Loading…
Lightweight Secure Session Key Protection, Mutual Authentication and Access Control (LSSMAC) for WBAN assisted IoT NetWork
WBAN (Wireless Body Area NetWork) is a new technology trend that uses wearable sensors linked to the Internet of Things (IoT) network to provide remote tracking and data collection for patient healthcare records. IoT technologies have the potential to change our everyday lives, but they also pose si...
Saved in:
Published in: | IEEE sensors journal 2023-09, Vol.23 (17), p.1-1 |
---|---|
Main Authors: | , |
Format: | Article |
Language: | English |
Subjects: | |
Citations: | Items that this one cites Items that cite this one |
Online Access: | Get full text |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Summary: | WBAN (Wireless Body Area NetWork) is a new technology trend that uses wearable sensors linked to the Internet of Things (IoT) network to provide remote tracking and data collection for patient healthcare records. IoT technologies have the potential to change our everyday lives, but they also pose significant security concerns. However, in untrusted wireless environments, the majority of WBAN-IoT data is shared between computationally restricted devices. As a result, protecting sensitive data in WBN-IoT becomes a crucial challenge. The algorithm had to be lightweight due to the limited computing resources in WBAN sensors or IoT devices. However, significant issues in cloud-based IoT systems must be resolved to recognize the authority of communicators during contact sessions over vulnerable networks like the Internet. To eliminate unauthorized access in IoT applications, a safe authentication, confidentiality, and integrity protocol is highly desirable. Under the hard problem assumptions, our protocol is provably reliable and meets all security criteria, including session key security. In addition, our proposed lightweight secure session key protection, mutual authentication, and access control IoT (LSSMAC-IoT) is considerably greater than the fastest ones shown by the performance evaluation, based on an already existing safe, mutual authentication process based on heavy homomorphic encryptions and zero-knowledge proof. |
---|---|
ISSN: | 1530-437X 1558-1748 |
DOI: | 10.1109/JSEN.2023.3295381 |