[go: up one dir, main page]

Rai et al., 2024 - Google Patents

A combined approach of PUF and physiological data for mutual authentication and key agreement in WMSN

Rai et al., 2024

Document ID
13695352833367246349
Author
Rai S
Paul R
Banerjee S
Meher P
Sah G
Publication year
Publication venue
Journal of Grid Computing

External Links

Snippet

Abstract Wireless Medical Sensor Network (WMSN) is a kind of Ad-hoc Network that is used in the health sector to continuously monitor patients' health conditions and provide instant medical services, over a distance. This network facilitates the transmission of real-time …
Continue reading at link.springer.com (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/80Wireless
    • H04L2209/805Lightweight hardware, e.g. radio-frequency identification [RFID] or sensor
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0838Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these
    • H04L9/0841Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these involving Diffie-Hellman or related key agreement protocols
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
    • H04L9/3231Biological data, e.g. fingerprint, voice or retina
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0435Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply symmetric encryption, i.e. same key used for encryption and decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/06Network architectures or network communication protocols for network security for supporting key management in a packet data network
    • H04L63/061Network architectures or network communication protocols for network security for supporting key management in a packet data network for key exchange, e.g. in peer-to-peer networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W12/00Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
    • H04W12/06Authentication

Similar Documents

Publication Publication Date Title
Wazid et al. A novel authentication and key agreement scheme for implantable medical devices deployment
Alladi et al. HARCI: A two-way authentication protocol for three entity healthcare IoT networks
Wang et al. Blockchain and PUF-based lightweight authentication protocol for wireless medical sensor networks
Masud et al. A lightweight and robust secure key establishment protocol for internet of medical things in COVID-19 patients care
Xu et al. A lightweight mutual authentication and key agreement scheme for medical Internet of Things
Yu et al. A robust authentication protocol for wireless medical sensor networks using blockchain and physically unclonable functions
Wazid et al. BACKM-EHA: A novel blockchain-enabled security solution for IoMT-based e-healthcare applications
Praveen et al. Improved Gentry–Halevi's fully homomorphic encryption‐based lightweight privacy preserving scheme for securing medical Internet of Things
Tan et al. A PUF-based and cloud-assisted lightweight authentication for multi-hop body area network
Xu et al. Efficient and provably secure anonymous user authentication scheme for patient monitoring using wireless medical sensor networks
Challa et al. Authentication protocols for implantable medical devices: taxonomy, analysis and future directions
Shao et al. A PUF-based anonymous authentication protocol for wireless medical sensor networks
Shuai et al. Lightweight and secure three‐factor authentication scheme for remote patient monitoring using on‐body wireless networks
Ostad‐Sharif et al. Design of a lightweight and anonymous authenticated key agreement protocol for wireless body area networks
Alzahrani et al. An improved lightweight authentication protocol for wireless body area networks
Das et al. A New Biometric-Based Remote User Authentication Scheme in Hierarchical Wireless Body Area Sensor Networks.
Chen et al. Blockchain‐Based Efficient Device Authentication Protocol for Medical Cyber‐Physical Systems
Wan et al. A lightweight continuous authentication scheme for medical wireless body area networks
Le et al. An anonymous key distribution scheme for group healthcare services in 5G-enabled multi-server environments
Sutrala et al. On the design of secure user authenticated key management scheme for multigateway‐based wireless sensor networks using ECC
Chen et al. A Lightweight and Robust User Authentication Protocol with User Anonymity for IoT-Based Healthcare.
Law et al. Kalwen: A new practical and interoperable key management scheme for body sensor networks
Chen et al. An efficient mutual authentication and key agreement scheme without password for wireless sensor networks.
Zhou et al. BDK: secure and efficient biometric based deterministic key agreement in wireless body area networks
Xu et al. A computationally efficient authentication and key agreement scheme for multi-server switching in WBAN