Authentication protocol for wearable devices using mobile authentication proxy

DH Hwang, JM Shin, YH Choi - 2018 Tenth international …, 2018 - ieeexplore.ieee.org
The data transmitted from the wearable device commonly includes sensitive data. So,
application service using the data collected from the unauthorized wearable devices can …

Cryptanalysis of a secure and lightweight authentication protocol for wearable devices environment

D Kumar, HS Grover - 2018 2nd International Conference on …, 2018 - ieeexplore.ieee.org
Due to the rapid development in wireless communication technologies, wearable devices
have become an indispensable part of this digital world. Recently, Das et al. have designed …

A lightweight authentication mechanism between IoT devices

JH Han, JN Kim - 2017 International Conference on Information …, 2017 - ieeexplore.ieee.org
Smart IoT and wearable devices have been presenting through many companies lately.
Most devices are interacted with a variety of sensors and they have feature to connect the …

Lightweight and secure authentication protocol for wearable device in smart healthcare

SA Hussein, IA Abed, ZA Hussien - … Conference on Electrical …, 2022 - ieeexplore.ieee.org
The information sent by wearable devices usually includes sensitive data. There are great
risks that can occur to the data sent due to smart devices that collect it through wearable …

Toward self-authenticable wearable devices

FP Diez, DS Touceda, JMS Camara… - IEEE Wireless …, 2015 - ieeexplore.ieee.org
Wearable devices communicate among themselves, but they also need to communicate with
remote entities through the Internet in order to share information. Given the sensitivity of the …

A three-party mutual authentication protocol for wearable IoT health monitoring system

Z Wang, P Sun, N Luo, B Guo - 2021 IEEE International …, 2021 - ieeexplore.ieee.org
Recently, the frequent security incidents of the Internet of things make the wearable IOT
health monitoring systems (WIHMS) face serious security threats. Aiming at the security …

An authentication protocol for wearable medical devices

WJ Long, W Lin - 2017 13th International Conference and Expo …, 2017 - ieeexplore.ieee.org
Wearable medical devices are playing more and more important roles in healthcare. Unlike
the wired connection, the wireless connection between wearable devices and the remote …

A secure authentication and key establishment scheme for wearable devices

MH Kim, JY Lee, SJ Yu, KS Park… - 2019 28th …, 2019 - ieeexplore.ieee.org
With the rapid development of micro-electronics and Information and Communication
Technology (ICT), users can utilize various service such as Internet of Things (IoT), smart …

Secure transfer protocol between app and device of Internet of Things

Z Xu, X Li - Security, Privacy, and Anonymity in Computation …, 2017 - Springer
Communication security is one of the key component of Internet of Things. Now we can
communicate with smart device, such as microwave oven, camera, and control it using App …

A lightweight and privacy-preserving mutual authentication scheme for wearable devices assisted by cloud server

F Wu, X Li, L Xu, S Kumari, M Karuppiah… - Computers & Electrical …, 2017 - Elsevier
As a popular technology for Internet of Things (IoT), wearable devices are accepted widely
by people. Classic wearable devices including glasses and watches collect wearers' …