A survey on security and authentication in wireless body area networks

B Narwal, AK Mohapatra - Journal of Systems Architecture, 2021 - Elsevier
Abstract Wireless Body Area Networks (WBAN) is often envisioned as a paradigm shift from
the traditional healthcare system to the modern E-Healthcare system. The patient's vitals …

A secure system for pervasive social network-based healthcare

J Zhang, N Xue, X Huang - Ieee Access, 2016 - ieeexplore.ieee.org
Modern technologies of mobile computing and wireless sensing prompt the concept of
pervasive social network (PSN)-based healthcare. To realize the concept, the core problem …

Application of nano‐radiosensitizers in combination cancer therapy

M Varzandeh, L Sabouri, V Mansouri… - Bioengineering & …, 2023 - Wiley Online Library
Radiosensitizers are compounds or nanostructures, which can improve the efficiency of
ionizing radiation to kill cells. Radiosensitization increases the susceptibility of cancer cells …

Authentication techniques and methodologies used in wireless body area networks

M Hussain, A Mehmood, S Khan, MA Khan… - Journal of Systems …, 2019 - Elsevier
Wireless body area network (WBAN), got the IEEE standard in February 2012, is the most
significant and highly focused research area among researchers, academicians, and …

Lightweight anonymous and mutual authentication scheme for wireless body area networks

A Attir, F Naït-Abdesselam, KM Faraoun - Computer Networks, 2023 - Elsevier
Wireless body area networks (WBANs) represent an important technology for e-health
systems. They provide enhanced efficiency, more flexibility, and important cost savings for …

[HTML][HTML] A unified privacy preserving model with AI at the edge for Human-in-the-Loop Cyber-Physical Systems

JE Rivadeneira, GA Borges, A Rodrigues, F Boavida… - Internet of Things, 2024 - Elsevier
With the proliferation of personal Internet of Things (IoT) devices and their wide adoption
among society, the original notion of IoT has been reshaped, giving rise to new IoT-based …

Leakage-resilient authenticated key exchange for edge artificial intelligence

J Zhang, F Zhang, X Huang… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
Edge Artificial Intelligence (AI) is a timely complement of cloud-based AI. By introducing
intelligence to the edge, it alleviates privacy concerns of streaming and storing data to the …

Leakage-resilient and lightweight authenticated key exchange for e-health

W Zeng, J Zhang - 2020 6th International Conference on …, 2020 - ieeexplore.ieee.org
E-Health applications generally involve human users' privacy information such as identity
and medical data. To protect these data, authenticated key exchange (AKE) protocols are …

Wireless body area networks: A critical review of the state-of-the-art security schemes

J Auko, S Abeka - Global Journal of Engineering and Technology …, 2022 - gjeta.com
The continued advancement of information communication technologies (ICT) has led to the
adoption of internet of things in the healthcare sector. One of such application domain of ICT …

A Blockchain-based Protocol for Power Data Preservation in Ping Dingshan vs. Wang Case

H Wang, Y Feng, B Xing, X Zhang… - 2021 IEEE 4th …, 2021 - ieeexplore.ieee.org
power companies, the data collected by smart meters on electricity consumption is of vital
interest. In 2019, Wang had a dispute with Ping Dingshan. They came into disagreement …