Page 131 - 2023-Vol19-Issue2
P. 131
127 | Rashid et al.
[5] J. Iqbal, M. Adnan, Y. Khan, H. AlSalman, S. Hussain, [15] C. Wang, W. Zheng, S. Ji, Q. Liu, and A. Wang,
S. S. Ullah, N. u. Amin, and A. Gumaei, “Designing a “Identity-based fast authentication scheme for smart mo-
healthcare-enabled software-defined wireless body area bile devices in body area networks,” Wireless Communi-
network architecture for secure medical data and effi- cations and Mobile Computing, vol. 2018, 2018.
cient diagnosis,” Journal of Healthcare Engineering,
vol. 2022, pp. 1–19, 2022. [16] P. Dodangeh and A. H. Jahangir, “A biometric security
scheme for wireless body area networks,” Journal of
[6] S. M. Mousavi, A. Khademzadeh, and A. M. Rahmani, Information Security and Applications, vol. 41, pp. 62–
“The role of low-power wide-area network technologies 74, 2018.
in internet of things: A systematic and comprehensive re-
view,” International Journal of Communication Systems, [17] X. Liu, R. Zhang, and M. Zhao, “A robust authentication
vol. 35, no. 3, p. e5036, 2022. scheme with dynamic password for wireless body area
networks,” Computer Networks, vol. 161, pp. 220–234,
[7] Y. Perwej, N. Akhtar, N. Kulshrestha, and P. Mishra, “A 2019.
methodical analysis of medical internet of things (miot)
security and privacy in current and future trends,” Jour- [18] M. Soni and D. K. Singh, “New directions for secu-
nal of Emerging Technologies and Innovative Research, rity attacks, privacy, and malware detection in wban,”
vol. 9, no. 1, pp. d346–d371, 2022. Evolutionary Intelligence, pp. 1–18, 2022.
[8] M. Kaur et al., “A review on classification of data [19] D. Hammood and A. Alkhayyat, “An overview of the
in wban,” in 2022 8th International Conference on survey/review studies in wireless body area network,”
Advanced Computing and Communication Systems in 2020 3rd International Conference on Engineering
(ICACCS), vol. 1, pp. 1434–1438, IEEE, 2022. Technology and its Applications (IICETA), pp. 18–23,
IEEE, 2020.
[9] A. Behura and S. Nandan Mohanty, “Application of
the internet of things (iot) in biomedical engineering: [20] M. H. Alzuwaini and A. A. Yassin, “An efficient mech-
Present scenario and challenges,” Internet of Things and anism to prevent the phishing attacks.,” Iraqi Journal
Its Applications, pp. 151–169, 2022. for Electrical & Electronic Engineering, vol. 17, no. 1,
2021.
[10] M. Trnka, A. S. Abdelfattah, A. Shrestha, M. Coffey,
and T. Cerny, “Systematic review of authentication and [21] A. J. Mohammed and A. A. Yassin, “Efficient and flexi-
authorization advancements for the internet of things,” ble multi-factor authentication protocol based on fuzzy
Sensors, vol. 22, no. 4, p. 1361, 2022. extractor of administrator’s fingerprint and smart mobile
device,” Cryptography, vol. 3, no. 3, p. 24, 2019.
[11] T.-Y. Wu, Q. Meng, S. Kumari, and P. Zhang, “Rotating
behind security: A lightweight authentication protocol [22] M. H. Ibrahim, S. Kumari, A. K. Das, M. Wazid, and
based on iot-enabled cloud computing environments,” V. Odelu, “Secure anonymous mutual authentication for
Sensors, vol. 22, no. 10, p. 3858, 2022. star two-tier wireless body area networks,” Computer
methods and programs in biomedicine, vol. 135, pp. 37–
[12] F. Wei, P. Vijayakumar, J. Shen, R. Zhang, and L. Li, “A 50, 2016.
provably secure password-based anonymous authenti-
cation scheme for wireless body area networks,” Com- [23] C. Vorakulpipat, S. Pichetjamroen, and E. Rattanalerdnu-
puters & Electrical Engineering, vol. 65, pp. 322–331, sorn, “Usable comprehensive-factor authentication for a
2018. secure time attendance system,” peerJ computer science,
vol. 7, p. e678, 2021.
[13] M. Kompara, S. H. Islam, and M. Ho¨lbl, “A robust
and efficient mutual authentication and key agreement [24] A. Alghamdi, “A verification system for multi-factor
scheme with untraceability for wbans,” Computer net- authentication for e-healthcare architectures,” Arab Jour-
works, vol. 148, pp. 196–213, 2019. nal for Scientific Publishing (AJSP), vol. 2663, p. 5798,
2021.
[14] A. M. Koya and P. Deepthi, “Anonymous hybrid mu-
tual authentication and key agreement scheme for wire-
less body area network,” Computer Networks, vol. 140,
pp. 138–151, 2018.