANs playing an increasing role in modern medical systems because of its capabilities to collect real-time biomedical data through intelligent medical sensors in or around the patients' body and send the collected data to remote medical personnel for clinical diagnostics. WBANs not only bring us conveniences but also bring along the challenge of keeping data's confidentiality and preserving patients' privacy. In the past few years, several anonymous authentication (AA) schemes for WBANs were proposed to enhance security by protecting patients' identities and by encrypting medical data. However, many of these schemes are not secure enough. First, we review the most recent AA scheme for WBANs and point out that it is not secure for medical applications by proposing an impersonation attack. After that, we propose a new AA scheme for WBANs and prove that it is provably secure. Our detailed analysis results demonstrate that our proposed AA scheme not only overcomes the security weaknesses in previous schemes but also has the same computation costs at a client side. |
---|---|
AbstractList | Advances in wireless communications, embedded systems, and integrated circuit technologies have enabled the wireless body area network (WBAN) to become a promising networking paradigm. Over the last decade, as an important part of the Internet of Things, we have witnessed WBANs playing an increasing role in modern medical systems because of its capabilities to collect real-time biomedical data through intelligent medical sensors in or around the patients' body and send the collected data to remote medical personnel for clinical diagnostics. WBANs not only bring us conveniences but also bring along the challenge of keeping data's confidentiality and preserving patients' privacy. In the past few years, several anonymous authentication (AA) schemes for WBANs were proposed to enhance security by protecting patients' identities and by encrypting medical data. However, many of these schemes are not secure enough. First, we review the most recent AA scheme for WBANs and point out that it is not secure for medical applications by proposing an impersonation attack. After that, we propose a new AA scheme for WBANs and prove that it is provably secure. Our detailed analysis results demonstrate that our proposed AA scheme not only overcomes the security weaknesses in previous schemes but also has the same computation costs at a client side. |
Author | Kumar, Neeraj Lee, Jong-Hyouk Zeadally, Sherali He, Debiao |
Author_xml | – sequence: 1 givenname: Debiao surname: He fullname: He, Debiao email: hedebiao@163.com organization: State Key Laboratory of Software Engineering, Computer School, Wuhan University, Wuhan, China – sequence: 2 givenname: Sherali surname: Zeadally fullname: Zeadally, Sherali email: szeadally@uky.edu organization: College of Communication and Information, University of Kentucky, Lexington, KY, US – sequence: 3 givenname: Neeraj surname: Kumar fullname: Kumar, Neeraj email: neeraj.kumar@thapar.edu organization: Department of Computer Science and Engineering, Thapar University, Patiala, India – sequence: 4 givenname: Jong-Hyouk surname: Lee fullname: Lee, Jong-Hyouk email: jonghyouk@smu.ac.kr organization: Department of Computer Science and Engineering, Sangmyung, Cheonan, South |
BookMark | eNp9kMtOwzAQRS1UJNrCD8DGP5DiZ2IvQ8VTFUVqEWIVOclENaQ1sl1Q_p60RSxYsJqRRueO7hmhwcZtAKFzSiaUEn35sHhdLCeM0HTCpBCKyCM0pJpniWZcDPY7SxRV4gSNQngjRCqZ6SGa531St3bbgPNtXMEm2spE6za4cR6_WA8thICvXN3h3IPBjxC_nH8P_S2u8JN3n6ZsAS-g2nobu1N03Jg2wNnPHKPnm-vl9C6ZzW_vp_ksqViaxYRyBtxUrKSmVA3QUhEhpawEo1pnpFamSbVQtVZAuZa8JkD6UkyWQDOtSj5G7JBbeReCh6b48HZtfFdQUuyUFHslxU5J8aOkh9QfqLJx3zZ6Y9v_0YsDagHg91cmpKIp4d93KXHH |
CODEN | ISJEB2 |
CitedBy_id | crossref_primary_10_1109_JIOT_2019_2892009 crossref_primary_10_1109_TMC_2023_3297854 crossref_primary_10_1155_2018_8470949 crossref_primary_10_1016_j_comcom_2020_08_014 crossref_primary_10_1109_JIOT_2018_2876133 crossref_primary_10_1007_s10916_016_0620_4 crossref_primary_10_1007_s11277_017_4250_z crossref_primary_10_1007_s10916_016_0595_1 crossref_primary_10_3390_su142013098 crossref_primary_10_1109_JIOT_2024_3432757 crossref_primary_10_1186_s13638_021_02022_1 crossref_primary_10_1016_j_jksuci_2019_04_013 crossref_primary_10_1002_dac_3305 crossref_primary_10_3390_s25030897 crossref_primary_10_1016_j_sysarc_2020_101883 crossref_primary_10_1109_JBHI_2017_2721545 crossref_primary_10_1109_TSC_2021_3059856 crossref_primary_10_1155_2019_5860286 crossref_primary_10_1016_j_sysarc_2019_101655 crossref_primary_10_1109_TII_2019_2925071 crossref_primary_10_1109_JIOT_2021_3068364 crossref_primary_10_1007_s11036_016_0793_6 crossref_primary_10_1007_s11036_021_01840_3 crossref_primary_10_1109_JSAC_2020_3020599 crossref_primary_10_3390_cryptography8040052 crossref_primary_10_1016_j_comnet_2024_110938 crossref_primary_10_1109_TITS_2024_3413321 crossref_primary_10_1109_JIOT_2019_2959602 crossref_primary_10_4236_ijcns_2018_112002 crossref_primary_10_1109_ACCESS_2021_3058180 crossref_primary_10_1109_JIOT_2022_3171791 crossref_primary_10_1109_JSYST_2016_2574719 crossref_primary_10_1007_s10207_021_00543_w crossref_primary_10_1109_JSYST_2020_2990749 crossref_primary_10_1002_sec_1573 crossref_primary_10_1155_2021_6577492 crossref_primary_10_1186_s13638_019_1524_z crossref_primary_10_1007_s10586_019_03036_7 crossref_primary_10_1016_j_jisa_2019_04_004 crossref_primary_10_1007_s11227_016_1886_5 crossref_primary_10_1016_j_compeleceng_2022_107867 crossref_primary_10_1109_ACCESS_2023_3325130 crossref_primary_10_1155_2021_4939589 crossref_primary_10_1007_s10916_016_0670_7 crossref_primary_10_1109_TAP_2021_3090852 crossref_primary_10_1109_ACCESS_2018_2853985 crossref_primary_10_1007_s10723_023_09731_5 crossref_primary_10_1109_JIOT_2021_3098007 crossref_primary_10_1007_s11277_019_07005_6 crossref_primary_10_1145_3575811 crossref_primary_10_35940_ijitee_K9461_09101121 crossref_primary_10_1109_JIOT_2020_2970974 crossref_primary_10_1002_sec_1680 crossref_primary_10_1007_s12083_017_0581_5 crossref_primary_10_1007_s12083_020_00973_8 crossref_primary_10_1109_JIOT_2021_3062630 crossref_primary_10_1002_nem_1937 crossref_primary_10_3390_bdcc6040148 crossref_primary_10_1007_s11704_023_2548_4 crossref_primary_10_1007_s10916_017_0720_9 crossref_primary_10_3390_asi5040079 crossref_primary_10_1007_s11235_016_0222_y crossref_primary_10_1016_j_adhoc_2023_103332 crossref_primary_10_1007_s40012_018_0191_2 crossref_primary_10_1016_j_sysarc_2022_102821 crossref_primary_10_1109_JIOT_2021_3078702 crossref_primary_10_1080_03091902_2019_1707890 crossref_primary_10_1016_j_jnca_2018_09_008 crossref_primary_10_1016_j_pmcj_2023_101753 crossref_primary_10_1002_dac_5267 crossref_primary_10_1007_s11276_020_02470_5 crossref_primary_10_1109_ACCESS_2019_2893918 crossref_primary_10_1109_TBDATA_2022_3148181 crossref_primary_10_1109_ACCESS_2019_2948207 crossref_primary_10_1007_s10586_020_03121_2 crossref_primary_10_1049_iet_com_2016_0091 crossref_primary_10_1177_18479790251318538 crossref_primary_10_1016_j_comnet_2019_03_006 crossref_primary_10_1016_j_jisa_2021_102761 crossref_primary_10_1007_s11277_017_4508_5 crossref_primary_10_1155_2018_9436120 crossref_primary_10_1109_TDSC_2020_3025288 crossref_primary_10_1155_2017_3194845 crossref_primary_10_1007_s13369_021_05532_8 crossref_primary_10_32604_cmc_2024_049608 crossref_primary_10_3390_s22093539 crossref_primary_10_2139_ssrn_4017049 crossref_primary_10_1109_JIOT_2021_3088641 crossref_primary_10_1007_s12652_020_02728_y crossref_primary_10_1007_s10916_019_1458_3 crossref_primary_10_1007_s12065_022_00759_2 crossref_primary_10_1016_j_adhoc_2020_102374 crossref_primary_10_3390_s21248383 crossref_primary_10_1109_TGCN_2021_3077318 crossref_primary_10_1002_dac_4077 crossref_primary_10_1007_s10916_016_0592_4 crossref_primary_10_3390_app14083187 crossref_primary_10_1109_ACCESS_2021_3115706 crossref_primary_10_1016_j_comnet_2021_108687 crossref_primary_10_1155_2022_2793116 crossref_primary_10_1002_itl2_304 crossref_primary_10_1007_s00779_017_1055_8 crossref_primary_10_1109_ACCESS_2020_2985261 crossref_primary_10_1007_s11277_020_07702_7 crossref_primary_10_3233_IDT_170182 crossref_primary_10_1007_s11277_021_08565_2 crossref_primary_10_1155_2017_2367312 crossref_primary_10_1002_dac_4181 crossref_primary_10_1007_s10916_016_0615_1 crossref_primary_10_1109_TBDATA_2017_2710347 crossref_primary_10_1155_2017_4364376 crossref_primary_10_1109_JSYST_2016_2633559 crossref_primary_10_4018_IJISP_2022010111 crossref_primary_10_1109_TIFS_2018_2850299 crossref_primary_10_1007_s10916_018_0998_2 crossref_primary_10_1007_s11432_018_9738_2 crossref_primary_10_1049_htl_2018_5006 crossref_primary_10_1109_JIOT_2023_3252565 crossref_primary_10_1016_j_jpdc_2018_10_007 crossref_primary_10_1007_s11276_024_03690_9 crossref_primary_10_1109_ACCESS_2016_2624558 crossref_primary_10_1002_dac_4253 crossref_primary_10_1109_ACCESS_2022_3180165 crossref_primary_10_1002_dac_3288 crossref_primary_10_1109_JIOT_2023_3262498 crossref_primary_10_1007_s00500_017_2488_8 crossref_primary_10_3390_s23010240 crossref_primary_10_1007_s11277_018_6005_x crossref_primary_10_1007_s10916_018_0987_5 crossref_primary_10_1109_JIOT_2017_2761700 crossref_primary_10_1002_cta_3708 crossref_primary_10_1155_2018_4028196 crossref_primary_10_1109_JIOT_2021_3138989 crossref_primary_10_1007_s11276_022_03205_4 crossref_primary_10_3390_s24247967 crossref_primary_10_3390_jsan6020005 crossref_primary_10_1007_s10916_017_0693_8 crossref_primary_10_1109_ACCESS_2017_2673239 crossref_primary_10_3390_su142114625 crossref_primary_10_1109_ACCESS_2019_2953042 crossref_primary_10_1109_JIOT_2023_3317292 crossref_primary_10_1007_s10916_020_01598_3 crossref_primary_10_1002_cpe_7735 crossref_primary_10_1007_s11277_016_3740_8 crossref_primary_10_1007_s11277_016_3748_0 crossref_primary_10_1016_j_maturitas_2018_04_008 crossref_primary_10_1016_j_jmsy_2022_01_005 crossref_primary_10_1109_JSYST_2018_2881711 crossref_primary_10_3390_s20185148 crossref_primary_10_1002_dac_4823 crossref_primary_10_1155_2022_3086516 crossref_primary_10_1007_s10916_018_0990_x crossref_primary_10_1109_ACCESS_2020_3031484 crossref_primary_10_1109_TNSE_2022_3205044 crossref_primary_10_1109_JSYST_2020_2992650 crossref_primary_10_1007_s11227_023_05749_4 crossref_primary_10_1109_TSG_2017_2720159 crossref_primary_10_3390_en16010008 crossref_primary_10_1007_s13369_017_2447_9 crossref_primary_10_1109_ACCESS_2018_2880898 crossref_primary_10_1109_JSYST_2019_2899580 crossref_primary_10_1007_s10916_016_0590_6 crossref_primary_10_1007_s11277_021_09020_y crossref_primary_10_1155_2017_4167549 crossref_primary_10_1007_s11277_016_3352_3 crossref_primary_10_1016_j_cmpb_2018_02_002 crossref_primary_10_1109_ACCESS_2020_2989305 crossref_primary_10_1007_s00500_016_2231_x crossref_primary_10_1007_s11042_019_7149_8 crossref_primary_10_1007_s11277_024_11051_0 crossref_primary_10_1007_s10916_016_0587_1 crossref_primary_10_1007_s12083_024_01686_y crossref_primary_10_1016_j_cose_2022_102800 crossref_primary_10_1109_JSEN_2022_3198645 crossref_primary_10_1007_s12652_017_0516_2 crossref_primary_10_1007_s10916_018_0964_z crossref_primary_10_1007_s11432_016_0161_2 crossref_primary_10_1016_j_jisa_2020_102499 crossref_primary_10_1186_s42400_020_00061_7 crossref_primary_10_1007_s10916_016_0613_3 crossref_primary_10_1002_ett_3677 crossref_primary_10_1007_s11277_017_5130_2 crossref_primary_10_1109_TNSE_2019_2961932 crossref_primary_10_1016_j_sysarc_2021_102307 crossref_primary_10_1145_3465171 crossref_primary_10_1109_TSUSC_2022_3221125 crossref_primary_10_1007_s00500_016_2244_5 crossref_primary_10_1007_s10586_016_0701_7 crossref_primary_10_1007_s12652_021_03655_2 crossref_primary_10_1007_s10916_016_0491_8 crossref_primary_10_3390_s23031121 crossref_primary_10_3390_s19020341 crossref_primary_10_3390_s17071482 crossref_primary_10_3390_sym12020287 crossref_primary_10_1007_s00500_017_2504_z crossref_primary_10_1007_s11277_021_08969_0 crossref_primary_10_1007_s10586_024_04449_9 crossref_primary_10_1007_s10916_016_0586_2 crossref_primary_10_1109_ACCESS_2019_2942195 crossref_primary_10_1007_s00500_016_2271_2 crossref_primary_10_1007_s00500_017_2482_1 crossref_primary_10_1016_j_compeleceng_2023_108759 crossref_primary_10_33793_acperpro_02_03_104 crossref_primary_10_1007_s10207_021_00570_7 crossref_primary_10_1109_ACCESS_2020_3026630 crossref_primary_10_1007_s10916_017_0699_2 crossref_primary_10_1109_ACCESS_2020_3001152 crossref_primary_10_1007_s10916_016_0610_6 crossref_primary_10_1007_s11227_024_06801_7 crossref_primary_10_1016_j_jisa_2025_104031 crossref_primary_10_1371_journal_pone_0169414 crossref_primary_10_1016_j_tele_2018_09_001 crossref_primary_10_1007_s11277_016_3742_6 crossref_primary_10_1109_JSEN_2022_3141064 crossref_primary_10_1016_j_comnet_2016_12_013 crossref_primary_10_1007_s10207_023_00717_8 crossref_primary_10_1038_s41598_024_66603_y crossref_primary_10_1155_2021_8876766 crossref_primary_10_1007_s11276_018_1704_5 crossref_primary_10_1007_s00779_017_1048_7 crossref_primary_10_1109_ACCESS_2017_2676119 crossref_primary_10_1002_dac_3814 crossref_primary_10_1109_TMC_2020_3048703 crossref_primary_10_47836_pjst_32_6_25 crossref_primary_10_1177_1550147718824465 crossref_primary_10_1002_ett_3509 crossref_primary_10_1007_s10586_017_0783_x crossref_primary_10_1109_ACCESS_2021_3096188 crossref_primary_10_1109_TIFS_2020_2986881 crossref_primary_10_1007_s11277_016_3739_1 crossref_primary_10_1007_s11277_021_08509_w crossref_primary_10_1002_sec_1652 crossref_primary_10_1109_ACCESS_2016_2637887 crossref_primary_10_1109_TVT_2019_2938968 crossref_primary_10_1109_TIFS_2016_2573746 crossref_primary_10_32604_cmc_2021_019051 crossref_primary_10_1016_j_comnet_2020_107333 crossref_primary_10_1109_TMC_2020_3015010 crossref_primary_10_1007_s10916_016_0585_3 crossref_primary_10_1109_JIOT_2017_2706752 crossref_primary_10_1109_JSYST_2022_3152742 crossref_primary_10_1016_j_bios_2023_115509 crossref_primary_10_1109_TBDATA_2017_2705048 crossref_primary_10_1007_s13369_021_05442_9 crossref_primary_10_1007_s11235_017_0340_1 crossref_primary_10_1080_02522667_2020_1799511 crossref_primary_10_1109_MVT_2020_2979261 crossref_primary_10_1007_s10207_019_00464_9 crossref_primary_10_1016_j_dcan_2024_11_012 crossref_primary_10_1109_ACCESS_2018_2847030 crossref_primary_10_1109_JSYST_2020_3036425 crossref_primary_10_1007_s11276_021_02652_9 crossref_primary_10_1002_dac_3251 crossref_primary_10_1109_JIOT_2023_3264565 |
Cites_doi | 10.1007/s001450010003 10.1109/MWC.2010.5601959 10.1090/S0025-5718-1987-0866109-5 10.1145/1777406.1777410 10.1109/TITB.2009.2037617 10.1145/2185448.2185454 10.1145/2422966.2422975 10.1007/978-3-540-74853-3_15 10.1109/INFCOM.2010.5462095 10.1109/WCNC.2010.5506580 10.1016/j.jss.2011.06.061 10.1109/JSAC.2013.130913 10.1016/j.inffus.2011.01.001 10.1016/j.comnet.2009.12.008 10.1007/3-540-39799-X_31 10.1109/MCOM.2006.1632652 10.1007/3-540-45539-6_11 10.1109/TIT.1985.1057074 10.1145/1999995.2000016 10.1145/2462096.2462123 10.1109/ISSNIP.2007.4496869 10.1145/359340.359342 10.1147/sj.353.0609 10.1109/TPDS.2013.145 10.1109/SURV.2013.121313.00064 10.1145/1814433.1814466 10.1016/j.inffus.2012.12.002 10.1007/3-540-39568-7_5 10.1109/TIFS.2015.2473820 10.1109/WAINA.2012.125 10.1016/j.cose.2008.11.008 |
ContentType | Journal Article |
DBID | 97E RIA RIE AAYXX CITATION |
DOI | 10.1109/JSYST.2016.2544805 |
DatabaseName | IEEE All-Society Periodicals Package (ASPP) 2005–Present IEEE All-Society Periodicals Package (ASPP) 1998–Present IEEE Electronic Library (IEL) CrossRef |
DatabaseTitle | CrossRef |
DatabaseTitleList | |
Database_xml | – sequence: 1 dbid: RIE name: IEEE Electronic Library (IEL) url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/ sourceTypes: Publisher |
DeliveryMethod | fulltext_linktorsrc |
Discipline | Engineering |
EISSN | 1937-9234 |
EndPage | 2601 |
ExternalDocumentID | 10_1109_JSYST_2016_2544805 7458160 |
Genre | orig-research |
GrantInformation_xml | – fundername: Basic Science Research Program through the National Research Foundation of Korea (NRF) funded by the Ministry of Science, ICT & Future Planning grantid: NRF-2014R1A1A1006770 – fundername: National Natural Science Foundation of China grantid: 61572379; 61501333; U1536204 funderid: 10.13039/501100001809 – fundername: National High-tech R&D Program of China grantid: 2015AA016004 – fundername: Research Fund of the Guangxi Key Laboratory of Trusted Software grantid: kx201529 – fundername: Natural Science Foundation of Hubei Province of China grantid: 2015CFB257 |
GroupedDBID | 0R~ 29I 4.4 5GY 5VS 6IK 97E AAJGR AARMG AASAJ AAWTH ABAZT ABQJQ ABVLG ACIWK AENEX AETIX AGQYO AGSQL AHBIQ AKJIK AKQYR ALMA_UNASSIGNED_HOLDINGS ATWAV BEFXN BFFAM BGNUA BKEBE BPEOZ CS3 DU5 EBS EJD HZ~ IFIPE IPLJI JAVBF LAI M43 O9- OCL RIA RIE RNS AAYXX CITATION RIG |
ID | FETCH-LOGICAL-c267t-132e3ac2b1ab8fe1b804555c4219970d8af6948d98e13953d0e080525be1798b3 |
IEDL.DBID | RIE |
ISSN | 1932-8184 |
IngestDate | Tue Jul 01 01:43:28 EDT 2025 Thu Apr 24 23:03:25 EDT 2025 Wed Aug 27 08:36:58 EDT 2025 |
IsPeerReviewed | true |
IsScholarly | true |
Issue | 4 |
Language | English |
License | https://ieeexplore.ieee.org/Xplorehelp/downloads/license-information/IEEE.html |
LinkModel | DirectLink |
MergedId | FETCHMERGED-LOGICAL-c267t-132e3ac2b1ab8fe1b804555c4219970d8af6948d98e13953d0e080525be1798b3 |
PageCount | 12 |
ParticipantIDs | ieee_primary_7458160 crossref_primary_10_1109_JSYST_2016_2544805 crossref_citationtrail_10_1109_JSYST_2016_2544805 |
ProviderPackageCode | CITATION AAYXX |
PublicationCentury | 2000 |
PublicationDate | 2017-Dec. 2017-12-00 |
PublicationDateYYYYMMDD | 2017-12-01 |
PublicationDate_xml | – month: 12 year: 2017 text: 2017-Dec. |
PublicationDecade | 2010 |
PublicationTitle | IEEE systems journal |
PublicationTitleAbbrev | JSYST |
PublicationYear | 2017 |
Publisher | IEEE |
Publisher_xml | – name: IEEE |
References | ref35 cai (ref10) 0 ref13 ref34 ref12 ref15 ref36 ref14 ref31 he (ref30) 2012; 13 ref33 ref11 ref32 ref2 ref39 ref17 ref38 ref16 ref19 ref18 yoon (ref29) 0 samaneh (ref1) 2014; 16 jiang (ref21) 0 shen (ref23) 2015; 16 guo (ref22) 2014; 15 ref24 chatterjee (ref41) 2014; 21 ref25 ref20 ref28 ref27 ref8 ref7 ref9 toorani (ref3) 2015 ref6 ref5 toorani (ref4) 2015; 17 ref40 hankerson (ref26) 2004 scott (ref37) 0 |
References_xml | – ident: ref36 doi: 10.1007/s001450010003 – ident: ref9 doi: 10.1109/MWC.2010.5601959 – ident: ref25 doi: 10.1090/S0025-5718-1987-0866109-5 – ident: ref7 doi: 10.1145/1777406.1777410 – ident: ref8 doi: 10.1109/TITB.2009.2037617 – ident: ref15 doi: 10.1145/2185448.2185454 – ident: ref20 doi: 10.1145/2422966.2422975 – ident: ref12 doi: 10.1007/978-3-540-74853-3_15 – ident: ref19 doi: 10.1109/INFCOM.2010.5462095 – year: 2015 ident: ref3 article-title: On vulnerabilities of the security association in the IEEE 802.15. 6 Standard – ident: ref40 doi: 10.1109/WCNC.2010.5506580 – ident: ref32 doi: 10.1016/j.jss.2011.06.061 – ident: ref16 doi: 10.1109/JSAC.2013.130913 – volume: 21 start-page: 121 year: 2014 ident: ref41 article-title: An enhanced access control scheme in wireless sensor networks publication-title: The Journal of Ad Hoc and Sensor Wireless Networks – volume: 17 start-page: 629 year: 2015 ident: ref4 article-title: Cryptanalysis of two PAKE protocols for body area networks and smart environments publication-title: Int J Netw Secur – start-page: 633 year: 0 ident: ref29 article-title: Robust ID-based remote mutual authentication with key agreement protocol for mobile devices on ECC publication-title: Proc Int Conf Comput Sci Eng – volume: 13 start-page: 223 year: 2012 ident: ref30 article-title: An ID-based client authentication with key agreement protocol for mobile client-server environment on ECC with provable security publication-title: Inf Fusion doi: 10.1016/j.inffus.2011.01.001 – ident: ref38 doi: 10.1016/j.comnet.2009.12.008 – start-page: 1 year: 0 ident: ref10 article-title: Good neighbor: Ad hoc pairing of nearby wireless devices by multiple antennas publication-title: Proc Symp Network and Distributed System Security – ident: ref24 doi: 10.1007/3-540-39799-X_31 – year: 2004 ident: ref26 publication-title: Guide to Elliptic CurveCryptography – ident: ref5 doi: 10.1109/MCOM.2006.1632652 – ident: ref35 doi: 10.1007/3-540-45539-6_11 – ident: ref17 doi: 10.1109/TIT.1985.1057074 – ident: ref14 doi: 10.1145/1999995.2000016 – ident: ref11 doi: 10.1145/2462096.2462123 – ident: ref6 doi: 10.1109/ISSNIP.2007.4496869 – start-page: 134 year: 0 ident: ref37 article-title: Implementing cryptographicpairings on smartcards publication-title: Cryptographic Hardware and Embedded Systems (CHES) – ident: ref18 doi: 10.1145/359340.359342 – ident: ref2 doi: 10.1147/sj.353.0609 – ident: ref34 doi: 10.1109/TPDS.2013.145 – volume: 16 start-page: 1658 year: 2014 ident: ref1 article-title: Wireless body area networks: A survey publication-title: IEEE Commun Surv Tuts doi: 10.1109/SURV.2013.121313.00064 – volume: 16 start-page: 171 year: 2015 ident: ref23 article-title: A novel routing protocol providing good transmission reliability in underwater sensor networks publication-title: J Internet Technol – ident: ref13 doi: 10.1145/1814433.1814466 – ident: ref31 doi: 10.1016/j.inffus.2012.12.002 – ident: ref27 doi: 10.1007/3-540-39568-7_5 – ident: ref39 doi: 10.1109/TIFS.2015.2473820 – volume: 15 start-page: 929 year: 2014 ident: ref22 article-title: A variable threshold-value authentication architecture for wireless mesh networks publication-title: J Internet Technol – ident: ref33 doi: 10.1109/WAINA.2012.125 – ident: ref28 doi: 10.1016/j.cose.2008.11.008 – start-page: 438 year: 0 ident: ref21 article-title: An efficient scheme for user authentication inwireless sensor networks publication-title: Proc 21st Int Conf Adv Inf Netw Appl Workshops |
SSID | ssj0058579 |
Score | 2.5853908 |
Snippet | Advances in wireless communications, embedded systems, and integrated circuit technologies have enabled the wireless body area network (WBAN) to become a... |
SourceID | crossref ieee |
SourceType | Enrichment Source Index Database Publisher |
StartPage | 2590 |
SubjectTerms | Attack Authentication Body area networks Elliptic curve cryptography Medical diagnostic imaging security wireless body area network (WBAN) Wireless communication |
Title | Anonymous Authentication for Wireless Body Area Networks With Provable Security |
URI | https://ieeexplore.ieee.org/document/7458160 |
Volume | 11 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1LS8NAEF5qT3rwVcX6Yg_eNGmyeW2OKkoptAptoZ7CPiYIFis1FfTXu7N5UETEW0g2ybC77MzsfvN9hFzgURNPEuXkMTcJSgjCkToFR_JIiTzIA7CifcNR3J-Gg1k0a5GrphYGACz4DFy8tGf5eqFWuFXWS8KI-7FJ0DdM4lbWatWrrvml5dXDeMQxTiisC2S8tDcYP40niOKKXSTk4ihVt-aE1lRVrFO53yHD2pwSS_Lirgrpqq8fTI3_tXeXbFfRJb0up8MeacHrPtla4xzskIcm4ae4PYZgoXLXjprwlSIYdm4WP3qz0J_mOyDoqASKv5tnxTN9XC4-sNqKjivhuwMyvb-b3PadSlXBUSxOUHueQSAUk76QPAdfchPVRZEKGWJOPM1FHqch1ykHEx1GgfbAQ92DSAKSm8ngkLSNoXBEKAtSadInCR7ToVSQhoHgidYiYMoXKuoSv-7mTFWU46h8Mc9s6uGlmR2aDIcmq4amSy6bd95Kwo0_W3ew25uWVY8f_377hGwy9MoWjXJK2sVyBWcmpijkuZ1M3wIuyFg |
linkProvider | IEEE |
linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1LS8NAEF6KHtSDryrW5x68adq8NtkcVSy1tlVoC_UU9jFBsFipqaC_3p1NWoqIeAvJJhl2l52Z3W--j5BzPGricaycLOImQQlBOFIn4EjOlMiCLAAr2tftRa1h2B6xUYVcLmphAMCCz6COl_YsX0_UDLfKGnHIuBeZBH3V-H3mFdVa83XX_NQy62FE4hg3FM5LZNyk0e4_9QeI44rqSMnFUaxuyQ0t6apYt9LcIt25QQWa5KU-y2Vdff3gavyvxdtks4wv6VUxIXZIBV53ycYS62CVPCxSfoobZAgXKvbtqAlgKcJhx2b5o9cT_Wm-A4L2Cqj4u3mWP9PH6eQD661ov5S-2yPD5u3gpuWUugqO8qMY1ed9CITypSckz8CT3MR1jKnQR9SJq7nIoiTkOuFg4kMWaBdcVD5gEpDeTAb7ZMUYCgeE-kEiTQIlwfV1KBUkYSB4rLUIfOUJxWrEm3dzqkrScdS-GKc2-XCT1A5NikOTlkNTIxeLd94Kyo0_W1ex2xctyx4__P32GVlrDbqdtHPXuz8i6z76aItNOSYr-XQGJybCyOWpnVjfo2HLoQ |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Anonymous+Authentication+for+Wireless+Body+Area+Networks+With+Provable+Security&rft.jtitle=IEEE+systems+journal&rft.au=He%2C+Debiao&rft.au=Zeadally%2C+Sherali&rft.au=Kumar%2C+Neeraj&rft.au=Lee%2C+Jong-Hyouk&rft.date=2017-12-01&rft.issn=1932-8184&rft.eissn=1937-9234&rft.volume=11&rft.issue=4&rft.spage=2590&rft.epage=2601&rft_id=info:doi/10.1109%2FJSYST.2016.2544805&rft.externalDBID=n%2Fa&rft.externalDocID=10_1109_JSYST_2016_2544805 |
thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1932-8184&client=summon |
thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1932-8184&client=summon |
thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1932-8184&client=summon |