Rai et al., 2024 - Google Patents
A combined approach of PUF and physiological data for mutual authentication and key agreement in WMSNRai et al., 2024
- Document ID
- 13695352833367246349
- Author
- Rai S
- Paul R
- Banerjee S
- Meher P
- Sah G
- Publication year
- Publication venue
- Journal of Grid Computing
External Links
Snippet
Abstract Wireless Medical Sensor Network (WMSN) is a kind of Ad-hoc Network that is used in the health sector to continuously monitor patients' health conditions and provide instant medical services, over a distance. This network facilitates the transmission of real-time …
- 238000013459 approach 0 title description 10
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/80—Wireless
- H04L2209/805—Lightweight hardware, e.g. radio-frequency identification [RFID] or sensor
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0838—Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these
- H04L9/0841—Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these involving Diffie-Hellman or related key agreement protocols
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3226—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
- H04L9/3231—Biological data, e.g. fingerprint, voice or retina
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0435—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply symmetric encryption, i.e. same key used for encryption and decryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/06—Network architectures or network communication protocols for network security for supporting key management in a packet data network
- H04L63/061—Network architectures or network communication protocols for network security for supporting key management in a packet data network for key exchange, e.g. in peer-to-peer networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W12/00—Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
- H04W12/06—Authentication
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Wazid et al. | A novel authentication and key agreement scheme for implantable medical devices deployment | |
Alladi et al. | HARCI: A two-way authentication protocol for three entity healthcare IoT networks | |
Wang et al. | Blockchain and PUF-based lightweight authentication protocol for wireless medical sensor networks | |
Masud et al. | A lightweight and robust secure key establishment protocol for internet of medical things in COVID-19 patients care | |
Xu et al. | A lightweight mutual authentication and key agreement scheme for medical Internet of Things | |
Yu et al. | A robust authentication protocol for wireless medical sensor networks using blockchain and physically unclonable functions | |
Wazid et al. | BACKM-EHA: A novel blockchain-enabled security solution for IoMT-based e-healthcare applications | |
Praveen et al. | Improved Gentry–Halevi's fully homomorphic encryption‐based lightweight privacy preserving scheme for securing medical Internet of Things | |
Tan et al. | A PUF-based and cloud-assisted lightweight authentication for multi-hop body area network | |
Xu et al. | Efficient and provably secure anonymous user authentication scheme for patient monitoring using wireless medical sensor networks | |
Challa et al. | Authentication protocols for implantable medical devices: taxonomy, analysis and future directions | |
Shao et al. | A PUF-based anonymous authentication protocol for wireless medical sensor networks | |
Shuai et al. | Lightweight and secure three‐factor authentication scheme for remote patient monitoring using on‐body wireless networks | |
Ostad‐Sharif et al. | Design of a lightweight and anonymous authenticated key agreement protocol for wireless body area networks | |
Alzahrani et al. | An improved lightweight authentication protocol for wireless body area networks | |
Das et al. | A New Biometric-Based Remote User Authentication Scheme in Hierarchical Wireless Body Area Sensor Networks. | |
Chen et al. | Blockchain‐Based Efficient Device Authentication Protocol for Medical Cyber‐Physical Systems | |
Wan et al. | A lightweight continuous authentication scheme for medical wireless body area networks | |
Le et al. | An anonymous key distribution scheme for group healthcare services in 5G-enabled multi-server environments | |
Sutrala et al. | On the design of secure user authenticated key management scheme for multigateway‐based wireless sensor networks using ECC | |
Chen et al. | A Lightweight and Robust User Authentication Protocol with User Anonymity for IoT-Based Healthcare. | |
Law et al. | Kalwen: A new practical and interoperable key management scheme for body sensor networks | |
Chen et al. | An efficient mutual authentication and key agreement scheme without password for wireless sensor networks. | |
Zhou et al. | BDK: secure and efficient biometric based deterministic key agreement in wireless body area networks | |
Xu et al. | A computationally efficient authentication and key agreement scheme for multi-server switching in WBAN |