Page 131 - 2023-Vol19-Issue2
P. 131

127 |                                                            Rashid et al.

 [5] J. Iqbal, M. Adnan, Y. Khan, H. AlSalman, S. Hussain,       [15] C. Wang, W. Zheng, S. Ji, Q. Liu, and A. Wang,
      S. S. Ullah, N. u. Amin, and A. Gumaei, “Designing a             “Identity-based fast authentication scheme for smart mo-
      healthcare-enabled software-defined wireless body area           bile devices in body area networks,” Wireless Communi-
      network architecture for secure medical data and effi-           cations and Mobile Computing, vol. 2018, 2018.
      cient diagnosis,” Journal of Healthcare Engineering,
      vol. 2022, pp. 1–19, 2022.                                 [16] P. Dodangeh and A. H. Jahangir, “A biometric security
                                                                       scheme for wireless body area networks,” Journal of
 [6] S. M. Mousavi, A. Khademzadeh, and A. M. Rahmani,                 Information Security and Applications, vol. 41, pp. 62–
      “The role of low-power wide-area network technologies            74, 2018.
      in internet of things: A systematic and comprehensive re-
      view,” International Journal of Communication Systems,     [17] X. Liu, R. Zhang, and M. Zhao, “A robust authentication
      vol. 35, no. 3, p. e5036, 2022.                                  scheme with dynamic password for wireless body area
                                                                       networks,” Computer Networks, vol. 161, pp. 220–234,
 [7] Y. Perwej, N. Akhtar, N. Kulshrestha, and P. Mishra, “A           2019.
      methodical analysis of medical internet of things (miot)
      security and privacy in current and future trends,” Jour-  [18] M. Soni and D. K. Singh, “New directions for secu-
      nal of Emerging Technologies and Innovative Research,            rity attacks, privacy, and malware detection in wban,”
      vol. 9, no. 1, pp. d346–d371, 2022.                              Evolutionary Intelligence, pp. 1–18, 2022.

 [8] M. Kaur et al., “A review on classification of data         [19] D. Hammood and A. Alkhayyat, “An overview of the
      in wban,” in 2022 8th International Conference on                survey/review studies in wireless body area network,”
      Advanced Computing and Communication Systems                     in 2020 3rd International Conference on Engineering
      (ICACCS), vol. 1, pp. 1434–1438, IEEE, 2022.                     Technology and its Applications (IICETA), pp. 18–23,
                                                                       IEEE, 2020.
 [9] A. Behura and S. Nandan Mohanty, “Application of
      the internet of things (iot) in biomedical engineering:    [20] M. H. Alzuwaini and A. A. Yassin, “An efficient mech-
      Present scenario and challenges,” Internet of Things and         anism to prevent the phishing attacks.,” Iraqi Journal
      Its Applications, pp. 151–169, 2022.                             for Electrical & Electronic Engineering, vol. 17, no. 1,
                                                                       2021.
[10] M. Trnka, A. S. Abdelfattah, A. Shrestha, M. Coffey,
      and T. Cerny, “Systematic review of authentication and     [21] A. J. Mohammed and A. A. Yassin, “Efficient and flexi-
      authorization advancements for the internet of things,”          ble multi-factor authentication protocol based on fuzzy
      Sensors, vol. 22, no. 4, p. 1361, 2022.                          extractor of administrator’s fingerprint and smart mobile
                                                                       device,” Cryptography, vol. 3, no. 3, p. 24, 2019.
[11] T.-Y. Wu, Q. Meng, S. Kumari, and P. Zhang, “Rotating
      behind security: A lightweight authentication protocol     [22] M. H. Ibrahim, S. Kumari, A. K. Das, M. Wazid, and
      based on iot-enabled cloud computing environments,”              V. Odelu, “Secure anonymous mutual authentication for
      Sensors, vol. 22, no. 10, p. 3858, 2022.                         star two-tier wireless body area networks,” Computer
                                                                       methods and programs in biomedicine, vol. 135, pp. 37–
[12] F. Wei, P. Vijayakumar, J. Shen, R. Zhang, and L. Li, “A          50, 2016.
      provably secure password-based anonymous authenti-
      cation scheme for wireless body area networks,” Com-       [23] C. Vorakulpipat, S. Pichetjamroen, and E. Rattanalerdnu-
      puters & Electrical Engineering, vol. 65, pp. 322–331,           sorn, “Usable comprehensive-factor authentication for a
      2018.                                                            secure time attendance system,” peerJ computer science,
                                                                       vol. 7, p. e678, 2021.
[13] M. Kompara, S. H. Islam, and M. Ho¨lbl, “A robust
      and efficient mutual authentication and key agreement      [24] A. Alghamdi, “A verification system for multi-factor
      scheme with untraceability for wbans,” Computer net-             authentication for e-healthcare architectures,” Arab Jour-
      works, vol. 148, pp. 196–213, 2019.                              nal for Scientific Publishing (AJSP), vol. 2663, p. 5798,
                                                                       2021.
[14] A. M. Koya and P. Deepthi, “Anonymous hybrid mu-
      tual authentication and key agreement scheme for wire-
      less body area network,” Computer Networks, vol. 140,
      pp. 138–151, 2018.
   126   127   128   129   130   131   132   133   134   135   136